Q1. DRAG DROP
You are designing a Windows 7 image creation strategy for a multilingual deployment. You currently have an English language image of Windows 7.
The deployment must meet the following requirements:
. The image must include the German, French, and English languages.
. Users must be able to change the display languages.
You need to recommend an action plan that meets the deployment requirements.
Which two actions should be performed in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q2. Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.
You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.
You have the following requirements:
. Migrate 20 computers at a time.
. Ensure that you conserve network bandwidth.
You need to design a deployment strategy that meets the requirements.
What should you do?
A. Configure multicast transmission on the deployment point.
B. Configure unicast transmission on the deployment point.
C. Distribute the image by using Background Intelligent Transfer Service (BITS).
D. Compress the contents of the distribution folder.
Answer: A
Explanation:
Performing Multicast Deployments In order to deploy an image using multicasting instead of unicasting, you must first create a multicast transmission. Multicast transmissions make the image available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used.
http://technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx
Q3. Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates.
You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows 7.
You need to ensure that all users are able to run the custom application.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Install and register a shim on the WSUS server.
B. Install and register a shim on the client computers by using Group Policy.
C. Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.
D. Deploy and register the compatibility-fix database file to the client computers by using a user startup script.
Answer: B,C
Q4. Your company plans to deploy Windows 7 Enterprise.
The current client computers run either Windows XP Professional or Windows Vista
Enterprise.
The company uses 20 custom applications that were written for Windows XP.
You need to create a log of compatibility issues for the custom applications.
What should you do?
A. Install each application on a Windows XP client computer, and then run the Application Compatibility Toolkit (ACT).
B. Install each application on a Windows 7 client computer, and then run the Application Compatibility Toolkit (ACT).
C. Install each application on a Windows XP client computer. Sequence each application by using Microsoft Application Virtualization (App-V).
D. Install each application on a Windows Vista client computer. Sequence each application by using Microsoft Application Virtualization (App-V).
Answer: A
Q5. HOTSPOT
A company's server runs Windows 2008 R2 with Active Directory Domain Services (AD DS) and Windows Server Update Services (WSUS). All client computers run Windows 7 Enterprise.
You need to automate the distribution of Windows security updates to all client computers by meeting the following requirements:
1) Point all client computers to the WSUS server.
2) Schedule updates to install at a specific time.
3) Run the updates immediately after Windows starts if the computer missed the originally
scheduled updates.
You need to configure Group Policy to meet the requirements.
Which settings should you configure? To answer, select the appropriate setting or settings in the work area.
Answer:
Q6. A company has an Active Directory Domain Services (AD DS) forest with a single domain.
Domain controllers are located in the companys offices in New York and Boston.
You deploy a group policy at the domain level that includes security filtering.
You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.
You suspect there might be replication problems with the policies. What should you do?
A. Run a Group Policy Results report against computers in the Boston office.
B. Run a Group Policy Modeling report against computers in the Boston office.
C. Use the GpoTool.exe command-line tool.
D. Use the RepAdmin.exe command-line tool.
Answer: A
Q7. Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browsers security settings.
What should you do?
A. Reset the Internet Explorer settings
B. Restore the advanced settings in Internet Explorer C. Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode
D. Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode
Answer: D
Explanation:
Normal mode, you can configure IEM settings so that they are refreshed on users'
computers on a periodic basis (or each time the users log in). However, users can
temporarily change these settings between the times scheduled for their setting refresh.
For this reason, these settings in Normal mode behave as "pseudo-policies."
In Preference mode, you can configure IEM settings, but allow users to change these
settings later by using the Internet Explorer 9 user interface.
http://technet.microsoft.com/en-us/library/gg699413.aspx
Q8. DRAG DROP
An enterprise organization has computers that run Windows 7. Users log on to the Contoso.com domain from their client computers.
A user is unable to log on to the domain. The user changed his password the previous night and was unable to log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors.
You need to ensure that the user can log on to the domain.
Which command should you run? (To answer, drag the appropriate command and parameter from the list of commands and parameters to the correct location or locations in the work area.)
Answer:
Q9. Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7.
You need to detect compatibility issues that can occur during the installation and configuration process for a specific application.
Which tool should you use?
A. Windows Compatibility Evaluator
B. Setup Analysis Tool
C. Inventory Collector
D. Update Compatibility Evaluator
Answer: B
Explanation:
http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx
The Setup Analysis Tool (SAT) automates the running of application installations while monitoring the actions taken by each application’s installer. The standalone version of SAT can monitor any MSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-based installers and third-party installers that run unattended.
hints:
You need to detect compatibility issues that can occur during the installation and configuration process for a specific application.
Q10. Your company has 1,000 client computers that run Windows 7 Enterprise.
You need to ensure that users cannot bypass or disable Internet Explorer logging.
What should you do?
A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state to Enabled.
B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state to Enabled.
C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state to Enabled.
D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state to Enabled.
Answer: C
Explanation:
InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, form data, cookies, and usernames and passwords from being retained by the browser, leaving no easily accessible evidence of browsing or search history.
http://en.wikipedia.org/wiki/Internet_Explorer_8
hints:
run IE InPrivate Browsing will not keep any history or logging.
General Page able to clear IE history
untitled