Recent comments

Windows 7 Networking


Q1.             There is an Active Directory domain and a Direct Access infrastructure in your network. You have Windows 7 installed on a new laptop and join the computer to the domain. You have to make sure that the computer can establish Direct Access connections. What actions should you perform?

A.  Enable the Network Discovery firewall exception. 
B.  Add the computer account to the Network Configuration Operators group.
C.  Install a computer certificate.
D. Create a network connection.

Answer        A

Q2.             You are in charge of a computer that runs Windows Vista. You have Windows 7 installed on a new partition on the computer. You have to make sure that the computer always starts Windows Vista by default. What action should you perform? 

A.  Create a boot.ini file in the root of the Windows 7 partition.
B.  Create a boot.ini file in the root of the Windows Vista partition.
C.  Run Bcdedit.exe and the /default parameter. 
D. Run Bcdedit.exe and the /bootems parameter

Answer         C

Q3.             You manage a computer that runs Windows 7. You perform an image backup. A virus infects the computer and the computer is caused to become unresponsive. You have to restore the computer as quickly as possible. What action should you perform to achieve this? 

A.  Start the computer from Windows Preinstallation Environment (WinPE) and then run the imageX.exe
B.  Start the computer using the Last Known Good Configuration feature.
C.  Start the computer from Windows 7 DVD and then use the startup repair tool.
D. Start the computer from Windows 7 DVD and then use the System Image Recovery Tool. 

Answer         D

Q4.             You manage a standalone computer named Computer1 that runs Windows 7. Computer1 is shared by several users. You have to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must use as little administrative effort as possible when you try to achieve this. What action should you perform? 

A.  From Software Resricted Policies, Create a path rule.
B.  From Software Resricted Policies, Create a hash rule.
C.  From Access Control Policies, Create the default rules.
D. From Access Control Policies, Create an executable rule. 

Answer         D

Q5.             You are in charge of a computer that runs Windows 7. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What action should you perform? 

A.  From the local Group Policy, modify an application control policy.
B.  From the Control Panel, modify the BitLocker Drive Encryption settings.
C.  From Device manager, modify the settings of all removable devices.
D. From the Local Group Policy, modify a removable storage access policy. 

Answer         D

Q6.             You are in charge of a computer that runs Windows 7. The Ipv6 address of the computer is configured automatically. You have to identify the Ipv6 address of the computer. What action should you perform? 

A.  At the Command Prompt, run Netstat.
B.  At the Command Prompt, run Net config.
C.  From the network connection status, click Details. 
D. From the network connection properties, select IPv6 (TCP/IPv6) and click properties.

Answer         D

Q7.             You use a Laptop named Computer1 which runs Windows 7. There is a file server named Server1 that contains a shared folder named share. Windows server 2008 is run by Server1. Computer1 needs to be configured to make sure that cached files from Share1 are encrypted and when Server1 is disconnected from the network, files located on Server1 are available. So what action should you take to achieve this? 

A.  On Server1, encrypt the files in Share1.On Computer1, make Share1 available offline.
B.  On Server1, configure BitLocker Drive Encryption. On Computer1 make Share1 available offline.
C.  On Computer1, make Share1 available offline and enable encryption of offline files.
D. On Computer1, copy the files from Share1 to the documents library and configure BitLocker Drive Encryption.

Answer         C

Q8.             You have two computers that respectively named Computer1 and Computer2. WIndows Vista is run on Computer1. Windows 7 is run on Computer2. Now you receive an order from the company mangement. You are asked to migrate all profiles from Computer1 to Computer2. You have to identify how much space is required to complete the migration. What action should you perform? 

A.  On Computer1 run Loadstate c:\store/nocompress
B.  On Computer1 run Scanstate c: \store/nocompress/p 
C.  On Computer2 run Loadstate \\computer1\store/nocompress
D. none of the above

Answer         C

Q9.             You have a workgroup which contains five computers, Windows 7 is run by the computers. A computer named Computer 1 has video and Audio files. You have to share Computer1's video and audio files on the network. What should you do? 

A.  Connect a removable drive and enable BitLocker To Go.
B.  Create a HomeGroup. 
C.  Move the files to a Media Library.
D. Enable all BrancheCache rules in the Windows Firewall.

Answer         B

Q10.         You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform?    

A.  From Reliability Monitor, review the informational events. 
B.  From System Information, review the software environment.
C.  From Performance Monitor, review the System Diagnostics Report.
D. From Performance Monitor, run the System Performance Data Collector Set.

Answer         B


Q11.         There is one Active directory domain in your network. You have two computers name Computer1 and Computer2. Both run Windows 7. Both Computers are members of the domain. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You have to make sure that you can recover all EFS encrypted files from Computer2. What action should you perform? 

A.  On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specifyth /adduser parameter.
B.  On Computer1, backup %systemroot%\DigitalLocker. On Computer2 restore the %systemroot%\DigitalLocker.
C.  On Computer1, Export the data recovery agent certificate. On Computer2 Import the data recovery agent certificate. 
D. . On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter

Answer         A

Q12.         You are incharge of a computer that runs Windows 7. The computer needs to be configured to meet the following requirements: - Generate a new security ID (SID) when the computer starts. - Make sure that the Welcome screen appears when the computer starts. 

A.  Run Sysprep.exe/audit/generalize.
B.  Run Sysprep.exe/oobe/generalize. 
C.  Run MSConfig.exe and select Diagnostic startup.
D. Run MSConfig.exe and select Selective startup

Answer         C

Q13.         You manage a computer that runs Windows 7. Now you receive an order from the company management. You are asked to confirm that all device drivers installed on the computer are digitally signed. What action should you perform?    

A.  At the command Prompt, run Verify.
B.  At the command Prompt, run sigverif.exe. 
C.  From Device manager, click scan for harware changes.
D. From Device manager, select the devices by connection view.

Answer         B

Q14.         You are in charge of a computer that runs Windows 7. You need to modify the file extensions that are associated with Internet Explorer. What action should you perform?

A.  From Internet Explorer, click tools and then click Manage add-ons.
B.  From the Control Panel, open Default Programs and then click Set Associations.
C.  From the Local Group Policy, Expand Computer Configuration and then click Software Settings.
D. From Windows Explorer, right-click %programfiles%\Internet Explorer\iexplorer.exe and then click Properties.

Answer         B

Q15.         All of the Windows 7 editions can run on a 64-bit computing platform.

A.  TRUE
B.  FALSE

Answer         B

Q16.         Only the Professional and Ultimate editions of Windows 7 are capable of joining an AD DS domain.

A.  TRUE
B.  FALSE

Answer         B

Q17.         The Windows 7 Upgrade Advisor application only runs on Windows 7, Windows Vista, and Windows XP SP2.

A.  TRUE
B.  FALSE

Answer         A

Q18.         You can upgrade Windows 7 Starter edition to any other edition using Windows Anytime Upgrade

A.  TRUE
B.  FALSE

Answer         A

Q19.         All of the Windows 7 editions have full Homegroup networking support.

A.  TRUE
B.  FALSE

Answer         B

Q20.         Windows 7's Ready Boost feature requires a USB flash drive.

A.  TRUE
B.  FALSE

Answer         A

Q21.         The Windows 7 Enterprise and Ultimate editions both contain the same features.

A.  TRUE
B.  FALSE

Answer         A

Q22.         DirectAccess, BranchCache, and BitLocker are only included with the Enterprise and Ultimate edition of Windows 7.

A.  TRUE
B.  FALSE

Answer         A

Q23.         Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following:  Specifies the Config.xml file that should be used.

A.  /config 
B.  /genconfig
C.  /nocompress
D. /targetxp

Answer         A

Q24.         What is the lowest priced version of Windows 7 that contains Windows Aero?

A.  Starter
B.  Home Basic
C.  Home Premium 
D. Professional

Answer         C

Q25.         This unit is one larger than a Zettabyte

A.  1 EB (exabyte)
B.  1 PB (petabyte)
C.  1 TB (terrabyte)
D. 1YB (yottabyte) 

Answer         D

Q26.         Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: disables data compression?

A.  /genconfig
B.  /nocompress 
C.  /targetxp
D. /ue

Answer         B

Q27.         Which verdions of windows 7 include XP mode and Encrypting File System (EFS) (Choose all that apply.

A.  Windows 7 Enterprise (Missed)
B.  Windows 7 Home Basic
C.  Windows 7 Home Premium
D. none of the above

Answer         A

Q28.         Using the USMT (User State Migration Tool) for the switches related to Scanstate.exe and Loadstate.exe which of the following: Generates a Config.xml file but does not create a store.

A.  /config
B.  /genconfig 
C.  /nocompress
D. /targetxp

Answer         B

Q29.         The Windows 7 OS is stored on which two partitions?

A.  Active Partition
B.  Boot Partition (Missed)
C.  System Partition (Missed)
D. both 2 and 3

Answer         D

Q30.         Your company has a Server 2008 based environment. The company has recently purchased 20 computers. You are required to deploy Windows 7 on all of them. You decide to use Windows 7 image for the deployment. Which of the following utilities will you use to create the answer file and network shares for the image?

A.  ImageX
B.  Sysprep
C.  Windows PE (Windows Pre Installation Environment)
D. WindowSIM (Windows System Image Manager) 

Answer         D

Q31.         Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User include: includes the specified user

A.  /decrypt
B.  /encrypt
C.  /ui 
D. /uel

Answer         C

Q32.         Your sales manager complains that his Windows 7 computer is unable to boot. You suspect that a missing or corrupt OS file is causing it. You find Safe Mode booting and Last Known Good Configuration don't work. Which steps will resolve the issue with the least administrative burden?

A.  Run system recovery options Choose the Startup Repair Option
B.  Run system recovery options Choose the System Restore Option
C.  Run system recovery options  Choose the Windows Complete Restoration Option
D. Run system recovery options Choose the Windows Memory Diagnostic Otion

Answer         A

Q33.         You work as a network administrator. The sales manager works on her laptop that runs Windows 7 Ultimate. Tha hard disk on her lap top is configured as shown. She wants to make one more partition in Disk 0 and not lose any existing data. Which steps should she take?

A.  She can't create more partitions as no unallocated space is available.
B.  Take a back up of both partitions, delete them through disk management a create the required partitions though Fdisk.
C.  Through Disk Management delete the partition D create the required partitions though Fdisk.
D. Use the shrink feature in to create unallocated space. Create the partition using unallocated space.

Answer         D

Q34.         Your company has a Windows Domain Based Network. All servers on the domain run Server 2008 R2 and the clint computers run Windows 7 Ultimate. You are implimenting restriction policies for for running applications on domain users. You need to accomplish the following tasks.Users should be able to run all applications not resticted by any other rules.All applications digitally signed by Hack-It-Once vendor should be restricted.Which steps will get this done? (choose all that apply.)

A.  Create an AppLocker hash rule to block all applications digitally signed by the Hack-It-Once vendor
B.  Create an AppLocker publisher rule to block all applications digitally signed by the Hack-It-Once vendor (Missed)
C.  Impliment a default AppLocker rule to allow all applications that are not subject to any other rules. (Missed)
D. both 2 and 3

Answer         D

Q35.         Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Encypts the store (Scanstae.exe only)

A.  /config
B.  /decrypt
C.  /encrypt
D. /ue

Answer         C

Q36.         Which of the following tools is used to ensure that the legacy applications will run on Windows 7?

A.  Microsoft Application compatibility tool kit
B.  Microsoft Assessment planning tool kit
C.  Microsoft Deployment tool kit
D. Microsoft Shim

Answer         D

Q37.         Using the USMT (User State Migration Tool)  for the switches related to Scanstate.exe and Loadstate.exe which of the following: Excludes the user based on last login time.

A.  /encrypt
B.  /ue
C.  /ui
D. /uel

Answer         D

Q38.         When a user logs into their computer it creates aToken. What is the token called?

A.  Access
B.  Control
C.  Privileges
D. Rights

Answer         A


Q39.         Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User exclude: excludes the specified user.

A.  /decrypt
B.  /encrypt
C.  /genconfig
D. /ue

Answer         D

Q40.         What Windows 7 feature can be utilized for thePurpose of storing credentials?

A.  Credential Manager
B.  KeePass
C.  Password Manager
D. Password Safe

Answer         A

Q41.         What new Windows 7 feature displays details about a device and tasks you can perform with that device?

A.  Device Stage
B.  Jump Lists
C.  Snap
D. Windows Task Bar

Answer         A

Q42.         By using Sysprep, you may prepare an image to be captured by ImageX. Once you have run Sysprep, you can boot your master computer into the Windows Preinstallation Environment (Windows PE) to capture the image. Which of the following is FALSE regarding ImageX?

A.  You can use ImageX to capture and to apply upgrades to the operating system or applications.
B.  You can use only a single compression type for a .wim file. Appended image files must use the same compression type as the initial capture.
C.  You can use only formatted Windows image (.wim) files to interact with ImageX
D. All of these

Answer         A

Q43.         You want to test the performance of one of the Windows 7 clients in the office by using XPerf.exe. You have started a trace with BASE Kernel Group and cswitch Kernel Flag. xperf -on base+cswitch You now want to stop the trace and save it in a file called mytrace.etl. Which command should you use?

A.  xperf -i mytrace.etl
B.  xperf -d mytrace.etl
C.  xperf -merge mytrace.etl kernel.etl
D. xperf -i mytrace.etl -a tracestats –detail

Answer         B

Q44.         You are using sysprep to prepare a system for imaging. You want to enable end users to customize their Windows operating system, create user accounts, name the computer, and other tasks. Which sysprep setting should you use?

A.  /audit
B.  /generalize
C.  /oobe
D. /unattend

Answer         C


Q45.         Which tool can you use to prepare a USB device so that you can boot from it to install Windows 7 on a netbook?

A.  Bcdedit
B.  Diskpart
C.  LoadState.exe
D. ScanState.exe

Answer         B


Q46.         You are in charge of a computer that runs Windows Vista. You have Windows 7 installed on a new partition on the computer. You have to make sure that the computer always starts Windows Vista by default. What action should you perform?

A.  Create a boot.ini file in the root of the Windows 7 partition.
B.  Create a boot.ini file in the root of the Windows Vista partition.
C.  Run Bcdedit.exe and the /default parameter. 
D. Run Bcdedit.exe and the /bootems parameter.

Answer         C


Q47.         There is a head office and a branch office in your company network. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the head office. You run Netsh on your computer as shown in the Exibit. You have to make sure that the other computers in the branch office can access the cached content on your computer. What actions should you perform.

A.  Modify the Windows Firewall with Advanced Security rules. 
B.  Turn on the internet Information Services (IIS).
C.  Configure the computer as a hosted cache client.
D. Configure the BranchCache service to start automatically.

Answer         A


Q48.         You manage a standalone computer that runs Windows 7. You open Windows Update as shown. (Click Exit Button) You have to make sure that the Windows Update settings on the computer can be changed by you manually. What should you do? 

A.  Log on to Windows 7 as a member of the Administrators Group.
B.  From the Local Group Policy, Modify the Windows Update settings. 
C.  Right-Click Windows Update and select run as administrator.
D. Right-Click the command Prompt, select Run as Administrator, and then run Wuapp.exe.

Answer         B


Q49.         You are in charge of a computer that runs Windows 7. You run the Configure Backup wizard as shown in the exhibit. (Backup) You have to make sure that you are able to back up the computer to a local disk drive. What action should you perform before you run the Configure Backup Wizard?

A.  Log on as Administrator.
B.  Connect a removable disk. 
C.  Add your user account to the back up Operators group.
D. Start the Volume Shadow Copy Service (VSS) 

Answer         B


Q50.         You manage a standalone computer named Computer1 that runs Windows 7. Computer1 is shared by several users. You have to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must use as little administrative effort as possible when you try to achieve this. What action should you perform.

A.  From Software Resricted Policies, Create a path rule.
B.  From Software Resricted Policies, Create a hash rule. 
C.  From Access Control Policies, Create the default rules.
D. From Access Control Policies, Create an executable rule. 

Answer         D


Q51.         You are in charge of a computer that runs Windows 7. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What action should you perform?

A.  From the local Group Policy, modify an application control policy.
B.  From the Control Panel, modify the BitLocker Drive Encryption settings.
C.  From Device manager, modify the settings of all removable devices. 
D. From the Local Group Policy, modify a removable storage access policy. 

Answer         D


Q52.         You are in charge of a computer that runs Windows 7. The Ipv6 address of the computer is configured automatically. You have to identify the Ipv6 address of the computer. What action should you perform?

A.  At the Command Prompt, run Netstat.
B.  At the Command Prompt, run Net config.
C.  From the network connection status, click Details. 
D. From the network connection properties, select IPv6 (TCP/IPv6) and click properties.

Answer         C

Q53.         You use a Laptop named Computer1 which runs Windows 7. There is afile server named Server1 that contains a shared folder named share. Windows server 2008 is run by Server1. Computer1 needs to be configured to make sure that cached files from Share1 are encrypted and when Server1 is disconnected from the network , files located on Server1 are available. So what action should you take to achieve this?

A.  On Server1, encrypt the files in Share1.On Computer1, make Share1 available offline.
B.  On Server1, configure BitLocker Drive Encryption. On Computer1 make Share1 available offline.
C.  On Computer1, make Share1 available offline and enable encryption of offline files.
D. On Computer1, copy the files from Share1 to the documents library and configure BitLocker Drive Encryption.

Answer         C


Q54.         You have two computers that respectively named Computer1 and Computer2. WIndows Vista is run on Computer1. Windows 7 is run on Computer2. Now you receive an order from the company mangement. You are asked to migrate all profiles from Computer1 to Computer2. You have to identify how much space is required to complete the migration. What action should you perform?

A.  On Computer1 run Loadstate c:\store/nocompress 
B.  On Computer1 run Scanstate c: \store/nocompress/p 
C.  On Computer2 run Loadstate \\computer1\store/nocompress
D. On Computer2 run Scanstate \\computer1\store/nocompress/p

Answer         B


Q55.         You use a computer named Computer1 which runs Windows7. You run Ipconfig - results are shown in the exhibit. Now you receive an order from the company management. According to the company requirement, you have to make sure that you can establish a DirectAccess connection to the network. What action should you perform first.

A.  Add an additional default gateway address.
B.  Create a new VPN connection.
C.  Configure a static IPv4 address.
D. Enable IPv6 on the network adapter. 

Answer         D


Q56.         You are incharge of a computer that runs Windows 7. Mulitple users log onto the computer. You enable auditing on a folder stored in your computer. You have to make sure that each access to the folder is logged. What should you do?

A.  Start the problem Steps Recorder.
B.  From te Event Viewer, Modify the properties of the security log.
C.  From the Local Group Policy, Configure the audit object access setting. 
D. From the Local Group Policy, Configure the audit directory service access setting.

Answer         C


Q57.         You are incharge of a computer that runs Windows 7. You find that an application named App1 runs during the startup prcess. You have to prevent only app1 from running during startup. Users must be allowed to run App1 manually. What should you do?

A.  From the local Group Policy, modify the application control policy.
B.  From the local Group Policy, modify the software restriction policy.
C.  From the System Configuration tool, select Diagnostic Startup.
D. From the System Configuration tool, modify the Startup applications. 

Answer         D


Q58.         You manage a computer that runs Windows 7. There are two volumes in this computer . The two volumes are respectively named Volume C and Volume D. A document is created on volume D by you. You manually create a restore point and modify the document. You view the properties of the document as shown in the exhibit. You have to make sure you are able to restore the current version of the document if the document is modified. What action should be performed first?

A.  Start the Volume Shadow Copy Service (VSS)
B.  Run Disk Cleanup on Volume D.
C.  Enable Auditing on the document.
D. Turn on system Protection for volume D. 

Answer         D


Q59.         There is an Active Directory domain in your company. All computers are members of the domain. Your network contains an internal website that uses Integrated Windows Authentication. From a computer that runs Windows 7, youtry to connect to the website and are prompted for authentication. You verify that your user account has permission to access the website. You have to ensure that you are automatically authenticated when you connect to the website. What action should you perform?

A.  Add the URL of the website to the Trusted sites zone.
B.  Add the URL of the website to the Local intranet zone. 
C.  Create a complex password for your user account. 
D. Open Credential Manager and modify your credentials.

Answer         B


Q60.         There is a wireless access point in your network. You have a computer that runs Windows 7. The computer connects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wireless access point. You discover that you are now unable to connect to the wireless access point from the Windows 7 computer. You have to make sure that the computer can connect to the wireless access point. What action should you perform?

A.  From Credential Manager, modify the generic credentials. 
B.  From Credential Manager, modify the Windows credentials.
C.  From Network and Sharing Center, turn on Network discovery.
D. From Network and Sharing Center, modify the wireless network connection setting.

Answer         D


Q61.         You are in charge of a computer which is named Computer1. Windows 7 is run by Computer1. You have to make sure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What action should you perform to make sure of this?

A.  From Windows Firewall with Advanced Security, create a new rule. 
B.  From the local Group Policy, modify the application control policies.
C.  From Windows Firewall, modify the Allowed Programs and Features list.
D. From Network and Sharing Center, modify the Advanced Sharing settings.

Answer         A


Q62.         You use a computer that runs Windows 7. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform?

A.  From the Trusted Platform Module (TPM) snap-in, initialize TPM.
B.  From Control Panel, modify the BitLocker Drive Encryption settings.
C.  From a local Group Policy, modify the BitLocker Drive Encryption settings. 
D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings.

Answer         C


Q63.         You are in charge of a computer that runs Windows 7. A printer is installed on the computer. After removing the Everyone group from the access control list (ACL) for the printer, you share the printer. You have to make sure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the print jobs of other users. What should you do?

A.  From the printer's properties, assign the Print permission to the Sales group.
B.  From the printer's properties, assign the Manage Documents permission to the Sales group.
C.  From the local Group Policy, assign the Increase scheduling priority user right to the Sales group. 
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.

Answer         A


Q64.         You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start an application. The stored password needs to be deleted. What action should you perform?

A.  Run Del and specify the /p parameter.
B.  Run Runas and specify the /noprofile parameter.
C.  From Credential Manager, modify the Windows credentials. 
D. From Authorization Manager, modify the Authorization Manager options.

Answer         C


Q65.         You manage a computer that runs Windows 7. The computer has System Protection enabled. You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted. What action should you perform?

A.  Run Disk Cleanup for Programs and features.
B.  Run Disk Cleanup for System Restore and Shadow Copies. 
C.  From the System Protection Restore settings, select Turn off System Restore.
D. From the System Protection Restore settings, select Only restore previous versions of files. 

Answer         B


Q66.         You manage a reference computer that runs Windows 7. You are in going to deploy an image of the computer. An answer file named answer.xml is created by you. You have to make sure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?

A.  Imagex.exe /append answer.xml /check
B.  Imagex.exe /mount answer.xml /verify
C.  Sysprep.exe /reboot /audit /unattend:answer.xml 
D. Sysprep.exe /generalize /oobe /unattend:answer.xml 

Answer         D


Q67.         You manage a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You have to start the computer from the VHD. What action should you perform?

A.  From Diskpart.exe, run Select vdisk. (Missed)
B.  From Disk Management, modify the active partition.
C.  Run Bootcfg.exe and specify the /default parameter. 
D. none of the above

Answer         A


Q68.         You manage a computer that runs Windows 7. Your company has a corporate intranet website. You open Windows Internet Explorer as shown in the exhibit. You have to make sure that you are able to access Web pages on both the Internet and the intranet. What should you do?

A.  From the Tools menu, click Work Offline. 
B.  From the Safety menu, click InPrivate Blocking.
C.  From the Safety menu, click InPrivate Browsing.
D. From the Security tab, add the intranet Web site to the Trusted sites zone. 

Answer         A


Q69.         You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A preshared key is not configured on the wireless access point. You have to connect a computer that runs Windows 7 to the wireless access point. Which security setting should you select for the wireless connection?

A.  WPA2-Personal.
B.  802.1x.
C.  WPA-Personal.
D. WPA2-Enterprise. 

Answer         D


Q70.         You are in charge of two computers that run Windows 7. The two computers are respectively named Computer1 and Computer2. You have to make sure that you can remotely execute commands on Computer2 from Computer1. What action should you perform?

A.  Run Winrm quickconfig on Computer2. 
B.  Run Winrm quickconfig on Computer1.
C.  Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1. 

Answer         A


Q71.         You are in charge of a computer that runs Windows 7. The computer uses a VPN connection to connect to the corporate network. You have to make sure that you are able to access the Internet when the VPN connection is active. The solution must prevent Internet traffic from being routed through the VPN connection. What action should you perform?

A.  Configure the advanced TCP/IP settings of the VPN connection. 
B.  Configure a static DNS server address.
C.  Configure a static IP address and default gateway.
D. Configure the security settings of the VPN connection.

Answer         A


Q72.         You are in charge of computer that runs Windows 7 Professional. A USB disk is attached to the computer. You have to make sure that you can enable BitLocker To Go on the USB disk. So what action should you perform to make sure of this?

A.  Obtain a client certificate from an enterprise certification authority (CA).
B.  Enable Encrypting File System (EFS).
C.  Upgrade the computer to Windows 7 Enterprise. 
D. Initialize the Trusted Platform Module (TPM) hardware.

Answer         C


Q73.         You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User1 uses Encrypting File System (EFS) to encrypt a file. User1 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. So what action should you perform to make sure of this?

A.  Instruct User2 to log on to the computer and take ownership of the file.
B.  Instruct User2 to log on to the computer and encrypt a file. 
C.  Instruct User1 to export the certificate to a certificate (.cer) file.
D. Instruct User1 to move the file to a shared folder on the computer. 

Answer         B


Q74.         You manage a computer that runs Windows 7. According to the company requirement, the computer needs to be configured to download updates from a local Windows Server Update Services (WSUS) server. What action should you perform to achieve this?

A.  From Windows Update, modify the Windows Update settings.
B.  From the local Group Policy, modify the Windows Update settings. 
C.  From the System settings, modify the System Protection settings.
D. none of the above

Answer         B


Q75.         You manage a reference computer that runs Windows 7. You are going to create an image of the computer and then have the image deployed to 100 computers. You have to prepare the reference computer for imaging. What action should you perform before you create the image?

A.  Install the Windows Automated Installation Kit.
B.  Run the Package Manager.
C.  Run the System Preparation tool. 
D. Install the User State Migration Tool.

Answer             C



Windows 7 Networking Windows 7 Networking Reviewed by Positive thinking on 1:13 PM Rating: 5

No comments

Recent