Q1. HOTSPOT - (Topic 6)
You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed.
You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements:
. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office.
. Engineer employees' remote support is prevented when they are working from home.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer:
Q2. - (Topic 2)
You have a computer that runs windows 7.
You configure the computer to automatically install all updates.
You need to verify whether a specific update is installed.
What should you do?
A. In event viewer, examine the application log.
B. In windows update, examine the update history.
C. At the command prompt, run Wusa.exe and specify the /kb parameter.
D. At the command prompt, run Verifier.exe and specify the /query parameter.
Answer: B
Q3. - (Topic 4)
You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can create a striped volume on the computer.
What should you do?
A. Add an additional hard disk.
B. Convert all disks to dynamic disks.
C. Install a digitally-signed disk driver.
D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.
Answer: B
Explanation:
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost.
You can create striped volumes only on dynamic disks. Striped volumes cannot be extended.
You can create a striped volume onto a maximum of 32 dynamic disks.
Backup Operator or Administrator is the minimum membership required to complete the actions below.
Creating a striped volume
Using the Windows interface
Using a command line
To create a striped volume using the Windows interface
In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume….
Follow the instructions on your screen.
To create a striped volume using a command line
Open a command prompt and type diskpart.
At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume.
At the DISKPART prompt, type create volume stripe [size=<size>]
[disk=<disknumber>[,[<seconddisknumber>,
…]].
Q4. HOTSPOT - (Topic 6)
You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed.
Your manager wants you to upgrade all computers to Windows 7.
You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista.
In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. )
Answer:
Q5. - (Topic 2)
Which of the following Windows 7 utilities was used to create the output in the above figure?
Not the real exhibit (exhibit):
German Output (exhibit):
A. MemManager.exe
B. SysPrep.exe
C. Cipher.exe
D. Performance Monitor
Answer: C
Q6. - (Topic 5)
You have a virtual hard disk (VHD) and a computer that runs Windows 7.
The VHD has Windows 7 installed.
You need to start the computer from the VHD.
What should you do?
A. Run the System Configuration Utility and modify the Boot section.
B. Run the System Configuration Utility and modify the Startup section.
C. Run Bootcfg.exe and specify the /Copy parameter.
D. Run Bcdedit.exe and modify the Windows Boot Manager settings.
Answer: D
Q7. - (Topic 2)
You have recently installed Windows 7 Ultimate on a laptop computer, installed applications such as Office, and downloaded and installed all outstanding updates. The computer has two internal hard disks, both formatted with the NTFS file system. You also have an external USB hard disk that you have plugged into the laptop. You used the convert fs/ntfs command to convert the external hard drive to the NTFS file system. You have an 8-GB USB flash memory device and the laptop contains a DVD-ROM writer. In your workplace, you can plug in to the corporate network and connect to a network share on a file server running Windows Server 2008 R2.
On what devices can you create a full System Image backup of the laptop's system volume? (Choose all that apply.)
A. The second internal hard disk
B. The external hard disk
C. The USB flash drive
D. Multiple DVD-ROMs
E. The network share
Answer: A,B,E
Q8. - (Topic 1)
You have a computer that runs Windows 7.
You need to prevent Internet Explorer from saving any data during a browsing session.
What should you do?
A. Disable the BranchCache service.
B. Modify the InPrivate Blocking list.
C. Open an InPrivate Browsing session.
D. Modify the security settings for the Internet zone.
Answer: C
Explanation:
InPrivate Mode consists of two technologies: InPrivate Filtering and InPrivate Browsing.
Both InPrivate Filtering and InPrivate Browsing are privacy technologies that restrict the amount of information available about a user's browsing session. InPrivate Browsing restricts what data is recorded by the browser, and InPrivate Filtering is used to restrict what information about a browsing session can be tracked by external third parties.
Q9. - (Topic 4)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Send notifications to an administrator for predefined thresholds.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: I
Q10. - (Topic 6)
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network.
You need to connect to the projector from your computer. What should you do?
A. From Display, click Connect to a projector.
B. From Network and Sharing Center, create a temporary network and run Displayswitch.exe.
C. From Device Manager, click Add legacy hardware.
D. From the command prompt, run the NetProj command.
Answer: A
Q11. - (Topic 4)
YOU need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. From the Control Panel, open Troubleshooting.
B. From the Control Panel, open Performance Information and Tools.
C. From the Action Center, open Recovery.
D. From the Action Center, under Maintenance, click View reliability history.
Answer: D
Q12. - (Topic 2)
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications
What should you do?
A. On all the computers, configure a custom view. Configure a custom task for the application error events.
B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events.
C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.
D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log.
Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.
Q13. - (Topic 4)
You need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. Open Device Manager.
B. Open Reliability Monitor.
C. Create a User Defined Data Collector Set.
D. Create a new Event Trace Sessions Data Collector Set.
Answer: B
Explanation:
Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.
The Reliability Monitor is intended for advanced computer users, such as software developers and network administrators.
Click to open Action Center.
Click Maintenance. Then, under Check for solutions to problem reports, click View reliability history.
In Reliability Monitor, you can:
Click any event on the graph to view its details.
Click Days or Weeks to view the stability index over a specific period of time.
Click items in the Action column to view more information about each event.
Click View all problem reports to view only the problems that have occurred on your
computer. This view doesn't include the other computer events that show up in Reliability
Monitor, such as events about software installation.
Q14. - (Topic 3)
You have a computer that runs Windows 7. The computer is a member of a domain.
You share D:\data as Data. You assign Everyone Full control share permissions to the folder. No other share permissions are assigned to the folder.
From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: "Destination Folder Access Denied".
You need to ensure that you can create files in the Data share by using the User1 account.
What should you do?
A. Create a local user named User1.
B. Add User1 to the local Power Users group.
C. Assign User1 Write NTFS permission on the D:\data folder.
D. Assign User1 Full control share permissions to the Data share.
Answer: C
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share permissions do not affect users who log on locally, or log on using Remote Desktop. To set permissions for users who log on locally or using Remote Desktop, use the options on the Security tab instead of the Share Permissions tab. This sets permissions at the NTFS file system level. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder. For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally. Permissions The Read permission allows a user or group to access a file or folder but does not allow modification or deletion. The Change permission includes the read permission but also allows you to add files, delete files, and modify files in the shared folder. This permission is equivalent to the Read/Write permission in the basic File Sharing dialog box. The Full Control permission includes all the rights conferred by the Change and Read permissions. It also allows the user assigned that permission to modify the permissions of other users. Full Control is equivalent to the basic sharing Owner permission, though unlike basic sharing, where there can only be one user assigned the Owner permission, you can assign the Full Control permission to users and groups. NTFS permissionsYou can configure the local NTFS permissions for a shared folder or volume using Share and Storage Management in the following ways: New shared resources. In the Provision a Shared Folder Wizard, before you select a network sharing protocol, you can change the NTFS permissions for the folder or volume you will be sharing. These NTFS permissions will apply both locally and when accessing the resource over the network. To change the NTFS permissions, on the NTFS Permissions page, select Yes, change NTFS permissions, and then click Edit Permissions. Existing shared resources. You can change the NTFS permissions of a shared folder or volume listed on the Shares tab. To change the NTFS permissions, select the folder or volume, in the Actions pane click Properties, and on the Permissions tab, click NTFS Permissions.
Q15. - (Topic 3)
You have a computer that runs Windows 7 Professional.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Run Windows Update.
B. Run Windows Anytime Upgrade.
C. From the Windows 7 installation media, run Setup.exe.
D. From the Windows 7 installation media, run Migwiz.exe.
Answer: B
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small
businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade