Q1. You are planning a migration to Windows 7.
You need to recommend applications that obtain a list of software installed on client computers.
Which applications should you recommend? (Choose all that apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Sysprep
C. Microsoft Assessment and Planning Toolkit (MAP)
D. Microsoft Application Compatibility Toolkit (ACT)
E. windows User State Migration Tool (USMT)
F. Windows System Image Manager (windows SIM)
Answer: C,D
Q2. You deploy Windows 7 to the computers that are used by your companys Web developers. All Web developer user accounts are in a single organizational unit (OU).
Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers.
You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications.
What should you do?
A. Enable Compatibility View in Internet Explorer.
B. Add each server to the Intranet zone.
C. Add each server to the Trusted Sites zone.
D. Set the default security setting in Internet Explorer to Medium.
Answer: B
Explanation:
Pop-up Blocker features Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside the viewable desktop area. For more information, see "Windows Restrictions" in this document. When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual manner. Note that sites in the
Trusted Sites and Local
Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet Options.
http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx
hints: internal web , so i choose intranet zones.
Local Intranet Zone
By default, the Local Intranet zone contains all network connections that were established by using a Universal Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, http://local), as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the Local intranet zone.
Trusted Sites Zone
This zone contains Web sites that you trust as safe (such as Web sites that are on your organization's intranet or that come from established companies in whom you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low.
http://support.microsoft.com/kb/174360
Q3. You need to recommend a Microsoft Enterprise Desktop Visualization (MED-V) image update strategy to meet company requirements.
What should you recommend?
A. windows Update
B. Windows Intune
C. ConfigMgr
D. Windows Deployment Services (WDS)
Answer: C
Q4. Your companys network has client computers that run Windows 7. From a computer
named Computer1, a user attempts to log on to the domain and receives the following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect. You need to ensure that the user can log on to the domain from Computer1. What should you do?
A. Reset the password of the user account.
B. Move the computer account for Computer1 to the Computers container.
C. Run netdomcomputername computer1.
D. Remove Computer1 from the domain and rejoin Computer1 to the domain.
Answer: D
Explanation:
Re-create the computer account, join a workgroup, and then rejoin the domain. Refer to http://support.microsoft.com/kb/810497
Q5. Your network is configured as shown in the following diagram.
You are planning to deploy Windows 7.
You have the following requirements:
. Use BitLocker on all computers in the isolated network.
. Provide DirectAccess on all portable computers.
. Use the Key Management Service (KMS) to activate all client computers.
You need to plan a client computer licensing strategy that meets the requirements.
What should you do?
A. License 500 copies of Windows 7 Ultimate.
B. License 500 copies of Windows 7 Enterprise.
C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses.
D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate.
Answer: B
Explanation:
hints:
Direct Access only available for Ultimate and Enterprise only.
Company should use Enterprise version
Q6. A company network includes Windows 7 client computers and DirectAccess.
When using DirectAccess, users cannot connect to the companys internal resources.
You need to create a batch file that users can execute to trace all network traffic for
DirectAccess from their home computers.
Which command should you use? To answer, drag the appropriate terms from the list of
terms to the correct location or locations in the work area.
Answer:
Q7. Your network has 1,000 client computers that run Windows 7.
You need to install an application, in the Local System account context, on the client computers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Configure a logon script.
B. Configure a startup script.
C. Configure a shutdown script.
D. Configure a logoff script.
Answer: B,C
Q8. You are planning to deploy a computer in the lobby of each office.
You need to control which programs can run on the computer.
What should you do?
A. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure AppLocker.
B. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure BitLocker.
C. Create a GPO that enables and configures AppLocker and link it to the Carlsbad OU.
D. Create a GPO that enables and configures BitLocker and link it to the root of the AD DS domain.
Answer: A
Q9. Your company has a main office and 5 branch offices. Each office contains 200 client computer.
Each office has a direct connection to the Internet. The branch offices are connected to the main office through dedicated connections.
You plan to deploy an update solution for all client computers by using Windows Server Update Services (WSUS).
You need to recommend a WSUS deployment solution. The solution must minimize traffic over the dedicated connections.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Configure WSUS to download updates from an upstream server.
B. Deploy BranchCache in distributed cache mode in each office.
C. Deploy a WSUS server in each office.
D. Configure WSUS to download updates from Microsoft Update.
E. Deploy a WSUS server in the main office only.
Answer: C,D
Explanation:
hints:
Each office has a direct connection to the Internet.
The branch offices are connected to the main office through dedicated connections.
Q10. A company has an Active Directory Domain Services (AD DS) forest with a single domain.
Domain controllers are located in the companys offices in New York and Boston.
You deploy a group policy at the domain level that includes security filtering.
You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.
You suspect there might be replication problems with the policies. What should you do?
A. Run a Group Policy Results report against computers in the Boston office.
B. Run a Group Policy Modeling report against computers in the Boston office.
C. Use the GpoTool.exe command-line tool.
D. Use the RepAdmin.exe command-line tool.
Answer: A
Q11. Your company has 1,000 client computers that run Windows XP Professional x64.
You are planning to deploy Windows 7 Enterprise x64.
The company uses an application that is incompatible with Windows 7 Enterprise x64.
You have the following requirements:
. Provide all users with access to the application.
. Deploy and manage the application by using a centralized solution.
You need to design a solution that meets the requirements.
What should you do?
A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab.
B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode.
C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer.
D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V.
Answer: C
Q12. Your companys network is shown in the following diagram.
There is a VPN between Branch Officebranch office B and the Core Networkcore network.
The company plans to deploy Windows 7 to all client computers.
You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)
A. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network.
B. Deploy the Key Management Service (KMS) in branch office B.
C. Deploy the Key Management Service (KMS) in branch office A.
D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network.
Answer: A,B
Q13. Your company's network includes a main office and several branch offices.
The branch offices are connected to the main office by high-latency links.
All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2.
No servers are located in the branch offices.
Client computers in the branch offices frequently access a specific group of files on a file server named Server1.
These access requests consume significant amounts of bandwidth and reduce the speed of higher-priority traffic.
You need to reduce the bandwidth that is consumed by requests for frequently accessed files.
What should you do?
A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices.
B. Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices.
C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache mode on client computers in only the branch offices.
D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on client computers in only the branch offices.
Answer: D
Explanation:
Branch office does not have server, Distributed cache is only choice. Since we have server at main office, we can enable the BranchCache For Network Files role service
Q14. You need to ensure that the company's remote computers receive Windows updates at the same time as the internal computers.
What should you do?
A. Implement System Center Operations Manager (OpsMgr)
B. Install the Windows Deployment Services (WDS) role.
C. Install BranchCache in distnbuted mode.
D. Deploy DtrectAccess.
Answer: D
Q15. Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise on the existing client computers.
You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.
What should you do?
A. Use the Refresh Computer method and a hard-link migration store.
B. Use the Refresh Computer method and a compressed migration store.
C. Use the Replace Computer method and a hard-link migration store.
D. Use the Replace Computer method and a compressed migration store.
Answer: A
Explanation:
A hard-link migration store enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario.
http://technet.microsoft.com/en-us/library/dd560753(v=ws.10).aspx
Refresh Scenario
Similar to a new installation, the refresh scenario performs a clean setup. The difference is that the target computer already contains Windows, for which files and settings will be preserved (installed applications are not taken into consideration). This scenario is especially useful in the event that preserving the user state is a priority. It still leverages the consistency benefits that come through a new installation. You can automate this scenario with the latest version of the User State Migration Tool (USMT 4.0), which will collect pertinent data for each user state found in the system, and restore it after the clean installation is performed.
Replace Scenario
This is similar to the refresh scenario, except the target system is a new computer that does not yet contain any files or settings. The scenario consists of conducting a new installation on the target computer, and then using the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario side-by-side with an older system running Windows XP or Windows Vista.
http://technet.microsoft.com/en-us/magazine/hh124549.aspx
Hints:
Install on existing client computer = refresh
Replace a new client computer = Replace