Q1. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.
You are planning to deploy Windows 7 and a custom application.
You have the following requirements:
. The application must be available to only a specific group of users.
. You must be able to monitor application usage.
You need to design a deployment method for the custom application that meets the requirements.
Which deployment method should you use in your design?
A. software installation in Group Policy
B. Microsoft Application Virtualization (App-V)
C. baseline Windows 7 image that includes the custom application
D. startup scripts in Group Policy
Answer: B
Explanation:
MS App-V thus allows centralized installation and management of deployed applications. It supports policy based access control; administrators can define and restrict access to the applications by certain users by defining policies governing the usage. App-V can require that applications not be run 'cached' from workstations, or require that 'cached' App-V applications routinely update license information from the App-V server, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and fault tolerance, and also features a tracking interface to track the usage of the virtualized application. http://en.wikipedia.org/wiki/Microsoft_App-V
Q2. You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom application.
You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the custom application.
You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive the new GPO.
What should you do?
A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Allow-Apply Group Policy permission for the GPO.
B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the OU.
C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Deny-Apply Group Policy permission for the GPO.
D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain.
Answer: C
Q3. Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.
Microsoft releases a security update for Windows 7.
You have the following requirements:
. Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed.
. Use the least amount of administrative effort.
You need to manage the software update process to meet the requirements.
What should you do?
A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation, and force a detection cycle on the client computers.
B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers.
C. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.
D. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA to use the Microsoft Update site catalog.
Answer: D
Explanation:
Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.
http://technet.microsoft.com/en-us/security/cc184924
Q4. You are updating the corporate image to add drivers to support a new device.
You need to meet company requirements for updating images.
Which two actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q5. Your company’s network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU).
The company wants to deploy a new application. The application is not packaged.
You have the following requirements:
. Deploy the application to all computers in the shipping department.
. Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements.
Which two actions should you include in the process? (Each correct answer presents part of the solution. Choose two.)
A. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department users, and assign the package to the collection.
Answer: A,B
Explanation:
Hints: GPO only support MSI & ZAP file type this application is not packaged = non MSI or ZaP file type
Q6. Your network has a single domain with 1,000 client computers that run Windows Vista.
You are planning a deployment of Windows 7.
Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7.
You have the following requirements:
. Migrate the user state for each user.
. Preserve the file system and existing applications for only the sales department computers.
You need to recommend the deployment method that is appropriate for the environment.
Which combination of deployment scenarios should you recommend?
A. Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
B. Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.
C. Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.
D. Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.
Answer: A
Explanation:
Hints: only upgrade can preserve existing application
Replace method - change new computer and migrate user state for each user.
Q7. You are planning to upgrade Internet Explorer.
You have the following requirements:
. Create a report that identifies which computers are successfully upgraded.
. Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements.
What should you do?
A. Use Windows Server Update Services (WSUS).
B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.
C. Use Microsoft System Center Configuration Manager.
D. Use Microsoft System Center Essentials.
Answer: A
Explanation:
Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update.
http://en.wikipedia.org/wiki/Windows_Server_Update_Services
Q8. Your company has 1,000 client computers.
You are planning to deploy Windows 7 and a new line-of-business application.
You have the following requirements:
Install the application as part of the standard Windows 7 deployment.
Use a single Windows 7 image for the deployment.
The application must be available for use on client computers that are not
connected to the network.
You need to ensure that the application is installed on all new client computers.
What should you do?
A. Deploy the application by using Windows Server Update Services (WSUS).
B. Publish the application by using Group Policy Software Installation.
C. Service an offline image of Windows 7 to add the new application.
D. Service an online image of Windows 7 to add the new application.
Answer: D
Explanation:
Hints:
Client computer that are not connected to the network = A & B is wrong the question refer
to application installation. You can not do it offline servicing. Only online will be able to
achieve it.
Q9. Your companys network has client computers that run Windows 7.
A software vendor releases version 2 of an application that your company uses.
Your company currently uses version 1.
Version 1 and version 2 are not compatible.
You plan to deploy version 2 of the application.
You have the following requirements:
Users must be able to run both versions of the application on their computers.
Version 2 must be available when a client computer is not connected to the network.
You need to plan a software deployment process that meets the requirements.
What should you do?
A. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.
B. Deploy version 2 of the application by using a Group Policy Software Installation policy.
C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
D. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Answer: D
Explanation:
Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real-time to any client from a virtual application server. It removes the need for local installation of the applications. Instead, only the App-v client needs to be installed on the client machines. All application data is permanently stored on the virtual application server. Whichever software is needed is either streamed or locally cached from the application server on demand and run locally. The App-V stack sandboxes the execution environment so that the application does not make changes to the client itself (OS File System and/or Registry). App-V applications are also sandboxed from each other, so that different versions of the same application can be run under App-V concurrently. http://en.wikipedia.org/wiki/Microsoft_App-V
Q10. Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in the following diagram.
Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO.
A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that are in the Kiosk Computers OU.
You need to ensure that the user configuration settings are correctly applied.
What should you do?
A. Enable loopback processing in Merge mode on the Default Domain Policy GPO.
B. Disable the user configuration settings on the Default Domain Policy GPO.
C. Enable loopback processing in Replace mode on the Kiosk Computers GPO.
D. Disable the user configuration settings on the New York Users GPO.
Answer: C
Explanation:
Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92