Q1. All client computers on your company network run Windows 7.
You discover that memory usage on the computers is high.
You need to find the cause of the issue.
What should you do?
A. D. B. Software Environment An existing GPO named AppLockdown applies to Windows 7 machines and uses AppLocker to ensure that: No .bat files are allowed to be run by users and rules are enforced An existing GPO named RestrictApps applies to Windows XP client computers and uses a Software Restriction Policy to ensure that: No .bat files are allowed to be run by users and rules are enforced Data Protection Environment Some users at the Manufacturing site use EFS to encrypt data. A user account named EFSAdmin has been designated as the Data Recovery Agent (DRA). The DRA certificate and private key are stored on a portable USB hard drive. As part of the yearly security compliance audits, a vendor is due to arrive at Tailspin Toys in a month to perform the yearly audit. To prepare for the audit, management has asked you to participate in an internal review of the company's existing security configurations related to network security and data security. The management team has issued the following requirements: New software requirements All installation programs must be digitally signed. Minimum permissions must be granted for installation of programs. Internet Explorer requirements Users must not be able to bypass certificate warnings. Users must not be able to add Internet Explorer add-ons unless the add-ons are approved by IT. Data protection requirements All portable storage devices must use a data encryption technology. The solution must meet the following requirements: Allow all users a minimum of read access to the encrypted data while working from their company client computers. Encrypt entire contents of portable storage devices. Minimize administrative overhead for users as files and folders are added to the portable storage devices. Recovery information for client computer hard drives must be centrally stored and protected with data encryption. Users at the Manufacturing site must have a secondary method of decrypting their existing files if they lose access to their certificate and private key or if the EFS Admin's certificate is not available. You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them. What should you recommend that the users do? A. From the command line, run the cipher.exe /e command. B. From the command line, run the certutil.exe /backupKey command. C. Enroll for a secondary EFS certificate. D. Export their EFS certificates with private keys to an external location. Answer: D
Q11. A company has computers running Windows 7 Enterprise and has hardware capable of displaying Windows Aero. A user is unable to use Windows Flip 3D and does not see previews of open windows from the taskbar. You need to ensure that the computer displays Aero.
What should you do? (Choose all that apply.)
A. Upgrade to Windows 7 Ultimate.
B. Update to the latest video driver.
C. Run the Aero troubleshooter tool.
D. Add additional RAM in the computer.
E. Change the theme to an Aero theme.
F. Re-run the assessment for the Windows Experience Index.
Answer: BCE
Q12. Your company has a main office and a branch office.
The network contains an Active Directory forest. All users on the network access the Internet from their computers.
The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network.
When the employee attempts to join the computer to the domain, the connection fails.
A help desk technician reports the following about the employee:
He has a domain user account.
His computer can access Internet Web sites.
His computer can contact domain controllers by using the domain controllers' IP addresses.
You need to ensure that the employee's computer can join the domain. The solution must ensure that the computer can access resources on the Internet.
What should you do?
A. Modify the time zone for the computer.
B. Modify the IPv4 settings on the computer.
C. Create an A record for the computer in an internal DNS zone.
D. Request that an administrator create a prestaged computer account in the domain.
Answer: B
Q13. The users on your network have portable computers that run Windows 7 Ultimate.
Some users report that the batteries on their computers lose their charge faster than before.
You need to identify which batteries to replace.
What should you do?
A. From each computer, run Powercfg.exe.
B. From each computer, run Windows Resource Monitor.
C. From a network server, run MSConfig.exe.
D. From a network server, run System Information.
Answer: A
Q14. You plan to join Athens client computers to the AD DS domain.
The Athens client computers connect to the network via a wireless connection.
You need to ensure that the Athens client computers can be joined to the domain.
What should you recommend?
A. Create a bootstrap wireless profile for the client computers.
B. Configure Windows Deployment Services with PXE.
C. Create a domain wireless profile for the client computers.
D. Configure Remote Installation Services with PXE.
Answer: A
Q15. A user at the Headquarters site is able to run .bat files on LAPTOP01. However, you notice that the AppLockdown GPO was successfully applied to the computer.
You need to ensure that the user's computer complies with the existing AppLockdown GPO settings.
Which service should you start on LAPTOP01?
A. Application Experience
B. Application Identity
C. Application Management
D. Application Information
Answer: B