70-680

  1. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
    both desktop and laptop workstations.

    You are responsible for managing a desktop workstation named CERTKILLER-WS620.
    CERTKILLER-WS620 is configured to run Windows Vista. You install Windows 7 on a new
    partition on CERTKILLER-WS620 but you want Windows Vista to be booted by default on
    CERTKILLER-WS620 and not Windows 7.

    What should you do?

    A. You should consider running Bcdedit.exe and specifying the /default parameter.

    B. You should consider creating a boot.ini file in the root of the Windows 7 partition.

    C. You should consider running MSCONFIG and specifying the /bootOS parameter.

    D. You should consider running bootcfg.exe and specifying the /default parameter.
    Answer: A

    • Explanation:
    • To modify the boot parameters in Vista and Windows 7, use the command line tool Bcdedit.exe.
    • Using the /default switch will allow you to set the default system to boot. BCD = Boot Configuration
    • Data You can also change the default boot settings in Control Panel -> System & Security ->
    • System -> Advanced System Settings (on the left hand side), -> Startup & Recovery -> Settings
  2. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. You are responsible for maintaining
    CertKiller.com's Windows 7 workstations.

    You want to configure all Windows 7 workstations to produce a new Security ID (SID) as well as a
    Welcome screen when the workstation is booted.

    What should you do?

    A. You should consider running Msconfig.exe /oobe /generalize startup on all Windows 7
    workstations.

    B. You should consider running Sysprep.exe /audit /generalize on all Windows 7 workstations.

    C. You should consider running bootcfg.exe on all Windows 7 workstations.

    D. You should consider running Sysprep.exe /oobe /generalize on all Windows 7 workstations.
    Answer: D

    • Explanation:
    • The utility Sysprep is used to prepare systems before imaging and deployment. The switch/ oobe
    • means "Out Of the Box Experience" which will cause the new image to start up fresh just as if in
    • came out of the shrink-wrap. The /generalize command is required in order for the install to create
    • a new SID.
  3. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    CertKiller.com purchases a new client computer named CERTKILLER-WS680. You have been
    instructed to perform an automated installation of Microsoft Windows 7 on CERTKILLER-WS680
    using the Microsoft Windows 7 DVD.

    What should you do?

    A. You should consider creating an answer file named sysprep.xml and copying it to a network
    share.

    B. You should consider creating an answer file named winnt.sif and copying it to a removable
    drive.

    C. You should consider creating an answer file named autounattend.sif and copying it to a network
    share.

    D. You should consider creating an answer file named autounattend.xml and copying it to a
    removable drive.
    Answer: D


    • Explanation:
    • When Windows 7 is booted from the DVD, it automatically searches for an answer file called
    • autounattend.xml. If it finds such a file, it will use that to answer all of the configuration questions.
  4. You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    You need to perform a clean installation of Microsoft Windows 7 Professional on the workstations
    in the Research department. All workstations in the Research department have identical hardware
    as listed below:
    1.2 GHz Dual-Core processor.1024 MB of RAM.20 GB hard drive.DirectX 10 video display
    card.Integrated sound card.10/100 integrated network adapter.

    You need to ensure that the workstations able to support Windows 7 and are able to support
    Windows XP mode.

    What should you do? (Each correct answer presents part of the solution. Choose two.)

    A. You should upgrade the processor.

    B. You should upgrade the RAM.

    C. You should upgrade the video card.

    D. You should upgrade the hard drive.

    E. You should upgrade the network adapter.
    Answer: B,D

    • Explanation:
    • Although the workstations meet the system requirements for Windows 7, and additional 1 GB of
    • RAM and an additional 15 GB hard drive space is required to support Windows XP Mode.
  5. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com.

    The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client
    computers at CertKiller.com. You need to create a Windows 7 image that includes the Office 2007
    Microsoft Installer Package (MSI) package for the installation.

    What should you do?

    A. You should consider installing the MSI package by using the update command with the
    "/slipstream" switch.

    B. You should consider installing the MSI package by using the Msiexec command with the
    "/package /uninstall" switches.

    C. You should consider installing the MSI package by using the Msiexec command with the
    "/package" switch.

    D. You should consider installing the MSI package by using the Install command with the "/package
    " switch.
    • Answer: C
    • Explanation:
    • When deploying Windows 7, you first build a reference computer with all settings, configurations
    • and application required. This includes installing applications. To install Office using an MSI file,
    • you run the windows installer program MSIEXEC.EXE. The "/package" switch directs the installer to
    • run and install the msi file listed. e.g . "msiexec /package Office64MUI.msi". The switch "/package"
    • can be abbreviated to "/" i as in " msiexec / i Office64MUI.msi". (Yes, / i not /p)
  6. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. You are in the process of planning the
    installation of Windows 7 on a client computer named CERTKILLER-WS06. CERTKILLER-WS06
    contains a single hard disk drive that is connected to a RAID controller.

    Whilst doing the installation you notice that the installation media of Windows 7 does not include
    the necessary files to install the RAID controller. You need to make sure that you are able to install
    Windows 7 on the hard disk drive.

    What should you do?

    A. You should consider having CERTKILLER-WS04 started from the Windows installation media.
    Then Load Driver should be clicked from the Install Windows dialog box.

    B. You should consider inserting the Windows installation media.
    Thereafter F8 should be pressed during the power-on self test (POST) of CERTKILLER-WS04.

    C. You should consider inserting the RAID driver installation media. After the RAID driver is
    installed, insert the Windows installation media.

    D. You should consider inserting the Windows installation media.
    Thereafter F6 should be pressed when prompted by the Install Windows dialog box.
  7. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The CertKiller.com network client computers
    currently make use of Microsoft Windows XP Professional. You receive an instruction from
    Management to upgrade a client computer named CERTKILLER-WS25 to Windows 7. You decide
    to do the installation using the Windows 7 DVD so you log in to CERTKILLER-WS25 and insert
    the CD.

    What should you do next? (Choose all that apply. Each answer is a complete solution)

    A. One option would be to execute run setup.exe to upgrade to Windows 7 and keep all the
    Windows XP settings.

    B. One option would be to make use of the autorun feature on the DVD to upgrade to Windows 7
    and keep all the Windows XP settings.

    C. One option would be to run setup.exe from the DVD in order to start a clean Windows 7
    installation.

    D. One option would be to make use of the autorun feature on the DVD in order to start a clean
    installation.
    Answer: C,D
  8. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
    client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
    recently decided to have the client computers upgraded to Microsoft Windows 7 with all the
    installed applications. You receive an instruction from management to identify the volume types
    that is not used by Windows 7.

    A. In Windows 7 exFAT is not a volume type.

    B. In Windows 7 NTFS is not a volume type.

    C. In Windows 7 FAT is not a volume type.

    D. In Windows 7 NFS is not a volume type
    Answer: D
  9. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
    client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
    recently decided to have the client computers upgraded to Microsoft Windows 7 with all the
    installed applications. You are in the process of informing the newly appointed users in your
    department when the Aero Shake feature will work.


    What should you inform them? (Choose all that apply.)

    A. The Aero Shake feature will work if the Windows Experience Index is 3 or greater.

    B. The Aero Shake feature will work if the windows experience index is 4 or greater.

    C. The Aero Shake feature will work if the display adapter is compatible with the installed WDDM.

    D. The Aero Shake feature will work Windows Media Player 10 or later is installed.
    Answer: A,C
  10. CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
    network client computers currently make use of Microsoft Windows XP Professional. You receive
    an instruction from one of the senior managers to upgrade his workstation to Windows 7. The
    senior manager also informs you that he wants the Windows 7 games as well as Titan Chess
    installed on his workstation. You therefore need to identify the Windows 7 versions that will comply
    with the senior mangers request.


    What should you do? (Choose all that apply.)


    A. Your best option would be to install Windows Ultimate Edition.

    B. Your best option would be to install Windows Professional Edition.

    C. Your best option would be to install Windows Home Premium Edition.

    D. Your best option would be to install Windows Home Basic Edition

    E. Your best option would be to install Windows Enterprise Edition.

    F. Your best option would be to install Windows Starter Edition
    Answer: A,E
  11. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The CertKiller.com network client computers
    currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to
    have the client computers upgraded to Microsoft Windows 7. You receive an instruction from the
    CIO to ensure that the Active Directory domain can be joined by the Windows 7 Edition.


    What should you do? (Choose all that apply).

    A. Your best option would be to install the Windows Professional Edition.

    B. Your best option would be to install the Windows Ultimate Edition.

    C. Your best option would be to install the Windows Home Premium Edition.

    D. Your best option would be to install the Windows Enterprise Edition.

    E. Your best option would be to install the Windows Home Basic Edition

    F. Your best option would be to install the Windows Starter Edition
    Answer: A,B,D
  12. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
    client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has
    recently decided to have the client computers upgraded to Microsoft Windows 7. You decide to
    check whether the current workstations comply with the minimum hardware requirements. You
    therefore need to identify the minimum requirement necessary to install Windows 7.

    Which of the following are minimum requirements? (Choose all that apply)

    A. You will require a 16 GB available disk space (32-bit)/20 GB (64-bit).

    B. You will require a 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor.

    C. You will require a 1 Gbps network card.

    D. You will require a DirectX 9 graphics processor with WDDM 1.0 or higher driver.

    E. You will require a 4GB RAM (32-bit)/2 GB RAM (64-bit).
    Answer: A,B,D
  13. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
    client computers are configured to either use Windows XP Professional or Windows Vista. You
    receive an instruction from management to identify the statement that is regarding Windows 7.
    What should you do?

    A. You should inform management that Outlook Express comes with Windows 7.

    B. You should inform management that Microsoft Mail is included with Windows 7.

    C. You should inform management that Windows 7 does not come with a preinstalled mail client.

    D. You should inform management that Windows Live Mail is the new default mail client with
    Windows 7.
    Answer: C

  14. CertKiller.com has hired you as a network Administrator for their network. All servers on the
    CertKiller.com network run Windows Server 2008. Half the client computers run Windows Vista
    and the rest Windows XP Professional. You are in the process of identifying the utilities that
    cannot be identified as a Windows PE tool.

    What should you identify?

    A. You should consider identifying Winpeshl.

    B. You should consider identifying Oscdimg.

    C. You should consider identifying Subinacl.

    D. You should consider identifying Diskpart.

    E. None of the above.
    Answer: C

  15. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
    client computers currently make use of Microsoft Windows XP Professional. You receive an
    instruction from the CIO to install Windows 7 on a computer named CERTKILLER-SR01. During a
    test installation you discover that the Online Compatibility Check has failed. You therefore need to
    determine the reason this occurred.

    What should you identify? (Choose all that apply.)

    A. The error occurred due to a display adapter with two SVGA ports.

    B. The error occurred due to a display adapter without WDDM Support but with SVIDEO Support.

    C. The error occurred due to 512MB of RAM.

    D. The error occurred due to a 60 GB Hard Disk.
    Answer: B, C

  16. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you receive instruction from CertKiller.com to create an unattended
    answer file which will be used to have Microsoft Windows 7 installed automatically. CertKiller.com
    additionally requested that you select the appropriate utilities that can be used to create the
    unattended answer file.

    What should you do? (Choose two)

    A. You should consider making use of the bcedit.exe utility.

    B. You should consider making use of the gpedit.msc utility.

    C. You should consider making use of the Windows SIM tool in Windows AIK.

    D. You should consider making use of Microsoft Notepad.

    E. You should consider making use of the bootcfg utility
    • Answer: C, D
  17. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com.

    The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista (x86). During the course of the day you receive instruction from CertKiller.com to perform a clean installation of Microsoft Windows 7 (64-bit) on a user named Rory Allen's computer.

    What should you do?

    A. You should consider having the computer started using the Windows 7 installation media.
    You should then have the sysprep option selected from the Install Windows dialog box.

    B. You should consider having the computer started using the Windows 7 installation media.
    You should then select the Custom (advanced) option from the Install Windows dialog box.

    C. You should consider having the uninstall.exe command used from the Windows 7 installation
    media.

    D. You should consider having the format.exe /C command run from the Windows 7 installation
    media.
    Answer: B

  18. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    A CertKiller.com user named Rory Allen uses of a Microsoft Windows 7 Professional client
    computer named CERTKILLER-WS680. During the course of the day Rory Allen attaches a USB
    disk to CERTKILLER-WS680. However, Rory Allen cannot enable BitLocker To Go on the USB
    disk. You need to ensure that Rory Allen can enable BitLocker To Go on the USB disk.

    What should you do?

    A. You should consider upgrading CERTKILLER-WS680 to Microsoft Windows 7 Ultimate.

    B. You should consider initializing the Trusted Platform Module (TPM) hardware on CERTKILLERWS680.

    C. You should consider downloading a Microsoft Encryption certificate for CERTKILLER-WS680.

    D. You should consider enabling IPSEC on CERTKILLER-WS680.
    Answer: A

    • Explanation:
    • BitLocker To Go is a feature ONLY available on Windows 7 Ultimate and Windows 7 Enterprise.
  19. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows XP Professional with Service Pack 1 (SP1).

    You have been assigned a client computer named CERTKILLER-WS270. You want to upgrade
    CERTKILLER-WS270 to Windows 7 Professional without needing to install any of your
    applications. You verify that CERTKILLER-WS270 meets the system requirements for Windows 7
    by installing and running the Windows 7 Upgrade Advisor.

    What should you do next?

    A. You should consider upgrading CERTKILLER-WS270 to Microsoft Windows Vista Business,
    and then upgrade it to Windows 7 Professional.

    B. You should consider installing Service Pack 3 (SP3) on CERTKILLER-WS270, and then
    upgrade it to Windows 7 Professional.

    C. You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270,
    and then perform a clean installation of Windows 7 Professional.

    D. You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270,
    and then upgrade it to Windows 7 Professional.
    • Answer: A
    • Explanation:
    • To upgrade from Windows XP Professional to Windows 7 Professional without having to reinstall
    • applications, you would need to upgrade to Windows Vista first.
  20. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The client computers on the
    CertKiller.com network run a mix of Windows 2000 Professional with Service Pack 4 (SP4),
    Windows XP Professional with Service Pack 3 (SP3), Windows Vista Business and Windows Vista
    Ultimate.

    You have received instructions to upgrade some of the client computers to Windows 7
    Professional.

    What should you do?

    A. You should consider upgrading the Microsoft Windows 2000 Professional computers to
    Windows 7 Professional.

    B. You should consider upgrading the Microsoft Windows XP Professional computers to Windows
    7 Professional.


    C. You should consider upgrading the Microsoft Windows Vista Business computers to Windows 7
    Professional.

    D. You should consider upgrading the Microsoft Windows Vista Ultimate computers to Windows 7
    Professional.

    E. You should consider upgrading the Microsoft Windows Vista Business and Microsoft Windows
    Vista Ultimate computers to Windows 7 Professional.
    Answer: C

    • Explanation:
    • Only Windows Vista Business can be upgraded to Windows 7 Professional.
  21. You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows Vista Business.

    You have been instructed to upgrade a client computer named CERTKILLER-WS620 to Microsoft
    Windows 7 Professional. CERTKILLER-WS620 has the following specifications:

    Drive C (system drive) has 12 gigabytes (GB) of free space.Drive D (data drive) has 40 GB of free
    space.Four memory slots with two occupied by 512 megabyte (MB) memory sticks.One 2.0
    gigahertz (GHz) 32-bit processor.

    You need to ensure that Windows 7 Professional can be installed on CERTKILLER-WS620.
    What should you do?

    A. You should consider installing Windows 7 on Drive D.

    B. You should consider creating more free space on Drive C.

    C. You should consider upgrading the memory.

    D. You should consider upgrading the processor.
    Answer: B

    • Explanation:
    • During an upgrade, the Operating Systems must be installed on the system drive. However, the
    • system drive on CERTKILLER-WS620 has only 12 GB of free space. Therefore you should free
    • up space on Drive C because Windows 7 requires 16 GB of free space for installation purposes.
  22. You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows XP Professional.

    You have been instructed to upgrade the Windows XP Professional client computers to Windows
    7. However, before you proceed you need to determine if the current applications on the Windows
    XP Professional computers will run on Windows 7. You want to accomplish this task using the
    least amount of administrative effort.

    What should you do?

    A. You should run the Application Compatibility Toolkit (ACT) 5.5.

    B. You should run Windows Update.

    C. You should run the Windows 7 Upgrade Advisor.

    D. All of the above
    Answer: A

    • Explanation:
    • Application Compatibility Toolkit (ACT) 5.5 collects information about the applications that are
    • installed on the network computers and provides information about the applications that are
    • incompatible with Windows Vista. Windows Vista Upgrade Adviser can also be used for the same
    • purpose but it requires a massive amount of administrative effort because it needs to be run
    • separately on each computer.
  23. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network
    client computers currently make use of Windows Vista Enterprise (x86). You are responsible for
    managing a client computer named CERTKILLER-WS20. During the course of the day you
    receive instructions from CertKiller.com to identify the Windows 7 version and edition
    CERTKILLER-WS20 can directly upgrade to.

    What should you do?

    A. Your best option would be to make use of Windows 7 Enterprise (x64).

    B. Your best option would be to make use of Windows 7 Home Professional (x86).

    C. Your best option would be to make use of Windows 7 Home Basic (x86).

    D. Your best option would be to make use of Windows 7 Ultimate (x86).

    E. Your best option would be to make use of Windows 7 Ultimate (x64).
    Answer: D
  24. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. You are in the process of determining when
    you need to execute a migration rather that an upgrade.

    Select all answers that apply.

    A. Your best option would be to migrate Windows Vista Business (x86) to Windows 7 Professional
    (x64).

    B. Your best option would be to migrate Windows Vista Enterprise (x64) to Windows 7 Enterprise
    (x64).

    C. best option would be to migrate Windows XP Professional (x32) to Windows 7 Professional
    (x32)

    D. Your best option would be to migrate Windows Vista Home Premium (x64) to Windows 7 Home
    Premium (x86).

    E. Your best option would be to migrate Windows XP Professional (x64) to Windows 7
    Professional (x64).
    Answer: A,D,E
  25. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You are responsible for a
    computer named CERTKILLER-WS04. CERTKILLER-WS04 is configured to run Windows Vista
    Service Pack 2 (SP2). During the course of the week you receive an instruction from the CIO to
    have CERTKILLER-WS04 upgraded to Windows 7.

    How would you do this?

    A. This can be accomplished from Windows Vista by running update.exe from the Windows 7
    installation media.

    Thereafter the Upgrade option should be selected.

    B. This can be accomplished by starting CERTKILLER-WS04 from the Windows installation
    media.

    Thereafter the Setup.exe should be run and the Upgrade option should be selected.

    C. This can be accomplished by starting CERTKILLER-WS04 from the Windows 7 installation
    media.

    Thereafter the Custom (advanced) option should be selected.


    D. This can be accomplished from Windows Vista by running Setup.exe from the Windows 7
    installation media.

    Thereafter the Upgrade option should be selected.
    Answer: D
  26. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    A CertKiller.com employee named Rory Allen has a computer at home with a cable modem
    connection. Rory Allen has recently requested that you guide him by selecting the appropriate
    method to upgrade from Microsoft Windows 7 Home Premium to Microsoft Windows 7 Ultimate.
    What should you do?

    A. You should instruct Rory Allen that Windows Update can be used.

    B. You should instruct Rory Allen that Windows Anytime Upgrade can be used.

    C. You should instruct Rory Allen that upgrade.exe /s can be used.

    D. You should instruct Rory Allen that upgrade.exe /i can be used.
    Answer: B
  27. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows Vista. During the course of
    the day a network user named Mia Hamm asked you which of the Microsoft tools can be used to
    determine if your installed applications have known problems with Microsoft Windows 7.
    What should you do?

    A. You should consider instructing Mia Hamm that the winnt /checkupgradeonly command can be
    used.

    B. You should consider instructing Mia Hamm setup.exe can be used from the Windows 7
    installation media.

    C. You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool
    can be used.

    D. You should consider instructing Mia Hamm that Windows Update can be used.
    Answer: C
  28. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are responsible for managing a workstation named CERTKILLER-WS624. CERTKILLERWS624 is configured to run Windows Vista and contains an accounting application named
    accapp.exe. CertKiller.com purchases a new Windows 7 workstation that will replace
    CERTKILLER-624. You need to export the user state as well as the settings of the accapp.exe application so that it can be migrated to the Windows 7 workstation.

    What should you do?

    A. You should consider modifying the migapp.xml file on CERTKILLER-WS624 and then run
    Scanstate.exe with the /i parameter.

    B. You should consider running USMT on CERTKILLER-WS624 and then running Loadstate.exe
    with the /ui parameter.

    C. You should consider running Scanstate.exe with the /migapp parameter on CERTKILLERWS624.

    D. You should consider running migapp.exe with the /loadstate parameter on CERTKILLERWS624.
    Answer: A

    • Explanation:
    • In order to migrate a user from Vista to Windows 7run the User State Migration toolkit (USMT). ScanState collects the files and settings from the source computer. Run LoadState to restore the user state onto the destination computer.
  29. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are assigned two workstations named CERTKILLER-WS625 and CERTKILLER-WS680. CERTKILLER-WS625 is configured to run Windows Vista and CERTKILLER-WS680 is configured to run Windows 7.

    You receive an instruction to migrate the user files and profiles from CERTKILLER-WS625 to
    CERTKILLER-WS680. To accomplish this you want to determine the amount space needed to
    accomplish the migration.

    What should you do?

    A. You should consider running USMT \\CertKiller-WS625\store /nocompress /p on CERTKILLERWS680.

    B. You should consider running Scanstate c:\store /nocompress /p on CERTKILLER-WS625.

    C. You should consider running migapp /user \\WS625\store /nocompress on CERTKILLERWS680.

    D. You should consider running sysprep c:\store /nocompress on CERTKILLER-WS625.
    Answer: B

    • Explanation:
    • You should use the Scanstate command. /p Generates a space-estimate file called Usmtsize.txt that is saved to StorePath . This option does not collect the user state. You must also specify / nocompress . The command must be run locally on CERTKILLER625 (The source computer). The storage location may be on the network or local.
  30. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 300 Windows XP Professional workstations and 200 Windows Vista Ultimate workstations.

    You have been instructed to migrate all Windows XP Professional workstations to Windows 7 Ultimate. You need to ensure that user files and setting are retained. However, several
    CertKiller.com users have used Encrypting File System (EFS) to encrypt their user files. You
    therefore need to migrate the Encrypting File System (EFS) encrypted files and certificates. In addition you need to ensure that you are able to encrypt the migration store during the migration.

    What should you do?

    A. On Windows XP make use of the User State Migration Tool (USMT) 3.0.

    B. On Windows XP make use of the User State Migration Tool (USMT) 2.6.

    C. On Windows 7 make use of the User State Migration Tool (USMT) 4.0.

    D. On Windows 7 make use of the User State Migration Tool (USMT) 3.0.
    Answer: A

    • Explanation:
    • USMT 3.0 or higher should be used on Windows XP to migrate EFS files and certificates and
    • also encrypt the migration store. With USMT 3.0 you can specify the / efs :copyraw switch to
    • automatically migrate the EFS files and certificates to the destination computer that is running Windows Vista. To encrypt the store, you should use the /encrypt switch.
  31. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You have been instructed to perform a clean installation of Microsoft Windows 7 on the CertKiller.com client computers that are currently running Microsoft Windows Vista.

    You need to be able to migrate user data and settings to Windows 7. The computers running Windows Vista currently have a single partition of 80 GB with 60 GB of free disk space. You need to use the User State Migration Tool (USMT) to migrate user state data while keeping network traffic to a minimum.

    What should you do?

    A. You should create a network share and store the user data in the shared folder.

    B. You should format the hard disks on the Windows Vista computers and create a primary and a secondary partition.

    C. You should use third-party tools to resize the 80 GB partition and create a second partition to store the user data.

    D. You should use the Windows Easy Transfer tool to store the user data on the system partition.
    Answer: C

    • Explanation:
    • Resizing the 80 GB partition with a third-party tool and creating a second partition to store the user state data will keep the network traffic to a minimum. If you want to store user state data on a network share and the computer does not have a secondary partition, you should resize the partition.
  32. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Dean Austin asked you which of the Microsoft operating systems supports offline migration using USMT.

    What should you do? (Choose all that apply)

    A. You should consider instructing Dean Austin that Microsoft Windows Vista supports offline
    migration using USMT.

    B. You should consider instructing Dean Austin that Microsoft Windows XP Professional with SP2 or later supports offline migration using USMT.

    C. You should consider instructing Dean Austin that Microsoft Windows XP Professional supports offline migration using USMT.

    D. You should consider instructing Dean Austin that Microsoft Windows 7 supports offline
    migration using USMT.

    E. You should consider instructing Dean Austin that Microsoft Windows 2000 Professional with SP4 supports offline migration using USMT.
    Answer: A,B,C,D
  33. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are busy with a deployment of an image of a computer. You have created an answer file
    named answer.xml. You want to ensure that the installation applies the answer file after the deployment of the image.

    What should you do?

    A. You should consider running Imagex.exe / generalize /oobe /unattend:answer.xml before you capture the image.

    B. You should consider running Sysprep.exe /generalize /oobe /unattend:answer.xml before you capture the image.

    C. You should consider running Imagex.exe /unattend:answer.xml /run command before you capture the image.

    D. You should consider running setup.exe from the Windows 7 installation media before you capture the image.
    Answer: B

    • Explanation:
    • The System Preparation ( Sysprep ) tool prepares an installation of Windows 7 for duplication, auditing, and customer delivery. You can use an answer file with Sysprep to configure unattended Setup settings.

    The /generalize command removes any machine specific attributes such as the Security ID (SID).

    The / oobe command tells the image to start with the normal "Out-Of-The-Box" experience. Just as if you bought a retail new copy.

    The / unattend : command tells the image to use the answer file
  34. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 120 workstations.

    CertKiller.com is currently in the process of migrating all of its workstations to Windows 7. In preparation of the migration, you have installed Windows 7 on a computer named CERTKILLERWS680. You now need to create an image of CERTKILLER-WS680, which will be deployed to all workstations on the CertKiller.com network.

    What should you do before creating the image on CERTKILLER-WS680?

    A. You should consider running the System Preparation tool (Sysprep).

    B. You should consider installing the Remote Installation Services (RIS).

    C. You should consider disabling the System Protection settings.

    D. You should consider running the Windows Deployment Services (WDS).
    Answer: A


    • Explanation:
    • Sysprep is used to prepare the image to be installed on other machines. Sysprep will remove the SID, Reset the Activation to 30 days, add an answer file if desired and reset the install to an "Out-Of-The-Box" experience.

    Any method of moving a Windows image to a new computer, either through imaging, hard disk duplication, or other method, must be prepared with the sysprep /generalize command. Moving or copying a Windows image to a different computer without running the Sysprep /generalize command is not supported.
  35. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You have been instructed to
    deploy Microsoft Windows 7 on all of the CertKiller.com client computers.

    You have installed Windows Automated Installation Kit (Windows AIK) on a reference computer.
    You then created an answer file for a Windows 7 unattended installation. You now need to validate
    the answer file before deploying Windows 7 to the CertKiller.com client computers.

    What should you do?

    A. You should consider using the Setup Manager.

    B. You should consider using the Sysprep.exe utility.

    C. You should consider using the Office Customization Tool (OCT).

    D. You should consider using the Windows System Image Manager (Windows SIM) tool.
    Answer: D

    • Explanation:
    • The Windows SIM tool is used to create an answer file, as well as to validate the answer file to
    • ensure that the file is working.
  36. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com.

    You have been instructed to deploy Microsoft Windows 7 on all the CertKiller.com client
    computers. You want to deploy Windows 7 on the client computers in unattended mode. You
    install Windows 7 on a reference computer named CERTKILLER-WS680 that will be used to build
    a master image. You then manually create the answer file that will be required for the unattended
    installation.

    What should you do next?

    A. You should use Sysprep.exe to capture an image of CERTKILLER-WS680.

    B. You should use the ImageX command-line utility to capture an image of CERTKILLER-WS680.

    C. You should use Windows System Image Manager (Windows SIM) to validate the answer file.

    D. You should use the Setup Manager Tool to validate the answer file
    Answer: C

    • Explanation:
    • When manually creating an answer file, you should always validate the answer file using SIM.
    • Validating will ensure that the values in the answer file are correct. If you neglect to validate after
    • manually creating the answer file, you may encounter errors when deploying Windows 7 and will
    • then have to validate the answer file.
  37. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You have received instructions
    to deploy Windows 7 on all the CertKiller.com client computers that have CD-ROM drives.

    You decide to create a custom Windows 7 image on spanned media using the
    Createspannedshares.cmd script. However, you are unable run the Createspannedshares.cmd
    script.

    What should you do?

    A. You should consider installing the Package Manager prior to creating the spanned media.

    B. You should consider installing Windows Automated Installation Kit (Windows AIK) prior to
    creating the spanned media.

    C. You should consider installing the Deployment Image Servicing and Management (DISM) tool
    prior to creating the spanned media.

    D. You should consider installing the Windows System Image Manager (Windows SIM) prior to
    creating the spanned media.
    Answer: B

    • Explanation:
    • To be able to create the spanned media to install Windows 7 on the CD-ROM client computers
    • you need to install Windows AIK on a computer from where you plan to create the spanned media.
    • Only after the installation of Windows AIK will you be able to run the Createspannedshares.cdm
    • script to create the spanned media.
  38. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com.

    The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client
    computers at CertKiller.com. You have installed Windows Deployment Service (WDS) on a server
    named CERTKILLER-SR05. You want to use a client computer named CERTKILLER-WS680 as a
    reference computer from which you want to create the image for the deployment. You now need to
    remove hardware-specific information from the Windows installation on CERTKILLER-WS680.

    What should you do?

    A. You should consider running the Sysprep.exe utility with the /oobe and /generalize switches on
    CERTKILLER-WS680.

    B. You should consider running the Pkgmgr.exe utility with the /oobe and /generalize switches on
    CERTKILLER-WS680.

    C. You should consider running the Setupmgr utility with the /oobe and /generalize switches on
    CERTKILLER-WS680.

    D. You should consider running the ImageX command-line utility with the /oobe and /generalize
    switches on CERTKILLER-WS680.
    Answer: A
  39. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
    contains 5 Windows Server 2008 servers, 200 Windows Vista Business client computers and 300
    Windows 7 Professional client computers.

    You have been instructed to deploy Microsoft Windows 7 on the 200 Windows Vista Business
    client computers. There is an existing offline Windows 7 image on a client computer named
    CERTKILLER-WS680. However, you need to add updated device drivers to this image.

    What should you do?

    A. You should consider using the ImageX command line utility.

    B. You should consider using the Pkgmgr.exe utility.

    C. You should consider using the Sysprep.exe utility.

    D. You should consider using the Windows System Image Manager (Windows SIM).

    E. You should consider using the Deployment Image Servicing and Management (DISM) tool.
    Answer: E

    • Explanation:
    • The Deployment Image Servicing and Management (DISM) tool replaces the Pkgmgr.exe utility
    • and is used to update images by adding or removing device drivers and language packs, enabling
    • or disabling Windows features, and adding and configuring Windows updates.
  40. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its
    headquarters in London and a regional office in New York. All client computers on the
    CertKiller.com network run Windows 7 Ultimate. You are responsible for managing
    CertKiller.com's operating system deployment images.

    CertKiller.com is in the process of opening a European regional office in Rome. You are required
    to ensure that a Windows 7 image with support for Italian is available for deployment in the Rome
    office.

    What should you do?

    A. You should consider using the ImageX command-line tool to mount the Windows 7 image and
    make the appropriate changes using an answer file.

    B. You should consider using the ImageX command-line tool to mount the Windows 7 image and
    use a script to commit changes to the image.

    C. You should consider using the International Settings and Configuration (Intlcfg.exe) tool to
    make the appropriate changes to the Windows 7 image.

    D. You should consider using the Windows System Image Manager (Windows SIM) to create an
    answer file and then use the Deployment Image Servicing and Management (DISM) tool to apply it
    to the Windows 7 image.
    Answer: D

    • Explanation:
    • The Deployment Image Servicing and Management (DISM) tool allows you to add or remove
    • packages to or from an offline image or an image that is currently running on a computer. You can
    • also add or remove Windows features, apply unattended installation answer file settings, and
    • perform the offline installation of language packs and out-of-box driver packages specified in an
    • answer file.
  41. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its
    headquarters in London and a regional office in New York. All client computers on the
    CertKiller.com network run Windows 7 Ultimate. You are responsible for managing
    CertKiller.com's operating system deployment images.

    CertKiller.com is in the process of opening a European regional office in Rome. You are required
    to ensure that support for Italian is available for the Windows 7 deployment in the Rome office.
    However, you need to install the Italian language pack without editing the Windows 7 image.

    What should you do?

    A. You should consider installing the Italian language pack by using the Language Pack Setup
    Tool.

    B. You should consider copying the Italian language pack to the Windows distribution folder.

    C. You should consider installing the Italian language pack by using the Package Manager utility.

    D. You should consider installing the Italian language pack by using the Intlcfg.exe tool.
    • Answer: B
  42. You are employed as the network administrator at CertKiller.com. The CertKiller.com network
    contains 150 client computers currently running Microsoft Windows XP Professional.

    CertKiller.com has recently decided to deploy Windows 7 to 80 client computers on the
    CertKiller.com network. You decide to install Windows 7 on a computer named CERTKILLERWS06
    and prepare it to be imaged. You therefore need to determine what you should be doing
    prior to creating the image of CERTKILLER-WS06.

    What should you do?

    A. You should consider starting CERTKILLER-WS06 from the Windows Preinstallation
    Environment (Windows PE).
    Thereafter the Setupmgr utility should be run.

    B. You should consider running DISM.

    C. You should consider running Sysprep.

    D. You should consider running Windows System Image Manager (Windows SIM).
    Answer: C
  43. You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
    two Windows Server 2008 computers named CERTKILLER-SR01 and CERTKILLER-SR02 and
    500 Windows Vista Ultimate client computers. CERTKILLER-SR01 functions as a Domain
    Controller (DC) while CERTKILLER-SR02 functions as a Domain Name System (DNS) server.

    CertKiller.com purchases 200 new client computers that have the following resources:
    2.33 GHz Dual-Core processor.2 GB of RAM.80 GB hard drive.DirectX 10 video display
    card.Integrated sound card.10/100/1000 integrated network adapter.

    You need to perform a clean installation of Microsoft Windows 7 Ultimate on the new client
    computers. You use one of the new client computers as a reference computer from which you
    build a custom image and an answer file. You want to deploy the image to the new client
    computers over the network using Windows Deployment Services (WDS).

    What should you do?

    A. You should install a Remote Installation Services (RIS) server on the network.

    B. You should install a Dynamic Host Configuration Protocol (DHCP) server on the network.

    C. You should upgrade the Domain Controller to Windows Server 2008 R2.

    D. You should install a Windows Internet Name Service (WINS) server on the network.
    • Answer: B
    • Explanation:
    • The network must have a DHCP server with an active scope as Windows Deployment Services
    • uses PXE, which relies on DHCP for IP addressing.
  44. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You have been instructed to
    deploy Microsoft Windows 7 on all the CertKiller.com client computers.

    You use a client computer named CERTKILLER-WS680 as a reference computer to create a
    custom image and an answer file that will be used to automate the deployment of Windows 7 on
    the client computers. You want to complete the task with the least amount of administrative effort.

    What should you do?

    A. You should consider installing Systems Management Server (SMS) operating system
    deployment (OSD) feature pack on CERTKILLER-WS680.

    B. You should consider installing the Windows Automated Installation Kit (Windows AIK) on
    CERTKILLER-WS680.

    C. You should consider installing Windows System Image Manager (Windows SIM) on
    CERTKILLER-WS680.

    D. You should consider installing the ImageX command-line utility on CERTKILLER-WS680.
    Answer: B

    • Explanation:
    • WAIK is a set of tools that will aid you in deploying Windows 7 on target computers. You can
    • create an answer file and capture an image of a reference computer by making use of Windows
    • AIK.
  45. You work as the Desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You have been instructed to
    deploy Microsoft Windows 7 on CertKiller.com client computers that do not support PXE.

    You install Windows Deployment Service (WDS) on a server named CERTKILLER-SR05 and
    create a discover image for the deployment. You now need to identify the best method for creating
    bootable media that will be used to deploy Windows 7 on the non-PXE supporting client
    computers.

    What should you do?

    A. You should consider installing Windows System Image Manager (Windows SIM) on
    CERTKILLER-SR05.

    B. You should consider installing the Windows Automated Installation Kit (Windows AIK) on
    CERTKILLER-SR05.

    C. You should consider installing the Business Desktop Deployment (BDD) workbench on
    CERTKILLER-SR05.

    D. You should consider installing Sysprep on CERTKILLER-SR05.
    Answer: B

    • Explanation:
    • : Bootable media that will be used to deploy Windows 7 to client computers must be created after
    • a discover image is created. WAIK will provide the tools that are required to create the bootable
    • media.
  46. You work as a Desktop support technician at CertKiller.com. You have been assigned the task of
    installing Windows 7 on 10 network computers using custom WIM image.

    You have the Windows Automated Installation Kit (Windows AIK) installed on one of the
    computers. You now want to create a WinPE CD to capture or apply the custom WIM image of
    Windows 7 from the master computer.

    What should you do? (Each correct answer presents part of the solution. Choose three.)

    A. You should copy the WinPE.wim and boot files to WinPE_x86 and Burn this data on a CD.

    B. You should run Copype.cmd to install Windows PE to a directory and then copy the imagex.exe
    file to ISO folder under WinPE_x86 directory

    C. You should create wimscript.ini configuration file in notepad. Save the file in the same directory
    as imagex.exe.

    D. You should copy the Oscdimg.exe file and create a configuration file named wimscript.ini. Save
    the file in the same directory as Oscdimg.exe.

    E. You should run Oscdimg.exe to create an ISO image of WinPE. Burn the image on a CD.
    Answer: B,C,E

    • Explanation:
    • To create a WinPE CD and to initiate Windows 7 installation using a custom WIM image of
    • Windows 7, you need to first run Copype.cmd to install Windows PE to a directory and then copy
    • the imagex.exe file to ISO folder under WinPE_x86 directory, then create wimscript.ini
    • configuration file in notepad and save the file in the same directory as imagex.exe, and then finally
    • run Oscdimg.exe to create an ISO image of WinPE and then burn the image on a CD.
    • Part 4: Configure a VHD (6 Questions)
  47. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    The CertKiller.com network contains a client computer named CERTKILLER-WS679 with a Virtual
    Hard Disk (VHD). You have installed Windows 7 on the Virtual Hard Disk (VHD). You now want to
    boot CERTKILLER-WS679 from the Virtual Hard Disk (VHD).

    What should you do?

    A. You should consider running msconfig.

    B. You should consider editing the boot.ini file in notepad.

    C. You should consider running the Bcdedit.exe command and modifying the Windows Boot
    Manager settings.

    D. You should consider running the Bootcfg.exe command with the /active parameter.
    Answer: C

    • Explanation:
    • If you are deploying the VHD to a computer with an existing Windows7 or Windows
    • Server®2008R2 installation, you can use the BCDedit tool to make the new VHD bootable and
    • add it to the boot menu. Using BCDedit , you obtain the GUID from the VHD boot disk and then
    • using BCDedit , set that GUID to be the default boot device.
  48. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    You have created a Virtual Hard Disk (VHD) with a disk image that you want to add to a client
    computer named CERTKILLER-WS680. You have copied the VHD to CERTKILLER-WS680 and
    attached it using the attach vdisk command. You now want to add the Virtual Hard Disk (VHD) to
    the Windows 7 boot menu.

    What should you do?

    A. You should consider using the Sysprep utility to modify the Windows Boot Manager settings.

    B. You should consider using Disk Management to change the active partition.

    C. You should consider using the BCDboot utility to copy the boot environment files and Boot
    Configuration Data (BCD) configuration from the \Windows directory in the VHD to CERTKILLERWS680.

    D. You should consider using the Bootcfg.exe utility with the /default parameter to set the VHD as
    the default boot device.
    Answer: C
  49. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. CertKiller.com has acquired a new computer
    named CERTKILLER-WS25 that has no operating system (OS) installed.

    There is a virtual hard disk (VHD) in your department that contains an installation of Windows 7.
    You therefore decide to start CERTKILLER-WS25 from the Windows Preinstallation Environment
    (Windows PE). You then create a partition on CERTKILLER-WS25 and copy the VHD to it. Your
    next step is to configure CERTKILLER-WS25 to start from the virtual hard disk.

    What should you do?

    A. Your best options would be to make use of sysprep.exe and bootcfg.

    B. Your best options would be to make use of VHDmgr.exe and Diskmgmt.msc.

    C. Your best options would be to make use of Diskpart.exe and Bcdedit.exe.

    D. Your best options would be to make use of Diskpart.exe and Bcdboot.exe.
    Answer: D
  50. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you receive instruction from CertKiller.com to create a 20-GB native
    VHD which will be named KingSystem located in a folder KingWindows which resides on an
    external hard disk assigned the H: drive designation.

    What should you do?

    A. You should consider making use of the diskpart file=h:\kingwindows\kingsystem.vhd
    maximum=20 command.

    B. You should consider making use of the diskpart file=h:\kingwindows\kingsystem maximum=20
    command.

    C. You should consider making use of the create vhd file= h:\kingwindows\kingsystem.vhd
    maximum=20000 command.

    D. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd
    maximum=20000 command.
    Answer: D
  51. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you receive instruction from CertKiller.com to configure fault
    tolerance for an operating system on a computer running Microsoft Windows 7 Home Premium to
    boot in the event of a hard disk failure. CertKiller.com additionally informed you that the computer
    has two disks with unallocated space on the second disk drive.

    What should you do?

    A. You should consider having a RAID-1 volume created.

    B. You should consider having a RAID-5 volume created.

    C. You should consider having a RAID-6 volume created.

    D. You should consider having a RAID-0 volume created.
    Answer: A
  52. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named
    Rory Allen has recently requested that you copy files to a virtual hard disk (VHD) file on his client
    computer.

    Which two steps should you take first?

    A. You should consider having the Diskpart.exe command run.

    B. You should then have the Select and Attach commands run.

    C. You should consider having Microsoft Hyper-V installed.

    D. You should consider having the Disk Management run and scanning for disks.

    E. You should consider having the VHD file opened from within Windows Explorer.
    Answer: A,B
  53. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    You are currently working on a workstation named CERTKILLER-WS680. You use the Windows
    Preinstallation Environment (Windows PE) to boot CERTKILLER-WS680. You now need to load a
    network adapter device driver on the Windows PE.

    What should you do?

    A. You should consider running Drvload.exe and then specify the device driver path.

    B. You should consider running Sysprep.exe.

    C. You should consider using the ntloader command after you run Wpeutil.exe.

    D. You should consider running sigverif.exe and then specify the device driver path.
    Answer: A

    • Explanation:
    • Drvload.exe is the tool used to load drivers in the PE environment. Manually load the network
    • driver, and then verify that it is the correct driver.
  54. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. You are responsible for a workstation
    named CERTKILLER-WS680 that runs Windows 7.

    You have just upgraded the driver for the network adapter on CERTKILLER-WS680. After the
    upgrade you discover that you are unable to access the network resources. In Device Manager
    you notice a warning symbol next to the network adapter. You have to make sure that you are able
    to access the network resources as soon as possible.

    What should you do?

    A. You need to uninstall the network adapter and scan for any hardware changes.

    B. You need to roll back the network adapter driver.

    C. You need to disable the network adapter and scan for any hardware changes.

    D. You need to assign a static IP address to the network adapter.
    Answer: B

    • Explanation:
    • The easiest way to fix the problem is to roll back the newly installed driver. Click on the device in
    • device manager, select the "Driver" tab and then click on "Roll Back Driver"

    • Incorrect Answers:
    • A: Uninstalling the network adapter might work but it is a lot of effort.

    C: If you disable the adapter, the hardware scan won't find it.

    D: A static IP address won't help.
  55. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows 7 Professional.

    You are working on a client computer named CERTKILLER-WS680 that has been assigned to a
    CertKiller.com user named Amy Walsh. You have been instructed toupdate the printer connected
    to CERTKILLER-WS680 so that Amy Walsh can print graphics at a higher resolution. You
    download a new printer driver from the Internet. Before you install the new printer driver you want
    to ensure that the driver is compatible with Windows 7.

    What should you do?

    A. You should view the Advanced Attributes dialog box for the printer driver file and install the
    driver if the contents have been secured.

    B. You should run File Signature Verification to verify that the new driver has a Microsoft digital
    signature and install the driver if it does have the signature.

    C. You should install the driver and logon to the computer. If the computer fails after installing the
    driver, reboot the computer and select the last known good configuration to recover the original
    driver.

    D. You should install the driver and logon to the computer. If the computer fails after installing the
    driver, reboot the computer and use the roll back option to recover the original driver.
    Answer: B

    • Explanation:
    • When installing new software on your computer, system files and device driver files are sometimes
    • overwritten by unsigned or incompatible versions, causing system instability. The system files and
    • device driver files provided with Windows 7 have a Microsoft digital signature, which indicates that
    • the files are original, unaltered system files or that they have been approved by Microsoft for use
    • with Windows. Using File Signature Verification, you can identify unsigned files on your computer.
    • You should not install the driver if it does not have the signature if you want to prevent the loss of
    • production time due to incompatible driver installation that you are unsure of.
  56. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network client
    computers currently make use of Microsoft Windows 7. You are assigned a client computer named
    CERTKILLER-WS25. To ensure your productivity you need to make sure that the physical
    memory as well as the speed is increased on CERTKILLER-WS25.

    What should you do?

    A. You should consider making use of ReadyBoost.

    B. You should consider making use of EFS.

    C. You should consider making use of SpeedDisk.

    D. You should consider making use of Pagefile.sys.
    Answer: A
  57. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory forest containing a single domain named CertKiller.com. The servers on the
    network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
    CertKiller.com purchases 40 new client computers configured with 32-bit hardware.

    You have been asked by CertKiller management to plan the deployment of Windows 7 along with
    several corporate applications to the client computers using a custom image.

    How should you prepare for the deployment whilst ensuring the least amount of administrative
    effort is used?

    A. You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and
    run on a server.

    B. You should consider having Windows 7 installed on each computer ready for the deployment of
    the corporate applications.

    C. You should consider having Microsoft Windows 7 and the corporate applications installed on
    one client computer.

    D. You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and
    run on a client computer.

    E. You should consider having WSUS installed on a server.
    Answer: C
  58. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    CertKiller.com has recently deployed a client computer that is used by multiple users in the Sales
    department. The client computer currently has multiple removable devices attached. During the
    course of the day you receive instruction from CertKiller.com to ensure that the network users are
    only able to access removable devices which were previously installed in the computer by
    modifying the Local Group Policy.

    What should you do?

    A. You should consider having the Run with Elevated Permissions setting disabled.

    B. You should consider having the Unsigned Driver Installation - Block setting enabled.

    C. You should consider having the Prevent redirection of USB device settings enabled.

    D. You should consider having the Prevent redirection of USB device settings disabled.

    E. You should consider having the Prevent installation of removable devices setting enabled.
    Answer: E
  59. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    The CertKiller.com network contains a Windows 7 client computer named CERTKILLER-WS680.
    CERTKILLER-WS680 also runs a third party accounting application named accapp.exe.
    Accapp.exe is started during the boot process. You have received instructions to ensure that
    accapp.exe is only started manually and not started during the boot process.

    How can you stop accapp.exe starting during the boot process?

    A. You should consider modifying the permissions on accapp.exe.

    B. You should consider using the System Configuration tool and using the Boot tab.

    C. You should consider setting a software restriction policy.

    D. You should create a path rule to accapp.exe.

    E. You should consider using the System Configuration tool and set the Startup applications.
    • Answer: E
    • Explanation: Using the System Configuration tool (MSConfig.exe), you can select diagnostic booting or configure starting services or applications. Incorrect
  60. You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. All client computers including mobile
    computers on the CertKiller.com network run Windows 7 Professional.

    A CertKiller.com user named Kara Lang has been assigned a mobile computer named
    CERTKILLER-WS680. Kara Lang is preparing a multimedia presentation on CERTKILLERWS680.
    However, Kara Lang informs you that when she plays the multimedia presentation there
    is no sound.
    You need to enable Kara Lang to do her presentation with audio and video playback.

    What should you do?

    A. You should install Windows Media Player 10 or later.

    B. You should select the 'I always give a presentation when I use this display configuration' check
    box from the Presentation settings dialog box.

    C. You should configure CERTKILLER-WS680 to use the default sound scheme.

    D. You should enable the 'Presentation Settings' option and adjust the volume settings
    appropriately.
    • Answer: D
    • Explanation: Using "Windows Mobility Center" you can ensure that your laptop stays awake, notifications are turned off and the screen saver is turned off. You can also adjust the sound. The " Windows Mobility Center " is only available on Laptops.
  61. You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
    workstation named CERTKILLER-WS680.

    You have upgraded CERTKILLER-WS680 from Windows XP Professional Service Pack 2 (SP2)
    to Windows 7 Professional. However, when you attempt to run a custom application named
    CKapp.exe you receive an error message stating: "This application is only designed to run on
    Windows XP or later." You need to configure the application to run on Windows 7.

    What should you do?

    A. You should consider installing Windows XP Mode on CERTKILLER-WS680.

    B. You should consider having the CKapp.exe application configured to run with elevated
    privileges.

    C. You should consider reinstalling the application.

    D. You should consider modifying the CKapp.exe application properties to run in Silent Mode.
    Answer: A
  62. You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. All client computers and mobile computers
    on the CertKiller.com network run Windows 7 Professional.

    CertKiller.com has an Accounts department that needs to run an accounting application named
    accapp.exe. However, accapp.exe is not Windows 7 compatible and can run only on Windows XP
    Professional computers. You need to ensure that the Accounts department can run accapp.exe on
    their client computers.

    What should you do?

    A. You should configure accapp.exe to run with elevated privileges.

    B. You should install Windows XP Mode on each client computer in the Accounts department.

    C. You should enable User Account Control on the client computers in the Accounts department.

    D. You should disable User Account Control on the client computers in the Accounts department.
    Answer: B
  63. CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
    network contains 50 client computers that are configured to run Microsoft Windows XP
    Professional. During the course of the day you receive an instruction from the CIO to determine
    which current applications installed on the client computers are compatible with Windows 7. You
    need to accomplish this task with the least amount of administrative effort.

    What should you do?

    A. You should consider running Package Manager.

    B. You should consider running ImageX.

    C. You should consider running Windows Deployment Services (WDS).

    D. You should consider installing Microsoft Application Compatibility Toolkit (ACT).
    Answer: D
  64. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. All computers on the
    CertKiller.com network are configured to run Windows 7. You are in the process of identifying the
    various ratings for games in Windows 7.

    What will you find?

    A. You will find the Teen (T) rating setting in Windows 7.

    B. You will find the Everyone (E) rating setting in Windows 7.

    C. You will find the General Audience (G) rating setting in Windows 7

    D. You will find the Universal (U) rating in Windows 7.

    E. You will find the Adults Only (AO) rating setting in Windows 7.
    Answer: A,B,E
  65. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7 or Microsoft Windows
    XP Professional.

    During the course of the day a network user named Dean Austin asked you which of the Microsoft
    utilities can be used when transferring user encryption certificates from a computer that is
    configured to run Microsoft Windows XP Professional to a computer configured to run Microsoft
    Windows 7.

    What should you do? (Choose two)

    A. You should consider instructing Dean Austin that the Windows Easy Transfer utility can be used
    for transferring the user encryption certificates.

    B. You should consider instructing Dean Austin that the xcopy.exe utility can be used for
    transferring the user encryption certificates.

    C. You should consider instructing Dean Austin that the ImageX utility can be used for transferring
    the user encryption certificates.

    D. You should consider instructing Dean Austin that the USMT utility can be used for transferring
    the user encryption certificates.
    Answer: A,D
  66. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the
    day a network user named Rory Allen asked you what he should download from the Microsoft
    Corporation Web site to obtain USMT 4.0.

    What should you do?

    A. You should consider instructing Rory Allen that WAIK should be downloaded from Microsoft
    Corporation to obtain USMT 4.0.

    B. You should consider instructing Rory Allen that Windows Deployment Services should be
    downloaded from Microsoft Corporation to obtain USMT 4.0.

    C. You should consider instructing Rory Allen that the Windows 7 Resource Kit Tools should be
    downloaded from Microsoft Corporation to obtain USMT 4.0.

    D. You should consider instructing Rory Allen that Windows Easy Transfer should be downloaded
    from Microsoft Corporation to obtain USMT 4.0.
    Answer: A
  67. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you create an application shim for the third-party accounting
    application using Microsoft Application Compatibility Toolkit (ACT).

    What should you do first to make sure the application shim is applied the next time the application
    is run?

    A. You should consider modifying the permissions on the application file.

    B. You should consider reinstalling the application.

    C. You should consider having the Sdbinst.exe command run.

    D. You should consider running Windows Update.

    E. You should consider having the Msiexec.exe command run.
    Answer: C
  68. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    You are responsible for managing a desktop workstation named CERTKILLER-WS680.
    CERTKILLER-WS680 is configured to run Windows 7. You receive an instruction to ensure that all
    device drivers installed on CERTKILLER-WS680 are digitally signed.

    Which of the following is the easiest way to achieve this?

    A. You should consider running Sigverif.exe at a command prompt on CERTKILLER-WS680.

    B. You should consider running sfc /scannow at a command prompt on CERTKILLER-WS680.

    C. You should consider viewing the properties of each device listed in Device Manager on
    CERTKILLER-WS680.

    D. You should consider running Windows Update on CERTKILLER-WS680.
    Answer: A
  69. You work as a desktop support technician at a company named CertKiller.com. All CertKiller.com
    users are divided into groups named CK_ADMIN, CK_SUPRT and CK_STAFF.

    The CertKiller.com network contains a stand-alone Windows 7 computer named CERTKILLERWS680.
    Several CertKiller.com users make use of CERTKILLER-WS680. You need to prevent the
    CertKiller.com users of the CK_STAFF group from running Windows Media Player on
    CERTKILLER-WS680. However, all other members must still be able to run Windows Media
    Player. You want to accomplish this task by using the least amount of administrative effort.

    What should you do?

    A. You should consider creating an executable rule from Application Control Policies on
    CERTKILLER-WS680.

    B. You should consider creating a path rule from Application Control Policies on CERTKILLERWS680.

    C. You should consider creating an executable rule from Software Restriction Policies on
    CERTKILLER-WS680.

    D. You should consider creating a certificate rule from Software Restriction Policies on
    CERTKILLER-WS680.
    Answer: A
  70. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a
    computer named CERTKILLER-WS680 which runs Microsoft Windows 7. CERTKILLER-WS680 is
    currently used by multiple CertKiller.com network users who log on to the computer. You have
    received instruction to deny a CertKiller.com user named Mia Hamm access to removable devices
    on CERTKILLER-WS680. However, all other users who log on to CERTKILLER-WS680 must
    retain access to removable devices.

    What should you do?

    A. You should consider configuring disk permissions in Disk Management on CERTKILLERWS680.

    B. You should consider altering the Disk Encryption settings on CERTKILLER-WS680.

    C. You should consider a removable storage access policy from Device Manager on
    CERTKILLER-WS680.

    D. You should consider altering a removable storage access policy from the local Group Policy on
    CERTKILLER-WS680.
    Answer: D
  71. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    CertKiller.com issues a new usage policy that states that no CertKiller.com user should be allowed
    to play video clips using Windows Media Player. You need ensure that this policy is applied.

    What should you do? (Each correct answer presents part of the solution. Choose TWO.)

    A. You should create a software restriction policy.

    B. You should create a logon script that deletes wmplayer.exe.

    C. You should create a logon script that uninstalls Windows Media Player.

    D. You should create a path rule to restrict the use of wmplayer.exe
    • Answer: A,D
    • Explanation: To prevent users from running Windows Media Player, you need to first create a software restriction policy and then create a path rule to restrict the use of wmplayer.exe. Software Restriction Policies can be used to protect computers against unauthorized software.
  72. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    A software restriction policy has been implemented for the Finance department and the default
    security level for the policy has been set to Disallow. The Finance department now needs to run a
    custom application named FinApp.exe.

    You now need to configure the software restriction policy to allow CertKiller.com users in the
    Finance department to run FinApp.exe. However, they should not be allowed to run any other
    unauthorized applications.

    What should you do?

    A. You should set the default security level of the software restriction policy to Unrestricted.

    B. You should add FinApp.exe to the Designated File Types.

    C. You should create a new path rule for FinApp.exe.

    D. You should create a logon script to modify the permissions on the FinApp.exe file.

    E. You should set the default security level of the software restriction policy to Basic User.
    • Answer: C
    • Explanation: To configure the software restriction policy to allow Finance department users to run FinApp.exe and make sure that they are not allowed to run any other unauthorized applications, you need to create a new path rule for FinApp.exe and then set the rule to Unrestricted.
  73. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com
    network run Windows Server 2008 and all client computers run Windows 7. CertKiller.com has
    multiple custom applications that are digitally signed. For security purposes CertKiller wants you to
    devise a security policy that will only enable company approved digitally signed applications to run.

    Which of the following options would achieve this?

    A. Your best option would be run Software Explorer on each client computer.

    B. Your best option would be to Bitlocker rule created.

    C. Your best option would be to have an AppLocker executable rule created.

    D. Your best option would be to have a software restriction policy that applies a path rule.
    Answer: C
  74. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network client
    computers are configured to run Windows 7. You are assigned a computer named CERTKILLERSR05.
    During the course of the day you receive an instruction from the CIO to identify the
    applications that were installed on CERTKILLER-SR05 the previous week. You need to gather this
    information as soon as possible.

    What should you do? (Choose all that apply.)

    A. You should be able to locate this information by checking the Programs and Features section in
    the Control Panel.

    B. You should be able to locate this information by reviewing the informational events from the
    Reliability Monitor.

    C. You should be able to locate this information by checking the process list in Task Manager.

    D. You should be able to locate this information by viewing all events in the Applications Log in
    Event Viewer.
    Answer: B,D
  75. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you receive instruction from CertKiller.com to deny the network users
    execute, write and read access to all types of external storage devices for security reasons.

    Which of the following is the easiest way to achieve this?

    A. You should consider making use of a path rule.

    B. You should consider making use of the Removable Disks: Deny Write Access computer policy
    setting.

    C. You should consider making use of Windows Explorer to change the permissions on the drives
    on each client computer

    D. You should create a Software Restriction policy.

    E. You should consider making use of the All Removable Storage Classes: Deny All Access
    computer policy setting.
    Answer: D
  76. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    During the course of the day you receive instruction from CertKiller.com to have a standalone
    computer configured to prevent the non-administrative users from using Disk Management whilst
    ensuring that the users are able to access the Device Manager.

    Which of the following options would achieve this?

    A. You should consider having the permissions modified on the Microsoft Management Console.

    B. You should consider having the Microsoft Management Console (MMC) settings modified from
    the local computer policy.

    C. You should consider having the driver installation settings modified from the local computer
    policy.

    D. You should consider having the User Account Control (UAC) settings modified from the local
    computer policy.
    Answer: B
  77. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers run Microsoft
    Windows 7.

    You are assigned a client computer named CERTKILLER-WS680.

    How would you modify the file extensions on CERTKILLER-WS680 that are linked to Internet
    Explorer?

    A. You should consider opening Default Programs and selecting Set Associations from the Control
    Panel.

    B. You should consider modifying the properties of iexplore.exe.

    C. You should consider modifying the Internet Properties on the Content tab within Internet
    Explorer.

    D. You should consider running msconfig to open the System Configuration utility.
    Answer: A
  78. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an
    internal Web site that uses Integrated Windows Authentication.

    A CertKiller.com user named Amy Walsh has been assigned a workstation named CERTKILLERWS680
    that is running Windows 7. Amy Walsh reports that she is prompted for authentication
    when she attempts to access the internal Web site. You verify that Amy Walsh's user account has
    permission to access the internal Web site. You need to make sure that authentication occurs
    automatically when Amy Walsh attempts to connect the Web site.

    What should you do?

    A. You should consider adding the Web site's URL to the Local Intranet zone on CERTKILLERWS680.

    B. You should consider changing the password for Amy Walsh's user account.

    C. You should consider changing the access control for the internal Web site to allow Anonymous
    Access.

    D. You should consider changing the security level for Internet Explorer to Medium-Low on
    CERTKILLER-WS680.

    E. You should consider adding the Web site's URL to the Trusted sites zone on CERTKILLERWS680.
    Answer: A
  79. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an
    intranet Web site.

    A CertKiller.com user named Robbie Blake has been assigned a workstation named
    CERTKILLER-WS680 that is running Windows 7. Robbie Blake reports that he can access the
    internal web site but he cannot access web sites on the internet when he starts Internet Explorer.
    You open Internet Explorer on CERTKILLER-WS680 as shown in the exhibit:

    {Microsoft Corporation -Windows Internet Explorer - [Working Offline]} {InPrivate http://www.microsoft.com} (unable to copy image)

    You need to ensure that Robbie Blake can access websites on both the Internet and the intranet.

    What should you do?

    A. You should consider selecting Work Offline from the Tools menu on CERTKILLER-WS680.

    B. You should consider selecting InPrivate Blocking from the Safety menu on CERTKILLERWS680.

    C. You should consider selecting InPrivate Browsing from the Safety menu on CERTKILLERWS680.

    D. You should consider changing the Security level to Medium-Low on CERTKILLER-WS680.

    E. You should consider adding the intranet Web site to the Internet zone from the Security tab on
    CERTKILLER-WS680.
    Answer: A
  80. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com.

    A CertKiller.com user named Mia Hamm currently makes use of a computer named
    CERTKILLER-WS680 which runs Microsoft Windows 7.

    How would you configure CERTKILLER-WS680 to prevent Microsoft Internet Explorer from saving
    any data when Mia Hamm browses the Internet?

    A. You should consider modifying the permissions on the Temporary Internet Files folder.

    B. You should consider disabling the Client for Microsoft Networks service on CERTKILLERWS680.

    C. You should consider opening an InPrivate Browsing session on CERTKILLER-WS680.

    D. You should consider selecting the Work Offline option in Internet Explorer on CERTKILLERWS680.
    Answer: C
  81. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows 7 Professional.

    A CertKiller.com user named Andy Reid currently makes use of a computer named CERTKILLERWS680.
    You want to configure CERTKILLER-WS680 to make sure that the temporary Internet
    files are deleted immediately whenever Andy Reid closes Internet Explorer.

    What should you do?

    A. You should consider modifying the offline files settings on CERTKILLER-WS680.

    B. You should consider modifying the advanced settings from the Internet Options on
    CERTKILLER-WS680

    C. You should consider changing the security level for the Internet zone to Low from the Internet
    Options on CERTKILLER-WS680.

    D. You should consider modifying the permissions of the %systemroot%\temp\history folder on
    CERTKILLER-WS680.
    Answer: B
  82. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com currently
    has an internal Web site that uses HTTPS and has a self-signed certificate.

    A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web
    site. During the course of the day you receive complaints from Rory Allen that he receives the
    error message when attempting to browse the internal Web site:

    "There is a problem with the website's security certificate"

    CertKiller.com wants you to prevent the warning message from appearing when Rory Allen or
    other users access the internal Web site.

    What should you do?

    A. You should consider having the Web sites certificate imported into the Trusted Root
    Certification Authorities store using Certificate Manager.

    B. You should consider having the Web sites certificate imported into the Trusted Root
    Certification Authorities store using Windows Explorer.

    C. You should consider changing the security level for the Internet zone to Medium-Low from the
    Internet Options.

    D. You should consider having Web site added to the Internet zone from Internet Explorer.
    Answer: A
  83. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. CertKiller.com has itsheadquarters in
    London and a branch office in Paris.

    The relevant portion of the CertKiller.com network is shown in the following exhibit:
    London connected to a router transmitting to Paris router with computer (certkiller ws-680) Internal IP address:192.168.5.52/27


    You have just deployed a Windows 7 workstation named CERTKILLER-WS680 at the Paris office.
    You now need to assign an IP address to the worksation.

    What should you do?

    A. You should consider assigning the IP address 192.168.5.193 to CERTKILLER-WS680.

    B. You should consider assigning the IP address 192.168.5.126 to CERTKILLER-WS680.

    C. You should consider assigning the IP address 192.168.5.40 to CERTKILLER-WS680.

    D. You should consider assigning the IP address 192.168.5.94 to CERTKILLER-WS680.
    • Answer: C
    • Explanation: Correct Answer 192.168.5.40. Using an IP address like 192.168.5.52/27 is a shorthand way of indentifying the subnet mask. The /27 means that the first 27 bits of the IP address is the net mask. In this case 255.255.255.224. So the range of the available IP addresses for computers is limited to 192.168.5.33-62. The only IP address listed in that range is 198.158.5.40
    • The range starts at 33 because in the IP address given (192.168.5.40) the last octet number is 40.
    • 40 includes the number 32 which is 27th bit in the subnet mask. This means that the subnet ends
    • at 32 and so workstations must begin at 33. Or in other words, the address of the the subnet is
    • 192.168.5.32. This answer is the same regardless of the first three octet values. Even if the IP
    • address was 192.168.2.62, the results are the same.
  84. You work as the network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network
    run Windows Server 2008 and all client computers run Windows 7. All client computers are
    configured as Dynamic Host Configuration Protocol (DHCP) clients.

    CertKiller.com users connect to a file server named CERTKILLER-SR01 that hosts several shared
    folders. A fellow network administrator relocates CERTKILLER-SR01 to another network segment.
    However, after the CERTKILLER-SR01 is relocated, numerous CertKiller.com users complain that
    they are unable to access the shared folders on TESTING-SR01. You need to make sure that
    CertKiller.com users can connect to CERTKILLER-SR01 and access the shared folders on
    CERTKILLER-SR01.

    What should do?

    A. You should instruct all CertKiller.com users to run ipconfig /displaydns from a command prompt
    window on their client computers.

    B. You should instruct all CertKiller.com users to run netsh interface ip set dns from a command
    prompt window on their client computers.

    C. You should instruct all CertKiller.com users to run nbtstat -RR from a command prompt window
    on their client computers

    D. You should instruct all CertKiller.com users to run ipconfig /release and ipconfig /renew from a
    command prompt window on their client computers.

    E. You should instruct all CertKiller.com users to run ipconfig /flushdns.
    • Answer: E
    • Explanation:
    • The ipconfig / flushdns command is used to flush and reset the contents of the DNS client
    • resolver cache. The workstations that communicated with CERTKILLER-SR01 prior to the move
    • cached the server's IP address in their DNS cache. It is therefore a possibility that those
    • workstations are retrieving their IP address from the cache. It does not query the DNS server for
    • the IP address. This type of situation will continue until the cached records expire.
  85. You are employed as a network administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Microsoft Windows 7.

    A CertKiller.com user named Dean Austin has been assigned a client computer named
    CERTKILLER-WS623. CERTKILLER-WS623 has been configured to use the 192.168.16.35 IP
    address and the 255.255.255.0 Subnet mask. CERTKILLER-WS623 has also been configured to
    use 192.168.18.3 as the DNS Server address. The following exhibit shows the CERTKILLERWS623
    IP configuration:
    (See Image)


    You need to ensure that Dean Austin can make use of CERTKILLER-WS623 to connect to
    resources on other subnets.

    What should you do?

    A. You need to configure the default gateway as 192.168.16.1.

    B. You need to configure the default gateway as 192.168.16.35.

    C. You need to configure the default gateway as 192.168.18.1.

    D. You need to configure the preferred DNS server as 192.168.16.35.
    • Answer: A
    • Explanation:
    • To connect to other subnets, you need to configure CERTKILLER-WS623 with a default gateway.
    • The default gateway is usually the address of the internal interface of the network router. The
    • question doesn't tell us what address of the internal interface of the network router is but we know
    • that it needs to be an address in the same subnet as CERTKILLER-WS623. From the answers
    • given, the only address that would apply is 192.168.16.1.
  86. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    The CertKiller.com network is connected to the Internet through a router with an internal IP
    address of 192.168.16.12 and an external IP address of 198.207.16.19. You add a new Windows
    7 client computer named CERTKILLER-WS680 to the network. You configure CERTKILLERWS680
    with the IP address of 192.168.16.35 and a subnet mask of 255.255.255.0. You need to
    ensure that CERTKILLER-WS680 is able to access the Internet.

    What should you do?

    A. You should set the IP address for CERTKILLER-WS680 to 198.164.16.35.

    B. You should set the subnet mask for CERTKILLER-WS680 to 255.255.0.0.

    C. You should set the default gateway on CERTKILLER-WS680 to 198.164.16.19.

    D. You should set the default gateway on CERTKILLER-WS680 to 192.168.16.12.
    Answer: D
  87. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You are working on a client computer named CERTKILLER-WS680. You want to release the
    DHCP assigned IP configuration of CERTKILLER-WS680. However, when you run the ipconfig
    /release command you receive the error message stating that elevated permissions are required.

    What should you do?

    A. You should consider right-clicking the command prompt and select Run as administrator and
    using the ipconfig /release command.

    B. You should consider logging on as an administrator and open the command prompt to run the
    ipconfig /all command.

    C. You should consider opening the Command Prompt and run the ipconfig /release /high
    command.

    D. You should consider disabling the network adapter and enabling it then run ipconfig /release.
    Answer: A
  88. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The CertKiller.com network currently
    consists of two offices named Detroit and Miami which are on an isolated private wired subnet.
    The servers on the network run Microsoft Windows Server 2008 and the client computers run
    Microsoft Windows 7.

    During the course of the day you configure Detroit with an IPv4 address 172.28.34.140 with a
    subnet mask of 255.255.255.0. CertKiller.com additionally requested you configure the Miami
    office with an IPv4 address 172.28.34.210 with a subnet mask 255.255.255.0. During your routine
    maintenance you ping Detroit entering 172.28.34.140 and the command times out. You later try
    pinging Miami entering 172.28.34.210 and discover that you fail to locate the Miami computer IPv4
    address. CertKiller.com wants you to determine what could be causing the problem.

    What should you do?

    A. You should inform CertKiller.com that the problem could be caused by not specifying a default
    gateway.

    B. You should inform CertKiller.com that the problem could be caused by not permitting ICMPv4
    traffic through firewalls on both computers.

    C. You should inform CertKiller.com that the problem could be caused by the DNS service not
    being available on the subnet.

    D. You should inform CertKiller.com that the problem could be caused by the WINS service not
    being available on the subnet.

    E. You should inform CertKiller.com that the problem could be caused by the computer being on
    different subnets.
    Answer: B
  89. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network is
    configured to use IPv6 addressing.

    You have installed Windows 7 on a client computer named CERTKILLER-WS680 and have used
    automatic IPv6 addressing on CERTKILLER-WS680. You want to verify the IPv6 address of
    CERTKILLER-WS680.

    What should you do?

    A. You should consider running the Net view command from the command prompt on
    CERTKILLER-WS680.

    B. You should consider selecting Details from the network connection status on CERTKILLERWS680.

    C. You should consider running the msconfig command to open the System Configuration utility
    on CERTKILLER-WS680.

    D. You should consider running the Nbtstat command from the command prompt on
    CERTKILLER-WS680.
    Answer: B
  90. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    A CertKiller.com user named Amy Wilson has been assigned a client computer named
    CERTKILLER-WS680. CERTKILLER-WS680 is connected directly to the Internet. You have
    received instruction to configure CERTKILLER-WS680 with an Internet Protocol version 6 (IPv6)
    address similar to a public IPv4 address. You need to determine the unicast address that needs to
    be configured on CERTKILLER-WS680.

    What should you do?

    A. You should consider using a unique local address as the appropriate IPv6 address type.

    B. You should consider using a link-local address as the appropriate IPv6 address type.

    C. You should consider making use of a site-local address as the appropriate IPv6 address type.

    D. You should consider using a global unicast address as the appropriate IPv6 address type.

    E. You should consider using a DNS address as the appropriate IPv6 address type.
    • Answer: D
    • Explanation: Global Unicast IPv6 addresses are globally routable and reachable on the IPv6 portion of the Internet. Global addresses are equivalent to public IPv4 addresses and are used on the IPv6 Internet.
  91. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You are working on a client computer named CERTKILLER-WS680. You have been instructed to
    configure CERTKILLER-WS620 with 2001::e45d:691a:f:4ac2.

    What should you do?

    A. You should manually assign 2001::e45d:691a:f:4ac2 as the MAC address.

    B. You should manually assign 2001::e45d:691a:f:4ac2 as a DNS suffix search item.

    C. You should manually assign 2001::e45d:691a:f:4ac2 as a WEP key for a wireless network.

    D. You should manually assign 2001::e45d:691a:f:4ac2 as the IPv6 address.

    E. You should manually assign 2001::e45d:691a:f:4ac2 as the IPv4 address.
    .
    • Answer: D
    • Explanation: The format of the address 2001: :e45d:691a:f:4ac2 tells us that this is an IPv6 address and therefore you need to configure the network connection by entering 2001::e45d:691a:f:4ac2 in the IPv6 address properties
  92. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network is
    configured to make use of IPv6. You are responsible for managing a computer named
    CERTKILLER-SR04. You receive a request from the CIO to create a DNS record that will allow
    users to connect to CERTKILLER-SR04 using dec.CertKiller.com. You therefore need to identify
    the appropriate record you should request.

    What should you do?

    A. Your best option would be to request an NS record.

    B. Your best option would be to request an HINFO record.

    C. You best option would be to request an MX record.

    D. Your best option would be to request an AAAA record.

    E. Your best option would be to request an A record.
    Answer: D
  93. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
    recently deployed two client computers to the network configured with the IPv6 addresses shown
    in the table below:

    During the course of the day you receive instruction from CertKiller.com to test the IPv6 address
    connection from CERTKILLER-WS01 to CERTKILLER-WS02.

    What should you do?

    A. You should consider having the ping -t fe80::34df:1a54%11 command run.

    B. You should consider having the ping -t fe80::34df:1a54%13 command run

    C. You should consider having the ping -r fe80::34df:1a54%13 command run.

    D. You should consider having the ping -6 fe80::34df:1a54%11 command run.

    E. You should consider having the ping -6 fe80::34df:1a54%13 command run.
    • Answer: D
  94. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
    several mobile computers that connect to the network via a wireless access point (WAP).

    You are working on a mobile computer named CERTKILLER-WS680 that is running Windows 7.
    The network administrator has disabled the Service Set Identifier (SSID) broadcasts on the
    wireless access point (WAP). When you attempt to connect CERTKILLER-WS680 to the network
    you discover that you cannot access the WAP.

    How can you configure CERTKILLER-WS680 to access the wireless access point (WAP)?

    A. You should consider manually specifying the name of SSID of the Wireless Access Point in the
    wireless network connection setting on CERTKILLER-WS680.

    B. You should consider changing the encryption setting to WPA2.

    C. You should consider refreshing the network list on CERTKILLER-WS680.

    D. You should consider changing the network setting to Public on CERTKILLER-WS680.
    Answer: A
  95. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You have received instructions to install a new hardware router that provides wireless network
    connectivity between a mobile computer named CERTKILLER-WS680 and the Internet. You
    connect CERTKILLER-WS680 to the router by using a wireless network adapter and verify that
    CERTKILLER-WS680 can connect successfully to the Internet. However, CERTKILLER-WS680 is
    unable to discover other computers in the local wireless network. You need to ensure that
    CERTKILLER-WS680 can discover other computers on the local wireless network.

    What should you do?

    A. You should configure the wired and wireless network adapters as a network bridge.

    B. You should change the Network Category setting of the wireless connection to Public.

    C. You should configure an exception in Windows Firewall on CERTKILLER-WS680.

    D. You should configure the network category of your wireless network connection to Private.

    E. You should configure the network category of your wireless network connection to Open.
    • Answer: D
    • Explanation: If the network category of the wireless connection is set to public, the network discovery feature is disabled. As the wireless connection is 'inside' the network (behind the router), you can safely configure the wireless connection network category to private. This will enable the network discovery feature.
  96. You are employed as a network administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. All mobile computers on the
    CertKiller.com network run Microsoft Windows 7. The CertKiller.com network has a wireless
    access point (WAP) that all mobile computers use to access the network. Service Set Identifier
    (SSID) broadcasts on the wireless access point (WAP) have been disabled.

    You add a new Windows 7 mobile computer named CERTKILLER-WS680 to the network. You
    need to configure CERTKILLER-WS680 to connect to the wireless network.

    What should you do?

    A. You should configure the network category of your wireless network connection to Private.

    B. You need to click the 'Connect to a network' link, then right-click the appropriate network and
    select the 'Connect' option.

    C. You should configure the network adapter with an IP address then click the 'Connect to a
    network' link.

    D. You should click the 'Set up a connection or network' link and select the 'Manually connect to a
    wireless network' option.
    • Answer: D
    • Explanation:
    • A wireless access point can be configured to broadcast its SSID ( it's name) or not to broadcast it.
    • If the wireless access point is configured to not broadcast, it won't show up in the list of available
    • networks in your wireless networks box. You can however still connect to the network if you know
    • it's SSID. To do this, you need to click the Manually connect to a wireless network option in the
    • Set up a connection or network window and enter the SSID (name) of the wireless network you
    • wish you connect to.
  97. You are employed as a network administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Microsoft Windows 7.

    You have just installed a wireless network adapter on a client computer named CERTKILLERWS680.
    However, CERTKILLER-WS680 is unable to connect to the local wireless network. You
    need to ensure that CERTKILLER-WS680 is able to connect to the local wireless network.

    What should you do?

    A. You should change the 'Network Category' setting of the wireless connection to 'Public'.

    B. You should configure the wireless network adapter to connect to the appropriate wireless
    network from the 'Connect to a network' list.

    C. You should rename the wireless network adapter to match the Service Set Identifier (SSID) of
    the wireless network.

    D. You should disable any other network adapters installed on the client computer.

    E. You should configure an IP address on the wireless network adapter.
    • Answer: B
    • Explanation: To connect to a wireless network, you need to configure a connection to the wireless network. You can do this by configuring the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list. The Connect to a network list will list the available
    • networks you can connect to. Select the network and click Connect.
  98. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows 7.

    The CertKiller.com network contains a wireless access point (WAP) that is configured to use
    Advanced Encryption Standard (AES) security. However, you do not have a pre-shared key
    configured on the wireless access point.

    How should you connect a mobile computer named CERTKILLER-WS680 to the wireless access
    point?

    A. You should consider using WEP for the wireless connection.

    B. You should consider using the WPA2-Enterprise for the wireless connection.

    C. You should consider using the WPA-PSK for the wireless connection

    D. You should consider using the WPA2-PSK for the wireless connection.

    E. You should consider using the WPA-Personal for the wireless connection.
    Answer: B
  99. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com recently
    deployed a server named CERTKILLER-SR01 which runs a custom network application.
    CERTKILLER-SR01 has two IP addresses 192.168.45.23 and 192.168.45.24.

    How can you ensure that a client computer named CERTKILLER-WS680 resolves CERTKILLERSR01.
    CertKiller.com to only the 192.168.45.23 IP address?

    A. You should consider having the Hosts file edited on CERTKILLER-SR01.

    B. You should consider having the Lmhosts file edited on CERTKILLER-SR01.

    C. You should consider having the Hosts file edited on CERTKILLER-WS680.

    D. You should consider having the Lmhosts file edited on CERTKILLER-WS680.

    E. You should consider having the ipconfig /registerdns command run on CERTKILLER-SR01.
    Answer: C
  100. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
    recently deployed a client computer named CERTKILLER-WS01 and shared a folder on the disk
    drive. During the course of the day you receive instruction from CertKiller.com to configure
    CERTKILLER-WS01 to ensure the requirements below are met:
    CERTKILLER-WS01 should be configured to allow computers in the local subnet to access the
    shared folder.CERTKILLER-WS01 should be configured to stop computers in remote subnets
    from accessing the shared folder.CERTKILLER-WS01 should be configured to allow all client
    computers to connect to CERTKILLER-WS01 using Remote Desktop.

    What should you do?

    A. You should consider configuring the Network Location to Public on CERTKILLER-WSO1.

    B. You should consider having the properties of the File and Printer Sharing firewall exceptions
    modified.

    C. You should consider configuring the Network Location to Private on CERTKILLER-WSO1.

    D. You should consider modifying the share permissions on the shared folder.

    E. You should consider modifying the NTFS permissions on the shared folder.
    Answer: B
  101. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to
    run Windows 7.

    You are in the process of adding a new computer named CERTKILLER-WS16 with an IP address
    subnet. After the installation you discover that you are unable to connect to the other computers
    on the network, however, the other computers are able to make a connection to each other. You
    run the ipconfig command on CERTKILLER-WS16 and see that the IPv4 address is
    169.254.25.32. To ensure productivity you need to make sure that you are able to connect to the
    other computers on the network.

    What should you do?

    A. This can be accomplished by having a static TCP/IP address configured.

    B. This can be accomplished by disabling IPv6.

    C. This can be accomplished by configuring an exception for File and Printer Sharing in Windows
    Firewall.

    D. This can be accomplished by running disabling DHCP.

    E. This can be accomplished by clearing the Block All Incoming Connections setting on the
    Windows Firewall.
    Answer: A
  102. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network are configured to run Windows 7. All users currently make use of a router
    that the company is connected to. The Default Gateway is set to 192.168.67.1 with a subnet mask
    of 255.255.255.0. You need to determine the correct IP Address for the network.

    What should you do?

    A. You should consider identifying 169.172.1.254 as the IP address.

    B. You should consider identifying 192.168.67.0 as the IP address.

    C. You should consider identifying 192.168.67.255 as the IP address

    D. You should consider identifying 169.254.2.10 as the IP address.

    E. You should consider identifying 173.16.10.1 as the IP address.
    • Answer: B
  103. You work as a desktop support technician at CertKiller.com. The CertKiller.com network contains
    several File Transfer Protocol (FTP) servers. You are working on a Windows 7 client computer
    named CERTKILLER-WS680.

    You have received instruction to ensure that CERTKILLER-WS680 can only connect to the File
    Transfer Protocol (FTP) servers when it is connected to a private network.

    What should you do?

    A. You should consider changing the software restriction policies from the local Group Policy on
    CERTKILLER-WS680.

    B. You should consider creating a path rule on CERTKILLER-WS680.

    C. You should consider modify the Advanced settings in Internet Explorer or CERTKILLERWS680.

    D. You should consider changing the Allowed Programs and Features list from the Windows
    Firewall Policy on CERTKILLER-WS680.

    E. You should consider creating a new rule from the Windows Firewall with Advanced Security
    Policy on CERTKILLER-WS680.
    Answer: D
  104. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com
    network run Microsoft Windows 7.

    The CertKiller.com network contains a client computer named CERTKILLER-WS680.
    CERTKILLER-WS680 is configured to use both wired and wireless network connections. The
    networks are not connected to each other. All incoming connections on the wireless connection
    are disallowed in Microsoft Windows Firewall on CERTKILLER-WS680.

    You create a shared folder named CKDocs on CERTKILLER-WS680. However, the CertKiller.com
    users on the wireless network cannot access the shared folder. You need to ensure that all
    CertKiller.com users are able access to the shared folder from the wireless network while
    maintaining the security of the wired network

    What should you do?

    A. You should configure the wired network connection and the wireless network connection as a
    network bridge.

    B. You should enable the File and Printer Sharing exception in the firewall settings of the wireless
    network adapter.

    C. You should Internet Connection Sharing on the wireless connection.

    D. You should disable the Block all incoming connections option.

    E. You should disable the anti-virus program on CERTKILLER-WS680.
    • Answer: B
    • Explanation: You need to enable connections to a shared folder. Therefore, we need to enable inbound connections on the ports used for accessing shared folders. Windows Firewall makes this easy in that you can simply enable the File and Printer Sharing exception in the firewall settings. This will allow inbound connections on the necessary ports.
  105. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    A new 32-bit third-party accounting application named accapp.exe has just been installed on a
    computer named CERTKILLER-WS680. The 32-bit third-party accounting application uses port 80
    to negotiate a listening port. After establishing the listening port, the application uses dynamic
    ports above port 6000. You need to configure Microsoft Windows Firewall to allow traffic for the
    accapp.exe application.

    What should you do?

    A. You should disable the Windows Firewall on CERTKILLER-WS680.

    B. You should add a program exception for the accapp.exe application.

    C. You should add a port exception for port 80 on CERTKILLER-WS680.

    D. You should create an Internet Explorer exception on CERTKILLER-WS680.

    E. You should add a port exception for all ports above 6000 on CERTKILLER-WS680.
    Answer: B
  106. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. CertKiller.com wants to prevent all inbound
    traffic to a Windows 7 computer named CERTKILLER-WS680 without the end user being notified
    when inbound traffic is blocked.

    What should you do?

    A. You should enable the Windows Firewall and deselect all entries in the exception list.

    B. You should rename the network adapter.

    C. You should disable the network adapter.

    D. You should set the network location to Private from the Network and Sharing Center.

    E. You should enable the Windows Firewall and select the 'Block all incoming connections' check
    box.
    • Answer: E
    • Explanation:
    • Block all incoming connections, including those in the list of allowed programs
    • This setting blocks all unsolicited attempts to connect to your computer. Use this setting when you
    • need maximum protection for your computer, such as when you connect to a public network in a
    • hotel or airport, or when a computer worm is spreading over the Internet. With this setting, you are
    • not notified when Windows Firewall blocks programs, and programs in the list of allowed programs
    • are ignored. When you block all incoming connections, you can still view most webpages , send
    • and receive e-mail, and send and receive instant messages.
  107. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
    two client computers named CERTKILLER-WS680 and CERTKILLER-WS682. Both
    CERTKILLER-WS680 and CERTKILLER-WS682 run Microsoft Windows 7.

    How would you ensure that you can use CERTKILLER-WS680 to remotely execute commands on
    CERTKILLER-WS682?

    A. You should consider running the Winrm allow command on CERTKILLER-WS682.

    B. You should consider running the Winrm connect command on CERTKILLER-WS682.

    C. You should consider running the Winrm quickconfig command on CERTKILLER-WS682.

    D. You should consider running the Winrm quickconfig command on CERTKILLER-WS680.
    Answer: C
  108. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You have been assigned a client computer named CERTKILLER-WS680. To manage the
    computers on the corporate network effectively, you want to view the security events logged on all
    client computers on the network. You decided to collect the copies of events from multiple remote
    computers and store them on CERTKILLER-WS680. You also want to ensure that the events are
    encrypted when they are forwarded to CERTKILLER-WS680.

    Which three steps should you take?

    A. You should ensure that the Windows Remote Management (WinRM) service and the Windows
    Event Collector service are running on computers participating in the forwarding and collecting
    process

    B. You should ensure that a Windows Firewall exception for Remote Event Log Management is
    configured on each source computer.

    C. You should ensure that a Windows Firewall exception for Remote Event Log Management is
    configured on CERTKILLER-WS680.

    D. You should ensure that the computer account of CERTKILLER-WS680 is added to the local
    Administrators group on each of the source computers.

    E. You should ensure that all users have an SSL certificate and Certificate Propagation service
    startup type is set to automatic.

    F. You should ensure that all computers have a computers certificate and port 443 is open on the
    Windows firewall.
    • Answer: A,D,F
    • Explanation:
    • To enable forwarding of events from the client computers and collecting them to your computer,
    • you need to ensure that the Windows Remote Management ( WinRM ) service and the Windows
    • Event Collector service are running on computers participating in the forwarding and collecting
    • process and ensure that the computer account of the collector computer is added to the local
    • Administrators group on each of the source computers.
    • To ensure that the events must be encrypted when they are forwarded, you need to use the
    • HTTPS protocol by using the HTTPS option in Advanced Subscription Settings and ensure that all
    • computers have a computers certificate and port 443 is open on the Windows firewall
  109. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    CertKiller.com has two client computers named CERTKILLER-WS01 and CERTKILLER-WS02
    which have Windows Remote Management (WinRM) enabled. During the course of the day you
    receive instruction from CertKiller.com to have an additional disk volume created remotely on
    CERTKILLER-WS01 using CERTKILLER-WS02.

    What should you do?

    A. You should consider running the Diskpart \\CERTKILLER-WS-01 command on CERTKILLERWS02.

    B. You should consider running Disk Management on CERTKILLER-WS02 and connect to
    CERTKILLER-WS01.

    C. You should consider having the Winrs command run and then running the Diskpart command
    on CERTKILLER-WS02.

    D. You should consider having the Diskmgmt.msc \\CERTKILLER-WS01 command on
    CERTKILLER-WS02.
    • Answer: C
    • Explanation: Windows Remote Management (known as WinRM ) is a handy new remote management service for Windows Server 2003 R2, Windows Vista, and Windows Server 2008. WinRM is the "server" component of this remote management application and WinRS (Windows Remote Shell) is the "client" for WinRM , which runs on the remote computer attempting to remotely manage the WinRM server. However, I should note that BOTH computers must have WinRM installed and enabled on them for WinRS to work and retrieve information from the remote system.
  110. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7.

    A network user named Rory Allen recently complained about receiving error messages whilst
    using an application. CertKiller.com is aware you do not have remote access to Rory Allen's
    computer. CertKiller.com recently requested that you instruct Rory Allen how to create
    screenshots of the actions performed on the computer whilst ensuring the mouse actions
    performed are tracked too.

    What should instruct Rory to do?

    A. You should consider instructing Rory Allen to run Netmon.exe and start a capture.

    B. You should consider instructing Rory Allen to run paint.exe and press the Printscreen key.

    C. You should consider instructing Rory Allen to run Windows Media Player.

    D. You should consider instructing Rory Allen to run the Psr.exe command and click Start Record.
    • Answer: D
    • Explanation: The Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information. Learn how the recording can be used to quickly identify problems and help reduce time spent with the help desk.
  111. You are employed as the desktop support technician at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. You are responsible for a
    workgroup name CK_GROUP that contains seven workstations. All the workstations run Windows
    7.

    The CK_GROUP workgroup contains a workstation named CERTKILLER-WS680 that hosts video
    and audio files.

    Which two actions should you perform to share the video and audio files on CERTKILLERWS680?

    A. You should consider moving the files to the Media Library on CERTKILLER-WS680.

    B. You should consider enabling File and Printer Sharing in Windows Firewall.

    C. You should consider disabling User Account Control (UAC) on CERTKILLER-WS680.

    D. You should consider creating a HomeGroup on CERTKILLER-WS680.
    Answer: A,D
  112. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The network contains a file server
    named CERTKILLER-SR03 that runs Windows Server 2008. CERTKILLER-SR03 contains a
    shared folder named CK_Data.

    You have been assigned a client computer named CERTKILLER-WS680 that runs Windows 7.
    You receive an instruction to ensure that CERTKILLER-WS680 is configured to encrypt any
    cached files from CK_Data. You also need to ensure that when CERTKILLER-SR03 is
    disconnected the files in CK_Data are still available.

    What should you do? (Each correct answer presents part on the solution. Choose TWO.)

    A. You should consider copying the files from CK_Data to the Documents library on
    CERTKILLER-WS680.

    B. You should consider encrypting the files in the CK_Data share on CERTKILLER-SR03.

    C. You should consider enabling encryption of offline files on CERTKILLER-WS680.

    D. You should consider enabling BitLocker Drive Encryption on CERTKILLER-WS680.

    E. You should consider making CK_Data available offline on CERTKILLER-WS680.

    F. You should consider enabling BitLocker Drive Encryption on CERTKILLER-SR03.
    • Answer: C,E
    • Explanation: The two requirements are "to ensure that CertKiller-ws680 is configured to encrypt any cached files from CK_Data " and that the files are available offline. E . Making the CK_Data files available office on CertKiller-ws680 is required and C. Enabling encryption of the offline files. It is true that if the files on the server are encrypted, they will also be encrypted in the workstation offline cache. But therequirement is "to ensure that CERTKILLER-WS680is configured to cache any files from CK_Data ." Encrypting on the server is also more work than configuring the workstation. Offline files can be set to be encrypted via GPO or manually on the workstation.
  113. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
    client computer named CERTKILLER-WS680 that is running Windows 7.

    You attach a printer named PRINTER01 to CERTKILLER-WS680 and install the printer drivers.
    You then remove the Everyone group from the access control list (ACL) for the PRINTER01 and
    share the printer. You need to ensure that members of a group named CK_STAFF can only make
    changes to the print jobs that they submit. Members of the CK_STAFF group must not be able to
    change the print jobs of other users.

    What should you do?

    A. You should consider assigning the Manage Documents permission to the CK_STAFF group in
    the printer properties.

    B. You should consider disabling User Account Control (UAC) on CERTKILLER-WS-680.

    C. You should consider lowering the priority of PRINTER01.

    D. You should consider assigning the Deny - Modify permission on PRINTER01.

    E. You should consider assigning the Print permission to the CK_STAFF group in the printer
    properties.
    Answer: D
  114. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You install a new printer named PRINTER1 on a client computer named CERTKILLER-WS680.
    You share PRINTER1 with several users in the Sales department. However, when members of the
    Sales department attempt to print to PRINTER1, the output is unreadable. You need to ensure
    that members of the Sales department can successfully print to PRINTER1.

    What should you do?

    A. You should increase the priority on PRINTER1.

    B. You should configure PRINTER1 to use the WinPrint print processor and to use RAW as the
    default data type.

    C. You should configure PRINTER1 to hold mismatched documents and disable the advanced
    printing features.

    D. You should disable bidirectional support on PRINTER1.

    E. You should run the 'Add Printer Driver Wizard' to install the correct printer driver on
    CERTKILLER-WS680.
    • Answer: E
    • Explanation: Unreadable text usually indicates an incorrect printer driver. We need to install the correct driver. The users will need to disconnect and reconnect to download the new driver.
  115. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a
    stand-alone computer named CERTKILLER-WS680 that runs Microsoft Windows 7.
    CERTKILLER-WS680 contains a single partition and is used by two CertKiller.com users named
    Rory Allen and Kara Lang.

    Rory Allen makes use of Encrypting File System (EFS) to encrypt files. During the course of the
    day Rory Allen grants Kara Lang access to the encrypted files. However, Kara Lang is unable to
    access the encrypted files.

    How should you ensure that Kara Lang is able to access the encrypted files of Rory Allen?

    A. You should consider having Rory Allen grant Kara Lang Full Control permissions on the files.

    B. You should consider having Rory Allen grant Kara Lang Take Ownership permissions on the
    files.

    C. You should consider disabling EFS on CERTKILLER-WS680.

    D. You should consider having Kara Lang log on to CERTKILLER-WS680 and encrypt a file.
    Answer: D
  116. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    A CertKiller.com user named Mia Hamm has been assigned a client computer named
    CERTKILLER-WS680. Mia Hamm needs to share an existing folder on CERTKILLER-WS680 with
    other members in her group. However, Mia Hamm receives an "Access is denied" error whenever
    she tries to change the permissions on the folder. You need to ensure that Mia Hamm can change
    the permissions on the folder.

    What should you do?

    A. You should grant Mia Hamm change permission on the share.

    B. You should instruct Mia Hamm to use the "Net Share" command on CERTKILLER-WS680.

    C. You should grant the 'Allow-Modify' permission on the folder to Mia Hamm.

    D. You should grant the 'Allow-Full control' permission on the folder to Mia Hamm.
    • Answer: D
    • Explanation: To share a folder on her computer, Anna only needs full control on the folder. Therefore, you need to Grant Allow-Full control permission to Anna in the properties of the folder.
  117. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7. The user accounts in the CertKiller.com network are
    divided into four groups named ADMIN, SALES, MARKETING and OTHER.

    A CertKiller.com user named Mia Hamm has been assigned a client computer named
    CERTKILLER-WS680. Mia Hamm is a member of the SALES group. Mia Hamm shares a folder
    on CERTKILLER-WS680 named CertKillerFiles1. Mia Hamm wants members of the MARKETING
    group to be able to add files to the CertKillerFiles1 shared folder. Currently members of the
    SALES group have Allow - Read permission for the CertKillerFiles1 shared folder while members
    of the MARKETING group have Allow - Modify permissions.
    You need to ensure that members of both the SALES group and the MARKETING group can add
    files to the CertKillerFiles1 shared folder.

    What should you do? (Each correct answer presents part of the solution. Choose TWO.)

    A. You should grant the EVERYONE group 'Allow - Full Control' permission on the CertKillerFiles1
    shared folder.

    B. You should grant the MARKETING group 'Allow - Read' permission on the CertKillerFiles1
    shared folder.

    C. You should grant the SALES group 'Allow - Change' permission on the CertKillerFiles1 shared
    folder.

    D. You should grant the MARKETING group 'Allow - Read' permission on the CertKillerFiles1
    shared folder.

    E. You should grant the SALES group 'Allow - Modify' permission on the CertKillerFiles1 shared
    folder.

    F. You should grant the MARKETING group 'Allow - Write' permission on the CertKillerFiles1
    shared folder.
    • Answer: C,E
    • Explanation: In order for a group to be able to create files in a shared folder, the group must have the NTFS permissions of "Allow - Modify" on the folder and the sharing permission of "Allow - Change" on the share. Since the SALES group has neither, these two permissions must be added.
  118. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named
    Rory Allen is a member of a group named KingAccess and currently uses a shared computer.

    Rory Allen recently informed you that the computer has a folder named RAllen. Rory Allen
    requested that you configure the permissions on the RAllen folder to meet the requirements below:
    The permissions should be modified to allow Rory Allen to delete all files in the RAllen folder.The
    permissions should have the members of the KingAccess group able to create files in the RAllen
    folder.

    Rory Allen has additionally stated that you should configure the permissions to prevent the
    members of the KingAccess group from deleting the files they did not create in the folder RAllen
    whilst preventing all users from modifying the permission on RAllen.

    What should you do?

    A. You should consider having Rory Allen assigned the Modify permission whilst having the
    KingAccess group denied read permission assigned.

    B. You should consider having Rory Allen assigned the Write permission and having the Write
    permission assigned to the KingAccess group.

    C. You should consider having Rory Allen assigned the Modify permission whilst assigning the
    Write permission to KingAccess group.

    D. You should consider having Rory Allen assigned the Change permission whilst assigning the
    Write permission to KingAccess group

    E. You should consider having Rory Allen assigned the Full Control permission whilst assigning
    the Write permission to the KingAccess group.
    Answer: C
  119. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. The CertKiller.com
    network users currently make use of a standalone computer for storing encrypted files.

    How should you ensure you are able to read the contents of the encrypted files of all users on the
    standalone computer?

    A. You should consider having the Cipher.exe /r command run and have a data recovery agent
    added from the local security policy.

    B. You should consider having User Account Control (UAC) disabled.

    C. You should consider assigning your user account the Full Control permission to all encrypted
    files.

    D. You should consider installing a Certificate Authority and enrolling for an EFS certificate.
    Answer: A
  120. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    You currently make use of a workstation named CERTKILLER-WS680. When installing new
    applications on CERTKILLER-WS680 you are prompted for user account control permissions. You
    want to configure CERTKILLER-WS680 to allow you to interact with the Desktop when prompted
    for user account control permissions.

    What should you do?

    A. You should consider setting the User Account Control: Switch to secure desktop when
    prompting for credentials to Disabled.

    B. You should consider adding your user account to the local administrators group on
    CERTKILLER-WS-680.

    C. You should consider adding your user account to the local Power Users group on
    CERTKILLER-WS-680.

    D. You should consider setting the User Account Control to disabled.
    Answer: A
  121. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    CertKiller.com has a written security policy that states that only administrator approved
    applications should be installed on the CertKiller.com network. A CertKiller.com user named Amy
    Wilson has been assigned a client computer named CERTKILLER-WS680. Amy Wilson reports
    that every time she attempts to make configuration changes to CERTKILLER-WS680, she
    receives the prompt shown in the following exhibit: (Image)

    You need to ensure that Amy Wilson can make configuration changes to CERTKILLER-WS680.
    You verify that Amy Wilson is a member of the local administrators group. You now want to
    prevent this prompt from appearing when Amy Wilson attempts to make configuration changes to
    CERTKILLER-WS680.

    What should you do?

    A. You should add Amy Wilson to the local Power Users group.

    B. You should add Amy Wilson to the local Users group.

    C. You should change 'The behavior of the elevation prompt for administrators' from 'User Account
    Control (UAC) Admin Approval Mode'.

    D. You should turn off the Windows Firewall.

    E. You should disable running all administrators in 'User Account Control (UAC) Admin Approval
    Mode'.
    • Answer: C
    • Explanation: UAC prevents unauthorized configuration changes and silent installations. The message that is displayed confirms a user's decision to make configuration changes. This helps prevent viruses from making changes to a user's computer in the security context of the user but without the user's permission. You should change the behavior of the elevation prompt for administrators in UAC Admin Approval Mode. Change the policy setting from Prompt for consent to No prompt. With this setting, the UAC message will not be displayed whenever Amy Wilson attempts to make configuration changes that require administrative privileges.
  122. CertKiller.com has hired you as a network Administrator for their network. A CertKiller.com user
    named Rory Allen is a senior manager in the Marketing department. You receive a request from
    Rory Allen to ensure that his children are only able to login to Windows 7 at certain times.

    How would you do this?

    A. Your best option would be to go to the System Configuration utility and configure the logon
    hours.

    B. Your best option would be to go configure logon hours in the user account properties.

    C. Your best option would be to prohibit the children from using the workstation when you are at
    work.

    D. Your best option would be to go to the Start then Control Panel.
    Then you should go to User Accounts and Family Safety and select Setup Parental Controls.
    Thereafter Time Restrictions can be set.
    Answer: D
  123. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network
    run Windows 7. Half the client computers run Windows Vista and the rest run Windows XP
    Professional. A CertKiller.com employee named Kara Lang works in the Research and
    Development department. She informs you that the security pop-up notifications appear constantly
    on her monitor whilst she is working. You therefore decide implement a solution that will control
    when the notifications pop-up.

    What should you do this?

    A. You can accomplish this by adding Kara Lang to the Administrators Group.

    B. You can accomplish this by adding Kara Lang to the Power Users Group.

    C. You can accomplish this modifying the Advanced System Settings.

    D. You can accomplish this modifying the User Account Control settings.
    Answer: D
  124. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
    Windows 7 computer named CERTKILLER-WS680 that runs a finance application named
    finapp.exe. You use RunAs with the /savecred parameter to start finapp.exe.

    How would you delete the stored passwords?

    A. You should consider restarting the computer.

    B. You should consider changing the Windows credentials from Credential Manager.

    C. You should consider running the RunAs command and specifying the /delete parameter.

    D. You should consider running the Delprof command.
    Answer: B
  125. You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network
    contains a VPN server named CERTKILLER-SR01 that is configured to run Windows Server
    2008. You are responsible for a computer named CERTKILLER-WS10 that is configured to run
    Windows 7. During the course of the day you receive an instruction from the CIO to make use of a
    smart card in order to authenticate CERTKILLER-SR01.

    What should you do?

    A. Your best option would be to make use of PAP.

    B. Your best option would be to make use of PMS-CHAP v2.

    C. Your best option would be to make use of P EAP.

    D. Your best option would be to make use of MS-CHAP v2

    E. Your best option would be to make use of PCHAP.
    Answer: C
  126. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 R2 and the client computers run Microsoft Windows 7.

    CertKiller.com has recently deployed a server named CERTKILLER-SR01 configured as a DHCP
    server that has Network Access Protection (NAP) enforcement point configured. During the course
    of the day you receive instruction from CertKiller.com to configure a network user named Rory
    Allen's client computer as a NAP client.

    Which two actions should you perform?

    A. You should consider having the Network Access Protection Agent service Startup Type set to
    Automatic from the services snap-in.

    B. You should consider configuring the Network Location to Public.

    C. You should consider having the DHCP Quarantine Enforcement Client enabled from the NAP
    Client Configuration console.

    D. You should consider having the Winlogon service Startup Type set to Automatic from the
    services snap-in.

    E. You should consider disabling the DHCP client service.
    Answer: A,C
  127. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
    Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has
    recently installed and configured a file server named CERTKILLER-SR01 on the network.

    A network user named Rory Allen makes use of a computer named CERTKILLER-WS01 and tried
    connecting to CERTKILLER-SR01 using an account named RAllen unsuccessfully. CertKiller.com
    wants you to ensure that Rory Allen authenticates using the account named KingAdmin when
    connecting to CERTKILLER-SR01.

    What should you do?

    A. You should consider using the Add a Windows credential from Credential Manager on
    CERTKILLER-WS01.

    B. You should consider having the File and Printer Sharing settings modified on CERTKILLERWS01.

    C. You should consider having the network location set to Public on CERTKILLER-WS01.

    D. You should consider having the network location set to Private on CERTKILLER-WS01.
    Answer: A
  128. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
    London and a branch office in Paris. All servers on the CertKiller.com network run Windows
    Server 2008 R2 and all client computers run Windows 7. The London office contains a file server
    named CERTKILLER-SR04 that hosts shared folders that are accessed from both offices. The
    Paris office contains a DNS server named CERTKILLER-SR12.

    You want to reduce network traffic between the Paris office and the London office. You decide to
    enable BranchCache in Hosted Cache mode on CERTKILLER-SR12. You now need to enable
    BranchCache on the client computers.

    What should you do?
    • Explanation:
    • Step #1 Click START and select Computer Management

    Step #2 Click on 'Services and Applications' and select 'Services'.

    Step #3 Locate the ' BranchCache ' service, start the service and set it to start automatically.
  129. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
    London and a branch office in Paris. All servers on the CertKiller.com network run Windows
    Server 2008 and all client computers run Windows 7.

    The London office contains a file server named CERTKILLER-SR04 that hosts shared folders that
    are accessed from both offices. The Paris office also contains a file server named CERTKILLERSR12
    that is only accessed from the Paris office. You want to reduce network traffic between the
    Paris office and the London office.

    What should you do?

    A. You should enable BranchCache in Host mode on CERTKILLER-SR04 in the London Office.

    B. You should enable BranchCache in Host mode on CERTKILLER-SR12 in the Paris Office.

    C. You should enable BranchCache in Distributed mode on the client computers in the London
    Office.

    D. You should enable BranchCache in Distributed mode on the client computers in the Paris
    Office.

    E. You should configure a Virtual Private Network (VPN) connection between CERTKILLER-SR12
    and CERTKILLER-SR04.
    • Answer: D
    • Explanation: BranchCache in Distributed mode on the client computers in the Paris Office will cache files from CERTKILLER-SR04 on the local computers and will reduce network traffic between the two offices.
  130. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a
    single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in
    London and a branch office in Athens. All servers on the CertKiller.com network run Windows
    Server 2008 and all client computers run Windows 7.

    The servers are located at the London office and the four client computers at the Athens office.
    The servers located at London office have BranchCache enabled. You receive numerous
    complaints from users at the Athens office stating that it takes a long time to open large files in the
    London office.

    How could you minimize the time it takes for users in the Athens office to open files in the London
    office?

    A. Your best option would be to enable Universal Group Caching in the Athens office.

    B. Your best option would be to configure the client computers to make use of the BranchCache
    Distributed Cache mode at the Athens office.

    C. Your best option would be to configure DFS to replicate the data from the London office to the
    Athens office.

    D. Your best option would be to configure a VPN between the London office and the Athens office.
    Answer: B
  131. You work as a network administrator at CertKiller.com. CertKiller.com currently has its
    headquarters located in Miami and a branch office located in Detroit. The CertKiller.com network
    consists of a single Active Directory domain named CertKiller.com. The servers on the network run
    Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

    CertKiller.com has the Detroit office configured to use BranchCache. During the course of the day
    a network user in the Detroit office using a computer named CERTKILLER-WS01 complains about
    experiencing performance issues.

    How would you temporarily have all the computers prevented from retrieving cached content from
    CERTKILLER-WS01?

    A. You should consider stopping the Server service on CERTKILLER-WS01.

    B. You should consider having the File and Printer Sharing setting modified on CERTKILLERWS01.

    C. You should consider having the Netsh branchcache flush command run at the command
    prompt of CERTKILLER-WS01.

    D. You should consider having the Windows Firewall configured to Block All Incoming
    Connections on CERTKILLER-WS01.
    Answer: C
  132. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on the
    CertKiller.com network run Windows 7.

    The Research and Development department is working on a confidential project. To protect their
    computers from data theft they encrypted the hard disk of their client computers with BitLocker. A
    USB drive is used to store the BitLocker password. All the computers that were encrypted were
    using Trusted Platform Model (TPM) chips on their motherboards.

    A member of the Research and Development department named Amy Wilson has been assigned
    a client computer named CERTKILLER-WS680. Amy Wilson reports that she was not able to start
    CERTKILLER-WS680 because the TPM chip on CERTKILLER-WS680 was faulty. You need to
    recover the encrypted data from CERTKILLER-WS680.

    What should you do?

    A. You should replace the motherboard on CERTKILLER-WS680 with the same brand of
    motherboard having the same brand of TPM chip.

    B. You should update the BIOS on CERTKILLER-WS680.

    C. You should enter the BitLocker Drive Encryption Recovery console on CERTKILLER-WS680 by
    using the password stored on the USB drive and recover the data.

    D. You should run WinRE on CERTKILLER-WS680 and recover the data.
    • Answer: C
    • Explanation:
    • When the BitLocker is used in TPM only mode, it uses TPM hardware to validate the integrity of the computer and the Operating System. If the TPM is missing or changed, then to recover data, you need to enter the BitLocker Drive Encryption Recovery console on the computer by using the 40 digit recovery key or password stored on the USB drive to recover the data.
  133. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com and includes a Direct Access
    infrastructure.

    CertKiller.com has purchased a new mobile computer named CERTKILLER-WS680. You install
    Windows 7 on CERTKILLER-WS680 and join it to the domain.

    How should you make sure that CERTKILLER-WS680 is able to establish Direct Access
    connections?

    A. You should consider installing a computer certificate on CERTKILLER-WS680.

    B. You should consider disabling User Account Control (UAC) on CERTKILLER-WS680.

    C. You should consider modifying the network connection properties on CERTKILLER-WS680.

    D. You should consider adding the computer account for CERTKILLER-WS680 to the RAS and
    IAS Servers group in the domain.
    Answer: A
  134. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. You are assigned a mobile computer
    named CERTKILLER-WS680 that runs Windows 7.

    You are currently using Windows Internet Explorer 8 to browse a Web site that displays Really
    Simple Syndication (RSS) feeds. You want to be able to view the headlines of the site when
    CERTKILLER-WS680 is offline.

    What should you do?

    A. You should add the home page of the site to the Local Intranet zone in Internet Explorer 8.

    B. You should open the Offline Files from the Control Panel and select the 'Enable Offline Files'.

    C. You should make the site your home page in Internet Explorer 8.

    D. You should synchronize the information from the Sync Center prior to disconnecting from the
    Internet.

    E. You should add the RSS page of the site to the feeds list from Internet Explorer 8.
    Answer: E
  135. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on theCertKiller.com network run Windows 7. The CertKiller.com network contains a file server named CERTKILLER-SR24 that hosts a shared folder named CKDocs.

    A CertKiller.com user Amy Walsh has been assigned a mobile computer named CERTKILLERWS680.
    Amy Walsh uses CERTKILLER-WS680 to work on a file named MarketingPlan.doc which
    is located in the CKDocs folder on CERTKILLER-SR24.

    Amy Walsh needs to make the MarketingPlan.doc file available on CERTKILLER-WS680 so that
    she can continue working on the document when she is out of the office. You verify that Amy
    Walsh has permission to make the file available offline. However, when Amy Walsh right-clicks the
    file, the menu option labeled Make available offline is not visible. You need to ensure that Anne
    can make the file available offline.

    What should you do?

    A. You should instruct Amy Walsh to map a network drive to the \\CertKiller-sr24\CKdocs folder.

    B. You should instruct Amy Walsh to move the MarketingPlan.doc file from the \\CertKillersr24\
    CKdocs folder to a shared folder on CERTKILLER-WS680.

    C. You should ask a network administrator to modify the permissions on the MarketingPlan.doc file
    to grant Amy Walsh Allow-Read & Execute permission.

    D. You should ask a network administrator to modify the permissions on the CKDocs folder to
    grant Amy Walsh Full Control permission.

    E. You should ask a network administrator to open the properties of the CKDocs shared folder and
    ensure that the Allow caching of files in this shared folder check box is selected.
    • Answer: E
    • Explanation:
    • Enabling offline files is a two step process. First, it must be enabled on the shared files by allowing the caching of the files. Only when this is done will Anne be able to make the files available to her offline
  136. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7. All CertKiller.com users store their data on a file server
    named CERTKILLER-SR04. No company or user data is stored locally on client computers.

    CertKiller.com users from the Sales department have been issued with portable computers. When
    these users travel, they must be able to use company data files even when they are not connected
    to the network. You enable caching of offline files on all shared folders on CERTKILLER-SR04.
    You also configure offline files on all portable computers in the Sales department. Before they
    leave the office users in the Sales department select several folders from CERTKILLER-SR04 to
    be made available offline.

    However, when the users return to the office they report that the offline files were not available to
    them when they were out of the office. You need to ensure that the offline files are available to the
    CertKiller.com users in the Sales department even when they are not connected to the network.

    What should you do?

    A. You should grant the 'Allow-Change permission on the shared folders on CERTKILLER-SR04
    to the users in the Sales department.

    B. You should change the caching options for the shared folders on CERTKILLER-SR04 to allow
    automatic caching of documents.

    C. You should change the caching options for the shared folders on CERTKILLER-SR04 to allow
    manual caching of documents.

    D. You should create an exception in Windows Firewall for Offline Files on each portable computer
    in the Sales department.

    E. You should select the 'Notify me and begin working offline' check box from the Advanced
    properties for Offline Files on each portable computer in the Sales department.
    • Answer: E
    • Explanation:
    • The portable clients must be configured to begin to work offline when they are disconnected from the network. To configure this we must open Control Panel on the client computers and then o pen Folder Options. On the Offline Files tab, click Advanced and under When a network connection is lost, select Notify me and begin working offline. This is the preferred option for portable notebook systems and it specifies that you can continue working offline if you lose your connection to a computer or the network. Any network files will continue to be available to you.
  137. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. All client computers on
    theCertKiller.com network run Windows 7.

    A CertKiller.com user named Amy Walsh has been assigned a mobile computer named
    CERTKILLER-WS680. Amy Walsh needs to travel extensively in the execution of her duties and
    has configured CERTKILLER-WS621 to use the Power saver power plan. However, Amy Walsh
    reports that CERTKILLER-WS680 does not shut down completely when she clicks the Power
    button icon on the Start menu as the same programs that were opened when she tried to shut
    down the computer are still open when she restarts the computer.

    You now need to configure CERTKILLER-WS680 to have it turn off completely without saving
    Amy Wilson's desktop session when she clicks the Power button icon on the Start menu.

    What should you do?

    A. You should disable the Wake-on-LAN feature.

    B. You should disable the screensaver.

    C. You should open 'Advanced Settings' for the current power plan from 'Power Options' and
    change the 'On battery' setting in the 'Sleep after' category to 'Never'.

    D. You should open 'Advanced Settings' for the current power plan from 'Power Options' and
    change the 'Start menu power button' setting to 'Shut down'.
    • Answer: D
    • Explanation:
    • You should change the Start menu power button setting to Shut down in Advanced Settings. To open Advanced Settings, first open Power Options and click the Change plan settings link associated with the Power saver power plan. Then click the Change advanced power settings link to open the Advanced Settings dialog box. Expand Power buttons and lid, and then expand Start menu power button. Change the On battery setting to Shut down. This causes Windows to completely shut down when the Power button icon on the Start menu is clicked.
  138. You are the newly appointed desktop support technician at CertKiller.com. The CertKiller.com
    network consists of a single Active Directory domain named CertKiller.com.

    You are responsible for managing a workstation named CERTKILLER-WS680 that is configured to
    run Windows 7. Several CertKiller.com users log onto CERTKILLER-WS680. CERTKILLERWS680
    contains a folder named CK_Data. You enable auditing on CK_Data.

    What step should you take to ensure all access to CK_Data is logged?

    A. You should consider modifying the permissions on the CK-Data folder.

    B. You should consider configuring the Audit object access setting from the local Group Policy.

    C. You should consider configuring the Audit directory service Access setting from the local Group
    Policy.

    D. You should consider modifying the UAC settings on CERTKILLER-WS680.

    E. You should consider modifying the Windows Firewall settings on CERTKILLER-WS680.
    Answer: B
  139. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
    of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
    two computers named CERTKILLER-WS680 and CERTKILLER-WS622. CERTKILLER-WS680
    currently runs Microsoft Windows 7 and CERTKILLER-WS622 runs Microsoft Windows XP
    Professional.

    During the course of the day you enable remote desktop on CERTKILLER-WS680 as shown in the
    exhibit below: (Image)


    Later, a CertKiller.com user named Rory Allen logs on to CERTKILLER-WS622 and attempts to
    remotely access CERTKILLER-WS680. However, Rory Allen receives the error as shown in the
    exhibit below: (Image)


    What should you do to ensure that Rory Allen can use CERTKILLER-WS622 to remotely connect
    to CERTKILLER-WS680?

    A. You should consider enabling Remote Assistance on CERTKILLER-WS622.

    B. You should consider changing the network location to PUBLIC on CERTKILLER-WS680.

    C. You should consider enabling the Allow connections from computers running any version of
    Remote Desktop setting on CERTKILLER-WS680.

    D. You should consider installing a computer certificate on CERTKILLER-WS622.
    Answer: C
  140. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a computer named CERTKILLER-WS680 that runs Microsoft Windows 7. During the course of the day you created a VPN connection on CERTKILLER-WS680 for connecting to the CertKiller.com network. You want to ensure that you are still able to use the
    Internet while being connected to the CertKiller.com network via the VPN connection. You also want to ensure that Internet traffic is not routed through the CertKiller.com network.

    What should you do?

    A. You should consider changing the default gateway on CERTKILLER-WS680.

    B. You should consider adding a static route on CERTKILLER-WS680.

    C. You should consider configuring the advanced TCP/IP settings of the VPN connection on CERTKILLER-WS680.

    D. You should consider enabling Internet Connection Sharing on CERTKILLER-WS680.

    E. You should consider adding another network connection on CERTKILLER-WS680.
    Answer: C
  141. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consistsof a single Active Directory domain named CertKiller.com. All client computers on theCertKiller.com network run Windows 7.

    A CertKiller.com user named Kara Lang has been assigned a portable client computer namedCERTKILLER-WS680. Kara Lang is aware that CERTKILLER-WS680 has a Virtual PrivateNetwork (VPN) connection configured to connect to the CertKiller.com network from remotelocations. However, Kara Lang reports that she cannot locate the VPN connection onCERTKILLER-WS680.

    What should you do?

    A. You should inform Kara Lang to check in Network Connections.

    B. You should inform Kara Lang to check in System and Maintenance.

    C. You should inform Kara Lang to check in Devices and Printers.

    D. You should inform Kara Lang to check in Network and Sharing Center.

    E. You should inform Kara Lang to check in Internet Options.
    Answer: D

    • Explanation:
    • The Network and Sharing Center program is where you would go to view all your network connections including VPN connections. From within the Network and Sharing Center program, you can select the VPN connection and connect to it.
  142. You are the newly employed desktop support technician at CertKiller.com. The CertKiller.com
    network consists of a single Active Directory domain named CertKiller.com.

    You are assigned a workstation named CERTKILLER-WS680. CERTKILLER-WS680 is
    configured to run Windows 7. You need to determine the applications that were installed by
    another desktop support technician the previous week.

    What should you do?

    A. You should consider reviewing the Software Environment from System Information.

    B. You should consider running the System Performance Data Collector Set from Performance
    Monitor.

    C. You should consider running Software Explorer.

    D. You should consider reviewing the informational events from Reliability Monitor.
    Answer: D
  143. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You working on a Windows 7 workstation named CERTKILLER-WS680. You have received instruction to configure Windows Update on CERTKILLER-WS680. You open Windows Update as shown in the following exhibit: (Image)


    You need to ensure that the Windows Update settings on CERTKILLER-WS680 can be changed manually.

    What should you do?

    A. You should consider changing the Windows Update settings from the local Group Policy on CERTKILLER-WS680.

    B. You should consider enabling the Windows Update service CERTKILLER-WS680.

    C. You should consider disabling User Account Control (UAC) on CERTKILLER-WS680.

    D. You should consider logging on to CERTKILLER-WS680 as member of the Administrators group.
    Answer: A
  144. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a workstation named CERTKILLER-WS680 that runs Microsoft Windows 7.

    How would you configure CERTKILLER-WS680 to download updates from a local Windows Server Update Services (WSUS) server?

    A. You should consider changing the Windows Update settings from Windows Update on CERTKILLER-WS680.

    B. You should consider changing the Windows Update settings from the local Group Policy on CERTKILLER-WS680.

    C. You should consider changing the Network Location setting on CERTKILLER-WS680.

    D. You should consider changing the Windows Firewall settings on CERTKILLER-WS680.
    Answer: B
  145. You are employed as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7. All client computers are configured for automatic updates.

    The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a recent update you notice that some of the applications on CERTKILLER-WS680 do not work. You reboot CERTKILLER-WS680 but the applications still do not work. You need to remove the latest update.

    What should you do?

    A. You should use Add or Remove Programs from the Control Panel.

    B. You should restore hidden updates.

    C. You should restart the computer and select the Last Known Good Configuration.

    D. You should use Windows Explorer.

    E. You should use the Installed updates list from Windows Update.
    Answer: E

    • Explanation:
    • To uninstall a Windows Update, you can use the Installed updates list on the Windows Update
    • window. When you display the list of updates, you'll see an 'Uninstall' button in the toolbar.
    • Simply select the update you wish to uninstall then click the Uninstall button.
  146. You are employed as a desktop technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a client computer named CERTKILLER-WS680 that runs Windows 7. You want to determine whether recent Windows Updates have been applied to CERTKILLER-WS680.

    What should you do? (Each correct answer presents a complete solution. Choose TWO.)

    A. You should check the %systemroot%\Updates folder.

    B. You should check the ReportingEvents.log file.

    C. You should check the update history in the Windows Update applet.

    D. You should check the WindowsUpdate.log file.

    E. You should check the Setup event log.
    Answer: B,C

    • Explanation:
    • To find out whether the updates have been installed on your computer or not, you need to check the ReportingEvents.log file because the WSUS client records update activities and results in this file. You need to check the update history in the Windows Update applet to see which updates Windows has installed, click the View Update History link in the left panel in the Windows Update window to view the updates.
  147. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a client computer named CERTKILLER-WS680 that runs Windows 7. CERTKILLER-WS680 has a Wake-on-LAN compliant network card. You configure Windows Update to run at night when the computer is shut down. You enable the Wake-on-LAN feature and
    configure the Enabling Windows Update Power Management settings on CERTKILLER-WS680. You need to ensure that Windows Update occurs at night.

    What should you do?

    A. You should leave CERTKILLER-WS680 in hibernate mode at night.

    B. You should leave CERTKILLER-WS680 in sleep mode at night.

    C. You should leave CERTKILLER-WS680 switched on and logged in at night

    D. You should shutdown CERTKILLER-WS680 at night.

    E. You should leave CERTKILLER-WS680 switched on but logged out at night.
    • Answer: A
    • Explanation:
    • To configure Windows Update installations to run at night when computers are shut down, you need to leave the computers in hibernate mode at night. Hibernate mode saves the contents of memory to a file called hiberfil.sys, therefore you would not lose unsaved data in case of total power failure and therefore can download the Windows updates and perform installations.
  148. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications.

    During the course of the day you receive an instruction from the CIO to install Federated Search connectors.

    What should you do?

    A. This can be accomplished running Windows Update.

    B. This can be accomplished running the Add/Remove Windows Components utility.

    C. This can be accomplished by having an .osdx file downloaded from a valid source.
    Thereafter the downloaded file should be double clicked and Add selected in order to install the
    file.

    D. This can be accomplished by signing up to the Microsoft Gold Partner program.
    Answer: C
  149. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

    CertKiller.com issues a new usage policy that prevents CertKiller.com users from installing removable disk devices on their computers. You need to ensure that the policy is implemented.

    What should you do?

    A. You should remove all users from the local administrators groups on each computer.

    B. You should enable the block unsigned drivers setting on each computer.

    C. You should enable the User Account Control setting on each computer

    D. You should enable the 'Prevent installation of removable devices' group policy setting.
    • Answer: D
    • Explanation:
    • To prevent users from installing removable device drivers on their computers, you need to enable group policy setting Prevent installation of removable devices Device Installation Restriction.
  150. You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are responsible for managing a computer named CERTKILLER-SR05 that is configured to run Windows 7. CERTKILLER-SR05 is configured to host two volumes named C and D. You are in the process of creating a new folder named D:\TESTDATA. During the course of the day you receive notification from management to make sure that files stored in TESTDATA are indexed by Windows search.

    What should you do?

    A. You should consider enabling EFS on the folder.

    B. You should consider enabling the archive attribute on the folder.

    C. You should consider creating a new library and adding TESTDATA to it.

    D. You should consider modifying the permissions on the folder.

    E. You should consider changing the properties of the Windows Search service.
    Answer: C
  151. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on theCertKiller.com network run Windows 7. You are working on a client computer named CERTKILLER-WS680. You want to identify the hardware and software failures which have occurred on CERTKILLER-WS680 over the past six months.

    What should you do?

    A. You should review the System Event log.

    B. You should create a User Defined Data Collector Set and review the results.

    C. You should review the results from the System Stability Chart.

    D. You should review the Application Event log.
    Answer: C
  152. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. Several months ago CertKiller.com deployed Microsoft Windows 7 client computers for all users in the Sales department.

    You received a report from a CertKiller.com user in the Sales Department user named Rory Allen. Rory Allen has been assigned a client computer named CERTKILLER-WS680 and reports that he experiences an unusually large amount of system failures. You log on to CERTKILLER-WS680 in
    an attempt to identify the cause of the failures and also to analyze a historical view of workstation performance and see when the failures first started appearing on CERTKILLER-WS680.

    What should you do?

    A. You should make use of Event Viewer to view the security log.

    B. You should make use of the Reliability Monitor.

    C. You should make use of a System Diagnostics Data Collector Set.

    D. You should make use of the Task Manager tool.
    • Answer: B
    • Explanation:
    • The Reliability Monitor will allow you to see a graphical history of software installs and uninstalls, application failures, hardware failures, Windows failures, and miscellaneous failures.
  153. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been assigned a workstation
    named CERTKILLER-WS680 that is configured to run Windows 7.

    You want to compile the performance data for a period of three weeks on CERTKILLER-WS680. The performance data should encompass CPU usage, memory usage as well as disk usage.

    What should you do?

    A. You should use the Resource Monitor tool.

    B. You should create a Startup Event Trace Sessions Data Collector Set.

    C. You should create a User Defined Data Collector Set.

    D. You should add counters to the Performance Monitor.

    E. You should review the Hardware Events log in Event Viewer.
    Answer: C
  154. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for managing a computer named CERTKILLER-WS25 that is configured to run Windows 7.

    What can you do to view the processes that are producing network activity at present?

    A. You should consider changing the Windows Firewall settings.

    B. You should consider opening Resource Monitor and clicking the Network tab.

    C. You should consider opening Performance Monitor and adding all counters for the network
    interface.

    D. You should consider viewing the status of the network connection.

    E. You should running the netstat command.
    Answer: B
  155. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network run Windows Server 2008 and all mobile computers run Windows 7. You are assigned a mobile computer named CERTKILLER-WS20.

    CERTKILLER-WS20 is configured to enter sleep mode if no activity takes place in 15 minutes. You leave your office for 20 minutes and discover that CERTKILLER-WS20 has not entered into sleep mode. You are puzzled by the fact that CERTKILLER-WS20 has not entered into sleep
    mode and therefore want to identify what could have caused this.

    What should you do?

    A. You should consider disabling the screen saver.

    B. You should consider running Powercfg energy at a command prompt.

    C. You should consider running shutdown -s at a command prompt.

    D. You should consider running systeminfo at a command prompt.
    Answer: B
  156. You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

    CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7. You receive a complaint from a CertKiller.com user named Mia Hamm stating that the games included with Windows 7 were not installed by default on her computer. You therefore decide to install the games on her computer.

    What should you do?

    A. You should install the games by using Add Remove Windows Components.

    B. You should install the games by running Windows Update.

    C. You should install the games by running the games installer from the Windows 7 DVD.

    D. You should install the games by going to Control Panel > Programs, then click Turn Windows
    features on or off.
    Answer: D
  157. CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications.

    You are in the process of notifying all CertKiller.com users how they will be made aware with information systems and configuration alerts.

    What should you do?

    A. You should inform all users that the Start button will flash.

    B. You should inform all users that once a flag appears in the taskbar with a red "x" it will signify a
    problem that needs attention.

    C. You should inform users that a pop-up message will appear next to the taskbar.

    D. All of the above
    Answer: B
  158. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on theCertKiller.com network run Windows 7.

    A CertKiller.com user named Clive Wilson is the company's sales representative. When Clive Wilson is out in the field, he takes a mobile computer named CERTKILLER-WS680 with him. Clive Wilson wants you to configure the power settings on CERTKILLER-WS680 so that the display turns off when the computer is inactive and running on battery power. However, the power settings of the hard disk remain unaffected.

    What should you do?

    A. You should configure CERTKILLER-WS680 to use the 'Mobile' power plan.

    B. You should disable Sleep mode on CERTKILLER-WS680.

    C. You should restore the 'Power Saver' power plan to the default settings.

    D. You should change the advanced power settings of the 'Balanced' power plan.

    E. You should disable Hibernate mode on CERTKILLER-WS680.
    Answer: D
  159. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on theCertKiller.com network run Windows 7.

    You have installed Microsoft Windows 7 on a new computer named CERTKILLER-WS680. CERTKILLER-WS680 has the following hardware configuration: 2.4-GHz processor2 GB of RAM512-MB video adapter250-GB hard disk

    After the installation you are unable to view the Thumbnails, Previews on folders and Transparent glass. You need to ensure that the advanced visual features of Windows 7 are displayed so you can view it.

    What should you do?

    A. You should install more RAM.

    B. You should configure the system properties to optimize for best appearance.

    C. You should configure the system properties to optimize for applications.

    D. You should configure the system properties to optimize for background services.

    E. You should press the ALT key and the TAB key simultaneously.
    Answer: B
  160. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    A CertKiller.com user named Clive Wilson has been assigned a Windows 7 client computer named CERTKILLER-WS680. Clive Wilson reports that applications on CERTKILLER-WS680 are running slowly. You notice that CERTKILLER-WS680 has 2 GB of RAM and 250 MB free disk space. You need to improve performance on CERTKILLER-WS680.

    What should you do? (Choose TWO.)

    A. You should set the total paging file to 50 percent of physical memory.

    B. You should perform a disk analysis and use the disk defragmenter if recommended.

    C. You should use disk cleanup to delete temporary files and unnecessary program files.

    D. You should configure the applications to run with Elevated Privileges.
    • Answer: B,C
    • Explanation:
    • The system in this scenario is showing symptoms that Clive Wilson is running out of disk space. The Disk Cleanup utility can be used to free some disk space. It's also a good idea to defragment the hard drive as a hard drive which is close to its maximum capacity can become fragmented fast.
  161. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of asingle Active Directory domain named CertKiller.com. The servers on the network run MicrosoftWindows Server 2008 and the client computers run Microsoft Windows 7.

    What should you do to increase the size of the paging file for a Windows 7 computer namedCERTKILLER-WS680?

    A. You should consider having the Advanced system settings modified from System.

    B. You should consider having the System protection setting modified from System.

    C. You should consider adding more RAM.

    D. You should consider modifying the permissions on pagefile.sys.
    Answer: A
  162. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7 Professional.

    You install a new application named CKapp.exe on a client computer named CERTKILLERWS680 and run the application. You now want to apply various application patches to CERTKILLER-WS-680 so you decide to perform a backup of CERTKILLER-WS680 first. You want all user files, application data and application settings, as well as the operating system and system state to be included in the backup so that you can perform a complete restore in the event of a hard disk failure.

    What should you?

    A. You should use Windows Backup and Restore Center to create a System Repair Disk.

    B. You should configure automatic restore points for all disks on CERTKILLER-WS680.

    C. You should use Windows Backup and Restore Center to create a Complete PC Backup.

    D. You should enable the Bitlocker feature on CERTKILLER-WS680.

    E. You should use Windows Backup and Restore Center to create a Complete File Backup
    Answer: C

    • Explanation:
    • To backup Windows 7 computers that will enable a restore in the event of a hard disk failure, you need to create a Complete PC Backup using Windows Backup and Restore Center . The Complete PC Backup and Restore will ensure a comprehensive, image-based backup that will allow you to recover your entire system.
  163. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a Windows 7 workstation named CERTKILLER-WS680. You want to backup data on CERTKILLER-WS680. You open the Configure Backup wizard as shown in the exhibit below: (Image)


    You need to be able to backup the data to a local disk drive.

    What should you do?

    A. You should consider adding your user account to the Backup Operators group before running
    the Configure Backup wizard.

    B. You should consider opening Disk Management and creating a new volume before running the
    backup.

    C. You should consider stopping the explorer.exe process before running the backup.

    D. You should consider logging on to CERTKILLER-WS680 as an administrator before running the
    Configure Backup wizard.

    E. You should consider connecting a removable disk to CERTKILLER-WS680 before running the
    Configure Backup wizard.
    Answer: D
  164. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are working on a Microsoft Windows 7 workstation named CERTKILLER-WS680 that has been infected by a virus. You have previously performed an image backup of CERTKILLER-WS680 that you now want to restore.

    What should you do? (Each correct answer presents part of the solution. Choose TWO.)

    A. You should consider selecting the Last Known Good Configuration boot option on
    CERTKILLER-WS680.

    B. You should consider booting CERTKILLER-WS680 from the Windows 7 DVD.

    C. You should consider running the Startup Repair tool.

    D. You should consider running the System Image Recovery tool.

    E. You should consider booting CERTKILLER-WS680 from Windows Preinstallation Environment
    (Windows PE).

    F. You should consider running the Imagex.exe utility.
    Answer: B,D
  165. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a
    client computer named CERTKILLER-WS680 that is running Windows 7. CERTKILLER-WS680 contains two volumes named Volume C and Volume D.

    You have created a document named CKdoc.docx on Volume D and you have manually created a restore point for the document before editing the document. You want to be able to restore the document to its current version if the document is edited any further.

    What should you do?

    A. You should consider starting the Volume Shadow Copy Service (VSS).

    B. You should consider using the System Protection on volume D.

    C. You should consider modifying the permissions of the document.

    D. You should consider installing the Previous Versions client.
    Answer: B
  166. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

    You are working on a client computer named CERTKILLER-WS680 that is running Windows 7. System Protection is enabled on CERTKILLER-WS680.

    What would you do to delete all System Protection snapshots on CERTKILLER-WS680 except the most recent snapshot?

    A. You should consider compressing the disk drive.

    B. You should consider enabling disk quotas.

    C. You should consider disabling the System Restore from the System Protection Restore
    settings.

    D. You should consider deleting the contents of the %systemroot%\Temp folder.

    E. You should consider running Disk Cleanup for System Restore and Shadow Copies.
    Answer: E
  167. You are employed as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

    The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a recent critical update you notice that CERTKILLER-WS680 is unstable. You now want to use system restore to restore CERTKILLER-WS680 to an earlier point.

    What should you do?

    A. D
    • Answer: A
    • Explanation:
    • Step #1: Click on the Start button, open the Control Panel and select 'System and Security'
    • (Image)

    • Step #2:
    • Select ' Action Center ' (Image)


    • Step #3:
    • Select 'Recovery' (Image)

    • Step #4:
    • Click on the 'Open System Restore' button (Image)

    • Step #5:
    • Click 'Next' on the 'Restore System Files and Settings' dialog box (Image)

    • Step #6:
    • Select the 'Show more restore points' check box, select the restore point you to use and click
    • 'Next'. (Image)

    • Step #7:
    • Select 'Finish' on the Confirm your restore point' page. (Image)
  168. You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

    A network user named Mia Hamm has a client computer which she regularly backs up. Mia Hamm additionally creates system image backups. During the course of the day Mia Hamm's computers
    disk fails and she replaces the failed disk drive. CertKiller.com wants you to recover Mia Hamm's computer to the previous Windows environment. You started the computer using the Windows 7
    installation media.

    What should you do?

    A. You should consider having the System Image Recovery option selected.

    B. You should consider having the Upgrade option selected.

    C. You should consider having the System Restore option selected.

    D. You should consider having the Command Prompt option selected.

    E. You should consider having the Last Known Good Configuration selected
    Answer: A
  169. You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7. You are working on a client computer named
    CERTKILLER-WS680. CERTKILLER-WS680 is configured with two hard disk drives named Drive C and Drive D. Both hard disks drives are formatted with the NTFS file system. You need to disable previous versions on the Drive D.

    What should you do?

    A. You should disable indexing on Drive D.

    B. You should modify the Permissions on Drive D.

    C. You should consider modifying the Sharing settings on Drive D.

    D. You should modify the System protection setting from System Properties.

    E. You should delete all System Restore Points from System Properties.
    Answer: D
Author
cmplxsmplcty
ID
22620
Card Set
70-680
Description
Windows 7, Configuring
Updated