Q1. A Windows Server 2008 R2 server named SERVER01 has the Windows Deployment Services (WDS) role installed. SERVER02 is running DHCP services. You prestage computer objects in Active Directory. You plan to use WDS to deploy Windows 7 to the prestaged computers. When you try to deploy an image by using PXE, the process fails. You need to ensure that SERVER01 responds to prestaged client computers only. From WDS, what should you do? (Choose all that apply.)
A. On the DHCP tab, select Configure DHCP option 60 to indicate that this server is also a PXE server.
B. On the Advanced tab, select Authorize this Windows Deployment Services server in DHCP.
C. On the PXE Response tab, select Respond to all client computers (known and unknown).
D. On the DHCP tab, select Do not listen on Port 67.
E. On the PXE Response tab, select Respond only to known client computers.
F. On the Advanced tab, select Do not authorize this Windows Deployment Services server in DHCP.
Answer: B,E
Explanation:
hints: prestaged computers = known client computers
Q2. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.
You are planning to deploy Windows 7 and a custom application.
You have the following requirements:
. The application must be available to only a specific group of users.
. You must be able to monitor application usage.
You need to design a deployment method for the custom application that meets the requirements.
Which deployment method should you use in your design?
A. software installation in Group Policy
B. Microsoft Application Virtualization (App-V)
C. baseline Windows 7 image that includes the custom application
D. startup scripts in Group Policy
Answer: B
Explanation:
MS App-V thus allows centralized installation and management of deployed applications. It supports policy based access control; administrators can define and restrict access to the applications by certain users by defining policies governing the usage. App-V can require that applications not be run 'cached' from workstations, or require that 'cached' App-V applications routinely update license information from the App-V server, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and fault tolerance, and also features a tracking interface to track the usage of the virtualized application. http://en.wikipedia.org/wiki/Microsoft_App-V
Q3. Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise on the existing client computers.
You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.
What should you do?
A. Use the Refresh Computer method and a hard-link migration store.
B. Use the Refresh Computer method and a compressed migration store.
C. Use the Replace Computer method and a hard-link migration store.
D. Use the Replace Computer method and a compressed migration store.
Answer: A
Explanation:
A hard-link migration store enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario.
http://technet.microsoft.com/en-us/library/dd560753(v=ws.10).aspx
Refresh Scenario
Similar to a new installation, the refresh scenario performs a clean setup. The difference is that the target computer already contains Windows, for which files and settings will be preserved (installed applications are not taken into consideration). This scenario is especially useful in the event that preserving the user state is a priority. It still leverages the consistency benefits that come through a new installation. You can automate this scenario with the latest version of the User State Migration Tool (USMT 4.0), which will collect pertinent data for each user state found in the system, and restore it after the clean installation is performed.
Replace Scenario
This is similar to the refresh scenario, except the target system is a new computer that does not yet contain any files or settings. The scenario consists of conducting a new installation on the target computer, and then using the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario side-by-side with an older system running Windows XP or Windows Vista.
http://technet.microsoft.com/en-us/magazine/hh124549.aspx
Hints:
Install on existing client computer = refresh
Replace a new client computer = Replace
Q4. Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in the following diagram.
Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO.
A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that are in the Kiosk Computers OU.
You need to ensure that the user configuration settings are correctly applied.
What should you do?
A. Enable loopback processing in Merge mode on the Default Domain Policy GPO.
B. Disable the user configuration settings on the Default Domain Policy GPO.
C. Enable loopback processing in Replace mode on the Kiosk Computers GPO.
D. Disable the user configuration settings on the New York Users GPO.
Answer: C
Explanation:
Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92
Q5. HOTSPOT
A company has a server that runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. The domain controllers were recently upgraded from Windows Server 2003. You are using Group Policy to deploy applications to the client computers remotely. The computers reboot each night as part of routine maintenance.
You need to ensure that the application installs when the computer starts up.
Which Group Policy setting should you configure? To answer, select the appropriate setting or settings in the work area.
Answer:
Q6. You create and test a Windows 7 image that supports all existing client computer hardware in the company. User settings must be preserved during migrations to Windows 7. You need to deploy the new image to all office locations by using the Zero Touch Installation methodology. What should you recommend? (Choose all that apply.)
A. Enable a DHCP helper address on the routers for each remote office.
B. Enable network boot functionality on all client computers at the remote locations.
C. Deploy and configure Microsoft System Center Configuration Manager (ConfigMgr).
D. Deploy and configure Microsoft System Center Operations Manager (OppMgr).
E. Create a task sequence that enables local administrators to select their local office.
F. Create a User State Migration Tool configuration file and include it in the deployment.
Answer: B,C,F
Q7. You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers.
You need to design a custom image that will enable users to connect to a Telnet server.
What should you do?
A. Create a Network Connection before capturing the image.
B. Turn on the Telnet Server feature in the image.
C. Create a Certificate-Based credential before capturing the image.
D. Turn on the Telnet Client feature in the image.
Answer: D
Q8. You are using Windows Deployment Services (WDS) to deploy new images of Windows 7 to 64-bit computers.
Technicians receive the error message shown in the exhibit when they attempt to boot by
using PXE.
You need to ensure that the technicians can boot the client computers by using PXE.
What should you do? (Choose all that apply.)
A. Run the bcdedit /set {ntldr} description "Windows 7 32-bit" command.
B. Add a 64-bit boot image to the WDS server.
C. Add a 64-bit install image to the WDS server.
D. Add a 32-bit boot image to the WDS server.
E. Run the bcdedit /set {ntldr} description "Windows 7 64-bit" command.
F. Add a 32-bit install image to the WDS server.
Answer: B,D
Q9. Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates.
You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows 7.
You need to ensure that all users are able to run the custom application.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Install and register a shim on the WSUS server.
B. Install and register a shim on the client computers by using Group Policy.
C. Deploy and register the compatibility-fix database file to the client computers by using a computer startup script.
D. Deploy and register the compatibility-fix database file to the client computers by using a user startup script.
Answer: B,C
Q10. Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain.
You discover that multiple client computers were automatically shut down because the security log was full.
You need to ensure that client computers are not shut down when the security log becomes full.
What should you do?
A. Increase the maximum log size.
B. Configure an Event Viewer subscription.
C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO).
D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).
Answer: D
Explanation:
Why not Default Domain Controllers Policy Group Policy object??
Default Domain Controllers Policy Group Policy object is set policy to manage domain
controller (domain server)
Default Domain Policy Group Policy object is set of policy to manage client