Q1. Your company uses Windows Update to download and install security updates on client computers.
When Microsoft releases a security update, you have the following requirements:
Establish which client computers require the security update.
Identify what changes will occur as a result of the security update.
Identify which applications might be affected by the security update.
You need to select the appropriate tool to detect application-compatibility issues.
What should you do?
A. Use the Inventory Collector
B. Use the Setup Analysis Tool
C. Use the Update Compatibility Evaluator.
D. Use the Windows Compatibility Evaluator
Answer: C
Explanation:
The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows. update, and looks for potential conflicts due to changes in the registry, application files, or application file properties.
You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager.
http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx
Q2. You use Microsoft Application Compatibility Manager to produce a report that lists a company's applications and their compatibility status with Windows 7.
You need to add your ratings of the compatibility of the applications to the report.
Which Microsoft Application Compatibility Manager action should you select? To answer, select the appropriate setting or settings in the work area.
Answer:
Q3. DRAG DROP
A company has client computers in an Active Directory Domain Services (AD DS) environment. You deploy a new wireless access point (WAP). Third-party security software controls access to the wireless network.
Users are able to connect to the wireless network and access the Internet but are unable to access the company's file servers.
You need to enable users to connect to the file servers by using the wireless network.
Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q4. Your company is planning to deploy Windows 7 to all client computers.
You have the following requirements:
Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use.
You need to select the appropriate method to detect application compatibility issues.
What should you do?
A. Use the Setup Analysis Tool in a virtual environment.
B. Use the standalone Setup Analysis Tool.
C. Use the Standard User Analyzer Wizard.
D. Use the Standard User Analyzer tool.
Answer: D
Explanation:
The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature.
http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx
Q5. DRAG DROP
All client computers in a company run Windows 7 Enterprise. The company creates Windows PowerShell scripts to collect statistical data from client computers. A logon script is configured to run the PowerShell scripts during log on.
An error occurs when the scripts are run on client computers.
You need to ensure that all PowerShell scripts run correctly.
Which command should you use? (To answer, drag the appropriate component from the list of components to the correct location or locations in the work area.)
Answer:
Q6. Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image.
You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.
You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted.
What should you do?
A. Create a multicast transmission for the Windows 7 image.
B. Use an Auto-Add policy on the WDS server.
C. Create a unicast transmission for the Windows 7 image.
D. Use DHCP rogue detection on the WDS server.
Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc731409(v=ws.10).aspx#BKMK_2
untitled
Q7. Your company has an Active Directory domain.
You are planning the deployment of Windows 7 to client computers that are located in a main office and in satellite offices. All client computers use the same hardware.
Your company’s security policy has the following requirements:
All client computers in the main office must run Windows 7 Enterprise.
All client computers in the satellite offices must use BitLocker.
All client computers in the main office must apply a custom security template.
The template must not apply to client computers in the satellite offices.
You need to recommend an image-creation strategy that meets the requirements of the security policy. The solution must minimize administrative effort.
What should you include in your recommendations?
A. One image for all client computers
A Group Policy object
B. One image for the main office computers
One image for the satellite office computers
A Data Recovery Agent A Security database (secedit.sdb)
C. One image for the main office computers
One image for the satellite office computers
A Group Policy object
D. One image for all client computers
A Data Recovery Agent
A Security database (secedit.sdb)
Answer: A
Q8. You are deploying Windows 7 Enterprise and Microsoft Office to client computers.
The deployment must meet the following requirements:
Deploy Windows 7 Enterprise to all client computers.
Deploy Office 2007 Professional to client computers in the Munich office.
Deploy Office 2010 Professional to client computers in the Madrid office.
Automate the deployment to minimize administrative effort.
You need to recommend a deployment solution that meets the requirements.
What should you recommend?
A. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the account used for deployment.
B. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a Group Policy object based on the user who is logged in.
C. Create a Windows 7 Enterprise Edition image with Office 2007 installed. Create a second Windows 7 Enterprise Edition image with Office 2010 installed.
D. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the Organizational Unit of the client computer.
Answer: D
Explanation:
AppLocker (a set of Group Policy settings that evolved from Software Restriction Policies, to restrict which applications can run on a corporate network, including the ability to restrict based on the application's version number or publisher) http://en.wikipedia.org/wiki/Features_new_to_Windows_7
Q9. You are designing an implementation of BitLocker. You create a GPO with BitLocker settings that conform to company requirements.
You need to design an implementation strategy that supports the company requirements.
What should you do? (Choose all that apply.)
A. Link the GPO to the Munich-Computers OU. Use a security filter to apply the GPO to all Munich desktop computers.
B. Block the Munich-Computers OU from inheriting policies.
C. Link the GPO to the Madrid-Computers OU. Use a security filter to apply the GPO to all Madrid desktop computers.
D. Link the GPO to the Munich-Users OU.
E. Create and use a WMI filter that targets all portable computers with the GPO. Link the WMI filter to the GPO
F. Link the GPO to the root of the AD DS domain.
Answer: B,C,E,F
Q10. HOTSPOT
A company has client computers that run windows 7. A new corporate security policy states that all client computers in the legal department should allow only inbound and outbound network connections for which there is an existing firewall rule.
You need to ensure that all client computers in the legal department are configured to follow the new security policy.
Which settings should you select? To answer, select the appropriate setting or settings in the work area.
Answer: