Q1. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. Create an EFS Data Recovery Agent by using Group Policy.
B. From User Accounts, select Manage your file encryption certificates.
C. Run the cipher.exe /adduser /user:administrator command.
D. Run the manage-bde -on C: -RecoveryPassword password command.
Answer: A
Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.
Q2. - (Topic 1)
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?
A. PhysiRAM
B. Aero Glass
C. DirectAccess
D. ReadyBoost
Answer: D
Q3. - (Topic 3)
You have a computer that runs Windows 7.
You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site.
Which two configuration changes should you perform? (Each correct answer presents part of the solution, Choose two.)
A. Modify the properties of Group1.
B. Assign an SSL certificate to the default Web site.
C. Modify the authentication methods of the default Web site.
D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
Answer: C,D
Explanation:
Modifying the Default Authentication Method
You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site.
Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
See article:
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0
Web server http://support.microsoft.com/kb/271071
Q4. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.
You create a shared folder on the server and enable BranchCache on the shared folder.
You discover that the users of the client computers are unable to access files in the shared folder.
You need to provide access for the users to the shared folder.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.
F. Check permissions.
G. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.
Answer: F
Explanation:
Have the users been given access to the files (what does BranchCache have to do with accessing files locally etc).
Q5. - (Topic 1)
You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three.
A. Run setup.exe from the DVD to start the Windows 7 installation.
B. Use the autorun feature on the DVD to start the installation.
C. Perform a full installation of Windows 7.
D. Perform and upgrade of Windows 7 keeping all the Windows XP settings.
Answer: A,B,C
Q6. - (Topic 2)
You have a computer that runs windows 7.
The network contains a monitoring server named server1 Computer runs a monitoring service named service1.
Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1.
What should you do?
A. From windows Firewall with Advanced Security, create a predefined rule.
B. From windows Firewall with Advanced Security, create custom rule.
C. From the Network and Sharing Center, modify the network location settings.
D. From the Network and Sharing Center, modify the advanced sharing settings.
Answer: B
Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q7. - (Topic 2)
You have a computer that runs Windows 7.
You need to provide standard users the ability to update the drivers for display adapters.
What should you modify from the Local Group Policy?
A. driver installation settings for the user
B. device installation settings for the computer
C. driver installation settings for the computer
D. display settings for the user
Answer: C
Explanation:
To Update the Drivers you need permissions to install drivers. Apply this to the computer for all local users, as opposed to only one user.
Q8. - (Topic 5)
You administer a computer that has Windows 7 and Internet Explorer 8 installed. A user has installed a third-party toolbar in Internet Explorer 8.
You need to permanently remove the toolbar.
What should you do?
A. From Programs and Features in the Control Panel, uninstall the toolbar.
B. From an elevated command prompt, run °/osystemdrive°/o\Program Files\Internet Explorer\iecleanup.exe.
C. From Internet Explorer, launch Manage Add-ons and disable the toolbar.
D. Start Internet Explorer in an InPrivate Browsing session.
Answer: A
Q9. - (Topic 5)
A stand-alone computer that runs Windows 7 has only one partition. Two users named User1 and User2 share this computer.
User1 encrypts a file by using Encrypting File System (EFS). User1 attempts to grant
User2 access to the file as shown in the exhibit.
You need to ensure that User1 can grant User2 access to the file.
What should you do?
Exhibit:
A. Instruct User2 to log on to the computer and take ownership of the file.
B. Instruct User1 to move the file to a shared folder on the computer.
C. Instruct User2 to export the EFS certificate to a certificate file.
D. Instruct User1 to export the EFS certificate to a certificate file.
Answer: C
Q10. - (Topic 4)
You use a desktop computer that has Windows 7 SP1 Ultimate installed.
You update the driver for the computer's sound card and the computer becomes unresponsive.
You need to be able to roll back the sound card driver.
What should you do?
A. Boot from the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image.
B. Start the computer, press F8, and then select Repair Your Computer.
C. Start the computer, press F8, and then select Debugging Mode.
D. Restart the computer in safe mode.
Answer: D