Q1. All client computers on your company network were recently migrated from Windows XP to Windows 7.
Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7-compatible version is developed.
A security update is made for this application. The update must be tested and then deployed as a new version of the application.
During testing you are unable to install the application.
You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment.
What should you do?
A. Disable UAC prompts.
B. Run the .msi file from an elevated command prompt.
C. Modify the shim to apply to all versions of the application.
D. Modify the shim to apply only to the new version of the application.
Answer: D
Q2. All client computers on your company network run Windows 7.
Each computer has the following components:
Single quad-core processor
8 GB of RAM
250-GB hard disk drive
The hard disk drive is partitioned into drive C for the operating system and drive D for the user data.
Employees run an application that generates large reports. These reports take too long to generate on the computers. You confirm that processor time and memory are acceptable.
You need to identify why these reports are generating slowly.
You create a User Defined Data Collector Set.
What should you include in this set?
A. Memory\Available Mbytes and Memory\% Committed Bytes In Use counters
B. Process\% Privileged Time and Process\% User Time counters for each processor core
C. Physical Disk\ Avg. Disk Queue Length and Physical Disk\% Disk Time counters for Disk0 of the computers
D. Logical Disk\Free Megabytes and Logical Disk\% Free Space counters for the user data drives of the computers
Answer: C
Q3. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company's corporate image.
What should you do next?
A. Modify the System Protection properties for the C volume
B. Create a new system restore point
C. Modify the Shadow Copies properties for the C volume
D. Create a new critical volume backup
Answer: A
Q4. You deploy a WAP in the company's Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.IX authentication server that is used to authenticate wireless connections.
You need to ensure that the wireless authentication meets the company's requirements.
Which security option should you configure the wireless connections to use?
A. WPA-Enterprise
B. WEP
C. WPA2-Personal
D. No authentication (Open)
Answer: A
Q5. The Office1 network link is brought offline for emergency maintenance.
Users in Office2 and Office3 report that they cannot connect to the wireless network.
You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails.
What should you recommend?
A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured
Answer: B
Q6. All client computers on your company network run Windows 7 and are members of an
Active Directory Domain Services domain named contoso.com.
Employees access the company intranet site at http://app.contoso.com.
The Test team must be able to access a new version of http://app.contoso.com before the site is in production.
You need to ensure that the Test team can access the new version of the site without affecting other employees' access to the current site.
What should you do?
A. Create a DNS record for app.contoso.com that specifies the IP address of the test server.
B. Create a Windows Firewall rule that blocks access to the IP address of the test server on the employees' computers.
C. Create a Windows Firewall rule that allows access to the IP address of the test server on the Test team's computers.
D. Add an entry to the Hosts file that specifies app.contoso.com and the IP address of the test server on the Test team's computers.
Answer: D
Q7. You deploy a WAP in one of the company locations. Client computers connect to it by using the WiFi GPO.
You need to ensure that users cannot change the network location for the connection.
Which policy should you define?
A. Wireless Network (IEEE 802.11)
B. IP Security
C. Network List Manager
D. Windows Firewall with Advanced Security
Answer: C
Q8. Your company has a main office and a branch office. The network contains a single Active Directory domain. All servers and client computers are members of the domain.
A print server is located in the branch office. All other servers are located in the main office. All servers run Windows Server 2008 R2. All client computers run Windows 7.
Users in the branch office report poor performance when they access an intranet Web site in the main office.
You need to recommend changes to the network to improve the performance of intranet access by computers in the branch office.
What should you recommend implementing?
A. a VPN
B. BranchCache
C. HTTP redirect
D. WebDav
Answer: B
Q9. The help desk reports that users receive a security warning message when they try to access the internal Web site shown in the exhibit:
The help desk confirms that users never received this security warning message before.
You need to provide a solution to prevent users from receiving the security warning when they try to access the internal Web site.
What should you do?
Exhibit:
A. Instruct the users to download the certificate of the Web server.
B. Instruct the users to download a new certificate revocation list (CRL).
C. Request that a domain administrator renew the Web server SSL certificate.
D. Request that a domain administrator renew the user authentication certificates for all users.
Answer: C
Q10. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain.
Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room.
You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises.
What should you do?
A. Configure the Network authentication (Shared mode) setting.
B. Apply a Wireless Network Policy to set the network type to WPA-PSK.
C. Apply a Wireless Network Policy to automatically connect to the company wireless network.
D. Apply a Wireless Network Policy to set the company wireless network as the preferred network.
Answer: D