1. What are the minimum hardware requirements for Windows 7?
    1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  2. What does the Windows 7 Upgrade Advisor do?
    It sees if your PC is ready for Windows 7. It scans your hardware
  3. What OS can be upgraded to Windows 7?
    Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
  4. What can Windows 7 Enterprise can be directly upgraded to?
    Windows 7 Ultimate.
  5. What dows Windows Anytime Upgrade do?
    You can upgrade to a more advanced edition of Windows 7�say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs
  6. How do you upgrade windows 7?
    All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
  7. How do you upgrade windows vista to windows 7?
    Boot into Windows Vista to initiate a direct upgrade to Windows 7
  8. What windows 7 OSs can join a domain?
    Only Business Track Windows 7 editions (Professional
  9. How do you setup Windows 7 setup to run unattended?
    You create an answer file and place it on removable media. By default
  10. How do you make a Windows 7 Answer File used for unattended setup?
    They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
  11. Who can run the Windows Easy Transfer Wizard?
    Only a local administrator
  12. What can you use the User State Migration Tools (USMT) for?
    Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts
  13. Where do you get the USMT?
    Comes with the Windows Automated Installation Kit (WAIK)
  14. What does the MigApp.xml file do?
    Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
  15. What does the MigUser.xml file do?
    Specify this file with both the ScanState and LoadState commands to migrate user folders
  16. What does the MigDocs.xml file do?
    Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However
  17. What do you provide to Scanstate to prevent certain system settings from being migrated?
    A CONFIG.XML file
  18. What is the command needed In order for ScanState and LoadState to use any of the migration .xml files?
    You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT
  19. What does Scanstate /p do?
    Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
  20. What does Scanstate /OfflineWinOld: C:\Windows.old do?
    Perform an offline migration
  21. What does Scanstate /EFS:COPYRAW do?
    Migrates EFS encrypted files?
  22. What does Scanstate /GENMIGXML do?
    It create a report of which files will be migrated
  23. What is new in Windows User State Migration Tool (USMT) 4.0?
    Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
  24. What are the two primary offline scenarios enabled in USMT 4.0?
    Windows PE and Windows.old.
  25. Can Offline migration be performed on Windows 2000?
  26. Are Migrated user accounts are enabled by default?
    No they are disabled
  27. What are WIM files used for?
    Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
  28. What is required to upgrade Vista to Windows 7?
    The latest Vista Service Pack
  29. What do you do if you install an older operating AFTER you install Windows 7?
    You will need to run Startup Repair from within the Windows Recovery Environment (WRE)
  30. What is BCD?
    Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
  31. What is BCDEdit?
    Is a command-line tool for managing BCD stores. It can be used for a variety of purposes
  32. What is Bcdboot?
    BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
  33. What is Bootsect.exe?
    Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
  34. What is Oscdimg?
    Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660
  35. What is DiskPart?
    A text-mode command interpreter that enables you to manage objects (disks
  36. What is Drvload?
    Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
  37. What is DISM.EXE?
    The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr
  38. What is Sysprep?
    It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file
  39. What does sysprep /generalize /oobe /shutdown /unattend:sysprep.xml?
    The system will shut down. The next time you start this system (after cloning it)
  40. What is the default Install image from a Windows 7 Setup DVD?
    A OOBE ready and will be booted into Windows Welcome
  41. What does IMAGEX /MountRW do?
    Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
  42. What does IMAGEX /SPLIT do?
    Divide up a large WIM file into multiple smaller .SWM files
  43. How do you capture a computer's hard disk to a .WIM file?
    Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
  44. What does DISM /UNMOUNT-WIM /COMMIT do?
    Writes changes to a mounted WIM file
  45. What does DISM do?
    It can add a driver to an offline WIM image with the /Add-Driver option
  46. What does DISM do?
    It can enable a windows feature on an offline image with the /Enable-Feature option
  47. What does DISM /Get-Drivers do?
    Used to get a list of installed 3rd party drivers
  48. How can you can upgrade an offline image's Windows 7 edition?
    By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:\SAMPLE.WIM /Set-Edition:Ultimate
  49. Can DISM can apply an answer file to an offline image?
  50. How do you create a custom Windows PE image that supports windows scripting host?
    Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
  51. How do you add the Windows 7 VHD to the boot choices menu?
    Use the BCDEDIT.EXE command
  52. What does Diskpart.exe do?
    Can be used to create virtual hard disks
  53. What does the max=32000 mean in create vdisk file = c: \ vhd \windows 7\ vhdfilename.vhd max = 32000
    It is the max size is expressed in megabytes.
  54. What is the benifit of create a fixed size VHD instead of a dynamically expanding VHD file?
    It improves performance
  55. How can you use ImageX to apply a WIM Image directly to a VHD file?
    ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
  56. What happens when 3rd party vendors create a new driver?
    It is submitted to Microsoft for device signing to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However not all drivers are digitally signed
  57. What does DRIVERQUERY /SI do?
    It will display driver signing status
  58. What does PNPUTIL.EXE do?
    It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
  59. Where is the Troubleshoot option for fixing common problems located?
    Devices and Printers Control Panel applet has a
  60. How do you repartition your hard disk by using the Shrink feature in Disk Management?
    If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space
  61. What type of drives can Software RAID 0
  62. How do you move a Dynamic Disk from one computer to another?
    Use the Import Foreign Disk option on the target computer
  63. What does it mean to Extend a Basic Disk Volume?
    You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume
  64. Where is Software RAID is configured?
    At the volume level
  65. What does Windows ReadyBoost do?
    It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows
  66. How do you setup Ready Boost?
    When you plug a ReadyBoost-compatible storage device into your computer
  67. How do you change the ReadyBoost configuration of a flash drive?
    Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
  68. What is exFAT?
    A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
  69. Can configure a GPO to prevent all removable storage devices?
  70. How do you allow specific vendors for being excluded from a GPO to prevent all removable storage devices?
    You can allow by adding the device vendor's GUID to the allow list in a GPO.
  71. What is the Microsoft Application Compatibility Toolkit (ACT)?
    It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7
  72. Can the Application Compatibility Kit can also search and report on the applications installed on a Windows 7 computer?
  73. Why would you deploy an application compatibility database across multiple computers?
    So you can use a system management solution
  74. What is another way to deploy an application compatibility database across multiple computers?
    By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer
  75. What does Windows XP Mode for Windows 7 makes it easy to do?
    Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology
  76. What does Windows XP Mode requires?
    A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windows 7 Enterprise
  77. How do you install applications in Windows XP Mode?
    You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example
  78. When you install an application in Windows Virtual PC � Windows XP Mode
    where does it automatically creates a Windows 7 Start Menu Shortcut under?
  79. What does MISEXEC.EXE do?
    Install Windows Installer Packages (.MSI) files. You can script the installation.
  80. What does Microsoft Transform files (MST) do?
    Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
  81. What is AppLocker?
    A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
  82. Where are Applocker policies are configured?
    Through a GPO under Application Control Policies in the Computer Security Settings Node.
  83. What OS can Applocker policies not be enforced?
    Windows 7 Professional.
  84. What does AppLocker allows you to generate default rules for?
    Each of the rule types. For example
  85. How does AppLocker reduce administrative overhead and help administrators control how users can access and use files
    such as executable files
  86. What is an example of a rule based on file attributes derived from the digital signature?
    For example
  87. What is an example of a exceptions to rule?
    For example
  88. Why would you use audit-only mode?
    To deploy the policy and understand its impact before enforcing it.
  89. What does importing and exporting rules affect?
    The import and export affects the entire policy. For example
  90. What service has to be started for Applocker to work?
    The Application Identity Service
  91. How do you verify your IPV6 address?
    Use IPCONFIG or Status Details for the Network Connection.
  92. What is a split tunnel VPN?
    It is where Internet access is direct and not routed through the VPN
  93. How do you create a VPN connection?
    Use the Connect to a Workplace option
  94. What are IPV6 host records in DNS?
    They are AAAA records.
  95. How do you ping the IPV6 address of a remote computer?
    Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
  96. What are some of the IPV6 transition technologies?
  97. What does IP Helper service has to run for?
    IPV6 transition technologies
  98. What does the Ping -6 option do?
    It pings with IPV6
  99. What protocol does Ping uses?
    The ICMP protocol.
  100. What is a HOSTS file?
    A file that can be used to perform FQDN name resolution in the absence of a DNS server.
  101. What needs to be enabled for smart card logon?
    EAP authentication needs to be enabled for remote access authentication (dial up
  102. How do you connect to a wireless access point is not broadcasting its SSID?
    By creating or modifying a wireless connection in Network and Sharing Center.
  103. What should you use for enhanced wireless security?
    Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
  104. Can Wireless profiles can be exported and imported using a flash drive?
  105. What extensions is Firewall rules can be exported and imported?
    A .WFW file
  106. How do you have a Firewall rule apply only to a specific computer?
    Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
  107. How do you configure IPSEC between two computers?
    Use the Advanced Firewall to define Connection Security Rules.
  108. What is WinRS?
    It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command
  109. What is Network Level Authentication?
    An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
  110. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
  111. What is a HomeGroup?
    It makes it easy to share your libraries and printers on a home network. You can share pictures
  112. Can you choose which media libraries you want to share with your homegroup?
  113. Does the Advanced Firewall already has a predefined Homegroup inbound rule?
  114. What are Libraries?
    Where you go to manage your documents
  115. What does Windows uses the index for?
    To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that
  116. What do Print permission only allows?
    A user to submit a print job to a printer and manage their own print jobs through the Manage Documents permission granted to the Creator Owners Group. If you grant a user Manage Documents
  117. Why would you add additional drivers for the various operating systems in your organization that will be connecting to the shared printer when sharing a printer?
    To will ensure the clients download the appropriate printer driver.
  118. What does Removing Modify NTFS permission (not explicitly denying) do?
    It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
  119. Can users can share encrypted files with another user by giving them permission?
  120. How do you manage EFS from the command line?
    Use the Cipher.exe command line tool.
  121. How should EFS files should be recovered?
    By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password
  122. What does Cipher /K do?
    Use it to generate an EFS user certificate
  123. What does Cipher /X do?
    Use it to can backup certificates to a .PFX file that is password protected.
  124. How do you enable a recovery agent?
    Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
  125. What do you do if a computer is missing the data recovery agent certificate for the EFS recovery agent?
    Export and import it from another computer.
  126. What is BranchCache?
    It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed across peer client computers (Distributed Cache mode) or centrally hosted on a server (Hosted Cache mode) depending on where the cache is located. Introduced in Windows 7 and Windows Server 2008 R2 operating systems.
  127. What does the Hosted Cache mode do?
    It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache
  128. What mode is BranchCache configured for branch offices with fewer than 50 users?
    Distributed Cache mode. In this mode
  129. What does a BranchCache client hosting content in distributed cache mode must have?
    Certain firewall rules configured for the Peer Discovery and Content Retrieval.
  130. What does NETSH BRANCHCACHE FLUSH do?
    Clear the content being cached
  131. What requirements must your system must meet to use BranchCache?
    Client computers must be running Windows 7
  132. What does Credential Manager allows you to store?
  133. What is DirectAccess?
    In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access�without the need to VPN. When your IT department enables DirectAccess
  134. What are the proven
    standards-based technologies that DirectAccess is built on?
  135. What does DirectAccess uses to authenticate?
    IPsec to authenticate both the computer and user
  136. How does DirectAccess work?
    Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server
  137. What is IPsec Encapsulating Security Payload (ESP) tunnel?
    One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller
  138. What is IPsec ESP tunnel?
    One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
  139. Does Direct Access requires computer certificates be installed on client computers? Yes
  140. What should you modify of the NAP Agent client service if the computer needs to prove health status?
    Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP
  141. What versions of Windows 7 support Bitlocker Drive Encryption?
    Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device
  142. What is Transparent Caching?
    A new feature for Offline Files & Folders. Prior to Windows 7
  143. How does transparent caching work?
    The first time a user opens a file in a shared folder
  144. How does Transparent Caching lead to improved end-user response times and decreased bandwidth consumption over the WAN links to the server?
    By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
  145. How can Transparent Caching is be enabled?
    Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
  146. What is Client for Microsoft Networks?
    It is the Microsoft SMB client for accessing shared network resources
  147. What is the Powercfg.exe tool?
    Used to control power settings and configure computers to default to Hibernate or Standby modes. For example
  148. What is InPrivate Browsing?
    It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the new tab page or the Safety button.
  149. What does Internet Explorer store while you are surfing using InPrivate Browsing?
    Some information�such as cookies and temporary Internet files�so that the webpages you visit will work correctly. However
  150. What can In-Private Browsing not display?
    Suggested Sites
  151. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
    You will be prompted to reconnect online. To disable offline mode
  152. What is Internet Explorer Content Advisor?
    A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor
  153. Where must SSL certificates must be issued by?
    A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
  154. What sites support Integrated Windows Authentication?
    Only sites added to the local Intranet Zones
  155. Is there is a RESET option in Internet Explorer to set IE back to its default settings?
  156. How do you prevent Forms Based Credentials from being saved?
    Disable AutoComplete in Internet Explorer
  157. What does Reliability Monitor display?
    Problem history but also application installation history.
  158. What does the Resource Monitor display?
    Which processes currently consume a resource like processor utilization.
  159. What is the command to set a collecting computer for event log forwarding?
  160. What is the command to set a forwarding computer for event log forwarding?
  161. What does WINRM QUICKCONFIG do?
    Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
  162. What should you do if you receive warnings that your virtual memory is low?
    Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB)
  163. What does Create System Repair Disk option do?
    Creates a bootable CD that runs the Windows Recovery Environment (WRE)
  164. How do you quickly restore a file from backup?
    Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
  165. Where should you backup to automate System Image backups and maintain multiple images?
    A network location.
  166. How do you restore a System Image from backup?
    Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
  167. Where can Windows Backup backup a local drive to?
    To another hard disk in the same computer
  168. What is System protection?
    A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points
  169. What drive is System protection is automatically setup on?
    For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
  170. What does System Protection cover?
    System Restore Points as well as Previous Versions of Files (configured through the System applet).
  171. What are the two ways that you can take advantage of system protection?
    If your computer is running slowly or isn't working properly
  172. Can you can delete an individual restore point?
  173. What is PSR.EXE?
    Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard input. It then saves these screen shots into a web archive single file with a .MHT extension. It can be used by end users to record the problem they are experiencing and submit a single pages summary of their problem to a technician for assistance.
  174. What do you do if the Operating System won't start due to a corrupt driver?
    Use Safe Mode and then roll back the driver if it was recently updated.
  175. How do you can disable programs from autostarting?
    When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
  176. y-side comparison of BranchCache and DFSR
  177. What is Aero Peek?
    Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the Show desktop button to the far right of the new taskbar.
  178. What is Aero Shake?
    Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
  179. What is Aero Snap?
    Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the screen maximizes the window to full height
  180. What is Touch UI?
    Windows Aero was revised to be more touch-friendly.
  181. What does Aero require?
    A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
  182. What are Entertainment Software Rating Board (ESRB) ratings for?
    They are designed to provide concise and impartial information about the content in computer and video games so consumers
  183. What are the ESRB Ratings?
  184. What OSs are all Windows Games installed on?
    Windows 7 Enterprise and Ultimate Editions
  185. What has Windows 7 modified in searching?
    Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the added benefit of highlighting matches within the searched document. Windows 7 enables federated search via the public OpenSearch standards. Other improvements are the consistent UI for remote search results within Windows Explorer and the ability to drag and drop files listed in the search results between different locations. To create a federated search connector
  186. What does the NEW-PSSESSION powershell applet do?
    Create persistent connections to computers with POWERSHELL
  187. What does the PSCONSOLEFILE option in POWERSHELL do?
    Create a customized shell
  188. y-side comparison of BranchCache and DFSR
  189. What does User Rights policy governs?
    Who can shutdown a computer
  190. How do you configure client computers to use a WSUS server as the source for Windows Update?
    Modify/Create a GPO
  191. How do you verify that an Auto Update Client is connecting to its WSUS Server?
    Scan through the %WinDir%\WindowsUpdate.log (ie. C:\Windows\WindowsUpdate.log) file.
  192. What controlls file extensions?
    The Default Programs Control Panel applet
  193. What do you modify to define CD Autoplay settings and file associations?
    Default Programs Control Panel applet
  194. How do you enable additional Windows Components?
    Use the Programs and Features Control Panel applet to
  195. What does Parental Controls do?
    Restrict when a child can logon to a computer.
  196. Does Windows 7 does have an email client like Outlook Express or Windows Mail?
  197. What is User Account Control (UAC)?
    It is a security component that enables users to perform common tasks as non-administrators
  198. How can you can prevent users from accessing certain MMC console snap ins?
    Through a GPO.
  199. How do you review files in the Offline Files Cache?
    Use SYNC Center
  200. How do you display detailed Windows Activation and License status?
    Run: Cscript slmgr.vbs /dl
Card Set
Study questions for the 70-680 exam