Q1. All client computers in your network run Windows 7 Enterprise.
You need to prevent all standard user accounts from running programs that are signed by a
specific publisher.
What should you do?
A. Use AppLocker application control policies. Create an Executable rule.
B. Use software restriction policies. Create a hash rule.
C. Use AppLocker application control policies. Create a Windows Installer rule.
D. Use software restriction policies. Create a path rule.
Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/dd759068.aspx The AppLocker Microsoft Management Console (MMC) snap-in is organized into four areas called rule collections. The four rule collections are executable files, scripts, Windows Installer files, and DLL files. These collections give the administrator an easy way to differentiate the rules for different types of applications. Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash.
Publisher - This condition identifies an application based on its digital signature and extended attributes. The digital signature contains information about the company that created the application (the publisher). The extended attributes, which are obtained from the binary resource, contain the name of the product that the application is part of and the version number of the application. The publisher may be a software development company, such as Microsoft, or the information technology department of your organization.
Path - This condition identifies an application by its location in the file system of the computer or on the network. AppLocker uses path variables for directories in Windows. File hash - When the file hash condition is chosen, the system computes a cryptographic hash of the identified file.
Q2. A company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers run Windows 7 Enterprise. The kiosk computers do not have network connections.
The company brands the Microsoft Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar. The company changes its logo.
You have the following requirements:
. Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers.
. Modify the search providers that are available to main office computers.
You need to define Internet Explorer settings to support the requirements.
Which two actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q3. You are planning to deploy Windows 7 Enterprise to all of your company’s client computers.
You have the following requirements:
. Create two custom partitions on each client computers hard disk, one for the operating system and the other for data.
. Automatically create the partitions during Windows Setup.
You need to design an image that meets the requirements.
What should you do?
A. Use SysPrep to create the two partitions during Windows Setup.
B. Use Windows PE to create the partitions. Install Windows 7 on the first partition.
C. Use Windows System Image Manager (Windows SIM) to specify the partition configuration.
D. Use Disk Management to create the two partitions on the hard disk.
Answer: C
Explanation:
Windows System Image Manager (Windows SIM) creates and manages unattended Windows Setup answer files in a graphical user interface (GUI). Answer files are XML-based files that are used during Windows Setup to configure and to customize the default Windows installation. For example, you can use Windows SIM to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, Windows SIM can also install third-party applications, device drivers, language packs, and other updates.
http://technet.microsoft.com/en-us/library/cc766347(v=ws.10).aspx
Q4. When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message.
You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC.
To which group should you add the user?
A. Add the user to the Power Users group on Server1.
B. Add the user to the Remote Desktop Users group on Server1.
C. Add the user to the domain Windows Authorization Access group.
D. Add the user to the domain Remote Desktop Users group
Answer: B
Q5. Your company has client computers that run Windows Vista. The company plans to upgrade the Windows Vista computers to Windows 7. The current configuration of all client computers in your company is based on a common Windows Vista image. Some branch offices use WAN connections to connect to the main office.
You have the following requirements:
Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.
Use the least amount of bandwidth while transferring the user data. Support the same migration strategy for all offices.
You need to design a user state migration strategy that supports the requirements.
What should you do?
A. Use the Deployment Image Servicing and Management (DISM) tool.
B. Use the User State Migration Tool (USMT) and a hard-link migration store.
C. Use Windows PE to perform an offline migration.
D. Use the multicast feature of Windows Deployment Services (WDS).
Answer: B
Explanation:
Hints: A and B is not use for user state migration C is the best tool to do that
Q6. Your company has more than 1,000 client computers. You deploy Windows 7 by using six different images.
A driver that is included in the images needs to be replaced. You have the following requirements:
. Update the Windows 7 images with the new driver.
. Ensure that the old driver is no longer available.
You need to define an image-update strategy that meets the requirements.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Deploy each image to a reference computer, and then uninstall the old driver and install the new driver. Capture the new image.
B. Mount each image by using ImageX, and then install the new driver.
C. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and then delete the old driver and inject the new driver.
D. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and then copy the new driver into a new folder in the image.
Answer: A,C
Explanation:
hints:
Question request add new drive and remove old driver.
Q7. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.
You are planning to deploy Windows 7 Enterprise to the client computers.
You need to design a zero-touch installation strategy.
What should you use in your design?
A. custom Windows 7 image on DVD
B. unattended installation
C. Windows Deployment Services (WDS)
D. Microsoft System Center Configuration Manager 2007 R2
Answer: D
Explanation:
Microsoft Deployment Toolkit (MDT) 2010 is a Microsoft solution accelerator available at no cost for deploying Windows operating systems. Based on the experience of Microsoft employees, partners, and customers, MDT 2010 contains many thousands of lines of code—code that provides a deployment framework so that customers can focus on their business, not on programming. Integrating MDT 2010 with Configuration Manager 2007 R2 helps large organizations use this framework to more easily implement the Zero-Touch, High-Volume
Deployment strategy.
Benefits of integrating MDT 2010 with Configuration Manager 2007 R2 in the Zero-Touch, High-Volume
Deployment strategy include:
-Streamlined deployment, because installation is fully automated without interaction.
-Lower support costs, because configurations are consistent across all client computers.
-Streamlined maintenance, because Configuration Manager 2007 R2 handles applications, device drivers, and updates.
http://technet.microsoft.com/en-us/library/dd919178(v=ws.10).aspx
Q8. You have an image that is used to deploy Windows 7 on client computers.
You need to modify the image to change the edition of Windows 7.
What should you do?
A. Use Windows Setup to service the image.
B. Service the image online.
C. Service the image offline.
D. Use audit mode to service the image.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd744572(v=ws.10).aspx
Change the Windows Image to a Higher Edition You can change your Windows image to a higher edition while it is offline by using the DISM commands in the following procedure. You should not use this procedure on an image that has already been changed to a higher edition.
Q9. You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators?
A. Local Group Policy Editor
B. GPOAccelerator Tool
C. Remote Server Administration Tools
D. Administration Tools Pack
Answer: C
Explanation:
Group Polices were modified using the Group Policy Edit tool that was integrated with Active Directory Users and Computers Microsoft Management Console (MMC) snap-in, but it was later split into a separate MMC snap-in called the Group Policy Management Console (GPMC). The GPMC is now a user component in Windows Server 2008 and Windows Server 2008 R2 and is provided as a download as part of the Remote Server Administration Tools for Windows Vista and Windows 7.
http://en.wikipedia.org/wiki/Group_Policy
Q10. Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise on the existing client computers.
You need to ensure that the user state can be viewed after it has been collected and saved.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Perform an offline migration by using Windows PE.
B. Use an uncompressed migration store.
C. Perform an offline migration by using Windows.old.
D. Use a hard-link migration store.
Answer: B,D
Q11. Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments.
These network segments are shown in the following diagram.
Your company plans to deploy Windows 7 to all client computers.
You need to manage activation for client computers that are located in the high-security network segment.
What should you do?
A. Deploy the Key Management Service (KMS) in the core network segment.
B. Deploy the Key Management Service (KMS) in the high-security network segment.
C. Install the Volume Activation Management Tool (VAMT) in the core network segment.
D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment.
Answer: D
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to
activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx
There is a firewall blocking, (VAMT) should setup at high-security network.
Q12. HOTSPOT
A company has client computers that run windows 7. A new corporate security policy states that all client computers in the legal department should allow only inbound and outbound network connections for which there is an existing firewall rule.
You need to ensure that all client computers in the legal department are configured to follow the new security policy.
Which settings should you select? To answer, select the appropriate setting or settings in the work area.
Answer:
Q13. Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates.
You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows 7.
You need to ensure that all users are able to run the custom application.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Install and register a shim on the WSUS server.
B. Install and register a shim on the client computers by using Group Policy.
C. Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.
D. Deploy and register the compatibility-fix database file to the client computers by using a user startup script.
Answer: B,C
Q14. You create a Windows 7 image. You plan to test the image on 10 percent of the computers in each office. You need to recommend a deployment strategy to minimize the amount of time spent deploying the image. What should you recommend?
A. Distribute one USB flash drive containing a Windows 7 installation to Madrid, Carlsbad, and New Orleans. Create a new deployment share in Munich.
B. Send one USB flash drive containing a Windows 7 installation to each site.
C. Send one DVD installation disk to each site.
D. Distribute one USB flash drive containing a Windows 7 installation to Carlsbad and New Orleans. Create a new deployment share in Los Angeles.
Answer: A
Q15. The client computers in your network run either Windows XP or Windows 7. All client computers are in a single Active Directory Domain Services (AD DS) organizational unit (OU) named MyClients.
You install Windows Software Update Services (WSUS). You create a Group Policy object (GPO) that enables automatic updates from the WSUS server, and you link the GPO to the MyClients OU. You place all client computers in a targeting group named MyClients.
Testing reveals that a security update that is applicable to both Windows XP and Windows 7 causes a line-of-business application to fail on the Windows XP client computers.
You need to ensure that the application runs on the Windows XP client computers and that the Windows 7 client computers receive the security update.
What should you do?
A. Remove the Windows XP client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
B. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
C. Create a targeting group named MyXPClients beneath the MyClients targeting group. Move the Windows XP client computers to the MyXpClients targeting group. Approve the update for installation to the MyClients targeting group.
D. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the Unassigned Computers targeting group.
Answer: D
Explanation:
All computers targeting group = assigned group and unassigned group.
Unassigned computer targeting group = all computer which is not assign to any group.
untitled
hints:
Windows 7 remove from MyClients = unassigned computer targeting group
Windows XP = MyClients targeting group
update will only done for unassigned computer targeting group