Q1. Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.
You are planning to deploy Windows 7.
You need to create a report that shows hardware and device compatibility on all client computers.
You need to perform this action without installing any additional software on the client computers.
Which tool should you use?
A. System Center Configuration Manager
B. System Center Capacity Planner
C. Windows Performance Monitor Data Collector Sets
D. Microsoft Assessment and Planning Toolkit
Answer: D
Explanation:
Microsoft Assessment and Planning Toolkit performs a detailed analysis of hardware and device compatibility for migration to Windows 7, Windows Server 2008 R2, SQL Server 2008 R2, Microsoft Office 2010, and Office 365. The hardware assessment looks at the installed hardware and determines if migration is recommended. If it is not recommended, then reports provide information about why it is not.
http://technet.microsoft.com/en-us/library/bb977556.aspx
Q2. You are designing a Windows 7 Enterprise image creation strategy.
The strategy must meet the following requirements:
Support 32-bit and 64-bit hardware.
Support 64-bit applications.
Minimize the total number of images.
Reduce the bandwidth required to deploy an image.
Use System Center Configuration Manager (ConfigMgr) for application deployment.
You need to recommend the images that meet the requirements.
Which images should you recommend? (Choose all that apply.)
A. a thin image for the 32-bit version of Windows 7
B. a thick image for the 32-bit version of Windows 7
C. a thick image for the 64-bit version of Windows 7
D. a thin image for the 64-bit version of Windows 7
Answer: A,D
Q3. DRAG DROP
You create a shim database and distribute it to each of a companys client computers through a script. You name the database Shim_Database and give it a filename of shimdatabase.sdb. The database GUID is 18315260-2ecb-43af-945a-56810da33fb4.
The database must be registered on all client computers. The registration process must be invisible to the user.
You need to construct a command to register the shim database.
Which command should you use? To answer, drag the appropriate component from the list of command components to the correct location or locations in the work area.
Answer:
Q4. Your companys network is shown in the following diagram.
There is a VPN between Branch Officebranch office B and the Core Networkcore network.
The company plans to deploy Windows 7 to all client computers.
You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)
A. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network.
B. Deploy the Key Management Service (KMS) in branch office B.
C. Deploy the Key Management Service (KMS) in branch office A.
D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network.
Answer: A,B
Q5. You have an image that is used to deploy Windows 7 on client computers.
You need to modify the image to change the edition of Windows 7.
What should you do?
A. Use Windows Setup to service the image.
B. Service the image online.
C. Service the image offline.
D. Use audit mode to service the image.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd744572(v=ws.10).aspx
Change the Windows Image to a Higher Edition You can change your Windows image to a higher edition while it is offline by using the DISM commands in the following procedure. You should not use this procedure on an image that has already been changed to a higher edition.
Q6. A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. Windows 7 is installed on all the companys client computers.
You add a domain user account named User1 to the local Administrators group on a client computer named PC01. When User1 returns to the office, User1 does not have administrative access on PC01.
When you inspect PC01, you find that the local Administrators group does not contain the user account. You need to ensure that User1 is a member of the local Administrators group.
Which Group Policy setting should you select? To answer, select the appropriate Group Policy setting in the work area.
Answer:
Q7. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS.
You deploy the Key Management Service (KMS) on a Windows 7 computer.
You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.
B. Deploy a Windows Server 2008 KMS host.
C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.
D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.
Answer: A,C
Explanation:
http://technet.microsoft.com/en-us/library/ee939272.aspx
The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days.
Listening on Port:
Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host.
Q8. You are planning a migration to Windows 7.
You need to recommend applications that obtain a list of software installed on client computers.
Which applications should you recommend? (Choose all that apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Sysprep
C. Microsoft Assessment and Planning Toolkit (MAP)
D. Microsoft Application Compatibility Toolkit (ACT)
E. windows User State Migration Tool (USMT)
F. Windows System Image Manager (windows SIM)
Answer: C,D
Q9. You are planning to deploy a computer in the lobby of each office.
You need to control which programs can run on the computer.
What should you do?
A. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure AppLocker.
B. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure BitLocker.
C. Create a GPO that enables and configures AppLocker and link it to the Carlsbad OU.
D. Create a GPO that enables and configures BitLocker and link it to the root of the AD DS domain.
Answer: A
Q10. Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains.
Users in both domains can log on to client computers in only their own domains. System logs on the domain controllers display the error message Clock skew too great when users in Domain1 attempt to log on to client computers in Domain2.
You need to ensure that users can log on to client computers in both domains.
What should you do?
A. Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object ( GPO ).
B. Configure the primary domain controller (PDC) emulatorin each domain to synchronize its clock with the same external time source.
C. Run a startup script that includes Net Time /setsntp on all client computers.
D. Run a startup script that includes Net Time /querysntp on all client computers.
Answer: B