Q1. - (Topic 5)
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7.
You want to deploy a Windows image (WIM) file to other computers in the domain. You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file.
What should you do before you capture the image?
A. Run Oscdimg.exe.
B. Run Sysprep.exe.
C. Open a command prompt that has elevated privileges.
D. Run Defrag.exe.
Answer: B
Explanation: http://support.microsoft.com/kb/302577 http://technet.microsoft.com/en-gb/library/gg712328.aspx
Microsoft Official Academic Course (handbook) by Wiley (Lesson 3 page 66-67, 71)
Q2. - (Topic 1)
Your network has a main office and a branch office.
The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache.
At the branch office, a computer named Computer1 is experiencing performance issues.
You need to temporarily prevent all computers from retrieving cached content from Computer1.
What should you do on Computer1?
A. At the command prompt, run Netsh branchcache flush.
B. At the command prompt, run Netsh branchcache dump.
C. Modify the Configure BranchCache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.
Answer: A
Explanation:
Flush
Deletes the contents of the local BranchCache cache.
Q3. - (Topic 3)
You have a Windows 7 computer that is a member of a workgroup.
You need to prevent members of a local group from starting a specific application.
You must achieve this goal by using the minimum amount of administrative effort.
What should you create?
A. administrative template
B. application control policy
C. IPSec policy
D. software restriction policy
Answer: B
Explanation:
AppLocker Application Control Policies AppLocker is a feature new to Windows 7 that is available only in the Enterprise and Ultimate editions of the product. AppLocker policies are conceptually similar to Software Restriction Policies, though AppLocker policies have several advantages, such as the ability to be applied to specific user or group accounts and the ability to apply to all future versions of a product. Hash rules apply only to a specific version of an application and must be recalculated whenever you apply software updates to that application. AppLocker policies are located in the Computer Configuration\Windows Settings\ Security Settings\Application Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO.
AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies.
Q4. - (Topic 6)
You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers.
Management wants to decrease VPN costs by implementing DirectAccess for remote network access.
They assign you to evaluate the current network infrastructure, which includes the following elements:
Active Directory
IPv6 network and applications
Server for DirectAccess service
You need to ensure that all critical infrastructure components are present.
What should you add to the infrastructure?
A. Windows Internet Name Service (WINS) server
B. Public key infrastructure
C. NAT-PT devices
D. Windows Server 2012
Answer: B
Explanation: DirectAccess With Windows Server 2008 R2 requires:
* Public key infrastructure (PKI) to issue computer certificates.
* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet.
* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet.
* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients
* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2.
Note: DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet. DirectAccess was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients.
Q5. - (Topic 1)
Your company has an Active Directory domain. All computers are members of the domain.
Your network contains an internal Web site that uses Integrated Windows Authentication.
From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication.
You verify that your user account has permission to access the Web site.
You need to ensure that you are automatically authenticated when you connect to the Web site.
What should you do?
A. Create a complex password for your user account.
B. Open Credential Manager and modify your credentials.
C. Add the URL of the Web site to the Trusted sites zone.
D. Add the URL of the Web site to the Local intranet zone.
Answer: D
Explanation:
Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone.
Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited.
Q6. - (Topic 3)
You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB.
You need to ensure that you can copy the image to CD.
What should you do?
A. Run Imagex.exe and specify the /split parameter.
B. From the properties of the WIM file, enable compression.
C. Run Dism.exe and specify the /cleanup-wim parameter.
D. Right-click the WIM file, point to Send To and then click Compressed (zipped) Folder.
Answer: A
Explanation:
Imagex ImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.
/split image_filedest_filesize
Splits an existing .wim file into multiple read-only split .wim files (.swm).
image_file
Specifies the name and location of the .wim file to split.
dest_file
Specifies the file path of the split files.
SizeSpecifies the maximum size in megabytes (MB) for each created file. This option generates the .swm files into the specified directory, naming each file the same as the specified image_file, but with an appended number and the .swm file-name extension. For example, if you choose to split a file named Data.wim, this option creates a Data.swm file, a Data2.swm file, a Data3.swm file, and so on, defining each portion of the split .wim file.
Q7. - (Topic 6)
Your company network includes desktop computers that have Windows 7 installed.
Microsoft updates are applied automatically at a scheduled time.
A use1- reports that a proprietary application has stopped working.
You need to uninstall the most recent update from Microsoft.
What should you do first?
A. From the Action Center, open the Windows Update window.
B. From the Event Viewer, open the System log.
C. From the Services console, open the Windows Update service.
D. From the Task Scheduler, view the WindowsBackup node.
Answer: A
Q8. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Enterprise installed.
You install two new hard disk drives and verify that the disks have been detected by Disk Management.
You need to configure the two new disks as a software fault-tolerant disk array.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q9. - (Topic 3)
You need to modify the contents of an image that is contained in a Windows image (WIM) file.
What should you do first?
A. Run Diskpart /s.
B. Run Peimg.exe /import.
C. Create an empty folder on a NTFS partition.
D. Create and attach a virtual hard disk (VHD).
Answer: C
Q10. - (Topic 2)
You have a computer that runs Windows 7. The network connection details are shown in the exhibit. (Click the Exhibit button.)
You need to manually assign an IP address of 192.168.1.50 to the computer.
What should you do first?
A. Enable TCP/IPv4.
B. Disable TCP/IPv6.
C. Run Ipconfig and specify the /renew parameter.
D. Run Netsh and specify the Interface ipv4 add address command.
Answer: A
Explanation:
IPv4 is not currently enabled and 192.168.1.50 is an IPv4 address.Therefore IPv4 is required so ENABLE it.