Q1. Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates and service packs. Microsoft releases a security update for Windows 7. You have the following requirements: The security update must be deployed by 5:00 P.M. on Friday. Computers that are off when the security update is deployed must install the security update as soon as they are turned on. You need to manage the software update process to meet the requirements. What should you do?
A. Approve the security update for installation through the WSUS console with no deadline.
B. Approve the security update for download through the WSUS console with a deadline of Friday at 5:00 P.M.
C. Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00 P.M.
D. Approve the security update for download through the WSUS console with no deadline.
Answer: C
Explanation:
Hints:
1. question mention at friday 5pm
2. question request install update in stead of download update
Q2. You are planning to deploy Windows 7.
You have a custom line-of-business application that is not compatible with Windows 7.
You need to design a solution that allows the application to run.
What should you do?
A. Use the Windows Compatibility Evaluator.
B. Use the Setup Analysis Tool.
C. Use the Compatibility Administrator.
D. Use the Update Compatibility Evaluator.
Answer: C
Explanation:
The Compatibility Administrator tool can help you to resolve many of your compatibility issues by enabling the creation and the installation of application mitigation packages (shims), which can include individual compatibility fixes, compatibility modes, and AppHelp messages. The flowchart in Figure illustrates the steps required while using the Compatibility Administrator to create your compatibility fixes, compatibility modes, and AppHelp messages.
http://sourcedaddy.com/windows-7/using-the-compatibility-administrator.html
Q3. Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7.
You need to distribute a Microsoft Enterprise Desktop Visualization (MED-V) virtual machine (VM) image that includes the custom applications to all Windows 7 client computers.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q4. You are planning a deployment of Windows 7 on multiple client computers.
You need to recommend a Windows 7 deployment solution that meets the following requirements:
. Must support the deployment of WIM or VHD
. Must support deployment by using multicast
What should you include in the recommendations?
A. System Center Configuration Manager 2010
B. Microsoft Deployment Toolkit (MDT)
C. Deployment Image Servicing and Management (DISM)
D. Windows Deployment Services
Answer: D
Q5. You upgrade all of an organization's client computers to Windows 7.
After the upgrade, a specific legacy application does not function correctly.
You need to generate a list of all the computers that have the legacy application installed.
Which two actions should you perform? (To answer, move the appropriate action from the
list of actions to the answer area and arrange them in the correct order.)
Answer:
Q6. Your network contains 5 servers that have the Remote Desktop Session Host role service installed. The servers host a Remote Desktop RemoteApp named App1.
You need to recommend a solution for App1 that meets the following requirements:
. Must ensure that users can connect to any Remote Desktop Session Host server
. Must ensure that users are automatically reconnected to disconnected sessions
What should you include in the recommendations?
A. Windows Virtual PC and Windows XP Mode
B. Remote Desktop Web Access
C. Remote Desktop Gateway
D. Windows Deployment Services
E. Remote Desktop Connection Broker
Answer: E
Explanation:
Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx
Q7. DRAG DROP
Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com.
You deploy a new Group Policy object (GPO) named California Computers GPO as part of the organizational unit (OU) and GPO design shown in the following diagram.
The California Computers GPO contains computer configuration settings and user configuration settings.
User configuration settings are not being applied to users who log on to client computers in the California Computers OU.
Which GPO setting should you select?? (To answer, drag the appropriate setting from the list of settings to the correct location or locations in the work area.)
Answer:
Q8. Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments.
These network segments are shown in the following diagram.
Your company plans to deploy Windows 7 to all client computers.
You need to manage activation for client computers that are located in the high-security network segment.
What should you do?
A. Deploy the Key Management Service (KMS) in the core network segment.
B. Deploy the Key Management Service (KMS) in the high-security network segment.
C. Install the Volume Activation Management Tool (VAMT) in the core network segment.
D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment.
Answer: D
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to
activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx
There is a firewall blocking, (VAMT) should setup at high-security network.
Q9. You are the desktop architect for an enterprise organization with client computers that run Windows 7.
You need to create a new Windows Firewall rule that will allow you to access the Disk Management snap-in of remote client computers.
Which predefined rule should you select? To answer, select the appropriate setting in the work area.
Answer:
Q10. All client computers in your network run Windows 7 Enterprise.
You need to prevent all standard user accounts from running programs that are signed by a
specific publisher.
What should you do?
A. Use AppLocker application control policies. Create an Executable rule.
B. Use software restriction policies. Create a hash rule.
C. Use AppLocker application control policies. Create a Windows Installer rule.
D. Use software restriction policies. Create a path rule.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/dd759068.aspx The AppLocker Microsoft Management Console (MMC) snap-in is organized into four areas called rule collections. The four rule collections are executable files, scripts, Windows Installer files, and DLL files. These collections give the administrator an easy way to differentiate the rules for different types of applications. Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash.
Publisher - This condition identifies an application based on its digital signature and extended attributes. The digital signature contains information about the company that created the application (the publisher). The extended attributes, which are obtained from the binary resource, contain the name of the product that the application is part of and the version number of the application. The publisher may be a software development company, such as Microsoft, or the information technology department of your organization.
Path - This condition identifies an application by its location in the file system of the computer or on the network. AppLocker uses path variables for directories in Windows. File hash - When the file hash condition is chosen, the system computes a cryptographic hash of the identified file.
Q11. You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers.
You need to design a custom image that will enable users to connect to a Telnet server.
What should you do?
A. Create a Network Connection before capturing the image.
B. Turn on the Telnet Server feature in the image.
C. Create a Certificate-Based credential before capturing the image.
D. Turn on the Telnet Client feature in the image.
Answer: D
Q12. Your company’s network has client computers that run Windows 7.
When a user attempts to log on to the domain from a computer named Client1, she receives the following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect.
You need to ensure that the user can log on to the domain from Client1.
What should you do?
A. Disjoin and rejoin Client1 to the domain.
B. Reset the account password for Client1 through Active Directory Users and Computers.
C. Add the computer account for Client1 to the Domain Computers Active Directory group.
D. Reset the account password for the user through Active Directory Users and Computers.
Answer: A
Explanation:
Re-create the computer account, join a workgroup, and then rejoin the domain.
refer to http://support.microsoft.com/kb/810497
Q13. Your company’s network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU).
The company wants to deploy a new application. The application is not packaged.
You have the following requirements:
. Deploy the application to all computers in the shipping department.
. Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements.
Which two actions should you include in the process? (Each correct answer presents part of the solution. Choose two.)
A. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department users, and assign the package to the collection.
Answer: A,B
Explanation:
Hints: GPO only support MSI & ZAP file type this application is not packaged = non MSI or ZaP file type
Q14. Your network has a single domain with 1,000 client computers that run Windows Vista.
You are planning a deployment of Windows 7.
Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7.
You have the following requirements:
. Migrate the user state for each user.
. Preserve the file system and existing applications for only the sales department computers.
You need to recommend the deployment method that is appropriate for the environment.
Which combination of deployment scenarios should you recommend?
A. Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
B. Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.
C. Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.
D. Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.
Answer: A
Explanation:
Hints: only upgrade can preserve existing application
Replace method - change new computer and migrate user state for each user.
Q15. Your companys client computers run Windows 7. Your companys network has a wireless access point (WAP).
A user reports that he regularly loses connectivity to the WAP.
You need to display information about client connectivity to the WAP.
What should you do?
A. Use Event Viewer to view events from a source of WlanConn.
B. Use auditpol.exe to enable successful attempts in the Object Access category.
C. Use Event Viewer to view events from a source of WLAN AutoConfig.
D. Use auditpol.exe to enable failed attempts in the Object Access category.
Answer: C
Explanation:
WLAN AutoConfig service is built-in tool in Windows 7 that can be used to detect and connect to wireless network, http://www.home-network-help.com/wlan-autoconfig-service.html