Q1. You deploy Windows 7 Enterprise in a VDI pool resource group.
You need to ensure that the visualization strategy meets the company's OSE requirements.
Which GPO setting should you recommend?
A. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications.
B. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings.
C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications.
D. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings.
Answer: D
Q2. Your company has a main office and 20 branch offices.
The network contains 5,000 client computers. 100 users have laptop computers and work
remotely. All remaining users have desktop computers.
You plan to deploy Windows 7 on all client computers.
You need to ensure that your image-creation strategy meets the following requirements:
.Provide access to all applications on the laptop computers when the users first start their computers.
. Provide language-pack support based on the geographic location of the user. . Minimize the bandwidth used to deploy images to the desktop computers.
What should you create?
A. one thick image for all client computers
B. one thin image for all client computers
C. one hybrid image for all client computers
D. one thick image for the portable computers and one thin image for the desktop computers
E. one thin image for the portable computers and one thick image for the desktop computers
Answer: D
Explanation:
hints: all applications on the laptop computers = thick image language- pack support based on the geographic location = thin image
Q3. HOTSPOT
A company's server runs Windows 2008 R2 with Active Directory Domain Services (AD DS) and Windows Server Update Services (WSUS). All client computers run Windows 7 Enterprise.
You need to automate the distribution of Windows security updates to all client computers by meeting the following requirements:
1) Point all client computers to the WSUS server.
2) Schedule updates to install at a specific time.
3) Run the updates immediately after Windows starts if the computer missed the originally
scheduled updates.
You need to configure Group Policy to meet the requirements.
Which settings should you configure? To answer, select the appropriate setting or settings in the work area.
Answer:
Q4. You need to prevent users from accessing USB flash drives on portable computers.
What should you do? (Choose all that apply.)
A. Create a security group in AD DS and place all user objects for users with portable computers in the group.
B. Create a security group in AD DS and place all portable computer objects in the group.
C. Create a GPO that blocks the use of specific GUIDs used by USB flash drives and link it to the root of the domain.
D. Create a WMI filter that applies only to Model A and B computers and link it to a GPO.
E. Create an AppLocker policy that applies to the AD DS computer group you created.
F. Create an AppLocker policy that applies to the AD DS user group you created.
Answer: C,D
Q5. Your company has a single Active Directory Domain Services (AD DS) domain with
Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers.
You are designing the deployment of a custom application.
You have the following requirements:
. The application must be available to only users who need it.
. Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements.
Which deployment method should you use?
A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy
Answer: C
Explanation:
http://blogs.msdn.com/b/rds/archive/2009/06/08/introducing-remoteapp-and-desktop-connections.aspx
The RemoteApp and Desktop Connections feature offers several benefits:
RemoteApp programs launch from the Start menu just like any other application.
Published Remote Desktop connections are included alongside RemoteApp programs on the Start menu.
Changes to the published connection (such as newly published RemoteApp programs) are automatically reflected on the user’s Start menu, without any effort on the user’s part.
RemoteApp programs can be easily launched with Windows Search.
Users only have to log on once, to create the connection. From that point on, updates happen with no prompt for user credentials.
RemoteApp and Desktop Connections does not require domain membership for client computers.
RemoteApp and Desktop Connections benefits from new features in Windows Server 2008
R2, such as Personal Desktop assignment or per-user application filtering.
RemoteApp and Desktop Connections is built on standard technologies such as XML and HTTPS, making it possible for developers to build solutions around it. It also offers APIs that allow the client software to support other types of resources, in addition to RemoteApp programs and Remote Desktop connections.
Q6. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers.
You are planning to deploy a custom application.
You need to schedule the deployment to occur outside of business hours and without user interaction.
Which deployment method should you choose?
A. Lite Touch Installation
B. software deployment with Microsoft System Center Configuration Manager 2007
C. software installation with Group Policy
D. Microsoft Application Virtualization (App-V)
Answer: B
Explanation:
Microsoft System Center Configuration Manager 2007 able to set schedule to deploy (text book) hints: without user interaction = zero touch
Q7. Your company has offices in several countries. You must test and validate all operating system images before you deploy them.
You create a Windows 7 Enterprise master image that has all language packs installed. You test and validate the master image.
You are planning to create regional images based on the master image. Each regional image will contain only the language pack that is necessary for a specific geographic region.
You have the following requirements:
. Remove the language packs that are unnecessary for each region.
. Minimize the necessary testing and validation.
You need to create the regional images.
What should you do?
A. Run lpksetup.exe /u in unattended mode on the master image.
B. Deploy the master image to a target computer. Remove the unnecessary language packs, and then capture each regional image.
C. Service the master image online by using the Deployment Image Servicing and Management (DISM) tool.
D. Service the master image offline by using the Deployment Image Servicing and Management (DISM) tool.
Answer: D
Explanation:
Deployment Image Servicing and Management (DISM) tool:
Image servicing and management solutions fall into two main categories:
Managing the data or information included in the Windows image, such as enumerating or taking an inventory of the components, updates, drivers, or applications contained in an image.
Servicing the image itself, including adding or removing driver packages and drivers, modifying language settings, enabling or disabling Windows features, and upgrading to a higher edition of Windows.
http://technet.microsoft.com/en-us/library/dd744566(v=ws.10).aspx
Q8. You are planning to deliver VDI by using the companys virtualization infrastructure.
You need to ensure that VDI users are always reconnected to the same VDI session.
What should you recommend?
A. Deploy the App-V desktop client.
B. Add the VmHostAgent role service.
C. Deploy the App-V Sequencer.
D. Install Windows Server 2008 R2 Datacenter with the Hyper-V role.
Answer: B
Q9. You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers.
You need to design a custom image that will enable users to connect to a Telnet server.
What should you do?
A. Create a Network Connection before capturing the image.
B. Turn on the Telnet Server feature in the image.
C. Create a Certificate-Based credential before capturing the image.
D. Turn on the Telnet Client feature in the image.
Answer: D
Q10. You have a single Active Directory domain. All domain controllers run Windows Server 2003 with Service Pack 1 (SP1).
You plan to store Windows BitLocker Drive Encryption recovery passwords in Active Directory.
You need to recommend the solution that uses the least amount of administrative effort.
What should you recommend?
A. Upgrade the domain controller that has the role of operations master to Windows Server 2008 R2.
B. Upgrade all domain controllers to Windows Server 2008 R2.
C. Upgrade all domain controllers to Windows Server 2003 SP2.
D. Extend the Active Directory schema.
Answer: D
Explanation:
BitLocker Drive Encryption Configuration Guide: Backing Up BitLocker and TPM Recovery Information to Active Directory
This section provides information about how BitLocker and TPM recovery information can be backed up in Active Directory. By default, no recovery information is backed up. Administrators can configure Group Policy settings to enable backup of BitLocker or TPM recovery information. Before configuring these settings, as a domain administrator you must ensure that the Active Directory schema has been extended with the necessary storage locations and that access permissions have been granted to perform the backup. http://technet.microsoft.com/en-us/library/cc766015(v=ws.10).aspx
Q11. You are planning to deploy Windows 7 Enterprise and several custom applications. You create a custom Windows 7 Enterprise image. You need to validate that the custom applications will run after the deployment. What should you do?
A. Use ImageX with the check option to mount the image.
B. Mount the custom image by using the Deployment Image Servicing and Management (DISM) tool.
C. Deploy the custom image, and then run the sigverif.exe command.
D. Deploy the custom image to a Virtual Hard Disk (VHD), and then boot from the VHD.
Answer: D
Explanation:
The only way to check custom application is C in question, as need to load image to VHD or real PC, then boot from VHD or PC to windows, then run the customer application in windows.
Q12. DRAG DROP
A company has client computers in an Active Directory Domain Services (AD DS) environment. You deploy a new wireless access point (WAP). Third-party security software controls access to the wireless network.
Users are able to connect to the wireless network and access the Internet but are unable to access the company's file servers.
You need to enable users to connect to the file servers by using the wireless network.
Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q13. You are planning to upgrade Microsoft Internet Explorer. You must create a report that identifies which computers are successfully upgraded. You need to design a deployment method that meets this requirement. What should you use? (Choose all that apply.)
A. Microsoft System Center Essentials
B. Windows Intune
C. Microsoft System Center Configuration Manager
D. Internet Explorer Administration Kit (IEAK) and Group Policy
E. Windows Server Update Services (WSUS)
Answer: A,B,D,E
Q14. Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7.
You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) image that includes the custom applications to all Windows 7 client computers.
What should you do?
A. Mount the VM image from the MED-V workspace.
B. Deploy the VM image from the MED-V server.
C. Deploy the VM image by using Windows Deployment Services (WDS).
D. Deploy the VM image by using Windows Server Update Services (WSUS).
Answer: B
Q15. You are designing a Windows 7 deployment image.
You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK). You need to add the MAK to the configuration pass by using an answer file. To which configuration pass should you add the MAK?
A. the WindowsPE configuration pass
B. the Generalize configuration pass
C. the AuditSystem configuration pass
D. the Specialize configuration pass
Answer: D
Explanation:
As a single key is used, you can add MAK keys images when deploying them centrally. When using the Sysprep utility to prepare an image, you add a MAK key to an image during the Specialize configuration pass. When performing a traditional installation, you can enter MAK keys in the same way that you would enter a retail key. The main issue that requires consideration when using a MAK key is how you will perform activation.
http://blogs.msdn.com/b/microsoft_press/archive/2010/10/27/new-book-mcitp-self-paced-training-kit-exam-70-686-windows-174-7-enterprise-desktop-administrator.aspx