Deploying Windows
Configuring Hardware
Access to Resources
Maintaining System
Backup and Recorvery
100
Alex has refurbished an older laptop computer by installing a new 2.5 GHz processor, a 300 GB hard disk, and 2 GB RAM. The computer has a CD-ROM drive that he has not replaced, but no DVD-ROM drive. Alex would like to install Windows 7 Home Premium on this computer but is concerned because the installation media is published on a DVD-ROM disc. Which of the following methods can he use to install Windows 7 on this computer? (Choose all that apply.)
What is A network share, A portable hard drive, A USB thumb drive
100
John has three drives on his computer C D E, he creates a folder E:Software He wants to ensure all files stored in the software folder are indexed by windows search. What should he do?
Create a new library and add folder to the library.
100
Shirley is a tech support technician for Que Publishing. In recent months, many users in her company have received new Windows 7 computers. A manager named Karen needs to access a website operated by a subsidiary company named Cert Guide. She reports that she receives the message Your security settings prohibit the display of unsigned ActiveX controls when she attempts to connect. Que Publishing has a policy requiring that users can download unsigned ActiveX controls from approved Internet websites only. Shirley verifies that Karen’s Internet Explorer settings are configured as the defaults. What should Shirley do to enable Karen to access the website operated by Cert Guide? (Each answer represents part of the solution. Choose two.)
What is Add the Cert Guide website to the Trusted sites zone. AND In the Trusted Sites settings, clear the Require server verification (https:) for all sites in this zone check box
100
Joe is a landscape designer who travels extensively throughout his state working with residential and business clients to create award-winning gardens and beauty spots. He uses a Windows 7 Ultimate portable computer and needs to conserve power when traveling on the road. He has noticed that when he presses the power button on his computer, it does not fully turn off and continues to consume battery power with the result that he has occasionally lost work. Joe would like to ensure that the computer is always completely off when he presses the power button when on battery power. What should he do? (Each answer represents a complete solution. Choose two.)
What is From the Power Options Control Panel applet, select Change plan settings under the current power plan, and then select Change advanced power settings. In the Power Options dialog box, expand the Power buttons and lid category, expand Power button action, and then select Shut down OR From the Power Options Control Panel applet, select Choose what the power buttons do, and then select Shut down under On Battery for When I press the power button
100
Wayne is a consultant who is preparing a bid for a multimillion dollar contract his company is hoping to land. After working all week on an important document for this bid, Wayne discovers one Friday that this document file has become corrupted. Wayne’s computer runs Windows 7 Enterprise and has system protection enabled on all volumes. Wayne’s computer is configured with the default backup options. He must recover the latest version of this document so that he can complete the bid with minimal delay because the submission deadline is next Monday. What should Wayne do?
What is Use the Restore previous versions option
200
Kevin is a consultant who is responsible for deploying 200 new Windows 7 Enterprise computers. The client firm has requested that Kevin use the Deployment Workbench and ensure that the Windows 7 images he uses are placed on a distribution share and include all required device drivers, applications, and updates. Which deployment tool should Kevin use?
What is Microsoft Deployment Toolkit (MDT) 2010
200
Kristin has just purchased a new portable computer that runs Windows 7 Ultimate and is setting up a new wireless connection that will enable her to access her company’s wireless access point, which uses the IEEE 802.1x authentication method and the TKIP encryption protocol. Kristin accesses the Manually connect to a wireless network dialog box and enters the network name and passphrase. She needs to select a security type that will enable connection using the TKIP encryption protocol by default without the need to enter a preshared key or passphrase. Which security type should she select?
What is WPA-Enterprise
200
Ethan is a desktop support specialist for a small company that operates a workgroup-based network. A Windows 7 Ultimate computer in his office contains several shared folders that users in the office must have access to. Ethan needs to ensure that only users with valid usernames and passwords can access the shared folders on this computer, including the Public folder. What should he do?
What is In the Network and Sharing Center, enable the Password protected sharing option
200
Paul is using a computer that he has upgraded from Windows Vista Home Premium to Windows 7 Home Premium. He notices that whenever he starts many of his programs or attempts to access the properties of many Control Panel items, he is presented with a UAC prompt. Paul believes that he should not be receiving all these prompts but still would like to be prompted when he attempts to install a program or when websites attempt to make changes to his computer’s configuration. What should Paul do?
What is Access the User Account Control Settings dialog box and select Default–Notify me only when programs try to make changes to my computer
200
Kim is responsible for maintaining the virtual hard disk images used on Windows 7 computers in her company. A VHD mounted on the f: drive of a computer contains an image of Windows 7 Home Premium. Kim would like to upgrade this VHD to Windows 7 Ultimate. Which command should she use for this purpose?
What is dism /image:f:\ /Set-Edition:Ultimate
300
Tom is upgrading a computer from Windows Vista Ultimate to Windows 7 Ultimate. The computer is a 2.8 GHz Pentium IV and has 1 GB of RAM and a 250 GB hard disk. After the first restart, Tom is informed that the computer is infected with a master boot record virus. What should he do before continuing with the installation?
What is Remove or disable any antivirus software installed in Windows Vista.
300
Phil is concerned with the performance of his Windows 7 computer because it does not appear to be responding as rapidly as it did a few months ago. He creates a data collector set and logs his performance over the period of a workday. Then he uses Performance Monitor to display the collected data and notices the following results: Memory\Pages/sec: 62 Processor\% Processor Time: 71 LogicalDisk\% Disk Time: 74 PhysicalDisk\% Disk Time: 63 System: Processor Queue Length: 3 Which of the following system upgrades should Phil do first?
What is Add additional memory
300
You are a tax preparer for Taxes in Texas. All your computers are configured with Windows 7 Enterprise. Because of recent privacy laws, you cannot allow anyone other than official tax preparers to have access to your tax preparation materials for clients. You store all client files in the CLIENTS folder on your NTFS-formatted C: drive, as do all other tax preparers in your workgroup. You have four staff persons who work in the office. They are in the STAFF group. All tax preparers are in the PREP local group. One of the STAFF group members is also a member of the local Administrators group on each computer. What can you do to configure your system to ensure the privacy laws are met?
What is Run cipher /e on the C:\CLIENTS folder. Add certificates for each tax preparer to the encryption attributes
300
Lisa installs a new device driver and reboots her Windows 7 Ultimate computer. Before the logon screen appears, the computer displays the Blue Screen of Death (BSOD) with the error IRQL_NOT_LESS_OR_EQUAL. Which of the following should she do first?
What is Press F8 to access the Advanced Startup Options menu. Select Last Known Good Configuration
300
Bob is the desktop administrator of his company. A user named Emily installs a tax calculation application on her Windows 7 Professional computer. After she restarts her computer, she observes that the computer runs very slowly. Emily uninstalls the tax calculation application and restarts her computer. However, the computer still runs very slowly. She asks Bob to return her computer to its previous condition as soon as possible while preserving her data and computer settings. What should Bob do?
What is Restart the computer in safe mode and restore Windows 7 using the most recent system restore point.
400
Robert is using the User State Migration Tool (USMT) to migrate 100 users in his company from old Windows XP computers to newly purchased computers running Windows 7 Enterprise. He will be using a file server running Windows Server 2008 R2 as a storage location for user documents and settings during the course of the migration. He also wants to ensure that all data is encrypted and password-protected to minimize the possibility of unauthorized access during the migration. What migration strategy should Robert use?
He should use a side-by-side migration utilizing a compressed migration store.
400
Abby is a graphics art designer for an advertising agency. She is using a Windows 7 Ultimate computer that contains three hard disks, two of 400 GB capacity and one of 200 GB capacity. The operating system and several design applications are installed on the 200 GB disk, which is configured as the C: drive. The applications access very large files and consume considerable disk I/O actions. She needs to configure the hard disks on her computer for optimum operation of these applications. Which of the following actions should Abby take to accomplish this objective? (Each correct answer represents part of the solution. Choose two.)
What is Create a striped volume from the two 400 GB disks, Convert the two 400 GB disks to dynamic storage
400
Connie is using a Windows 7 Professional laptop computer to connect to her company’s VPN server using Secure Sockets Tunneling Protocol (SSTP) to make the connection to a VPN server running Windows Server 2003. When she attempts to complete the connection, she receives an error code 741 accompanied by the message stating that The local computer does not support the required encryption type. What should Connie do to make a successful connection to the VPN server?
What is Access the Security tab of the VPN Connection Properties dialog box, select Maximum strength encryption (disconnect if server declines), and then click OK.
400
Terri has used the DiskPart utility to create a VHD named c:\w7.VHD of size 50 GB on her computer. She now accesses the Disk Management snap-in and wants to create a partition on the VHD that she can use for installing a virtual copy of Windows 7. However, she cannot find the disk listed. What does she need to do before she can proceed further
What is She needs to mount the disk
400
Lynn is responsible for performance management of 50 computers running Windows 7 Enterprise in her company’s Active Directory Domain Services (AD DS) domain. She has configured Group Policy to assist her in collecting event logs from these computers onto a single Windows 7 Ultimate computer in her work cubicle so that she can identify problems rapidly and respond to users’ concerns. Which of the following should she configure on this computer?
What is A source-initiated event subscription
500
eorge is using a computer that is equipped with a 100 GB hard disk containing three partitions. The first partition holds an installation of Windows XP Professional, the second partition holds data files, and the third partition is currently empty. George would like to install Windows 7 on his computer but still have access to Windows XP. What should he do?
What is Boot the computer with the Windows 7 DVD. Select the option to perform a clean installation, select the third partition, format this partition with the NTFS file system, and install Windows 7 on this partition
500
You are a desktop support technician for your company. Management has asked you to implement smart cards as a secure authentication procedure for all computers in your company, and you must install smart card readers on all company computers. You have purchased a supply of the readers from an independent vendor. The shipment comes with a CD-ROM that includes drivers and support applications for Windows 7. Although the drivers are digitally signed, the support applications are not. You must ensure that the correct drivers and applications are installed.
What is Insert the CD-ROM and install the drivers and applications after installing the smart card reader. AND Attach the smart card reader to the computer before inserting the CD-ROM
500
Sheila is a help desk technician for White’s Photographic Supply, a company that caters to digital photographic needs of camera stores and portrait studios. All desktop computers run either Windows XP Professional or Windows 7 Professional and receive TCP/IP configuration information from a DHCP server on the network. One evening, several administrators shut down a file server named Server1 for some much-needed maintenance tasks. Several hours later they restart the server and move it to a different subnet. The next morning, Sheila receives calls from several users reporting that they cannot connect to shared folders on Server1. Which of the following commands should Sheila instruct the users to run on their computers?
What is ipconfig /flushdns and ipconfig /registerdns
500
Brendan is a desktop support technician for his company, which operates an Active Directory network consisting of a single domain. All client computers run Windows 7 Enterprise. No policies have been configured in the domain for use of BitLocker or data recovery. A user named Olga has configured BitLocker Drive Encryption on her laptop, which is equipped with a Trusted Platform Module (TPM). While configuring BitLocker, Olga chose the option to print the recovery password. Olga contacts Brendan and informs him that she is unable to start the computer and cannot remember the recovery password or locate the document on which she printed it. What should Brendan do to enable access to the data?
What is Reformat the laptop’s hard drive and reinstall Windows 7. Then restore the data from backup
500
Brenda has experienced problems in the past with updates downloaded from the Microsoft website causing applications to fail unexpectedly. So, she has configured Windows Update on her computer to check for updates but to let her choose whether to download and install them. A few months later, Brenda realizes that an optional patch that her work colleagues have received is missing from her machine, and its performance has suffered as a consequence. What should she do to view and restore this update while retaining the option to let her choose whether to download and install future updates?
What is From the Windows Update applet in Control Panel, click Restore hidden updates, select the update, and then click Restore.