Windows 7 Networking
Q1.
There is an Active Directory domain and a Direct Access
infrastructure in your network. You have Windows 7 installed on a new laptop
and join the computer to the domain. You have to make sure that the computer
can establish Direct Access connections. What actions should you perform?
A. Enable the
Network Discovery firewall exception.
B. Add the computer
account to the Network Configuration Operators group.
C. Install a
computer certificate.
D. Create a network
connection.
Answer A
Q2.
You are in charge of a computer that runs Windows Vista. You have
Windows 7 installed on a new partition on the computer. You have to make sure
that the computer always starts Windows Vista by default. What action should
you perform?
A. Create a boot.ini
file in the root of the Windows 7 partition.
B. Create a boot.ini
file in the root of the Windows Vista partition.
C. Run Bcdedit.exe
and the /default parameter.
D. Run Bcdedit.exe
and the /bootems parameter
Answer C
Q3.
You manage a computer that runs Windows 7. You perform an image
backup. A virus infects the computer and the computer is caused to become
unresponsive. You have to restore the computer as quickly as possible. What
action should you perform to achieve this?
A. Start the
computer from Windows Preinstallation Environment (WinPE) and then run the
imageX.exe
B. Start the
computer using the Last Known Good Configuration feature.
C. Start the
computer from Windows 7 DVD and then use the startup repair tool.
D. Start the
computer from Windows 7 DVD and then use the System Image Recovery Tool.
Answer D
Q4.
You manage a standalone computer named Computer1 that runs Windows
7. Computer1 is shared by several users. You have to prevent all users who are
members of a group named Group1 from running Windows Media Player. All other
users must be allowed to run Windows Media Player. You must use as little
administrative effort as possible when you try to achieve this. What action
should you perform?
A. From Software
Resricted Policies, Create a path rule.
B. From Software
Resricted Policies, Create a hash rule.
C. From Access
Control Policies, Create the default rules.
D. From Access
Control Policies, Create an executable rule.
Answer D
Q5.
You are in charge of a computer that runs Windows 7. Multiple users
log on to the computer. You need to deny one user access to removable devices
on the computer. All other users must have access to the removable drives. What
action should you perform?
A. From the local
Group Policy, modify an application control policy.
B. From the Control
Panel, modify the BitLocker Drive Encryption settings.
C. From Device
manager, modify the settings of all removable devices.
D. From the Local
Group Policy, modify a removable storage access policy.
Answer D
Q6.
You are in charge of a computer that runs Windows 7. The Ipv6
address of the computer is configured automatically. You have to identify the
Ipv6 address of the computer. What action should you perform?
A. At the Command
Prompt, run Netstat.
B. At the Command
Prompt, run Net config.
C. From the network
connection status, click Details.
D. From the network
connection properties, select IPv6 (TCP/IPv6) and click properties.
Answer D
Q7.
You use a Laptop named Computer1 which runs Windows 7. There is a
file server named Server1 that contains a shared folder named share. Windows
server 2008 is run by Server1. Computer1 needs to be configured to make sure
that cached files from Share1 are encrypted and when Server1 is disconnected
from the network, files located on Server1 are available. So what action should
you take to achieve this?
A. On Server1, encrypt
the files in Share1.On Computer1, make Share1 available offline.
B. On Server1,
configure BitLocker Drive Encryption. On Computer1 make Share1 available
offline.
C. On Computer1,
make Share1 available offline and enable encryption of offline files.
D. On Computer1,
copy the files from Share1 to the documents library and configure BitLocker
Drive Encryption.
Answer C
Q8.
You have two computers that respectively named Computer1 and
Computer2. WIndows Vista is run on Computer1. Windows 7 is run on Computer2.
Now you receive an order from the company mangement. You are asked to migrate
all profiles from Computer1 to Computer2. You have to identify how much space
is required to complete the migration. What action should you perform?
A. On Computer1 run
Loadstate c:\store/nocompress
B. On Computer1 run
Scanstate c: \store/nocompress/p
C. On Computer2 run
Loadstate \\computer1\store/nocompress
D. none of the above
Answer C
Q9.
You have a workgroup which contains five computers, Windows 7 is run
by the computers. A computer named Computer 1 has video and Audio files. You
have to share Computer1's video and audio files on the network. What should you
do?
A. Connect a
removable drive and enable BitLocker To Go.
B. Create a HomeGroup.
C. Move the files to
a Media Library.
D. Enable all
BrancheCache rules in the Windows Firewall.
Answer B
Q10.
You manage a computer that runs Windows 7. You have to identify
which applications were installed during the last week. So what action should you
perform?
A. From Reliability
Monitor, review the informational events.
B. From System
Information, review the software environment.
C. From Performance
Monitor, review the System Diagnostics Report.
D. From Performance
Monitor, run the System Performance Data Collector Set.
Answer B
Q11.
There is one Active directory domain in your network. You have two
computers name Computer1 and Computer2. Both run Windows 7. Both Computers are
members of the domain. From Computer1, you can recover all Encrypting File System
(EFS) encrypted files for users in the domain. You have to make sure that you
can recover all EFS encrypted files from Computer2. What action should you
perform?
A. On Computer1, run
Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe
and specifyth /adduser parameter.
B. On Computer1,
backup %systemroot%\DigitalLocker. On Computer2 restore the
%systemroot%\DigitalLocker.
C. On Computer1,
Export the data recovery agent certificate. On Computer2 Import the data
recovery agent certificate.
D. . On Computer1,
run Secedit.exe and specify the /export parameter. On Computer2, run
Secedit.exe and specify the /import parameter
Answer A
Q12.
You are incharge of a computer that runs Windows 7. The computer
needs to be configured to meet the following requirements: - Generate a new
security ID (SID) when the computer starts. - Make sure that the Welcome screen
appears when the computer starts.
A. Run
Sysprep.exe/audit/generalize.
B. Run
Sysprep.exe/oobe/generalize.
C. Run MSConfig.exe
and select Diagnostic startup.
D. Run MSConfig.exe
and select Selective startup
Answer C
Q13.
You manage a computer that runs Windows 7. Now you receive an order
from the company management. You are asked to confirm that all device drivers
installed on the computer are digitally signed. What action should you
perform?
A. At the command
Prompt, run Verify.
B. At the command
Prompt, run sigverif.exe.
C. From Device
manager, click scan for harware changes.
D. From Device
manager, select the devices by connection view.
Answer B
Q14.
You are in charge of a computer that runs Windows 7. You need to
modify the file extensions that are associated with Internet Explorer. What
action should you perform?
A. From Internet
Explorer, click tools and then click Manage add-ons.
B. From the Control
Panel, open Default Programs and then click Set Associations.
C. From the Local
Group Policy, Expand Computer Configuration and then click Software Settings.
D. From Windows
Explorer, right-click %programfiles%\Internet Explorer\iexplorer.exe and then
click Properties.
Answer B
Q15.
All of the Windows 7 editions can run on a 64-bit computing
platform.
A. TRUE
B. FALSE
Answer B
Q16.
Only the Professional and Ultimate editions of Windows 7 are capable
of joining an AD DS domain.
A. TRUE
B. FALSE
Answer B
Q17.
The Windows 7 Upgrade Advisor application only runs on Windows 7,
Windows Vista, and Windows XP SP2.
A. TRUE
B. FALSE
Answer A
Q18.
You can upgrade Windows 7 Starter edition to any other edition using
Windows Anytime Upgrade
A. TRUE
B. FALSE
Answer A
Q19.
All of the Windows 7 editions have full Homegroup networking
support.
A. TRUE
B. FALSE
Answer B
Q20.
Windows 7's Ready Boost feature requires a USB flash drive.
A. TRUE
B. FALSE
Answer A
Q21.
The Windows 7 Enterprise and Ultimate editions both contain the same
features.
A. TRUE
B. FALSE
Answer A
Q22.
DirectAccess, BranchCache, and BitLocker are only included with the
Enterprise and Ultimate edition of Windows 7.
A. TRUE
B. FALSE
Answer A
Q23.
Using the USMT (USer State Migration Tool) For the switchs related
to Scanstate.exe and Loadstate.exe which of the following: Specifies the
Config.xml file that should be used.
A. /config
B. /genconfig
C. /nocompress
D. /targetxp
Answer A
Q24.
What is the lowest priced version of Windows 7 that contains Windows
Aero?
A. Starter
B. Home Basic
C. Home
Premium
D. Professional
Answer C
Q25.
This unit is one larger than a Zettabyte
A. 1 EB (exabyte)
B. 1 PB (petabyte)
C. 1 TB (terrabyte)
D. 1YB (yottabyte)
Answer D
Q26.
Using the USMT (USer State Migration Tool) For the switchs related
to Scanstate.exe and Loadstate.exe which of the following: disables data
compression?
A. /genconfig
B. /nocompress
C. /targetxp
D. /ue
Answer B
Q27.
Which verdions of windows 7 include XP mode and Encrypting File
System (EFS) (Choose all that apply.
A. Windows 7
Enterprise (Missed)
B. Windows 7 Home
Basic
C. Windows 7 Home
Premium
D. none of the above
Answer A
Q28.
Using the USMT (User State Migration Tool) for the switches related
to Scanstate.exe and Loadstate.exe which of the following: Generates a
Config.xml file but does not create a store.
A. /config
B. /genconfig
C. /nocompress
D. /targetxp
Answer B
Q29.
The Windows 7 OS is stored on which two partitions?
A. Active Partition
B. Boot
Partition (Missed)
C. System
Partition (Missed)
D. both 2 and 3
Answer D
Q30.
Your company has a Server 2008 based environment. The company has
recently purchased 20 computers. You are required to deploy Windows 7 on all of
them. You decide to use Windows 7 image for the deployment. Which of the
following utilities will you use to create the answer file and network shares
for the image?
A. ImageX
B. Sysprep
C. Windows PE
(Windows Pre Installation Environment)
D. WindowSIM
(Windows System Image Manager)
Answer D
Q31.
Using the USMT (USer State Migration Tool) For the switchs related
to Scanstate.exe and Loadstate.exe which of the following: User include:
includes the specified user
A. /decrypt
B. /encrypt
C. /ui
D. /uel
Answer C
Q32.
Your sales manager complains that his Windows 7 computer is unable
to boot. You suspect that a missing or corrupt OS file is causing it. You find
Safe Mode booting and Last Known Good Configuration don't work. Which steps
will resolve the issue with the least administrative burden?
A. Run system
recovery options Choose the Startup Repair Option
B. Run system recovery
options Choose the System Restore Option
C. Run system
recovery options Choose the Windows
Complete Restoration Option
D. Run system
recovery options Choose the Windows Memory Diagnostic Otion
Answer A
Q33.
You work as a network administrator. The sales manager works on her
laptop that runs Windows 7 Ultimate. Tha hard disk on her lap top is configured
as shown. She wants to make one more partition in Disk 0 and not lose any
existing data. Which steps should she take?
A. She can't create
more partitions as no unallocated space is available.
B. Take a back up of
both partitions, delete them through disk management a create the required
partitions though Fdisk.
C. Through Disk
Management delete the partition D create the required partitions though Fdisk.
D. Use the shrink
feature in to create unallocated space. Create the partition using unallocated
space.
Answer D
Q34.
Your company has a Windows Domain Based Network. All servers on the
domain run Server 2008 R2 and the clint computers run Windows 7 Ultimate. You
are implimenting restriction policies for for running applications on domain
users. You need to accomplish the following tasks.Users should be able to run
all applications not resticted by any other rules.All applications digitally
signed by Hack-It-Once vendor should be restricted.Which steps will get this
done? (choose all that apply.)
A. Create an
AppLocker hash rule to block all applications digitally signed by the
Hack-It-Once vendor
B. Create an
AppLocker publisher rule to block all applications digitally signed by the
Hack-It-Once vendor (Missed)
C. Impliment a
default AppLocker rule to allow all applications that are not subject to any
other rules. (Missed)
D. both 2 and 3
Answer D
Q35.
Using the USMT (USer State Migration Tool) For the switchs related
to Scanstate.exe and Loadstate.exe which of the following: Encypts the store
(Scanstae.exe only)
A. /config
B. /decrypt
C. /encrypt
D. /ue
Answer C
Q36.
Which of the following tools is used to ensure that the legacy
applications will run on Windows 7?
A. Microsoft
Application compatibility tool kit
B. Microsoft
Assessment planning tool kit
C. Microsoft
Deployment tool kit
D. Microsoft Shim
Answer D
Q37.
Using the USMT (User State Migration Tool) for the switches related to Scanstate.exe and
Loadstate.exe which of the following: Excludes the user based on last login
time.
A. /encrypt
B. /ue
C. /ui
D. /uel
Answer D
Q38.
When a user logs into their computer it creates aToken. What is the
token called?
A. Access
B. Control
C. Privileges
D. Rights
Answer A
Q39.
Using the USMT (USer State Migration Tool) For the switchs related
to Scanstate.exe and Loadstate.exe which of the following: User exclude:
excludes the specified user.
A. /decrypt
B. /encrypt
C. /genconfig
D. /ue
Answer D
Q40.
What Windows 7 feature can be utilized for thePurpose of storing
credentials?
A. Credential
Manager
B. KeePass
C. Password Manager
D. Password Safe
Answer A
Q41.
What new Windows 7 feature displays details about a device and
tasks you can perform with that device?
A. Device Stage
B. Jump Lists
C. Snap
D. Windows Task Bar
Answer A
Q42.
By using Sysprep, you may prepare an image to be captured by ImageX.
Once you have run Sysprep, you can boot your master computer into the Windows
Preinstallation Environment (Windows PE) to capture the image. Which of
the following is FALSE regarding ImageX?
A. You can use
ImageX to capture and to apply upgrades to the operating system or
applications.
B. You can use only
a single compression type for a .wim file. Appended image files must use the
same compression type as the initial capture.
C. You can use only
formatted Windows image (.wim) files to interact with ImageX
D. All of these
Answer A
Q43.
You want to test the performance of one of the Windows 7 clients in
the office by using XPerf.exe. You have started a trace with BASE Kernel Group
and cswitch Kernel Flag. xperf -on base+cswitch You now want to stop the
trace and save it in a file called mytrace.etl. Which command should you use?
A. xperf -i
mytrace.etl
B. xperf -d mytrace.etl
C. xperf -merge
mytrace.etl kernel.etl
D. xperf -i
mytrace.etl -a tracestats –detail
Answer B
Q44.
You are using sysprep to prepare a system for imaging. You want to
enable end users to customize their Windows operating system, create user
accounts, name the computer, and other tasks. Which sysprep setting should you
use?
A. /audit
B. /generalize
C. /oobe
D. /unattend
Answer C
Q45.
Which tool can you use to prepare a USB device so that you can
boot from it to install Windows 7 on a netbook?
A. Bcdedit
B. Diskpart
C. LoadState.exe
D. ScanState.exe
Answer B
Q46.
You are in charge of a computer that runs Windows Vista. You have
Windows 7 installed on a new partition on the computer. You have to make sure
that the computer always starts Windows Vista by default. What action should
you perform?
A. Create a boot.ini
file in the root of the Windows 7 partition.
B. Create a boot.ini
file in the root of the Windows Vista partition.
C. Run Bcdedit.exe
and the /default parameter.
D. Run Bcdedit.exe
and the /bootems parameter.
Answer C
Q47.
There is a head office and a branch office in your company network.
The branch office has computers that run Windows 7. A network administrator
enables BranchCache in the head office. You run Netsh on your computer as shown
in the Exibit. You have to make sure that the other computers in the branch
office can access the cached content on your computer. What actions should you
perform.
A. Modify the
Windows Firewall with Advanced Security rules.
B. Turn on the
internet Information Services (IIS).
C. Configure the
computer as a hosted cache client.
D. Configure the
BranchCache service to start automatically.
Answer A
Q48.
You manage a standalone computer that runs Windows 7. You open
Windows Update as shown. (Click Exit Button) You have to make sure that the
Windows Update settings on the computer can be changed by you
manually. What should you do?
A. Log on to Windows
7 as a member of the Administrators Group.
B. From the Local
Group Policy, Modify the Windows Update settings.
C. Right-Click
Windows Update and select run as administrator.
D. Right-Click the
command Prompt, select Run as Administrator, and then run Wuapp.exe.
Answer B
Q49.
You are in charge of a computer that runs Windows 7. You run the
Configure Backup wizard as shown in the exhibit. (Backup) You have to make sure
that you are able to back up the computer to a local disk drive. What action
should you perform before you run the Configure Backup Wizard?
A. Log on as
Administrator.
B. Connect a
removable disk.
C. Add your user
account to the back up Operators group.
D. Start the Volume
Shadow Copy Service (VSS)
Answer B
Q50.
You manage a standalone computer named Computer1 that runs Windows
7. Computer1 is shared by several users. You have to prevent all users who are
members of a group named Group1 from running Windows Media Player. All other
users must be allowed to run Windows Media Player. You must use as little
administrative effort as possible when you try to achieve this. What action
should you perform.
A. From Software
Resricted Policies, Create a path rule.
B. From Software
Resricted Policies, Create a hash rule.
C. From Access
Control Policies, Create the default rules.
D. From Access
Control Policies, Create an executable rule.
Answer D
Q51.
You are in charge of a computer that runs Windows 7. Multiple users
log on to the computer. You need to deny one user access to removable devices
on the computer. All other users must have access to the removable drives. What
action should you perform?
A. From the local
Group Policy, modify an application control policy.
B. From the Control
Panel, modify the BitLocker Drive Encryption settings.
C. From Device
manager, modify the settings of all removable devices.
D. From the Local
Group Policy, modify a removable storage access policy.
Answer D
Q52.
You are in charge of a computer that runs Windows 7. The Ipv6
address of the computer is configured automatically. You have to identify the
Ipv6 address of the computer. What action should you perform?
A. At the Command
Prompt, run Netstat.
B. At the Command
Prompt, run Net config.
C. From the network
connection status, click Details.
D. From the network
connection properties, select IPv6 (TCP/IPv6) and click properties.
Answer C
Q53.
You use a Laptop named Computer1 which runs Windows 7. There is
afile server named Server1 that contains a shared folder named share. Windows
server 2008 is run by Server1. Computer1 needs to be configured to make sure
that cached files from Share1 are encrypted and when Server1 is disconnected
from the network , files located on Server1 are available. So what action
should you take to achieve this?
A. On Server1,
encrypt the files in Share1.On Computer1, make Share1 available offline.
B. On Server1,
configure BitLocker Drive Encryption. On Computer1 make Share1 available
offline.
C. On Computer1,
make Share1 available offline and enable encryption of offline files.
D. On Computer1,
copy the files from Share1 to the documents library and configure BitLocker
Drive Encryption.
Answer C
Q54.
You have two computers that respectively named Computer1 and
Computer2. WIndows Vista is run on Computer1. Windows 7 is run on Computer2.
Now you receive an order from the company mangement. You are asked to migrate
all profiles from Computer1 to Computer2. You have to identify how much space
is required to complete the migration. What action should you perform?
A. On Computer1 run
Loadstate c:\store/nocompress
B. On Computer1 run
Scanstate c: \store/nocompress/p
C. On Computer2 run
Loadstate \\computer1\store/nocompress
D. On Computer2 run
Scanstate \\computer1\store/nocompress/p
Answer B
Q55.
You use a computer named Computer1 which runs Windows7. You run
Ipconfig - results are shown in the exhibit. Now you receive an order from the
company management. According to the company requirement, you have to make sure
that you can establish a DirectAccess connection to the network. What action
should you perform first.
A. Add an additional
default gateway address.
B. Create a new VPN
connection.
C. Configure a
static IPv4 address.
D. Enable IPv6 on
the network adapter.
Answer D
Q56.
You are incharge of a computer that runs Windows 7. Mulitple users
log onto the computer. You enable auditing on a folder stored in your computer.
You have to make sure that each access to the folder is logged. What should you
do?
A. Start the problem
Steps Recorder.
B. From te Event
Viewer, Modify the properties of the security log.
C. From the Local
Group Policy, Configure the audit object access setting.
D. From the Local
Group Policy, Configure the audit directory service access setting.
Answer C
Q57.
You are incharge of a computer that runs Windows 7. You find that an
application named App1 runs during the startup prcess. You have to prevent only
app1 from running during startup. Users must be allowed to run App1 manually.
What should you do?
A. From the local
Group Policy, modify the application control policy.
B. From the local
Group Policy, modify the software restriction policy.
C. From the System
Configuration tool, select Diagnostic Startup.
D. From the System
Configuration tool, modify the Startup applications.
Answer D
Q58.
You manage a computer that runs Windows 7. There are two volumes in
this computer . The two volumes are respectively named Volume C and Volume D. A
document is created on volume D by you. You manually create a restore point and
modify the document. You view the properties of the document as shown in the
exhibit. You have to make sure you are able to restore the current version of
the document if the document is modified. What action should be performed
first?
A. Start the Volume
Shadow Copy Service (VSS)
B. Run Disk Cleanup
on Volume D.
C. Enable Auditing
on the document.
D. Turn on system
Protection for volume D.
Answer D
Q59.
There is an Active Directory domain in your company. All computers
are members of the domain. Your network contains an internal website that uses
Integrated Windows Authentication. From a computer that runs Windows 7, youtry
to connect to the website and are prompted for authentication. You verify that
your user account has permission to access the website. You have to ensure that
you are automatically authenticated when you connect to the website. What
action should you perform?
A. Add the URL of
the website to the Trusted sites zone.
B. Add the URL of
the website to the Local intranet zone.
C. Create a complex
password for your user account.
D. Open Credential
Manager and modify your credentials.
Answer B
Q60.
There is a wireless access point in your network. You have a
computer that runs Windows 7. The computer connects to the wireless access
point. You disable Service Set Identifier (SSID) broadcasts on the wireless
access point. You discover that you are now unable to connect to the wireless
access point from the Windows 7 computer. You have to make sure that the
computer can connect to the wireless access point. What action should you
perform?
A. From Credential
Manager, modify the generic credentials.
B. From Credential
Manager, modify the Windows credentials.
C. From Network and
Sharing Center, turn on Network discovery.
D. From Network and
Sharing Center, modify the wireless network connection setting.
Answer D
Q61.
You are in charge of a computer which is named Computer1. Windows 7
is run by Computer1. You have to make sure that Computer1 can connect to File
Transfer Protocol (FTP) servers only while it is connected to a private
network. What action should you perform to make sure of this?
A. From Windows
Firewall with Advanced Security, create a new rule.
B. From the local
Group Policy, modify the application control policies.
C. From Windows
Firewall, modify the Allowed Programs and Features list.
D. From Network and
Sharing Center, modify the Advanced Sharing settings.
Answer A
Q62.
You use a computer that runs Windows 7. You are asked to prevent
users from copying unencrypted files to removable drives. What action should
you perform?
A. From the Trusted
Platform Module (TPM) snap-in, initialize TPM.
B. From Control
Panel, modify the BitLocker Drive Encryption settings.
C. From a local
Group Policy, modify the BitLocker Drive Encryption settings.
D. From a local
Group Policy, modify the Trusted Platform Module (TPM) settings.
Answer C
Q63.
You are in charge of a computer that runs Windows 7. A printer is
installed on the computer. After removing the Everyone group from the access
control list (ACL) for the printer, you share the printer. You have to make
sure that members of the Sales group can modify all the print jobs that they
submit. You must prevent Sales group members from modifying the print jobs of
other users. What should you do?
A. From the
printer's properties, assign the Print permission to the Sales group.
B. From the
printer's properties, assign the Manage Documents permission to the Sales
group.
C. From the local
Group Policy, assign the Increase scheduling priority user right to the Sales
group.
D. From the local
Group Policy, assign the Take ownership of files or other objects user right to
the Sales group.
Answer A
Q64.
You have a computer that runs Windows 7. You run Runas and specify
the /savecred parameter to start an application. The stored password needs to
be deleted. What action should you perform?
A. Run Del and
specify the /p parameter.
B. Run Runas and
specify the /noprofile parameter.
C. From Credential
Manager, modify the Windows credentials.
D. From
Authorization Manager, modify the Authorization Manager options.
Answer C
Q65.
You manage a computer that runs Windows 7. The computer has System
Protection enabled. You need to retain only the last System Protection snapshot
of the computer. All other snapshots must be deleted. What action should you
perform?
A. Run Disk Cleanup
for Programs and features.
B. Run Disk Cleanup
for System Restore and Shadow Copies.
C. From the System
Protection Restore settings, select Turn off System Restore.
D. From the System
Protection Restore settings, select Only restore previous versions of
files.
Answer B
Q66.
You manage a reference computer that runs Windows 7. You are in
going to deploy an image of the computer. An answer file named answer.xml is
created by you. You have to make sure that the installation applies the answer
file after you deploy the image. Which command should you run before you
capture the image?
A. Imagex.exe
/append answer.xml /check
B. Imagex.exe /mount
answer.xml /verify
C. Sysprep.exe
/reboot /audit /unattend:answer.xml
D. Sysprep.exe
/generalize /oobe /unattend:answer.xml
Answer D
Q67.
You manage a Virtual Hard Disk (VHD) and a computer that runs
Windows 7. The VHD has Windows 7 installed. You have to start the computer from
the VHD. What action should you perform?
A. From
Diskpart.exe, run Select vdisk. (Missed)
B. From Disk
Management, modify the active partition.
C. Run Bootcfg.exe
and specify the /default parameter.
D. none of the above
Answer A
Q68.
You manage a computer that runs Windows 7. Your company has a
corporate intranet website. You open Windows Internet Explorer as shown in the
exhibit. You have to make sure that you are able to access Web pages on
both the Internet and the intranet. What should you do?
A. From the Tools
menu, click Work Offline.
B. From the Safety
menu, click InPrivate Blocking.
C. From the Safety
menu, click InPrivate Browsing.
D. From the Security
tab, add the intranet Web site to the Trusted sites zone.
Answer A
Q69.
You have a wireless access point that is configured to use Advanced
Encryption Standard (AES) security. A preshared key is not configured on the
wireless access point. You have to connect a computer that runs Windows 7 to
the wireless access point. Which security setting should you select for the
wireless connection?
A. WPA2-Personal.
B. 802.1x.
C. WPA-Personal.
D. WPA2-Enterprise.
Answer D
Q70.
You are in charge of two computers that run Windows 7. The two
computers are respectively named Computer1 and Computer2. You have to make sure
that you can remotely execute commands on Computer2 from Computer1. What action
should you perform?
A. Run Winrm
quickconfig on Computer2.
B. Run Winrm quickconfig
on Computer1.
C. Enable Windows
Remote Management (WinRM) through Windows Firewall on Computer2.
D. Enable Windows
Remote Management (WinRM) through Windows Firewall on Computer1.
Answer A
Q71.
You are in charge of a computer that runs Windows 7. The computer
uses a VPN connection to connect to the corporate network. You have to make
sure that you are able to access the Internet when the VPN connection is
active. The solution must prevent Internet traffic from being routed through
the VPN connection. What action should you perform?
A. Configure the
advanced TCP/IP settings of the VPN connection.
B. Configure a
static DNS server address.
C. Configure a
static IP address and default gateway.
D. Configure the
security settings of the VPN connection.
Answer A
Q72.
You are in charge of computer that runs Windows 7 Professional. A
USB disk is attached to the computer. You have to make sure that you can enable
BitLocker To Go on the USB disk. So what action should you perform to make sure
of this?
A. Obtain a client certificate
from an enterprise certification authority (CA).
B. Enable Encrypting
File System (EFS).
C. Upgrade the
computer to Windows 7 Enterprise.
D. Initialize the
Trusted Platform Module (TPM) hardware.
Answer C
Q73.
You manage a stand-alone computer which has only one partition.
Windows 7 is run by this computer. The computer is shared by two users that are
respectively named User1 and User2. User1 uses Encrypting File System (EFS) to
encrypt a file. User1 tries to grant User2 access to the file as shown in the
exhibit. You have to make sure that User1 are able to grant User2 access
to the file. So what action should you perform to make sure of this?
A. Instruct User2 to
log on to the computer and take ownership of the file.
B. Instruct User2 to
log on to the computer and encrypt a file.
C. Instruct User1 to
export the certificate to a certificate (.cer) file.
D. Instruct User1 to
move the file to a shared folder on the computer.
Answer B
Q74.
You manage a computer that runs Windows 7. According to the company requirement,
the computer needs to be configured to download updates from a local Windows
Server Update Services (WSUS) server. What action should you perform to achieve
this?
A. From Windows
Update, modify the Windows Update settings.
B. From the local
Group Policy, modify the Windows Update settings.
C. From the System
settings, modify the System Protection settings.
D. none of the above
Answer B
Q75.
You manage a reference computer that runs Windows 7. You are going
to create an image of the computer and then have the image deployed to 100
computers. You have to prepare the reference computer for imaging. What action
should you perform before you create the image?
A. Install the
Windows Automated Installation Kit.
B. Run the Package
Manager.
C. Run the System
Preparation tool.
D. Install the User
State Migration Tool.
Answer C
Windows 7 Networking
Reviewed by Positive thinking
on
1:13 PM
Rating:
No comments