Q1. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. Start the Microsoft Network Access Protection service.
B. From the Safety drop-down menu, open an InPrivate Browsing session.
C. From Internet Options, on the Advanced tab, clear Enable DOM Storage.
D. From Internet Options, modify the security settings for the Internet zone.
Answer: A
Q2. - (Topic 1)
Which of the following is true of Windows 7?
A. MailCentral is included as the new default mail client with Windows 7.
B. Outlook Express is included with Windows 7.
C. Microsoft Outlook is included with Windows 7.
D. There is no preinstalled mail client included with Windows 7.
Answer: D
Q3. - (Topic 2)
You have a workgroup that contains five computers. The computers run Windows 7.
A computer named Computer1 has video and audio files.
You need to share Computer1's video and audio files on the network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a HomeGroup.
B. Move the files to a Media Library.
C. Enable all BranchCache rules in Windows Firewall.
D. Connect a removable drive and enable BitLocker To Go.
Answer: A,B
Explanation:
HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby. Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder. For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point.
Q4. - (Topic 2)
You have a computer that runs Windows 7. The computers hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a system image.
B. Create a system repair disc.
C. Shrink C and then create a new partition.
D. Connect an external hard disk to the computer.
Answer: A,D
Explanation:
A System Image is a copy of all the files and folders on the system disk (and other specified hard disks) on a computer. You can use a System Image backup to restore the computer to exactly what its configuration was when the System Image backup was created.
External hard drives can be removed and stored in a secure location.NOT System Repair Disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It does not actually save the data and will only help if a system image exists elsewhere.NOT Shrink: All partitions are inaccessible is a hard disk fails.
Q5. - (Topic 5)
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder.
You need to verify whether User1 can save files to C:\Software.
What should you do?
A. Run the Net Share command.
B. Run the Wfs C:\Software command.
C. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.
D. Run the Fsutil C:\Software command.
Answer: C
Explanation: To view effective permissions on files and folders . Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions.
Right-click the file or folder, click Properties, and then click the Security tab.
Click Advanced, click the Effective Permissions tab, and then click Select.
In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.
Q6. HOTSPOT - (Topic 5)
You install Windows 7 Enterprise from an image file to a newly purchased portable computer. The image is configured with Windows Firewall disabled for all network locations.
The company security policy requires all computers be protected with Windows Firewall.
You need to comply with the company policy. You also need to ensure that computer users are notified if applications are blocked when the computer is connected to networks that are not trusted.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer:
Q7. - (Topic 2)
A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help.
What action can you take?
A. Restore the file from the previous night's backup.
B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin.
C. Restore the file from an older backup.
D. Ask the user to open his Recycle Bin.
Answer: D
Q8. - (Topic 1)
You have a computer that runs Windows 7.
A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users.
What should you do?
A. From the printer's properties, assign the Print permission to the Sales group.
B. From the printer's properties, assign the Manage Documents permission to the Sales group.
C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
Answer: A
Explanation:
The available permissions are:
-Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
-Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
-Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.
Q9. - (Topic 5)
You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing.
You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer.
You need to achieve the following goals:
. Prevent members of the Marketing group from modifying the print jobs of other users.
. Ensure that members of the Marketing group can modify the print jobs that they submit.
What should you do?
A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group.
B. From the printer's properties, assign the Print permission to the Marketing group.
C. From the printer's properties, assign the Manage Documents permission to the Marketing group.
D. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group.
Answer: B
Q10. - (Topic 4)
You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer.
You discover that Windows is unable to install the necessary device drivers for the mobile device.
You need to ensure that you can synchronize files to the mobile device.
What should you do?
A. From WindowsMobilityCenter, click Sync settings.
B. From Devices and Printers, right-click the device and click Troubleshoot.
C. From SyncCenter, click Set up new sync partnerships.
D. From Device Manager, click Scan for hardware changes.
Answer: B