Q1. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do?
A. Enable InPrivate Filtering and click Automatically block.
B. Add the Web site for the content provider to the Restricted sites zone.
C. Enable InPrivate Filtering and select the Choose content to block or allow option.
D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option.
Answer: C
Q2. - (Topic 1)
Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
Answer: B
Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker.
Q3. HOTSPOT - (Topic 5)
You use a computer that has Windows 7 installed. The computer uses a quad-core CPU.
Your computer experiences CPU performance issues while encoding video files.
You need to configure the wmplayer.exe process to use only the first two CPU cores.
What should you do? (To answer, select the appropriate option or options in the answer area.)
Answer:
Q4. - (Topic 2)
You have a computer that runs Windows 7.
You need to identify which applications were installed during the last week.
What should you do?
A. From Reliability Monitor, review the informational events.
B. From System Information, review the Software Environment.
C. From Performance Monitor, review the System Diagnostics Report.
D. From Performance Monitor, run the System Performance Data Collector Set.
Answer: A
Explanation:
Reliability Monitor tracks a computer's stability. It can also tell you when events that could affect stability (such as the installation of a software application) occurred and whether any restarts were required after these events. Action Center monitors your computer and reports problems with security, maintenance, and related settings. The Windows Experience Index indicates the suitability of your current computer hardware for running resource intensive applications.
Q5. - (Topic 4)
Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy.
A user indicates that he is unable to connect to a remote FTP server.
You need to view the status of TCP/UDP ports at the user's computer.
Which command should you run?
A. netstat -o
B. netstat -a
C. ipconfig /all
D. netstat –an
Answer: D
Q6. - (Topic 5)
You administer a desktop computer that has the following hardware specifications:
. Dual-core 2.5 GHz processor
. 1 GB RAM
. 25 GB unpartitioned disk space
. Onboard graphics that has WDDM 1.0
You install a customized Windows 7 Enterprise 64-btt image on the computer by using unpartitioned disk space. The computer operates unacceptably slow.
You need to improve the performance of the computer.
What should you do?
A. Install a video card that has 128 MB of video RAM.
B. Perform the initial Windows Experience Index run.
C. Upgrade the processor.
D. Install another 1 GB of RAM.
Answer: D
Explanation: http://windows.microsoft.com/en-us/windows7/products/system-requirements Should have 2GB RAM as a minimum.
Q7. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment.
You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on.
You have a workgroup which contains five computers. Windows 7 is run by the computers. A computer named C01 has video and audio files.
You have to share C01s video and audio files on the network.
What should you do? (Choose more than one)
A. Connect a removable drive and enable BitLocker To Go.
B. A HomeGroup should be created.
C. The files should be moved to a Media Library.
D. All BranchCache rules should be enabled in Windows Firewall.
Answer: B,C
Q8. - (Topic 1)
You manage a computer that runs Windows 7.
You are tasked to identify which applications were installed during the last week.
What Windows component would you use to find this information? Choose two.
A. Check the Windows System Change Log in the Control Panel.
B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel.
C. The informational events should be reviewed from Reliability Monitor.
D. Check the Windows System Diagnostics Report under the Performance Monitor MMC.
Answer: B,C
Q9. - (Topic 4)
A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) on a Windows 7 client computer.
You capture an image of the client computer.
A new driver is released for the network card that is installed in the client computer.
You need to update the image with the new driver for the network card.
What should you do first?
A. Add a boot image in WDS.
B. Create a capture image in WDS.
C. Run the BCDEdit command.
D. Run the PEImg /Prepcommand.
E. Run the Start /w ocsetup command.
F. Run the Dism command with the/Add-Driver option,
G. Run the Dism command with the /Mount-Wim option.
H. Run the Dism command with the /Add-Package option.
I. Run the ImageX command with the /Mountparameter.
J. Run the DiskPart command and the Attach command option.
K. Use Sysprep with an answer file and set the PersistAMDeviceInstalls option in the answer file to True.
L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
M. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes.
N. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
Answer: G
Q10. - (Topic 3)
You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:\folder1.
You need to identify all of the encrypted files in C:\folder1.
Which command should you run?
A. Cipher C:\folder1
B. Dir C:\folder1 /OE
C. Fsutil C:\folder1
D. Wfs C:\folder1
Answer: A
Explanation:
CipherDisplays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.