Q1. - (Topic 1)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
User1 must be allowed to delete all files in Folder1
Members of Group1 must be able to create files in Folder1
All other members of Group1 must be prevented from deleting files they did not create in Folder1
All users must be prevented from modifying the permissions on Folder1
What should you do?
A. Assign Group1 the Write permission. Assign User1 the Modify permission.
B. Assign Group1 the Modify permission. Assign User1 the Write permission.
C. Deny Group1 the Write permission. Assign User1 the Modify permission.
D. Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A
Explanation:
File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
Q2. - (Topic 2)
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices.
You need to ensure that users can only access removable devices that have been previously installed on the computer.
What should you modify in the Local Group Policy?
A. Enable the Prevent redirection of USB devices setting.
B. Enable the Prevent installation of removable devices setting.
C. Disable the WPD Devices: Deny read access setting.
D. Disable the Allow administrators to override Device Installation Restriction policies setting.
Answer: B
Explanation:
Prevent installation of removable devices This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it is connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update device drivers for removable devices as allowed or prevented by other policy settings. NOT Prevent redirection of USB devicesThis policy setting prevents redirection of USB devices. If you enable this setting, an alternate driver for USB devices cannot be loaded. If you disable or do not configure this setting, an alternate driver for USB devices can be loaded.
Q3. - (Topic 3)
You need to configure a computer to encrypt all inbound connections by using IPSec.
What should you do?
A. From Network and Sharing Center, click Connect to a network.
B. From Network and Sharing Center, click Set up a new connection or network.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.
Answer: D
Explanation:
Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not.
Q4. - (Topic 2)
You have a computer that runs Windows Vista.
You need to identify whether the computer can be upgraded to Windows 7.
Which tool should you use?
A. Windows Anytime Upgrade for Windows 7
B. Windows Anytime Upgrade for Windows Vista
C. Windows 7 Upgrade Advisor
D. Windows Vista Upgrade Advisor
Answer: C
Explanation:
Windows 7 Upgrade Advisor Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft's\ Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista. Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7. NOT Windows Anytime Upgrade A similar compatability report is generated during the upgrade process, but the version created by the Windows 7 Upgrade Advisor is more likely to be up to date.NOT VistaQuestion specifies upgrading to Windows 7 from Windows Vista, not upgrading to Windows Vista.
Q5. DRAG DROP - (Topic 5)
Twenty client computers run Windows XP. The computers are joined to a domain. You plan to perform a clean installation of Windows 7 on all the computers.
You need to transfer all users' documents and settings. You must exclude music and video files. You must achieve this goal by using the minimum amount of administrative effort.
Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q6. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.
The network configuration for Computer1 is shown in the exhibit. (Click the Exhibit button.)
You attempt to connect to \\Server1\Share1 and receive the following error message: Windows cannot access \\Server1\Share1. From Computer1, you successfully ping Server1.
You need to connect to \\Server1\Share1.
What should you enable on Computer1?
A. Client for Microsoft Networks
B. File and Printer Sharing for Microsoft Networks
C. Link-Layer Topology Discovery Mapper I/O Driver
D. Link-Layer Topology Discovery Responder
Answer: A
Explanation:
Client for Microsoft Networks Allows the computer to access resources on a Microsoft network.File and Printer Sharing for Microsoft NetworksEnables other computers to access resources on your computer in a Microsoft network (and other networks).Link-layer Topology Discovery Mapper I/O DriverDiscovers and locates other computers, devices, and network infrastructure features on the network, and determines network bandwidth.
Link-layer Topology Discovery ResponderAllows a computer to be discovered and located on the network.
Q7. - (Topic 2)
Your network consists of an Active Directory domain and 100 computers that run Windows 7.
The domain contains a logon script named logon.cmd.
You plan to deploy a new application named app1.msi by using the logon script. App1.msi is stored in \\server1\share1.
You need to modify the logon script to deploy the application.
What should you include in the logon script?
A. Sbdinst.exe -u \\server1\share1\app1.msi -q
B. Msinfo32.exe \\server1\share1\app1.msi
C. Pkgmgr.exe /ip /m:\\server1\share1\app1.msi
D. Msiexec.exe /i \\server1\share1\app1.msi /quiet
Answer: D
Explanation:
Msiexec Provides the means to install, modify, and perform operations on Windows Installer from the command line.
To install or configure a product Syntax msiexec /i {package|ProductCode} /i : Installs or configures a product.
NOT Msinfo32 Displays a comprehensive view of your hardware, system components, and software environment.
Q8. HOTSPOT - (Topic 6)
A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails.
Email 1
From: Company CIO
Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7.
Email 2
From: System Administrator
Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files.
Email 3
From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support
the inference as stated? (This question is worth three points. )
Answer:
Q9. - (Topic 6)
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7.
You want to deploy a Windows image (WIM) file to other computers in the domain.
You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file.
What should you do before you capture the image?
A. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk.
B. Run ScanState.exe.
C. Run Defrag.exe.
D. Run Diskpart.exe.
Answer: B
Explanation: You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration .xml files.
Q10. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. From Authorization Manager, modify the Authorization Manager options.
B. From Credential Manager, select Back up vault.
C. Create an EFS Data Recovery Agent by using Group Policy.
D. From User Accounts, select Manage your file encryption certificates.
Answer: C
Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.