Q1. You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application. You need to find out whether an add-on is the cause of the problem. What should you do?
A. Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.
B. Use Group Policy to turn on Internet Explorer 7 Standards mode.
C. Start Internet Explorer in No Add-ons mode.
D. Reset all Internet Explorer security zones to the default levels.
Answer: C
Q2. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.
You are planning to deploy Windows 7 and a custom application.
You have the following requirements:
. The application must be available to only a specific group of users.
. You must be able to monitor application usage.
You need to design a deployment method for the custom application that meets the requirements.
Which deployment method should you use in your design?
A. software installation in Group Policy
B. Microsoft Application Virtualization (App-V)
C. baseline Windows 7 image that includes the custom application
D. startup scripts in Group Policy
Answer: B
Explanation:
MS App-V thus allows centralized installation and management of deployed applications. It supports policy based access control; administrators can define and restrict access to the applications by certain users by defining policies governing the usage. App-V can require that applications not be run 'cached' from workstations, or require that 'cached' App-V applications routinely update license information from the App-V server, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and fault tolerance, and also features a tracking interface to track the usage of the virtualized application. http://en.wikipedia.org/wiki/Microsoft_App-V
Q3. You are designing a Windows 7 deployment image.
You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK). You need to add the MAK to the configuration pass by using an answer file. To which configuration pass should you add the MAK?
A. the WindowsPE configuration pass
B. the Generalize configuration pass
C. the AuditSystem configuration pass
D. the Specialize configuration pass
Answer: D
Explanation:
As a single key is used, you can add MAK keys images when deploying them centrally. When using the Sysprep utility to prepare an image, you add a MAK key to an image during the Specialize configuration pass. When performing a traditional installation, you can enter MAK keys in the same way that you would enter a retail key. The main issue that requires consideration when using a MAK key is how you will perform activation.
http://blogs.msdn.com/b/microsoft_press/archive/2010/10/27/new-book-mcitp-self-paced-training-kit-exam-70-686-windows-174-7-enterprise-desktop-administrator.aspx
Q4. DRAG DROP
You are planning to deploy Windows 7 Enterprise to all of your company's client computers.
You have the following requirements:
. Create two custom partitions on each client computer's hard disk, one for the operating system and the other for data.
. Automatically create the partitions during Windows Setup.
You need to design an image that meets the requirements.
Which two actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order)
Answer:
Q5. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.)
A. Create a collection with the required computers and assign the software to the collection.
B. Create a software installation Group Policy object (GPO).
C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain.
D. Create a software deployment package by using System Center Configuration Manager 2007.
E. Create an unattend.xml file.
F. Create a silent install MSI file.
Answer: A,D,F
Explanation:
hints: without user interaction = silent install MSI file
Q6. You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computers in Toronto by using ConfigMgr.
The deployed image fails to activate.
You need to ensure that the image meets company activation requirements.
What should you do?
A. Run the Sysprep /generalize command.
B. Run the Sysprep /oobe command.
C. Modify the unattend.xml file and enter a MAK key.
D. Modify the unattend.xml file and enter a KMS key.
Answer: A
Q7. You need to recommend a Microsoft Enterprise Desktop Virtualization (MED-V) image update strategy to meet company requirements. What should you recommend?
A. Windows Intune
B. Windows Update
C. ConfigMgr
D. Windows Deployment Services (WDS)
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh463536.aspx Creating and Deploying MED-V Workspace Packages with System Center Configuration Manager
Q8. Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise on the existing client computers.
You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.
What should you do?
A. Use the Refresh Computer method and a hard-link migration store.
B. Use the Refresh Computer method and a compressed migration store.
C. Use the Replace Computer method and a hard-link migration store.
D. Use the Replace Computer method and a compressed migration store.
Answer: A
Explanation:
A hard-link migration store enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario.
http://technet.microsoft.com/en-us/library/dd560753(v=ws.10).aspx
Refresh Scenario
Similar to a new installation, the refresh scenario performs a clean setup. The difference is that the target computer already contains Windows, for which files and settings will be preserved (installed applications are not taken into consideration). This scenario is especially useful in the event that preserving the user state is a priority. It still leverages the consistency benefits that come through a new installation. You can automate this scenario with the latest version of the User State Migration Tool (USMT 4.0), which will collect pertinent data for each user state found in the system, and restore it after the clean installation is performed.
Replace Scenario
This is similar to the refresh scenario, except the target system is a new computer that does not yet contain any files or settings. The scenario consists of conducting a new installation on the target computer, and then using the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario side-by-side with an older system running Windows XP or Windows Vista.
http://technet.microsoft.com/en-us/magazine/hh124549.aspx
Hints:
Install on existing client computer = refresh
Replace a new client computer = Replace
Q9. You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that
the virtualization strategy meets the companys OSE requirements. Which GPO setting should you recommend?
A. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings
B. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings
C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications
D. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications
Answer: B
Q10. Your companys network includes client computers that run Windows 7.
You design a wireless network to use Extensible Authentication ProtocolCTransport Level
Security (EAP-TLS). The Network Policy Server has a certificate installed.
Client computers are unable to connect to the wireless access points.
You need to enable client computers to connect to the wireless network.
What should you do?
A. Install a certificate in the Trusted Root Certification Authorities certificate store.
B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport Layer Security (PEAP-TLS).
C. Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
D. Install a certificate in the Third-Party Root Certification Authorities certificate store.
Answer: A