The computer contains two volumes, C and D. You create a new folder called D:Reports. You need to ensure that all files stored in the Reports folder are indexed by Windows Search. What should you do?
Create a new library and add the Reports folder to the library.
You work as a network administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. ABC.com has its headquarters in London, a branch office in Paris. ABC.com has a server, named ABC-SR07, whcih hosts a shared folder and is located in the London Office. ABC.com also has a laptop computer, named ABC-WS15, in the Paris Office. You have been instructed to make sure that when ABC-WS15 accesses the ABC.com network, it only has access to resources in the shared folder on ABC-SR07. you also have to make sure that network traffic between the two offices is kept to a minimum. Which of the following actions should you take?
You should consider having transparent caching enabled on ABC-WS15
You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are responsible for managing a computer named ABC-SR05 that is using Windows7 operating system. ABC-SR05 is configured to host two volumes. The details of the Volumes are shown below:
Volume1 – C
Volume2 – D
Are have created a folder on the volume2 named D:TESTDATA
You should consider creating a new library and adding TESTDATA to it.
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy?
Enable the Prevent installation of removable device setting
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 Professional installed.
You are working on a workstation, named ABC-WS680, which has been assigned to a ABC.com user, named Amy. You have been instructed to update the printer connected to ABC-WS680 so that Amy can print graphics at a higher resolution. Subsequent to the update, Amy’s workstation reacts in a manner that prevents her from working. You want to make sure that Amy’s workstation is returned to its previous state as quickly as possible. Which of the following actions should you take?
You should consider uninstalling the printer driver
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
A network user, named Rory Allen, is a member of a group named KingAccess and currently uses a shared workstation. Rory Allen recently informed you that the computer has a folder, named RAllen, and wants you configure the permissions on the RAllen folder.
You have to make sure that the permissions are customized to allow Rory Allen to delete all files, and alter permissions on the RAllen folder. Furthermore, the permissions should give the members of the KingAccess group the ability to create files in the RAllen folder. However, members of the KingAccess group should only be allowed to delete files from the RAllen folder that they created.
You should consider having Rory Allen assigned to the Full Control permission whilst assigning the Write permission to the KingAccess group
You have a computer that runs Windows 7.
A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users.
What should you do?
From the printer’s properties, assign the Print permission to the Sales group
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The network contains a data file server named ABC-SR03 which contains ABC_Data shared folder and running Windows Server 2008 operation system. You have been assigned a client computer named ABC-WS680 running Windows 7 Operating System.
You need to ensure the availability of the files in ABC_Data share and maintain encryption even when ABC-SR03 has been disconnected from the network. How can you accomplish this task? (Choose 2)
-By making ABC_Data available offline on ABC-WS680
-By enabling encryption of offline files on ABC-WS680.
You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share. You need to identify whether you are working on an offline version of a file. What should you do?
From Windows Explorer, select the file and then click the toolbar
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The ABC.com network contains a workstation, named ABC-WS680, which you have attached to a printer named PRINTER01. You then install the printer drivers, and remove the Everyone group from the access control list (ACL) for PRINTER01 before sharing the printer. You need to ensure that print jobs produced by employees belonging to a group named ABC_STAFF, are able to alter those print jobs. They should not, however, have the ability to alter print jobs produced by other ABC.com employees. Which of the following actions should you consider?
You should consider including the ABC_STAFF group in the ACL
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com currently makes use of a stand-alone computer named ABC-WS680 that runs Microsoft Windows 7. ABC-WS680 contains a single partition and is used by two ABC.com users named Rory Allen and Kara Lang.
Due to the security requirements of ABC.com Rory Allen is encrypting the files by using Encrypting File System (EFS). Rory allen reports that he has provided access and assigned the encrypted files to Kara Long?During the course of the day Kara Lang needs to access to the encrypted files. However, Kara Lang is unable to access the encrypted files.
How should you ensure that Kara Lang is able to access the encrypted files of Rory Allen?
By having Kara Lang to encrypt the files after logging into ABC-WS680
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
You have a desktop workstation in the office and a laptop for in the field. You then make use of the Advanced Sharing feature to create a shared folder on your desktop workstation. You want to make sure that automatic caching occurs when the shared folder is accessed from your laptop.
Which of the following actions should you take?
You should consider altering the properties of the shared folder on your desktop workstation
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
during the course of the day you receive instruction from ABC.com to find out which computer policy setting can be used in order to deny the network users execute, write and read access for a removable hard drive along with any other types of storage devices for security reasons.
Which of the following is the easiest way to achieve this?
You should consider making use of the All Removable Storage Classes: Deny All Access computer policy setting
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has recently deployed a workstation, named ABC-WS01, which hosts a shared folder. You have been instructed to configure a strategy that allows workstations on the Intranet to access the shared folder by connecting via Remote Desktop. You have also been informed that the shared folder should not be accessible to workstations that connect to the ABC.com network remotely from the Internet. Which of the following actions should you take?
You should consider configuring the Network Location to Private on ABC-WS01
You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. You discover that Windows is unable to install the necessary device drivers for the mobile device. You need to ensure that you can synchronize the file to the mobile device. What should you do?
From Devices and Printers, right-click the device and click troubleshoot.
You have a portable computer that runs Windows 7. This computer is joined to the domain. Multiple users log on to the computer. You need to prevent the computer from displaying the username of the last user who logged on. What should you do?
From the local computer policy, modify the local security policy
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.
ABC.com has a workstation, named ABC-WS13, which is configured to host a shared folder.
ABC.com has instructed you to make sure that you and your fellow administrators are the only users who are allowed to shut ABC-WS13 down.
To achieve this, you are required to make changes to the User Rights Assignment.
What action should you take?
You should consider accessing the local computer policy
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has recently deployed a workstation, named ABC-WS01, which hosts a shared folder. you have been instructed to configure a strategy that allows workstations on the Intranet to access the shared folder by connecting via Remote Desktop. You have been instructed to congirue a strategy that allows workstations on the Intranet to access the shared folder by connecting via Remote Desktop. You have also been informed that the shared folder should not be accessible to workstations that connect to the ABC.com network remotely via the Internet. Which of the following actions should you take?
You should consider configuring the network location to Private on ABC-WS01
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The ABC.com network contains a workstation, named ABC-WS680, which you have attached to a printer named PRINTER01. You then install the printer drivers, and remove the Everyone group form the ACL for PRINTER01 before sharing the printer. You need to ensure that print jobs produced by employees belonging to a group named ABC_STAFF, are able to alter those print jobs. They should not, however, have the ability to alter print jobs produced by other ABC.com employees.
Which of the following actions should you take?
You should consider including the ABC_STAFF group in the ACL
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has recently deployed a workstation, named ABC-WS01, which hosts a shared folder. You have been instructed to configure a strategy that allows workstations on the Intranet to access the shared folder by connecting via Remote Desktop. You have also been informed that the shared folder should not be accessible to workstations that connect to the ABC.com network remotely via the Internet.
Which of the following actions should you take?
You should consider configuring the Network Location to Private on ABC-WS01
You have a portable computer named Computer1 and a desktop computer named Computer2. Both computers run Windows 7.
On computer 2, you create a share named Share1 by using Advanced Sharing feature.
You need to ensure that when you connect to Share1 from Computer1, the files that you open are automatically cached.
What should you do?
On Computer2, modify the properties of Share1
A Remote Assistance session is established with a user’s computer that runs Windows 7 Enterprise.
You need to verify that a local file is encrypted with the EFS.
What should you use to accomplish this goal?
The Folder Properties Window
You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below:
The Disk Management Console (See the exhibit below).

The system Properties Window (See below)

The System protection for Local Disk C window (See Below)

You share your Documents library over a network. You discover that one of the fiels in the library was replaced with a previous version and then renamed. You need to restore the most recent version of the original file.
What should you do?

Copy the file from a previous version of a folder
A company has client computers that run Windows 7 Enterprise. A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. You need to verify that the folder is not encrypted with the EFS.
What should you use to accomplish this goal?
The Folder Properties Window
You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create a new NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do?
From System Properties, configure the System Protection settings
A company has client computers that run Windows 7 Enterprise.
A user has saved files in a C:|Users folder that coworkers must be able to read and edit. However, when coworkers try to edit those fiels, they get an “Access Denied” error.
You need to configure new NTFS permissions for the user’s C:Users folder to ensure that the coworkers have access to write to that folder.
Which two choices should you use to achieve this goal?
-The Folder Properties window
-The Icacls command
A company has client computers running Windows 7 Enterprise. You need to configure new NTFS permissions to ensure that only the specified user has access to write to a give folder.
What should you do to achieve this goal?
(Choose two)
-The Icacls command
-The Folder Windows Properties window
You have a computer that runs Windows 7. The computer is a member of an Active Directory domain and has a shared printer. Users report that they can print to the shared printer, but they cannot delete their print jobs.
You need to ensure that users can delete their own print jobs.
What should you do?
Assign the Manage Documents permission to CREATOR OWNER
You have a computer that runs Windows 7. You need to connect to a network projector from the computer.
what should you do?
Run Netproj.exe and provide the path to the projector
A user named User1 uses a shared computer that runs Windows 7.
User1 is a member of a group named Group1. The computer contains a folder named Folder1. You need to configure the permissions on Folder1 to meet the following requirements:
-User1 must be allowed to delete all files in Folder1.
-Members of Group1 must be able to create files in Folder1.
-All other members of Group1 must be able to create files in Folder1.
-All uses must be prevented from modifying the permission on Folder1.

What should you do?

Assign Group1 the Write permission. Assign User1 the Modify permission.
You install a local printer on a computer. You share the printer. You need to ensure that only members of a local group named Group1 can print documents on the printer. Which settings should you modify on the printer?
Security
Your company has an Active Directory domain and several branch locations. A Group Policy Object (GPO) exists for each branch office and for the main office. Compute accounts for computers used by sales employees are located in the Sales-Computers organizational unit (OU). The sales employees use portable computers that have Windows 7 Enterprise installed. Employees report that teh documetns that must be printed are sent to printers in their home office when they travel to the different branch offices. You need to ensure that documents are printed automatically to the correct printer when the sales employees travel to a branch office. What should you do first?
From Devices and Printers, select the Change my default printer when I change networks.
Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office.
You have a portable computer named Computer1 that runs Windows 7.
Computer1 is joined to the domain and is located in a branch office. A files server named Server1 contains a shared folder named Share1.
You need to configure Computer1 to meet the following requirements:
-Minimize network traffic between the main office and the branch office
-Ensure that Computer1 can only access resources in Share1 while it is connected to the network
What should you do?
On Computer1, enable transparent caching
You company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office. You need to configure printing on the computer to meet the following requirements:
-When you are located in the main office, all documents must automatically print to the main office printer.
-When you are located in the branch office, all documents must automatically print to the branch printer.
What should you do?
From Devices and Printers, configure the Manage Default Printers settings
You have a computer that runs Windows 7. Four users share the computer.
You create a folder named C:data.
The Users group has Full Control permissions to the folder.
You need to configure security on the folder to meet the following requirements:
-Allow users to create files
-Allow users to delete files that they create
-Prevent users from deleting files created by others.
What should you do?
Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission
You have a computer that runs Windows 7. The computer is a member of a domain.
You share D:data as Data. You assign Everyone Full Control share permissions to the folder. No other share permissions are assigned to the folder.
From another computer, you attempt to create a file in the Data share by using a domain account named User1.
You receive the following error message:
“Destination Folder Access Denied.”

You need to ensure that you can create files in the Data share by using User1 account. What should you do?

Assign User1 Write NTFS permission on the D:data folder
You have a computer that runs Windows 7.
You view the properties of a file on the computer as shown in the exhibit (see below).

You need to ensure that you can configure permission on the file.
What should you do?

Move the file to a disk that has the NTFS file system
A user named User1 uses ashared computer that runs Windows 7. User1 is a member of a group named Group1. The computer contains a folder named Folder1. You need to configure the permissions on Fodler1 to meet the following requirements:
-Use1 must be allowed to delete all files in Folder1.
-Members of Group1 must be able to create files in Folder1
-All other members of Group1 must be prevented from deleting files they did not create in Folder1.
-All users must be prevented from modifying the permissions on Folder1.

What should you do?

Assign Group1 the Write permission.
Assign User1 the Modify permission.
A company has client computers that run Windows 7 Enterprise. You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder. What should you use to achieve this goal? (Choose two)
-The Folder Properties Window
-The Icacls command
Your company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office. You need to configure printing on the computer to meet the following requirements:
-When you are located in the main office, all documents must automatically print to the main office printer.
-When you are located at the branch office, all documents must automatically print tot he branch office printer.
What should you do?
From Devices and Printer, configure the Manage Default Printers settings
A company has client computers that run Windows 7 Enterprise.
A user has saved files in a C:Users folder that coworkers must be able to read and edit. However, when coworkers try to edit those files, they get an “Access Denied” error.
You need to configure new NTFS permissions for the user’s C:Users folder to ensure that the coworkers have access to write to that folder.
Which two choices should you use to achieve this goal?
-The Icacls command
-The Folder Properties Window
You use a desktop compute that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown below.

The Disk Management Console

The System Properties Window

The System protection for Local Disk C window

You share your Documents library over a network. You discover that one of the files in the library was replaced with a previous version and then renamed. You need to restore the most recent version of the original file.

what should you do?

Copy the file from a previous version of a folder
Your company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office.
You need to configure printing on the computer to meet the following requirements:
-When you are located in the main office, all documents must automatically print to the main office printer.
-When you are located in the branch office, all documents must automatically print to the branch office printer.
What should you do?
From Devices and Printer, configure the Manage Default Printers settings
A company has client computers that run Windows 7 Enterprise.
You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder.
What should you use to achieve this goal?
-The Folder Properties window
-The Icacls command
You have a computer that runs Windows 7.
You view the properties of a file on the computer as show in the exhibit.

You need to ensure that you can configure permissions on the file.
What should you do?

Move the file to a disk that has the NTFS file system
You have a computer that runs Windows 7.
You view the properties of a file on the computer as show in the exhibit.

You need to ensure that you can configure permissions on the file.
What should you do?

Move the file to a disk that has the NTFS file system
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer. All other users must have access tot he removable drivers.
what should you do?
From the local Group Policy, modify a removable storage access policy.
You have a computer that runs Windows 7. The computer contains a folder named C:data. You use Advanced Sharing to share C:data by using the default share permissions. When a user tires to access the share over the network, he gets an Access is Denied error message.
You need to ensure that the user can access the share.
What should you do?
From the Security settings of the folder, assign the user the Read NTFS permission.
You have a computer named Computer1 that runs Windows 7.
Computer1 has a shared printer.
You need to configure Computer1 so that only Administrators are authorized to shut down the computer.
What should you do?
From the local computer policy, modify the User Rights Assignment
Which of the following best describes how the user is alerted with information system and configuration alerts?
A flag in the task bar with a red”X” indicates there is a problem needing attention
You use a computer that has Windows 7 SP1 installed.
the computer has a shared folder named C:Software. User1 is a local user account on the computer. The account is a member of several groups that have access to the C:Software folder.
You need to verify whether User1 can save files to C:Software.
What should you do?
Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C:Software folder
You have a computer named Computer1 that runs Windows 7.
Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1.
A group named HRUsers is a member of the Remote Desktop Users Group. Only HRUsers has access to Printer1.
A user named user1 is a member of HRUsers.
You need to configure the comptuer to meet the following requirements:
-Allow User1 to print to Printer1
-Prevent User1 from establishing Remote Desktop sessions to Computer1.
-Allow other members of HRUser to connect to Computer1 by using Remote Desktop.
What should you do?
Assign User1 the Deny log on through Remote Desktop Services user right.
You use a computer that has Windows 7 SP1 installed and has a folder named C:Data. The active network connection for the computer is configured as Public.
You assign User1 to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder. User1 browses to the shared folder across the network and receives the following error message: “Access is Denied.”

You need to ensure that the user can download files from the shared folder.

What should you do?

From the Advanced Sharing settings of the folder, assign the Read share permission to User1.
In windows 7 you can control when users such as kids can log in to Windows 7.
Which of the following best describes where to configure this option?
Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions.
ou use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
• The Disk Management console
• The System Properties window
• The System protection for Local Disk C window
you share your Documents library over a network. You discover that one of the files was deleted from the library by a network user.
You need to restore the most recent version of the deleted file.
What should you do?
Copy the file from a previous version of a folder.
A user named User1 uses a shared computer the runs Windows 7. User1 is a member of a group named Group1. The computer contains a folder named Folder1. The permissions for the User are shown in the User1 Permissions Exhibit (See below).
The permissions for Group1 are shown in the Group1 Permissions exhibit (See below).
You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1.
What should you do?
On Folder1, remove the Deny – Write permission for Group1
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit).
You share a printer named Printer1 on Computer1.
You need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer Properties?
Modify the Additional Driver Settings
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache.
You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server.
Which firewall rule should you enable on the client computers?
BranchCache – Content Retrieval (Uses HTTP)
You have a computer that runs Windows 7. You need to ensure that all users are required to enter a username and password when uninstalling applications from the computer. What should you do from Local Group Policy Editor?
Modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode settings
You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below.
The Disk Management Console (See the exhibit below.)
The System Properties window (See the exhibit below.)
The System protection for Local Disk C window (See the exhibit below.)
You share the Picture library over a network.
You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password.
You need to open the image file.
What should you do?
Copy the file from a previous version of a folder
You use a client computer named Accounting that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as Printer1.
An accounting users group is a member of the local Remote Desktop Uses group on the computer. Only the Accounting Users group has access to Printer1. A user named User1 is a member of Accounting Users.
You need to configure the computer to meet the following requirements:
-Prevent User1 from establishing Remote Desktop sessions to the Accounting computer.
-Allow other members of Accounting users to connect to the Accounting computer by using Remote Desktop.
Ensure that User1 can access Printer1. What should you do?
Assign the Deny log on through Remote Desktop Services user right to User1.
You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing.
You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer.
You need to achieve the following goals:
-Prevent members of the Marketing group from modifying the print jobs of other users.
-Ensure that members of the Marketing group can modify the print jobs that they submit.
What should you do?
From the printer properties, assign the Print permission to the Marketing group
which of the following is not a rating for games in Windows 7?
General Audience (G)
You use a computer that has Windows 7 SP1 installed.
The computer has a shared folder named C:Software. User1 is a local user account on the computer. The account is a member of several groups that have access to the C:Software folder.
You need to verify whether User1 can save files to C:Software.
What should you do?
Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C:Software folder.
Which of the following best describes how the user is alerted with information system and configuration alerts?
A flag in the taskbar with a red “X” indicates there is a problem needing attention.
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit).
You share a printer named Printer1 on Computer1.
You need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer Properties?
Modify the Additional Drivers settings
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer.
All other users must have access to the removable drives.
What should you do?
From the local Group Policy, modify a removable storage access policy.
You have a computer that runs Windows 7. The computer contains a folder named C:data.
You use Advanced Sharing to share C:data by using the default share permissions.
When a user tries to access the share over the network, he gets an Access is Denied error message.
You need to ensure that the user can access the share.
What should you do?
From the Security settings of the folder, assign the user the Read NTFS permission
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit).
You share a printer named Printer1 on Computer1.
You need to ensure tath any user can automatically download and install the drivers for Pritner1.
What should you do from Printer PropertiesYou need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer PropertiesChoose one answer.
a. Assign the Manage this printer permission to the Domain Users group. Incorrect
b. Install a new driver. Incorrect
c. Modify the Additional Drivers settings. Correct
d. Enable bidirectional support. Incorrect
Incorrect
Marks for this submission: 0/1.
Modify the Additional Drivers Settings
You have a computer named Computer1 that runs Windows 7.
Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1.
A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1.
A user named User1 is a member of HRUsers.
You need to configure the computer to meet the following requirements:
-Allow User1 to print to Printer1.
-Prevent User1 from establishing Remote Desktop sessions to Computer1
-Allow other members of HRUsers to connect to computer1 by using Remote Desktop.
What should you do?
Assign User1 the Deny log on through Remote Desktop Services user right.
You have a computer that runs Windows 7. The computer contains a folder named C:data.
You use Advanced Sharing to share C:data by using the default share permissions.
When a user tries to access the share over the network, he gets an Access is Denied error message.
You need to ensure that the user can access the share.
What should you do?
From the Security Settings of the folder, assign the user the Read NTFS permission
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit).
You share a printer named Printer1 on Computer1.
You need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer Properties?
Modify the Additional Drivers settings
You have a computer named Computer1 that runs Windows 7.
Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1.
A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1.
A user named User1 is a member of HRUsers.
You need to configure the computer to meet the following requirements: Allow User1 to print to Printer1.
Prevent User1 from establishing Remote Desktop sessions to Computer1.
Allow other members of HRUsers to connect to Computer1 by using Remote Desktop.
What should you do?
Assign User1 the Deny log on through Remote Desktop Services user right.
You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to run Windows 7.
You are in the process of adding a new computer named ABC-WS16 with an IP address subnet. After the installation you discover that you are unable to connect to the other computers on the network, however, the other computers are able to make a connection to each other. You run the ipconfig command on ABC-WS16 and verify that IPv4 address is 169.254.25.32. How can you allow the connectivity of ABC-WS16 to the all other computers present within the network
This can be accomplished by having a static TCP/IP address configured.
Your network consists of an Active Directory domain named contoso.com.
You have a computer named Computer1.contoso.com.
Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer using the name dev.contoso.com.
Which type of record should you request?
AAAA
You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. The ABC.com network is configured to make use of IPv6.
You are responsible for managing a computer named ABC-WS13. You have been instructed to generate a DNS record that will allow users to link up to ABC-WS13 via a sub domain, called dec.ABC.com.
You are, therefore, required to specify the necessary DNS record.
Which of the following actions should you take?
You should consider making use of AAAA
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been instructed to create a DirectAccess link for a ABC.com remote workstation.
Which of the following statements are TRUE with regards to this scenario? __________D
You should start by configuring a static IPv6 address
Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7.
You add a new computer named Computer1 to the subnet.
You discover that Computer1 has an IP address of 169.254.34.12.
You cannot connect to other computers on the network. Other computers on the network can connect to each other.
You need to ensure that you can connect to all computers on the network.
What should you do?
Configure a static TCP/IP address
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.
All ABC.com’s workstations have been configured with static IP addresses. You are preparing to configure a startup script to alter these IP addresses.
Which of the following actions should you take?
You should consider making the Netsh.exe command part of the startup script.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network is configured to use IPv6 addressing.
You have installed Windows 7 on a client computer named ABC-WS680 and have used automatic IPv6 addressing on ABC-WS680. What command can be used to help you in verifying IPv6 address of ABC-WS680?
Selecting Details from the network connection status on ABC-WS680
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 Enterprise installed, and are assigned both static and dynamic IP addresses.
Subsequent to a ABC.com DNS server being reconfigured, ABC.com users whose workstations have statically assigned IP addresses report that they are now unable to access the network servers.
You want to make sure that IP addresses and DNS server addresses are received by ABC.com’s workstations via a DHCP server.
Which of the following actions should you take?
You should consider making use of Netsh command
You have a computer that runs Windows 7.
Your network contains a DHCP server that runs Windows Server 2008 R2.
The server is configured as a Network Access Protection (NAP) enforcement point.
You need to configure the computer as a NAP client.
Which two actions should you perform?
-From Services, set the Network Access Protection Agent service Startup Type to Automatic
-From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client
You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point.
You set the starup type of NAP Agent service to Automatic on teh computer.
You need to complete the configuration of the computer as a NAP client.
What should you do?
From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command
You have a computer that runs Windows 7.
The IPv6 address of the computer is configured automatically.
You need to verify the IPv6 address on the computer.
What should you do?
From the network connection status, click Details
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com recently deployed a server, named ABC-SR01, and installed a custom network application. ABC-SR01 has two IP addresses, 192.168.45.23 and 192.168.45.24, configured.
You want to make sure that only 192.168.45.23 IP address is used by ABC-WS680 to resolve ABC-WR01.ABC.com.
Which of the following actions should you take?
You should consider having the Hosts file edited on ABC-WS680
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has recently deployed a server named ABC-SR01 configured as a DHCP server that has Network Access Protection (NAP) enforcement point configured. During the course of the day you receive instruction from ABC.com to configure a network user named Rory Allen’s workstation as a NAP client. You have set the Network Access Protection Agent service Startup Type to Automatic via the Services snap-in.
Which of the following is another action you should take?
You should consider having the DHCP Quarantine Enforcement Client enabled from the NAP Client Configuration console.
You are employed as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have created a workgroup, named ABC_GROUP, which includes7 workstations. One of these workstations, named ABC-WS680, is configured to host data files.
You want to make sure that the data files on ABC-WS680 are shared on the ABC.com network.
Which of the following actions should you take?
You should consider transferring the files to the DataLibrary, and also creating a HomeGroup on ABC-WS680
You have a computer that runs Windows 7.
The network connection details are shown in the exhibit. (See exhibit below.)

You need to manually assign an IP address of 192.168.1.50 to the computer.
What should you do first?

Enable TCP/IPv4
Your network consists of a single Active Directory domain named contoso.com.
You have a server named Server1 that runs a custom network application. Server1 has the following IP addresses:
192.168.15.10
192.168.15.11
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address.
What should you do from the computer?
Edit the hosts file
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has recently deployed two workstations, named ABC-WS01 and ABC-WS02, which are configured with the fe80::32cd:4da5%11 and fe80::26bc:2ae5%13 IPv6 addresses respectively.
During the course of the day you receive instruction from ABC.com to test the IPv6 address connection from ABC-WS01 to ABC-WS02.
Which of the following actions should you take?
You should consider executing the ping -6 fe80::26bc:2ae5%13 command
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been instructed to create a DirectAccess link for ABC.com remote workstation.
Which of the following are TRUE with regards to this scenario?
You should start by configuring a static IPv6 address
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has recently deployed a server named ABC-SR01 configured as a DHCP server that has Network Access Protection (NAP) enforcement point configured. During the course of the day you receive instruction from ABC.com to configure a network user named Rory Allen’s workstation as a NAP client. You have set the Network Access Protection Agent service Statup Type to Automatic via the Service snap-in. Which of the following is another action you should take?
You should consider having the DHCP Quarantine Enforcement Client enabled from the NAP Client Configuration Console
You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point.
You set the startup type of the NAP Agent service to Automatic on the computer.
You need to complete the configuration of the computer as a NAP client.
What should you do?
From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command
You are employed as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have created a workgroup, named ABC_GROUP, which includes7 workstations. One of these workstations, named ABC-WS680, is configured to host data files.
You want to make sure that the data files on ABC-WS680 are shared on the ABC.com network.
Which of the following actions should you take?
You should consider transferring files to the DataLibaray, and also creating a HomeGroupon ABC-WS680
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.
All ABC.com’s workstations have been configured with static IP addresses. You are preparing to configure a startup script to alter these IP addresses.
Which of the following actions should you take?
You should consider making the Netsh.exe command part of the startup script.
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com recently deployed a server, named ABC-SR01, and installed a custom network application. ABC-SR01 has two IP addresses, 192.168.45.23 and 192.168.45.24, configured.
You want to make sure that only the 192.168.45.23 IP address is used by ABC-WS680 to resolve ABC-SR01.ABC.com.
Which of the following actions should you take?
You should consider having the Hosts file edited on ABC-WS680
You have a computer that runs Windows 7.
You need to configure an application to connect to the computer by using the IPv6 loopback address.
Which address should you specify?
::1
You have two computers that run Windows 7.
Both computers are connected to a network and have IP addresses within the 172.16.10.0/24 subnet.
You need to ensure taht both computers can join a HomeGroup.
What should you do?
Set the network location to Home network
You have two computers on the same subnet.
The computers have the IPv6 addresses shown in the following table:
comp. name IPv6
Comp – 01 fe80::39cd:4c93%10
Comp – 02 fe80::44df:1b68%12

You need to test the connection to the IPv6 address from comp – 01 to comp – 02.
Which command should you run?

ping -6 fe80::44df:1b68%10
If you have a router in the network your connected to and the Default Gateway is set to 192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are usable IP addresses on that network?
192.168.1.30
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router.
You run Ipconfig as shown in the exhibit. (See exhibit below.)

Other users on the network receive IPv6 addresses for ISATAP.
You need to ensure that your comptuer receives an IPv6 address for ISATAP.
What should you do?

Start the IP Helper service
You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network.
You run the ipconfig.exe command as shown in the exhibit. (See exhibit below.)

You need to establish a DirectAccess connection to a DirectAccess server.
What should you do first?

Enable IPv6 on the network adapter
You have two computers named Computer1 and Computer2 that run Windows 7.
The network is configured as shown in the exhibit. (See exhibit below.)

What should you do? Yo need to ensure that both computers can connect to the Internet.

On both computers, set the default gateway to 12.168.0.254
You have a computer that runs Windows 7. IPv6 is disabled on the computer.

The computer has the following IPv4 settings:
IP address: 10.1.1.193
Subnet mask: 255.255.0.0
Default gateway: 10.1.1.194
Preferred DNS server: 10.1.1.195

You need to ensure that the computer can only communicate with computers on the local subnet.
What should you do?

Delete the default gateway address
Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group Policy. A user indicates that he is unable to connect to a remote FTP server.
You need to view the status of TCP/UDP ports at the user’s computer.
Which command should you run?
Netstat -an
You have a computer named Computer1 that runs Windows 7.
You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.
The network configuration for Computer1 is shown in the exhibit. (See exhibit below.)
You attempt to connect to Server1Share1 and receive the following error message: “Windows cannot access Server1Share1.”

From Computer1, you successfully ping Server1.
You need to connect to Server1Share1.
What should you enable on computer1?

Client for Microsoft Networks
Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (See exhibit below.)

In the branch office, you deploy a new computer named Computer1 that runs Windows 7. You need to assign an IP address to Computer1.
Which IP address should you use?

192.168.2.40
Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically.
The DNS and WINS servers on the company network have been taken offline for upgrades. Users report they can no longer access the Internet. You need to provide access to the Internet for the computers during the maintenance.
What should you do?
change the IP address of the primary DNS to public DNS
You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet.
You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0.
You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0.
You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.10.210 on Perth fails to locate the Brisbane computer’s Ipv4 address.
What is the likely reason for this lack of connectivity?
You need to permit ICMPv4 traffic through the firewalls of both computers.
You have a workgroup that contains five computers. The computers run Windows 7. A computer named Computer1 has video and audio files.
You need to share Computer1’s video and audio files on the network.
Which two actions should you perform?
-Create a HomeGroup
-Move the files to a Media Library
You have a computer named Computer1 that runs Windows 7.
You have a server named Server1 that runs Windows Server 2008. Computer1 and Server1 have IPv4 and IPv6 installed.
You need to identify whether you can connect to Server1 by using IPv6.
What should you do?
Run Ping Server1 -6
A computer that runs Windows 7 becomes infected with malware.
You scan the computer, remove all detected malware components, and restart the computer.
When you attempt to connect to a financial institution’s Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site.
You need to prevent the computer from being redirect tot he potential phishing site.
What should you do?
Modify the hosts file
You administer 80 computers that run Windows 7.
The computers have static IP addresses.
You need to change the static IP addresses on all the computers by using a startup script.
Which command should you include int eh Startup script?
Netsh.exe
You have a computer that runs Windows 7.
You need to configure an application to connect to the computer by using the IPV6 loopback address.
Which address should you specify?
::1
You have two computers on the same subnet.
The computers have the IPv6 addresses shown in the following table:

Computer
Name IPv6
Computer1 fe80::39cd:4c93%10
Computer2 fe80::44df:1b68%12

You need to test the connection to the IPv6 address from computer1 to computer2.
what command should you run?

Ping -6 fe80::44df:1b68%10
You have a computer named Computer1 that runs Windows 7.
You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.
The network configuration for Computer1 is shown in the exhibit. (See exhibit below.)

You attempt to connect to Server1Share1 and receive the following error message:
“Windows cannot access Server1Share1.”

From computer1, you successfully ping Server1.
You need to connect to Server1Share1.
What should you enable on Computer1?

Client for Microsoft networks
Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically.
The DNS and WINS servers on the company network have been taken offline for upgrades. Users report that they can no longer access the Internet.
You need to provide access to the Internet for the computers during the maintenance.
What should you do?
Change the IP address of the primary DNS to a public DNS
You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet.
You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0.
You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0.
You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.10.210 on Perth fails to locate the Brisbane computer’s IPv4 address.
What is the likely reason for this lack of connectivity?
You need to permit ICMPv4 traffic through the firewalls of both computers
You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network.
You run the ipconfig.exe command as shown in the exhibit. (See exhibit below.)

You need to establish a DirectAccess connection from the computer to a DirectAccess server.
What should you do first?

Enable IPv6 on the network adapter
You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network.
You run the ipconfig.exe command as shown in the exhibit. (See exhibit below.)

You need to establish a DirectAccess connection from the computer to a DirectAccess server.
What should you do first?

Enable IPv6j on the network adapter
Your network contains a wireless access point. You have a computer that runs Windows 7.
The computer connects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wireless access point.
You discover that you are now unable to connect to the wireless access point from the Windows 7 computer
You need to ensure that the computer can connect to the wireless access point.
What should you do?
From Network and Sharing Center, modify the wireless network connection settings
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1.
you need to configure Computer2 to connect to Network1 by using the same settings as Computer1.
What should you do on Computer1?
From the wireless network properties of Network1, copy the network profile to a USB flash drive.
You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a Virtual Private Network server named ABC-SR01 that is configured to run Windows Server 2008. You are responsible for a computer named ABC-WS10 that is configured to run Windows 7. During the course of the day you receive an instruction from the CIO to make use of a smart card for authentication of ABC-SR01 in order to establish connectivity to ABC-SR01.
What should you do?
Your best option would be to make use of EAP
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
The ABC.com network contains a wireless access point (WAP) that uses Advanced Encryption Standard (AES) security but a pre-shared key has not been configured on the wireless access point. How should you connect a mobile computer named ABC-WS680 to the wireless access point?
You should use WPA2-Enterprise for the wireless connection
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been assigned a workstation, named ABC-WS13. You have been instructed to make sure that, while browsing, Internet Explorer is unable to store any browsing information. Which of the following actions should you take?
You should consider selecting the Delete Browsing History on Exit option from the General tab of Internet Options
Your office contains the wireless networks shown the following table:

Network Name Network Configuration
Network1 802.11b
Network2 802.11g
Network3 802.11n

You have a portable computer that runs Windows 7. The computer successfully connects to all of the wireless networks.
You discover that when you start the computer, it connects to network2.
You need to ensure that the computer connects to Network3 by default.
What should you do?

From Network Sharing Center, modify the Manage wireless Networks settings
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been assigned a workstation, named ABC-WS13, which links up to a ABC.com wireless access point. After deactivating the Service Set Identifier (SSID) broadcasts on the wireless access point, you are no longer able to connect to the wireless access point.
Which of the following actions should you take to restore the connection?
You should consider accessing the Network and Sharing Center to make changes to the wireless network connection settings
You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security.
A pre-shard key is not configured on the wireless access point.
You need to connect a computer that runs Windows 7 to the wireless access point.
Which security setting should you select for the wireless connection?
WPA2-Enterprise
You have two portable computers that run Windows 7.
The computers are not connected to a network.
The computers are configured as shown in the following table:

You need to transfer a 1 GB file from Computer1 to Computer2. What should you do first?

On Computer1, create a wireless ad hoc network.
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1.
You need to configure Computer2 to connect to Network1 by using the same settings as Computer1.
What should you do on Computer1?
From the wireless network properties of Network1, copy the network profile to a USB flash drive
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1. During the course of the day Rory Allen attaches a USB hard drive to ABC-WS680 and cannot enable BitLocker To Go on the USB hard drive. How can you allow Rory Allen so that he can execute BitLocker To Go?
You should consider upgrading ABC-WS680 to Microsoft Windows 7 Ultimate
You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
The ABC.com network contains several File servers. You want to make sure that when your workstation, named ABC-WS680, is connected to a private network it can only connect to ABC.com’s File servers.
Which of the following actions should you take?
You should consider creating a new rule via the Windows Firewall with Advanced Security Policy on ABC-WS680
ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers run Windows 7. ABC.com has multiple custom applications that are digitally signed. For security purposes ABC wants you to devise a security policy that will only enable company approved digitally signed applications to be executed.
Which of the following options would achieve this?
Your best option would be to have an AppLocker executable rule created
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network has Windows 7 installed.
You are assigned to a workstation that has many operators. You then configure a shared folder on the workstation, and configure it to have auditing enabled.
You want to make sure that a log is recorded whenever the shared folder is opened.
Which of the following actions should you take?
You should consider having the Audit object access setting configured via the local Group Policy
You are employed as the network Administrator at ABC.com. The ABC.com network client computers currently make use of Microsoft Windows XP Professional. ABC.com has recently decided to have the client computers upgraded to Microsoft Windows 7.
You receive a complaint from a ABC.com user named Mia Hamm stating that she is unable to find the games included with Windows 7.
How can you proceed to install games on Mia Hamm’s computer?
Install the games by going to Control Panel > Programs, then clicking the option Turn Windows features on or off
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com has recently installed and configured a file and data server named ABC-SR01 on the network.
A network user named Rory Allen makes use of a computer named ABC-WS01 and tried connecting to ABC-SR01 using an account named RAllen unsuccessfully.
How can you ensure the account named KingAdmin is used for authentication when connecting to ABC-SR01?
You should consider using the Add a Windows credential from Credential Manager on ABC-WS01
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The Research and Development department is working on a confidential project. The hard disks of ABC.com’s workstations have BitLocker configured for data encryption. The BitLocker password is stored on a USB drive. All encrypted workstations make use of Trusted Platform Model (TPM) chips on their motherboards.
A member of the Research and Development department, named Amy Wilson, has been assigned a workstation named ABC-WS680. Amy Wilson has been reports that she is not able to start ABC-WS680 due to a problematic TPM chip.
You have been instructed to recover the encrypted data from ABC-WS680.
Which of the following actions should you take?
You should consider making use of the BitLocker password from to access the BitLocker Drive Encryption Recovery console on ABC-WS680
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers run Microsoft Windows 7.
You are assigned a client computer named ABC-WS680. How would you change the file extensions on ABC-WS680 that are linked to Internet Explorer?
By opening Default Programs and selecting Set Associations from the Control Panel
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been assigned a workstation, named ABC-WS13. You want to start an application using the Runas command-line tool, with the /savecred parameter.
You want to make sure that the stored password is removed.
How would you accomplish this task?
You should consider making use of Credential Manager to alter the Windows credentials.
You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All computers on the ABC.com network are configured to run Windows 7. You are int he process of identifying the various ratings for games in Windows 7.
What will you find? (choose three)
-You will find the Teen (T) rating in Windows 7
-You will find the Everyone (E) rating setting in Windows 7
-You will find the Adults Only (AO) rating setting in Windows 7.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com currently makes use of a computer named ABC-WS680 which runs Microsoft Windows 7. ABC-WS680 is currently used by multiple ABC.com network users who log on to the computer.
You have received instruction to deny a ABC.com user Mia Hamm access to removable devices on ABC-WS680. However, all other users who log on to ABC-WS680 must retain access to removable devices.
What should you do?
You should consider accessing the local Group Policy on ABC-WS680 to altering a removable storage access policy.
You work as a desktop support technician at a company named ABC.com. All ABC.com users are divided into groups named ABC_ADMIN, ABC_SUPRT and ABC_STAFF.
The ABC.com network contains a stand-alone Windows 7 computer named ABC-WS680. Several ABC.com users make use of ABC-WS680.
You need to prevent the ABC.com users of the ABC_STAFF group from running Windows Media Player on ABC-WS680. However, all other members must still be able to run Windows Media player. You want to accomplish this task by using the least amount of administrative effort.
Which of the following actions should you take?
You should consider creating an executable rule on ABC-WS680 via AppLocker
ABC.com has hired you as a network Administrator for their network. A ABC.com user named Rory Allen is a senior manager in the Marketing department. You receive a request from Rory Allen to ensure that his children are only able to log in to Windows 7 at certain times.
how would you do this?
Your best option would be to go to the Start then Control Panel. Then you should go to User Accounts and Family Safety and select Setup Parental Controls. Thereafter Time Restrictions can be set.
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
ABC.com has two offices, named Detroit and Miami, which are located on an isolated private wired Class C subnet. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
The two offices have the IP configuration shown below:
OfficeWorkstationIPv4 Address
DetroitABC-WS07192.168.34.140
MiamiABC-WS13192.168.34.210
during your routine maintenance, you ping Detroit’s IPv4 address and the command times out. You then try pinging Miami’s IPv4 address and meet with the same result.
You have been tasked with rectifying the problem.
Which of the following actions should you take?
You should consider having the firewalls on both workstations to allow ICMPv4 traffic to pass through it.
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com currently has an internal Web site that uses HTTPS and has a self-signed certificate.
A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web site. During the course of the day you receive complaints from Rory Allen that he receives the error message while browsing the website even when he is using HTTPS. The details of the message are below:
“There is a problem with the website’s security certificate.”
What can you do to solve the problem?
You should consider having the Website’s certificate imported into the Trust Root Certification Authorities store using Certificate Manager.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
ABC.com has two workstations, named ABC-WS13 and ABC-WS14. You are currently able to retrieve files that are encrypted using Encrypting File System (EFS) for all ABC.com’s domain users from ABC-WS13. You have been instructed to make sure that you are able to do the same from ABC-WS14.
Which of the following actions should you take?
-You should consider exporting the data recovery agent certificate from ABC-WS13
You should consider importing the data recovery agent certificate from ABC-WS13
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Microsoft Windows 7.
ABC.com issues a new usage policy that prevents ABC.com users from installing removable disk devices on their computers. You need to ensure that the policy is implemented.
What should you do?
You should enable the ‘Prevent installation of removable devices’ group policy settings
ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network workstations are configured to run Windows 7.
You are assigned a computer named ABC-SR05. During the course of the day you receive instruction from the CIO to identify the applications that were installed on ABC-SR05 the previous week. You need to gather this information as soon as possible.
Which of the following actions should you take?
You can locate this information by reviewing the information events from the Reliability Monitor, and by viewing all events in the Applications Log in Event Viewer
You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been instructed to make sure that ABC.com’s ises are able to perform enterprise searches from their workstations. Which of the following actions should you take?
You should consider downloading an appropriate .osdx file from a legal resource to install Federated Search connectors
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains an internal Web site that uses Integrated Windows Authentication.
A ABC.com user named Amy Walsh has been assigned a workstation named ABC-WS680 that is running Windows 7. Amy Walsh reports that she is prompted for authentication when she attempts to access the internal Website. You verify that Amy Walsh’s user account has permission to access the internal Website. You need to make sure that authentication occurs automatically when Amy Walsh attempts to connect to the website.
How would you accomplish this task?
You should consider configuring the Local Internet zone on ABC-WS680 to host the Website’s URL.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers run Microsoft Windows 7.
You are assigned a client computer named ABC-WS680. How would you change the file extensions on ABC-WS680 that are linked to Internet Explorer?
By opening Default Programs and selecting Set Associations from the Control Panel
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
A ABC.com user named Rory Allen uses of a Microsoft Windows 7 Professional client computer named ABC-WS680. During the course of the day Rory Allen attaches a USB hard drive to ABC-WS680 and cannot enable BitLocker To Go on the USB hard drive. How can you allow Rory Allen so that he can execute BitLocker To Go?
You should consider upgrading ABC-WS680 to Microsoft 7 Ultimate.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network has Windows 7 installed.
You are assigned to a workstation that has many operators. You then configure a shared folder on the workstation, and configure it to have auditing enabled.
You want to make sure that a log is recorded whenever the shared folder is opened.
Which of the following actions should you take?
You should consider having the Audit object access setting configured via the local Group Policy
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
A ABC.com user named Rory Allen uses of a Microsoft Windows 7 Professional client computer named ABC-WS680. During the course of the day Rory Allen attaches a USB hard drive to ABC-WS680 and cannot enable BitLocker To Go on the USB hard drive. How can you allow Rory Allen so that he can execute BitLocker To Go?
Upgrade ABC-WS680 to Microsoft Windows 7 Ultimate
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers run Microsoft Windows 7.
You are assigned a client computer named ABC-WS680. How would you change the file extensions on ABC-WS680 that are linked to Internet Explorer?
By opening Default Programs and selecting Set Associations from the Control Panel
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been assigned a workstation, named ABC-WS13. You want to start an application using the Runas command-line tool, with the /savecred parameter.
You want to make sure that the stored password is removed.
How would you accomplish this task?
Use Credential manager to alter the Windows Credentials
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network has Windows 7 installed.
You are assigned to a workstation that has many operators. You then configure a shared folder on the workstation, and configure it to have auditing enabled.
You want to make sure that a log is recorded whenever the shared folder is opened.
Which of the following actions should you take?
Have the Audit object access setting configured via the Local Group Policy
You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
The ABC.com network contains several File servers. You want to make sure that when your workstation, named ABC-WS680, is connected to a private network it can only connect to ABC.com’s File servers.
Which of the following actions should you take?
Create a new rule via the Windows Firewall with Advanced Security Policy on ABC-WS680
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
A ABC.com user named Rory Allen uses of a Microsoft Windows 7 Professional client computer named ABC-WS680. During the course of the day Rory Allen attaches a USB hard drive to ABC-WS680 and cannot enable BitLocker To Go on the USB hard drive. How can you allow Rory Allen so that he can execute BitLocker To Go?
Upgrade ABC-WS680 to Windows 7 Ultimate
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com.
You have set up a test computer that has Windows 7 installed. You have configured a user account that belongs to the Administrators group, and a user account that belongs to the Users group. The accounts are named TestA and TestU respectively. You are then instructed to make sure that the control Panel is inaccessible to TestU and completely accessible to TestA.
Which of the following actions should you take? (choose two)
-You should consider making use of the Prohibit Access to Control Panel option via User Configuration
-You should consider configuring a local GPO, and associating it with the TestU account.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
ABC.com has a workstation, named ABC-WS36, which has a third party application installed.
You have been instructed to make sure that ABC-WS36 has a certain edition of the application installed. You then acquire the digital signature of the vendor or the application.
Which of the following actions should you take?
You should consider configuring a certificate rule via Software Restriction policies
You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
A ABC.COM user, named Kara Lang, has a manually created restore point configured on her workstation. Kara Lang has requested that a copy of a file she saved to the system drive on her workstation the day before yesterday be retrieved.
You want to achieve this with a little human input as possible.
Which of the following actions should you take?
You should consider advising Kara Lang to access the file’s properties and choosing the Previous Versions tab
You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed.
ABC.com has a workstation, named ABC-WS07, on which a HomeGroup has been created. you are then instructed to make sure that access to the HomeGroup is allowed when ABC-WS07 is linked to a private network, but prevented when ABC-WS07 is linked to a public network.
Which of the following actions should you take? (Choose TWO)
-You should consider accessing Windows Firewall to configure the HomeGroup exception to block Public networks
-You should consider accessing Windows Firewall to configure the HomeGroup exception to include Home or Work (private) networks
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.
You have been assigned to manage a workstation, named ABC-WS07. You have noticed that Internet Explorer on ABC-WS07 has ActiveX controls enabled.
You are informed that ActiveX controls should not be allowed to run in ABC-WS07’s Internet Explorer.
Which of the following actions should you take?
You should consider accessing Internet Options, and making changes on the security Tab.
You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.
A ABC.com workstation, which has EFS configured, is logged on to by numerous ABC.COM employees. Each employee is required to encrypt data on the workstation.
You have been instructed to make sure that the EFS certificate is backed up. you are preparing to run the Cipher command-line tool to complete this task. You need to include the required parameter.
Which of the following actions should you take?
You should consider using the /x parameter
Your network consists of one Active Directory domain.
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all EFS encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
A user, named Mia Hamm, is assigned to a workstation named ABC-WS07. You have been instructed to make sure Mia Hamm is allowed to update the display adapter driver on ABC-WS07.
Which of the following actions should you take?
You should consider accessing the Global Group Policy to alter the device setting for Mia Hamm.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have been instructed to make sure that a user is able to run a program that requires administrator rights. the user should not, however, be given permanent administrator rights.
Which of the following options should you take?
You should consider logging on to the user’s workstation every time the user wants to run the program, and enter your password.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com.
A ABC.com user named Rory Allen uses a Windows 7 Professional workstation named WS680. During the course of the day Rory Allen attaches a USB disk to WS680. However, Rory Allen cannot enable BitLocker To Go on to the USB disk. You need to ensure that Rory Allen can enable BitLocker To Go on the USB disk.
Which of the following actions should you take?
You should consider upgrading ABC-WS680 to Microsoft Windows 7 Ultimate
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
ABC.com has a workstation named WS07, from which users are currently uninstalling applications freely. ABC.com has released a new written policy that require all users to enter their credentials for uninstalling applications from WS07.
You have been tasked with enforcing the new policy.
Which of the following actions should you take?
You should consider configuring the Behavior of the elevation prompt for administrator’s option in the Admin Approval Mode setting of the User Account Control.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
ABC.com has a workstation that is logged on to by numerous ABC.com employees.
Each employee is required to encrypt data on the workstation. This data must, however, be accessible to you.
Which action should you take?
You should consider executing the Cipher command-line tool with the /k parameter
You have a computer that runs Windows7.
You need to prevent users from copying the unencrypted files to removable drives.
From a local Group Policy, modify the BitLocker Drive Encryption settings.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
You have configured a workgroup that includes numerous workstations. One of the workstations, named ABC-SR07, hosts ABC.com’s multimedia files.
You are required to make sure that the multimedia files are shared on ABC.com’s network.
You start by creating a Home Group.
Which of the following actions should you take?
You should consider transferring the multimedia files to a Media Library
You have a computer that runs Windows 7.
You need to prevent Internet Explorer from saving any data during a browsing session.
What should you do?
Open an InPrivate Browsing session
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed with Internet Explorer 8 (IE8) installed.
A ABC.com user, named Kara Lang, has informed you that when she tries to open a webpage she is presented with an error informing her that the web page is not rated.
You have received instructions to make sure that Kara Lang is able to open the Web page.
Which of the following actions should you take?
You should consider reconfiguring the Content Advisor settings from the Content Tab of the Internet Options window.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All servers have Winodws Server 2008 R2 installed, and workstations have Windows 7 installed.
A ABC.co workstation, which forms part of a workgroup, has a local group configured. You have since been instructed to make sure that users belonging to a local group are unable to initialize a certain application. You have also been informed that your solution makes use of as little administrator input as possible.
Which of the following actions should you take?
You should consider configuring a new application control policy.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com.
ABC.com has numerous Windows XP workstations that need to have Windows 7 installed. You have been informed that the installation should allow for the transference of all users documents and settings, but prevent audio and visual files from being transferred.
Which of the following actions should you take?
You should consider making changes to the migdocs.xml file.
You have a portable computer named Computer1 that runs Windows 7. You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.
you need to configure Computer1 to meet the following requirements:
-Ensure that cached files from Share1 are encrypted.
-Ensure that files located in Share1 are available when Server1 is disconnected from the network.
What should you do?
On computer1, make Share1 available offline and enable encryption of offline files.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations Microsoft Windows 7 installed.
The ABC.com network users currently make use of a standalone workstation for storing their encrypted data. You want to make sure that you are able to access and view this data.
Which of the following actions should you take?
You should consider executing the Cipher.exe command-line tool with the /r parameter
users are currently uninstalling applications freely on WS07.
new written policy requires all users to enter their credentials for uninstalling applications on WS07.
You have the task of enforcing the policy.
What action should you take?
Configure the Behavior of the elevation prompt for administrator’s option in the Admin Approval Mode setting of the User Account Control.
WS36 has a third party application installed.
Make sure that WS46 has a certain edition of the application installed. You then acquire the digital signature of the vendor for the application.
Which action should you take?
Configure a certificate rule via Software Restriction policies
Mia Hamm works on WS07. Need to make sure that Mia Hamm is allowed to update the display adapter driver on WS07.
Which action should you take?
Access the Global Group Policy to alter the device setting for Mia Hamm
You need to prevent Internet Explorer from saving any data during a browsing session.
Open an InPrivate Browsing session
Kara Lang has manually created a restore point on her workstation. She requested a copy of a file she saved to the system drive on her drive the day before yesterday be retrieved.
Advise Kara Lang to access the file’s properties and choose the previous versions tab.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.
A user, named Mia Hamm, is assigned to a workstation named ABC-WS07. You hve been instructed to make sure that Mia Hamm is allowed to update the display adapter driver on ABC-WS07.
which of the following actions should you take?
Access the Global Group Policy to alter the device setting for Mia Hamm
You network consists of one AD domain. You have two computers named Comp1 and Comp2 that both run Win7. Both computers are members of the domain.
From Comp1, you can recover all EFS encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Comp2.
What should you do?
On comp1, export the data recovery agent certificate. On Comp2, import the data recovery agent certificate.
You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com.
You have set up a test computer that has Win7 installed. You have a user account that belongs to the Administrators group, TestA, and a user account that belongs to the Users group, TestU. You are instructed to make sure the Control Panel is inaccessible to TestU and completely accessible to TestA.
which of the following two actions should you take?
-Use the Prohibit Access to Control Panel option via User Configuration
-Configure local GPO, and associate it with the TestU account
You have a computer named Computer1 that runs Windows7.
You need to ensure that Comptuer 1 can connect to FTP servers only while it is connected to a private network.
What should you do?
From Windows Firewall with Advanced Security, create a new rule
You have a computer that runs windows 7.
You create an EFS recovery key and certificate.
You need to ensure that your user account can decrypt all EFS files on the computer.
What should you do?
From the local computer policy, add a data recovery agent.
A company has client computers that run Windows 7 Enterprise.
You need to ensure that only signed and validated executable files are run with elevated privileges.
What should you use to accomplish this goal?
The Group Policy Management console
You have a computer that runs Windows 7.
The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs).
You need to ensure that Service1 can receive requests from Sever1.
What should you do?
From Windows Firewall with Advanced Security, create a custom Rule.
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
You have a third-party Internet Explorer toolbar installed on the computer.
You need to temporarily disable the toolbar. The solution must not affect any other installed toolbars.
what should you do?
From the Tools menus, open Manage Add-ons and modify the add-on settings
You have a standalone computer that runs Windows 7.
Multiple users share the computer.
You need to ensure that you can read the content of all encrypted files on the computer.
What should you do?
Run Cipher.exe /r and then add a data recovery agent from the local security policy
You have a stand-alone computer named Computer1 that runs Windows 7.
Several users share Computer1.
You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player.
You must achieve this goal by using the least amount of administrative effort.
What should you do?
From Application Control Policies, create an executable rule
You have a computer named Computer1 that runs Windows 7.
The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008.
You log on to the computer by using an account named User1.
You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1.
What should you do on Computer1?
From Credential Manager, select Add a Windows Credential
You have a computer that runs Windows 7.
You attempt to add files to %programfiles&app1 and receive a prompt to elevate privileges.
You need to ensure that you can add files to %programfiles%app1 without receiving a prompt to elevate privileges.
The solution must prevent harmful applications from making unwanted changes to the system.
What should you do?
modify the User Account Control (UAC) settings
You have a computer that runs Windows 7.
You run runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
From Credential Manager, modify the Windows credentials.
You work in an international company which is named Wiikigo.
Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment.
You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and so on.
You use a computer that runs Windows 7.
Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform?
The BitLocker Drive Encryption settings should be modified from a local Group Policy
Your company has an internal Web site that requires HTTPS. The Web site’s certificate is self-signed.
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
You use HTTPS to browse to the Web site and receive the following warning message.
There is a problem wit this website’s security certificate.
You need to prevent the warning message from appearing when you access the Web site.
What should you do?
From Certificate Manager, import the Web site’s certificate into your Trusted Root Certification Authorities store.
You have a computer that runs Windows 7.
You open Windows Internet Explorer and access a Web site as shown in the exhibit. (See Exhibit below.)

You click the Suggested Sites button, but the suggestions fail to display. You need to obtain suggested sites.
What should you do?

From the Start menu, open a new Internet Explorer window.
Your network has a main office and a branch office. The branch office has computers that run Windows 7.
A network administrator enables BranchCache in the main office.
You run Netsh on your computer as shown in the exhibit. (See exhibit below.)

You need to ensure that other computers in the branch office can access the cached content on your computer.
What should you do?

Modify the Windows Firewall with Advanced Security rules
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file sender has the BranchCache feature installed.
You create a shared folder on the server and enable BranchCache on the shared folder.
You discover that the users of the client computers are unable to access files in the shared folder.
You need to provide access for the users to the shared folder.
what should you do?
-Check Permissions
-NONE command
-HOSTEDCLIENT command
-HOSTED SERVER clientauthentication
-DISTRIBUTED command
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.
You need to ensure that you can copy files from the computer to the USB drive.
The solution must retain the existing files on the USB drive.
What should you do?
From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.
You have a computer that runs Windows 7 Professional.
A USB disk is attached to the computer.
You need to ensure that you can enable BitLocker To Go on the USB disk.
What should you do?
Upgrade the computer to Windows 7 Enterprise
You have a computer that runs Windows 7. You create a HomeGroup. You need to secure the HomeGroup to meet the following requirements:
Allow access to the HomeGroup when you are connected to private networks.
Block access to the HomeGroup when you are connected to public networks.
What should you do?
Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks.
You have a computer that runs Windows 7 Professional.
A removable drive is attached to the computer.
You need to protect data on the removable drive by using Bitlocker To Go.
What should you do first?
Upgrade the computer to Windows 7 Enterprise.
A company has client computers that run Windows 7 Enterprise.
You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file.
What should you use to accomplish this goal?
The Group Policy Management console
You have a computer named Computer1 that runs Windows 7.
The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008.
You log on to the computer by using an account named User1.
You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1.
What should you do on Computer1?
From Credential Manager, select Add a Windows Credential
You have a computer that runs Windows 7 Professional.
A removable drive is attached to the computer.
You need to protect data on the removable drive by using BitLocker To Go.
What should you do first?
Upgrade to Windows 7 Enterprise
You have a computer that runs Windows 7.
You create an EFS recovery key and certificate.
You need to ensure that your user account can decrypt all EFS files on the computer.
What should you do?
From the local computer policy, add a data recovery agent.
You are preparing to install a new computer on the network using image-based deployment. You have created a custom answer file named customanswer.xml.
This answer file must be applied after the image is deployed. What should you do?
Run Sysprep.exe /generalize /oobe /unattend:customanswer.xml before capturing the image
You are planning to upgrade a desktop workstation from Windows Vista to Windows 7 and therefore need to find out if there are some applications running on Windows XP which might have known problems in Windows 7.
What should you do?
You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool can be used.
You are responsible for managing a workstation named ABC-WS624. WS624 is configured to run Windows Vista and contains an accounting application named accapp.exe. ABC.com purchases a new Windows workstation that will replace WS624. How can you export the user state as well as teh settings of the accapp.exe so that it can be migrated to the Windows 7 workstation?
By modifying the migapp.xml file on ABC-WS624 and then run Scanstate.exe with the /I parameter
You are working on a Windows 7 workstation named ABC-WS680 that has not been responding properly. You had performed an image backup of WS680 last week that you now want to restore. What should you do? (Choose two)
-Run the System Image Recovery tool
-Boot ABC-WS680 from the Windows 7 DVD
Half the client computers run Windows Vista and the rest run Windows XP Professional. You are int he process of identifying the utilities that are a part of Windows PE. What should you identify?
Subinacl
ABC.com has acquired a new computer named ABC-WS25 which came with the factory settings and has no Operating System. You want to perform an installation of Windows 7 on WS25.
There is an installation of Windows 7 available on virtual hard drive in your department.
You have proceeded with creating a partition on WS25 and copying it to the Virtual Hard Drive from the Windows Pre-installation Environment (Windows PE).
What command can you use in order to boot WS25 from the Virtual hard disk?
use Diskpart.exe and Bcdboot.exe
The ABC.com netwrok contains 50 client computers that are configured with Microsoft Windows XP Professional. During the course of the day you receive an instruction from the CIO to determine which current applications installed on the client computer are compatible with Windows 7.
How can you perform this task with the least amount of time and effort?
Install Microsoft Application Compatibility Toolkit (ACT)
You are responsible for managing a desktop workstation named ABC-WS620. WS620 is configured with the following configuration of Windows. Windows Vista on the first partition and Windows 7 on the second partition, has been installed recently.
How can you set up Windows Vista as the default Operating System during the System startup?
Run Bcdedit.exe and specify the /default parameter
ABC.com is currently int he process of migrating all of its workstations to Windows7. In preparation of the migration, you have installed Windows 7 on a computer named WS680 to be used as master image. Before proceeding with the deployment of all the workstations you need to prepare an image of WS680, which will be used in deployment to all workstations on the ABC.com network.
Which tool can be used prior to the creation of image WS680?
Run System Preparation tool (Sysprep).
You are managing a desktop called WS680. it is running Windows Vista. You are wanting to change the OS to Windows 7. You have formatted the hard drive and planning to do a clean install with automated installation. How can you proceed with automated installation on WS680 while booting from Windows 7 DVD.
Create an answer file named autounattend.xml and copying it to an external hard drive.
ABC.com is currently running Windows XP Professional on its client computers. They have recently decided to deploy Windows 7 to 80 clients on the network. You decide to install Windows 7 on a computer named WS06 and want it to be an image for all the remaining computers on the network. You need to determine which step can be preformed prior to creating the image of WS06.
Run Sysprep
The ABC.com network client computers currently make use of Windows XP Professional. You receive an instruction from management to upgrade a client computer named WS25 to Windows 7. You decide to do the installation using the Win7 DVD, so you log in to WS25 an insert the DVD. What should you do next? (Choose two)
-Run Setup.exe from the DVD in order to start a clean Windows 7 install
-Make use of the autorun feature on the DVD in order to start a clean install
The company currently runs Windows XP Professional on the client computers. ABC.com has recently decided to have the client computers upgraded to Windows 7. You decide to check whether the current workstations comply with the minimum hardware requirements to be able to sue Windows 7. Which of the following are minimum requirements? (Choose three)
-1 GHZ or faster 32-bit (x86) or a 64-bit (x64) processor
-16 GB available disk space (32-bit)/20 GB (64-bit)
-DirectX 9 graphics processor with WDDM 1.0 or higher driver
You are responsible for managing a client computer named WS20. During the course of the day you receive instructions from ABC.com to identify the Windows 7 version and edition WS20 can directly upgrade to. What should you do?
Windows 7 Ultimate (x86)
The servers on the ABC.com network run Windows Server 2008 and the client computers run Windows 7. During the course of the day a network user named Dean Austin asked you which of the Microsoft OSs supports offline migration using USMT.
What should you do? (Choose 4)
-Windows XP Professional with SP2 or later
-Windows 7
-Windows Vista
-Windows XP Professional
You are assigned two workstations named WS625 and WS680. WS625 is configured to run Windows Vista and WS680 is configured to run Windows 7.
You need to perform a migration of the user data files and folders along with profiles from WS625 to WS680.
Which command can you use that can help you in calculating the space needed for the migration?
Run Scastate C:store /nocompress /p on WS625
The ABC.com network contains a client computer named WS679 with a VHD. You have isntalled Windows 7 on the VHD and want to boot WS679 from the VHD.
How do you boot WS679 from a VHD?
run Bcdedit.exe and set the Windows Boot Manager settings.
The ABC.com network client computers currently make use of Windows 7. You are assigned a client computer named WS25.
To ensure your productivity you need to perform the following 2 tasks:
-Increase the speed of physical memory
-Increase the size of physical memory
What should you do?
ReadyBoost
All workstations on ABC.com’s network have a 32-bit version of Windows Vista Business installed. You have receive instruction to migrate the current OS to a suitable version of Windows 7.
Which of the following actions should you take
Migrate to a 32-bit version of Windows 7 Professional
The client computers run Windows 7. ABC.com purchases 40 new client computers configured with 32-bit hardware.
What can you do in order to ensure an image based deployment from a custom image whilst ensuring the least amount of administration is needed?
Have Windows 7 and the company custom applications installed on one client computer
The client computers of ABC.com run Windows Vista (x86) named WS680.
How can you install Windows 7 (64-bit) on WS680?
Start the computer using Windows 7 installation media. Select Custom (Advance3d) options from the Install Windows dialog box.
Client computers run Windows 7.
You used Microsoft Application Compatibility Toolkit (ACT) for the creation of an application shim named APPSHIM for an accounting application named ACCOUNTAPP which is created by ABC.com (third party).
What should you do to make sure that when ACCOUNTAPP is run next time, the APPSHIM should be applied.
Run Sdbinst.exe
The ABC.com network worstations currently make use of Windows XP Professional.
ABC.com has recently decided to have the workstations upgraded to Windows 7 uses in your department when the Aero Shake feature will work.
What should you inform them?
The Aero Shake feature will work if the Windows Experience Index is 3 or greater, and if the display adapter is compatible with the installed WDDM
The ABC.com workstations are configured to either use Windows XP Professional or Windows Vista. ABC.com management is considering an upgrade of all workstations to Windows 7.
Management has inquired which mail client forms part of the Windows 7 package.
Which of the following statements best describes your response?
Windows 7 does not contain a pre-installed mail client
The ABC.com workstations run Windows 7.
You have been instructed to create a VHD, named KingSystem in a folder named KingWindows. The KingWindows folder is hosted by an external hard disk that has the H: drive letter assigned. You are also informed that the maximum size of the VHD should be 60-GB.
Which of the following actions should you take?
Create vdisk file=h:kingwindowskingsystem.vhd maximum=60000
Running Windows 7.
ABC.com has two client computers WS01 and WS02 which have Windows Remote Management (WinRM) enabled. During the course of the day you receive instruction from ABC.com to have an additional disk volume created remotely on WS01 suing WS02.
What should you do?
Run the WinRS command then run the Diskpart command on WS02
All workstations at ABC.com have Windows 7 installed.
You have been assigned a trainee technician, named Andy. Andy wants to know what the purpose of the OobeSystem Configuration Pass is.
Which of the following options best describe your response?
It configures settings that are applied during the end-user first-boot experience, which is also known as Windows Welcome
Running Windows 7. during the course of the day a network user named Rory asked in order to obtain USMT 4.0 what must be downloaded from Microsoft Corporation Website.
What should you tell him?
WAIK
Running Windows 7.
ABC.com has recently acquired a new workstation that has Vista SP2 installed. The company policy requires all workstations to run Windows 7.
You need to make sure the policy is adhered to.
What should you do?
Perform an upgrade from Vista SP2 to Windows 7.
Running windows 7or Windows XP Professional.
During the course of the day a network user named Dean asked you which of the Microsoft utilities can be used when transferring user encryption certificates from a computer that is configured to run Windows XP Professional to a computer configured to run Windows 7.
What should you do? (Choose two)
-USMT utility
-Windows Easy Transfer utility
You have been instructed to deploy Windows 7 on all of the ABC.com workstations.
You have installed Windows Automated Installation Kit (WAIK) on a reference workstation. You then created an answer file for Windows 7 unattended installation. You now need to validate the answer file before deployment.
Which of the following actions should you take?
Use Windows System Image Manager tool
You are preparing to install Windows 7 on a new workstation. Because of your workload, you would like to configure an automatic installation of Windows 7. To achieve this, you have to generate an unattended answer file.
Which of the following actions should you take?
use the Windows SIM tool in WAIK or Notepad
Running Windows 7.
You are working on a application and receiving error messages.
You need to perform the following tasks:
-Create screenshots of the actions performed on the computer
-Ensure that the mouse actions are tracked too
How can you achieve this?
Run the Psr.exe command and click Start Record
Workstations on the ABC.com network currently make use of Windows XP Professional. You receive an instruction form the CIO to install Windows 7 on a workstation, named SR01.During a test installation you discover that the Online Compatibility Check has failed.
You are required to fix the problem.
Which of the following actions should you take?
Make sure that the display adapter supports WDDM, and that the workstation has the required amount of RAM.
running Windows 7.
You want to configure ABC.com’s workstations to produce a new Security ID (SID) as well as a Welcome screen when the workstation is booted.
You plan to make use of the Sysprep.exe tool on each workstation. You need to select the required parameters. Which combination of the following should you use? (Select two)
-Oobe
-generalize
Running Windows 7 and running Windows Remote Management (WinRM).
You need to perform the task of creating additional disk volumes on one of the computers named WS01. However you need to perform the task from another computer on the network named WS02.
What step can you perform in order to accomplish this task?
Run WinRS command then run the Diskpart command on WS02.
You have been instructed to deploy Windows7 on all Workstations.
You have installed WAIK on a reference computer. You then created an answer file for Windows 7 unattended installation. Now validate the answer file before deploying Windows 7 to the workstations.
Which of the following actions should you take.
Windows System Image Manager
Running Windows 7.
After a recent Windows update, you realize that the update was unnecessary and taking up valuable space. You would like to remove the update with as little administrative effort possible.
which of the following actions should you take?
Access Programs and Features from the Control Panel
You have previously created a customized image of Windows 7. When you notice that the image has a corrupt boot configuration data store, you decide to configure the image with a new configuration store.
Which of the following actions should you take? (Select two)
-use the Imagex.exe command with the /mountrw parameter FIRST
-uset eh Bcdedit.exe command NEXT
A company has as server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT) and the Windows Automated Installation Kit (WAIK) set up.
the company also has a client computer running Windows 7 Enterprise.
You need to remove a VHD boot option from the Windows Startup menu on a client computer.
What should you do?
run the BCDEdit /delete command
You have a computer that runs Windows XP SP3. The computer is a member of an Active Directory domain.
Several domain users log on to the computer.
You plan to install Windows 7 on the computer.
You need to ensure that all user settings are preserved after the install.
What should you do?
Run Windows Easy Transfer, Install Windows 7, and then run Windows Easy Transfer again
You are installing Windows 7 on the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows DVD? (Choose three)
-Run setup.exe from the DVD to start the Windows 7 installation
-Perform a full installation of Windows 7
-Use the autorun feature on the DVD to start the installation
You have a reference computer that runs Windows 7.
You plan to create an image of the computer then deploy the image to 100 computer. You need to prepare the reference computer for imaging.
What should you do before you create the image?
Run the Sysprep tool
ABC.com has acquired a workstation that has Windows XP SP2 installed. They then inform you that the workstation has to be upgraded to Windows 7.
You want to complete the upgrade as quickly as possible.
which of the following actions should you take FIRST?
upgrade to Windows Vista SP2
ABC.com has a server, named ABC-SR07, which has the following configured:
•Microsoft Deployment Toolkit (MDT)
•Windows Deployment Services (WDS)
•Windows Automated Installation Kit (WAIK)
You have received instructions to capture a standard image of the Windows 7 from one of the ABC.com workstations. Furthermore, you are informed that the workstation’s device drivers should not be included in the image.
You plan to execute the Sysprep tool with an answer file.
Which of the following actions should you take NEXT?
set the PersistAllDeviceInstalls option of the answer file to False
Which of the following operating systems support an offline migration using USMT? (Choose three)
-Windows Vista
-Windows XP Professional
-Windows 7
You create a new virtual hard disk (VHD) on a Windows 7 Enterprise computer. Then you install Windows 7 on the VHD.
After you reboot the computer, the Windows 7 boot menu shows two different Windows 7 installations titled “Windows 7”.
You need to ensure that the Windows 7 boot menu differentiates between the two Windows 7 installations.
What should you do?
Run the BCDEdit command
You have a computer that runs Windows 7.
You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7.
You need to start Windows 7 in the minimum amount of time.
What should you do?
Start the computer from Windows 7 installation media and run Startup Repair
You have received instructions to migrate the user state on a workstation, named ABC-WS13, via the User State Migration Tool (USMT) 4.0. You are preparing to execute the Scanstate.exe command.
You are required to make use of the appropriate parameters for specifying the user files that will be included in the migration.
Which of the following actions should you take?
use /genmigxml parameter
You have previously configured a customized image of Windows 7, which you are intending to deploy to three new workstations that are not connected to ABC.com’s network. You are informed that the deployment solution should allow for automatic installation of a customized application, subsequent tot he image deployment.
Which of the following actions should you take?
Run the New Media Wizard after creating a custom task sequence via the MDT.
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.
You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0.
During the migration, you receive the following error message:
“Gather was aborted because of an EFS file.”
You need to ensure that you can successfully migrate the user state from Computer1 to Computer2.
What should you do?
Add the efs:copyraw switch tot he Scanstate command
ABC.com has a domain controller, named ABC-DC01. You have been assigned a laptop workstation that has Windows 7 Home Premium installed and resides in the same IP range as ABC-DC01.
You want to configure your laptop workstation in such a way that you are able to manage DC01 by connecting to it via Active Directory Users and Computers.
Which of the following actions should you take FIRST?
use the Windows Anytime Upgrade feature to upgrade the laptop workstation to Windows 7 Professional
You have an offline virtual hard disk (VHD) that contains an installation of Windows 7 Home Premium.
You need to upgrade the installation to Windows 7 Ultimate by using the minimum amount of administrative effort.
What should you do?
From a computer that runs Windows7, attach the VHD. Run Dism.exe and specify the /set-edition parameter
ABC.com has a server, named ABC-SR07, which has the following configured:
•Microsoft Deployment Toolkit (MDT)
•Windows Deployment Services (WDS)
•Windows Automated Installation Kit (WAIK)
You have been instructed to delete data from the virtual disk located on one of ABC.com’s workstation. You start by accessing the DiskPart utility.
Which of the following DiskPart commands should you make use of NEXT?
Attach
All ABC.com’s workstations only have a single partition Basic Hard Disk installed, and all have available space on the disk.
You have been instructed to install Windows 7 in a dual-boot configuration with the existing Windows Vista installation on one of the workstations.
Which of the following actions should you take?
Use the Custom Installation option, after booting the workstation from the Windows 7 Installation disc

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>