Q1. - (Topic 1)
A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate?
A. Sysprep
B. Windows PE
C. WDS
D. Windows Anytime Upgrade
Answer: D
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Q2. - (Topic 3)
You need to prevent a custom application from connecting to the Internet.
What should you do?
A. From Windows Firewall, add a program.
B. From Windows Defender, modify the Allowed items list.
C. From Windows Firewall with Advanced Security, create an inbound rule.
D. From Windows Firewall with Advanced Security, create an outbound rule.
Answer: D
Explanation:
Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1.
What should you do?
A. From Windows Firewall with Advanced Security, create a predefined rule.
B. From Windows Firewall with Advanced Security, create a custom rule.
C. From Network and Sharing Center, modify the network location settings.
D. From Network and Sharing Center, modify the advanced sharing settings.
Q3. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives.
What should you do?
A. From the local Group Policy, modify an application control policy.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From Device Manager, modify the settings of all removable devices.
D. From the local Group Policy, modify a removable storage access policy.
Answer: D
Q4. - (Topic 3)
You have a computer that runs Windows 7.
You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7.
You need to start Windows 7 in the minimum amount of time.
What should you do?
A. From Windows XP, modify the default path in the boot.ini file.
B. From Windows XP Recovery Console, run the Fixboot command.
C. Start the computer from the Windows 7 installation media and select Install now.
D. Start the computer from the Windows 7 installation media and run Startup Repair.
Answer: D
Explanation: When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released
Q5. - (Topic 2)
You have a computer that runs Windows Vista.
You install Windows 7 on a new partition on the computer.
You need to ensure that the computer always starts Windows Vista by default.
What should you do?
A. Run Bcdedit.exe and specify the /default parameter.
B. Run Bcdedit.exe and specify the /bootems parameter.
C. Create a boot.ini file in the root of the Windows 7 partition.
D. Create a boot.ini file in the root of the Windows Vista partition.
Answer: A
Explanation:
The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses
Q6. - (Topic 1)
You have a computer that runs Windows 7.
Your network contains a VPN server that runs Windows Server 2008.
You need to authenticate to the VPN server by using a smart card.
Which authentication setting should you choose?
A. CHAP
B. EAP
C. MS-CHAP v2
D. PAP
Answer: B
Explanation:
VPN Server Software Requirements VPN server software requirements for smart card access are relatively straightforward. The remote access servers must run Windows 2000 Server or later, have Routing and Remote Access enabled, and must support Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). EAP-TLS is a mutual authentication mechanism developed for use in conjunction with security devices, such as smart cards and hardware tokens. EAP-TLS supports Point-to-Point Protocol (PPP) and VPN connections, and enables exchange of shared secret keys for MPPE, in addition to Ipsec. The main benefits of EAP-TLS are its resistance to brute-force attacks and its support for mutual authentication. With mutual authentication, both client and server must prove their identities to each other. If either client or server does not send a certificate to validate its identity, the connection terminates.Microsoft Windows Server. 2003 supports EAP-TLS for dial-up and VPN connections, which enables the use of smart cards for remote users. For more information about EAP-TLS, see the Extensible Authentication Protocol (EAP) topic at www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/auth_eap. mspx. For more information about EAP certificate requirements, see the Microsoft Knowledge Base article "Certificate Requirements when you use EAP-TLS or PEAP with EAP-TLS" at http://support.microsoft.com/default.aspx? scid=814394.
Q7. - (Topic 3)
Your network contains a Network Policy and Access Services server named Server1.
All certificates in the organization are issued by an enterprise certification authority (CA) named Server2.
You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP.
You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider."
You need to ensure that you can successfully establish the VPN connection to Server1.
What should you do on Computer1?
A. Import the root certificate to the user's Trusted Publishers store.
B. Import the root certificate to the computer's Trusted Root Certification Authorities store.
C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store.
D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.
Answer: B
Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA.
Q8. - (Topic 1)
Which of the following is not a minimum requirement to install Windows 7?
A. 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor
B. 4GB RAM (32-bit)/2 GB RAM (64-bit)
C. 16 GB available disk space (32-bit)/20 GB (64-bit)
D. DirectX 9 graphics processor with WDDM 1.0 or higher driver.
Answer: B
Q9. - (Topic 1)
Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point.
You disable Service Set Identifier (SSID) broadcasts on the wireless access point.
You discover that you are now unable to connect to the wireless access point from the Windows 7 computer.
You need to ensure that the computer can connect to the wireless access point.
What should you do?
A. From Credential Manager, modify the generic credentials.
B. From Credential Manager, modify the Windows credentials.
C. From Network and Sharing Center, turn on Network discovery.
D. From Network and Sharing Center, modify the wireless network connection settings.
Answer: D
Explanation:
Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q10. - (Topic 5)
You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL).
You attempt to connect to the internal website. You receive the following error message:
"There is a problem with this website's security certificate."
You need to be able to connect to the internal website successfully.
What should you do?
A. From Internet Explorer, add the website to the Local Intranet zone.
B. From Certificate Manager, import the website's certificate into the computer's Trusted Publishers store.
C. From Certificate Manager, import the website's certificate into your Trusted Root Certification Authorities store.
D. From Certificate Manager, import the website's certificate into your Personal store.
Answer: D
Q11. - (Topic 2)
You have a computer that runs Windows 7.
You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.)
You need to ensure that you can configure permissions on the file.
What should you do?
A. From Folder Options, modify the View settings.
B. Move the file to a disk that has the NTFS file system.
C. Open Windows Explorer by using elevated privileges.
D. Hold the SHIFT key, right-click the file, and click Properties.
Answer: B
Explanation:
Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object.
Q12. - (Topic 4)
You have two computers named Workstation! and Workstation2 that have Windows 7 SP1 installed.
You connect to Workstation2 from Workstation1 by using Remote Desktop.
You need to be able to copy files between the computers during the Remote Desktop session.
What should you do?
A. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources settings.
B. On Workstation1, open Remote Desktop Connection and configure the Local devices and resources settings.
C. On Workstation2, type MSTSC /v:Computer1 /f /console.
D. On Workstation1, open Remote Desktop Connection and configure the Connect from Anywhere settings.
Answer: B
Explanation:
How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
Q13. - (Topic 3)
You are evaluating the purchase a notebook computer that has the following hardware:
1.6-gigahertz (GHz) 32-bit processor
1024-MB RAM
1 video card that uses shared memory
4-GB solid state drive
You need to ensure that you can install Windows 7 Enterprise on the notebook computer.
Which hardware component should you change?
A. hard disk
B. processor
C. RAM
D. video card
Answer: A
Explanation:
Hard Disk does not meet the minimum requirements.4-GB solid state drive!= 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available spaceRequirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
-1 GHz 32-bit (x86) or 64-bit (x64) processor- 1 GB of system memory- A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver,- Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics
Q14. - (Topic 3)
You plan to install Windows 7 on a new notebook computer.
The computer will be used by users who speak English, French, and German.
You need to select an edition of Windows 7 that enables the users to switch between different graphical user interface (GUI) languages. The solution must minimize costs.
Which edition should you choose?
A. Home Premium
B. Professional
C. Starter
D. Ultimate
Answer: D
Q15. HOTSPOT - (Topic 6)
A law firm's wireless network does not use IPv6 and provides IP addresses automatically to connected clients.
A visiting attorney arrives to perform a deposition. The attorney's computer has never connected to the firm's wireless network. The attorney needs general access to several websites but is unable to connect to the Internet.
You collect information from the computer's Device Manager, Network Connections, and Wireless Network Connections.
Device information is shown in the Device Manager exhibit. (Click the Exhibit button.)
Network information is shown in the Network Connections exhibit. (Click the Exhibit button.)
Wireless network information is shown in the Wireless Network Connections exhibit. (Click the Exhibit button.)
You need to configure this attorney's laptop so it can access the Internet through the firm's wireless network.
Consider each of the following statements. Does the information in the three screenshots support the inference as stated? (This question is worth three points.)
Answer: