logo image

Windows 7 Configuration

You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the following hardware specifications:
Hard drive with 12 GB of free space.
1 GB of RAM, one additional socket available.
One Pentium 2.8 GHz processor, one additional socket available.
Video card with 128 MB of memory.
You need to change the hardware so that you can install Windows 7 Enterprise. What should you do?
Free up some space on the hard drive.
You have a stand-alone computer running Windows 7 Professional. You notice that the Aero features are not displayed. The computer has a 19 inch CRT screen that supports refresh rates up to 65 Hertz and a video card with 64 MB RAM. You need to use the Aero features. What should you do?
Replace the video adapter card with one that has at least 128 MB RAM.
You are planning to install Windows 7 Home Premium edition on a new 64-bit computer. The computer has the following hardware specifications:
500 GB hard drive.
1 GB of RAM, one additional socket available.
One Pentium 2.8 GHz processor, one additional socket available.
Video card with 256 MB of memory.
You need to ensure that the hardware will support Windows 7 Home Premium. What should you do?
Add more memory.
You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain and you plan to configure the computer to boot from a .VHD image. Which Windows 7 editon should you use?
Ultimate (64-bit)
You have several computers in a network. Some of the computers do not have an optical drive. Your boss has asked you to install Windows 7 on each of the computers. What should you do? (Select two. Each choice is a required part of the solution.)
Use the bootsect command to make the USB flash drive bootable.
Copy the product DVD to a USB flask drive and boot from the drive.
You have several computers in a domain network. Your company develops software that runs on bot Windows XP and Windows 7. Programmers need to have computers that will dual boot between Windows XP and Windows 7. You need to configure each system to meet the programmer’s requirements. What should you do?
Install Windows XP first, and then install Windows 7 on another partition.
You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?
On each computer, edit the BIOS to boot from the network first.
You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. A fourth hard disk is connected to the IDE channel. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. Only the disk on the IDE channel is visible. Select the option you would choose to make the RAID array visible for the installation.
Load Driver
You have a stand-alone computer running both Vista and Windows 7. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows Vista as the default operating system instead. What should you do?
Run bcdedit.exe.
You are preparing to install Windows 7 to a new computer. You copy the installation files from a DVD to a USB flash drive, then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. Using disk tools, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and shows you the following message:
Error loading operating system
Reboot and select proper boot device.
What should you do?
In the BIOS, modify the boot order to boot from the USB device first.
You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?
On the screen where you select the disk to install Windows, click Load Driver.
You are performing a network installation of Windows 7 on a new computer. You boot the computer using Windows PE. You need to install a device driver for the network adapter. What should you do?
Run drvload.exe
You have a computer that runs Windows Vista. You need to perform a clean installation of Windows 7 onto the computer. You would also like to retain the system and user files from the Windows Vista installation. What should you do?
While running setup.exe on the Windows 7 installation media, select the Custom (advanced) option.
You need to install Windows 7 Enterprise edition on multiple computers. You have an ISO image of the Windows 7 Enterprise edition installation disc that you will use for the installation. You want to boot the computer to a command prompt, connect to a network share, and then run setup from the shared folder. You create a shared folder named WinInstall on a server. What should you do? (Select two. Each choice is a required part of the solution.)
Extract the ISO image and copy all files in the image to the shared folder.
Create a bootable disc with WinPE and the necessary network drivers. Edit the BIOS to boot from the optical drive first.
You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 32-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform and Upgrade using the Windows 7 installation disc.
You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first?
Run Anytime Upgrade
You have a Windows XP Professional system that you would like to upgrade to Windows 7 Ultimate. What should you do first?
Run the Windows 7 Upgrade Advisor.
You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next?
Re-install all applications.
You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with windows 7. What should you do?
Run the Windows 7 Upgrade Advisor.
You have a 32-bit computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7 Ultimate. Your computer has the following specifications:
Service pack 2
1 GHz processor
512 MB RAM
256 MB video card
40 GB free disk space
DVD drive
You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Add more memory
You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the following specifications:
1 GHz processor
1 GB RAM
128 MB video card
16 GB free disk space
DVD drive
You would like to perform the upgrade with the least amount of effort possible. What should you do first?
Install the latest service pack
You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 64-bit version
Custom (advanced)
You have a workstation running the 64-bit version of Windows 7 Ultimate that you would like to change to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?
Perform a Custom (advanced) installation using the Windows 7 installation disc.
You have two computers: ComputerA is running Windows Vista Business and ComputerB is running Windows 7 Professional. You are using USMT to migrate only the user profiles and user data from ComputerA to ComputerB. You need to specify the rules used for the migration to include all .jpg files. What should you do?
Edit the MigUser.xml file.
You have two computers: ComputerA is running Windows XP Professional and ComputerB is running Windows 7 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. What should you do? (Select two. Each answer is a complete solution.)
Run Windows Easy Transfer
Run USMT
You have a single computer running Windows XP. You perform a Custom (advanced) installation of Windows 7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the Windows XP installation to the Windows 7 installation. What should you do?
Run scanstate with the /offlineWinOld: option
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from ComputerA to ComputerB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do?
On ComputerB, run loadstate with the /lae and /lac options.
You have a single computer running Windows Vista. You are about to complete a clean installation of Windows 7 on the computer, and you need to migrate user profiles and user data from the previous installation of Windows Vista. What should you do? (Select two. Each choice is a required part of the solution.)
Use a wipe-and-load migration.
Run WET and use External hard disk or USB flash drive as the transfer method.
You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate specific application settings from ComputerA to ComputerB by using USMT. What should you do? (Select two. Each choice is a required part of the solution.)
Run scanstate with the /i option.
Edit the migapp.xml file.
You have computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?
Run Scanstate in Windows XP. Perform a custom (advanced) installation of Windows 7 to the existing hard drive. Boot into Windows 7 and re-install all applications. Run Loadstate.
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available following the upgrade. You want to perform the upgrade with the least amount of effort possible. What should you do?
Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run *Scanstate* and then *Loadstate*.
You have a computer running Windows 7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do?
Download the Windows Automated Installation Kit (Windows AIK) from Microsoft.
Command line options for the Loadstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.
/ui > Specify user(s) to be migrated
/hardlink > Restore from a linked migration store.
/lae > Enable user accounts
/ue > Specify user(s) to omit from migration
/lac > Create user accounts
Command line options for the Scanstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.
/o > Allow overwriting existing data.
/ue > Specify user(s) to omit from migration
/ui Specify user(s) to be migrated.
/offlineWinOld > Path to the offline Windows.old folder.
/p /nocompress > Generate a space estimate.
You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to customize the migration of application, user profile, and user data. What should you do? (Select two. Each choice is a required part of the solution.)
Edit the MigApp.xml and MigDocs.xml files
Run Scanstate.
You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not be using WDS or MDT for the installation. When you start each computer, you would like the computer to boot and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?
Create an Unattended file on a USB drive. One each computer, edit the BIOS to boot from the optical drive firist. Insert the Windows installation disc into the DVD drive and the USB drive into a USB port.
You decide to use a system image to deploy Windows 7 to multiple computers. You have installed Windows on a reference computer. You need to restart Windows and manually install applications and make other changes prior to capturing the image. You want to prevent the Windows Welcome screen from showing when the system reboots prior to customizing the installation. You do not want any changes you make to prevent the end-user from seeing the full Out-of-Box Experience after the image is applied. What should you do?
Run Sysprep with the /audit option.
Drag each command line for the Sysprep utility listed on the left to the correct description of its function on the right.
/oobe > Starts the computer in the Windows Welcome mode.
/unattend: answerfile >Applies settings in an answer file.
/reboot > Restarts the computer when Sysprep completes.
/generalize > Removes machine-specific information from the installation.
/audit > Allows you to add additional drivers or applications and test your image.
You have a computer running Windows 7 Professional. You want to capture the installation as a system image. You need to remove any computer-specific information from the computer prior to capturing the image. What should you do?
Run Sysprep
Last month you deployed Windows 7 Enterprise to all of the desktop computers in your company using a single system image. To install this image, you created a WinPE boot CD. You recently received new desktop computers, and one of your colleagues is not able to install the image using the WinPE CD. The WinPE CD cannot boot to the network drive. What should you do?
Install the latest hardware drivers for these new desktop computers on the WinPE image.
You have a computer running Windows 7 Enterprise. You plan to capture the installation on this computer and use the image to deploy to other computers. You create an answer file named win7ent_answer.xml with Windows SIM. You want to remove computer-specific information and apply the settings in the answer file before you capture the installation. What should you do?
At the command prompt, run sysprep.exe/audit/oobe/unattend:win7ent_answer.xml
You have a computer running Windows 7 Ultimate. Prior to capturing the system image, you need to remove machine-specific information from the installation. What should you do?
At the command prompt, run sysprep.ext/generalize
You intend to install Windows 7 by using a Windows 7 installation DVD on several computers. To save time, you would like to automate the installation of Windows 7 for each computer. What should you do?
Create an answer file named autounattend.xml. Place the file on a USB flash drive, and run setup.exe.
You want to deploy Windows 7 to multiple computers using a system image. You would like to use an answer file to automate the installation process on a reference computer. What should you do first?
Run Windows System Image Manager (Windows SIM).
You want to capture a system image to deploy Windows 7 to multiple computers. You want to install Windows 7 on the reference computer using an answer file. You need to create the answer file. What should you do?
1. On a technician computer, insert the Windows 7 product DVD.
2. Run Windows SIM and load a preloaded install image (install.wim) from the DVD.
3. Select and edit the responses to the questions presented during product installation.
4. Validate the file in Windows SIM.
5. Save the answer file.
You have a computer running Windows 7 Ultimate. You will use this computer as a reference computer to install Windows 7 from a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named myCaptureSettings.ini to identify the compression settings. What should you do next?
Run imagex.exe with the /capture, /compress, and /config options.
You decide to use a system image to deploy Windows 7 to multiple computers. You have configured a reference computer with Windows 7 and are ready to capture and deploy the image. You want to save the image file using three smaller files instead of one large file. Then you need to install the image to the new computers. You want to perform these actions with the least amount of effort possible. What should you do? (Select two. Each choice is a required part of the solution.)
On the reference computer, run imagex /capture. After the image is captured, run imagex /split.
On the target computer, run imagex /apply /ref.
You have a computer running Windows7 Ultimate. You will use this computer as a reference computer to install Windows 7 from a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named myCaptureSettings.ini to identify the compression settings. You need to edit the compression settings in the file. What should you do? (Choose the best answer.)
Identify files that are not compressed using the CompressionExclusionList section.
You have a computer running Windows 7 Ultimate. You want to capture the installation as a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to exclude specific files from the ImageX capture operation. What should you do? (Select two. Each choice is a required part of the solution.)
Run imagex.exe.
Create a wimscript.ini file and include an exclusion list section.
Drag each command line option for the ImageX utility listed on the left to the correct description of its function on the right.
/split > Splits a captured image into multiple files.
/capture > Creates an image of a reference computer.
/compress > Specifies compression when capturing a system image.
/apply > Deploys an image.
/verify > Checks for errors and file duplication.
/config > Identifies an alternate configuration file name and location.
You have a computer without an operating system installed. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on the following network share: \imgserveimages. You need to manually deploy the image onto the computer. You boot the computer using WinPE and map a drive to the network share. What should you do next?
Run Diskpart to partition and format the disk.
You have a single computer without an operating system installed. The computer will eventually store sensitive information and will require the encryption of the operating system partition. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on a network share. You want to manually deploy the image to the computer. What should you do?
1. Boot the new computer using WinPE.
2. Use Diskpart to create a BitLocker partition.
3. Use Diskpart to create a system partition for the Windows 7 image.
4. Use ImageX to apply the image to the local drive.
You have a computer without an operating system installed. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on the following network share: \imgservimages. You need to manually deploy the image onto the computer. After booting the computer into WinPE, you partitioned and formatted the local hard drive with DiskPart. What should you do next? (Select two. Each choice is a required part of the solution.)
Use the net use command to connect to the network share and map the drive with a letter.
Use imagex.exe with the /apply option to copy the image from the network share to the local drive.
You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. You have created an answer file called Win7ProfAnswer.xml in the EImagesAnswerfiles folder. You want to apply the answer file to the image. What should you do?
At the command prompt, run dism /apply-unattend:e:imagesAnswerfilesWin7ProfAnswer.xml
You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image on a network share. You have updated the offline image with a Windows Update Stand-alone Installer (.msu) file. You believe the new .msu file is causing a problem on the system image. What should you do?
Use the dism /cleanup-image and /revertpendingactions options.
You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. Before deploying the image, you need to make sure there is a specific Windows application on the image. What should you do? (Select two. Both answers are complete solutions.)
At the command prompt, run dism /get-apps
At the command prompt, run dism /get-appinfo
You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you need to see a list of all the drivers included in the image. What should you do?
Run dism
You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you insert the third-party drivers from the C:DriversNetwork and C:Drivers|Custom directories into the system image. What should you do? (Select two. Both answers are complete solutions.)
At the command prompt, run dism /add-driver /driver:c:driversnetwork /driver:c:driverscustom
At the command prompt, run dism /add-driver /driver:c:drivers /recurse
You need to deploy Windows 7 Enterprise to multiple new computers. You have an image that you have previously captured. You have mounted and dismounted the image several times. You want to reduce the overall size of the image file by removing unnecessary resource files from the image file. What should you do?
Run imagex /export.
You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. You mount the image and use Dism to make several changes to the image. You decide not to keep any of the changes you have made to the image. The image is still attached. You want to undo the changes with the least amount of effort. What should you do?
Run Dism with the /unmount-wim and /discard options.
You want to deploy Windows 7 Enterprise to multiple computers from a previously-captured system image. You have received some operating system updates and would like to add these to the existing install image without recapturing the entire image. What should you do?
Run DISM
You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you need to append several files to the image. You want to compress the appended files to minimize disk space. What should you do?
Use the same compression type as the initial capture.
Which script is used to create the Windows PE build?
Copype.cmd
What do you call a template for a workstation configuration that contains all the software the workstation requires?
Reference computer
You have a Windows image file for Windows 7. You need to add a device driver to the image file. What utility should you use?
DISM.exe
What is the file-based disk image format used to deploy its latest Windows operating system releases, Windows 7, and Windows Server 2008?
WIM
What is a command line program that installers can use to prepare Windows 7 computers for imaging, auditing, and deployment including preparing a reference computer?
Sysprep.exe
Which type of image contains all of the elements of a workstation configuration, including applications drivers, updates, and all configuration settings?
Thick images
What command is used to partition and format a disk?
Diskpart.exe
To add drivers to an image using DISM.EXE, what file must you include?
.inf file
You are getting ready to deploy Windows 7 to multiple enterprise workstations. What do you use to hold the information captured from the reference computer?
Image file
You are researching the network requirements needed to support WDS on your network. One of your workstation requirements is that the network interface adapter has to support _______.
Pre-boot Execution Environment
What is the graphical utility that installers can use to create distribution shares and answer files that automate and customize Windows 7 installations?
Windows SIM
What is an XML script that provides the Windows 7 Setup program with the information it needs to perform an unattended installation?
Answer file
What is a command line tool that installers can use to mount, edit, and upgrade image files in the Windows Imaging format?
DISM.exe
What technology enables a computer to transmit the same data to multiple destinations at the same time?
Multicasting
What can be installed on Windows Server 2008 that enables installers to deploy Windows Imaging files to workstations over the network?
WDS
You have a Windows 7 computer that you manage at work. Because of security requirements for your company, you need to prevent all users from being able to save files to any removable storage device on the computer. Users are allowed to copy files from these devices. You want to accomplish this with the least amount of effort as possible. What should you do?
In removable storage access in Group Policy, configure the policy for each device type to deny write access.
You have a Windows 7 computer that you manage at work. Because of the security requirements of your company, you need to prevent all users from being able to use USB flash devices on this computer. What should you do?
Configure removable storage policies in the local security policy.
You have a Windows 7 computer that is shared by multiple users. You want to allow non-administrative users to install devices that use third-part drivers. Users should be able to install the device without prompts for administrative credentials. Users should only be able to install devices that use the drivers that you specifically identify. You copy the necessary drivers to the computer. You configure the DevicePath registry key to identify the folder where the drivers are located. A standard user logs on and tries to install the device, but gets a prompt for administrative credentials. What should you do?
Obtain drivers that have a digital signature.
You have a Windows 7 Ultimate computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. Other users who also use the same printer are not experiencing any problems. What should you do?
In Devices and Printers, right-click the Sharp AL-2040 icon and select Troubleshoot.
You are working on a computer running Windows 7. You try to listen to Audio CDs, but no audio is coming from the speakers. After checking the speaker cables, the volume level, and the mute feature, you check Device Manager and see the dialog shown in the image. What should you do?
In Device Manager, enable the Soundmax Integrated Digital HD Audio Driver device.
You are working on a computer running Windows 7. Your audio card is working, but you learn about an updated driver that adds some new features to the device. You download and install the new driver. After you restart and log on to Windows 7, you can no longer play audio files. Using a minimum of administrative tasks, you need to find a solution to be able to play audio. What should you do?
In Device Manager, roll back the driver.
You have a computer running Windows 7. You need to see a list of third-party drivers on the system. What should you do?
Run pnputil -e at the command prompt.
You are working on a computer running Windows 7. You recently installed a device that you only need temporarily. After several days of using the device, you remove it from the computer, and now you would like to remove the device driver as well. What should you do? (Select two. Both answers are complete solutions.)
At the command prompt, run pnputil -d.
In Device Manager, uninstall the device.
You have a computer running Windows 7. You need to install an updated driver for a hardware device on the computer. You need a driver file which has been tested by Microsoft and comes from a legitimate source. What should you do?
Install an updated driver with a digital signature.
You have a computer that runs Windows 7. You create the D:drivers folder on the computer for third party drivers and copy drivers for special devices to that folder. You want non-administrative users to be able to install devices on the computer without needing administrative privileges and without being prompted for the driver, but only for those devices whose driver is located in the D:drivers folder. What should you do?
In the registry, edit the DevicePath key.
You are working on a computer running Windows 7. You wold like to update the video driver that is used on the computer. Select the area in Device Manager where you would make this change.
Display Adapters
You are working on a computer running Windows 7. It is part of a domain. You recently installed Windows 7 Professional edition. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown in the image. What should you do?
Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver.
You are working on a computer running Windows 7. You have several standard users needing permission to install devices on this computer because Windows 7 does not include the necessary drivers for the devices. What should you do? (Select two. Both answers are complete solutions.)
Enable Allow non-administrators to install drivers for these device setup classes in Group Policy.
Run pnputil -i -a to add the drivers to the driver store.
You have a Windows 7 computer. You install a new internal sound card in the computer. After rebooting, you install the driver, but the device doesn’t appear to be working. You need to view information for the device and perform troubleshooting steps. What should you do?
In Computer Management, go to Device Manager.
You are working on a computer running Windows 7 Enterprise. Two devices connected to the computer are not performing correctly. You suspect the devices are conflicting with each other because they may be using the same system resources. What should you do to identify the problem? (Select two. Each answer is a possible solution.)
Open Device Manager and view the Resources tab.
Run System Information (msinfo32).
You are working on a computer running Windows 7. It is a member of a domain. You need to discover if there are any drivers on the computer which do not have a digital signature. Which of the following tools should you use?
Sigverif.exe
You have a small network with three subnets as shown in the graphic. IP addresses for each router interface are also indicated. You need to connect Wrk1_A to SubnetA and Wrk5_C to SubnetC. Which IP addresses should you use? (Select two.)
Wrk1_A = 192.168.111.62
Wrk5_C = 10.155.64.97
You manage the small network that is connected to the Internet as shown in the graphic. You add Host A to the network. All hosts use manually-assigned TCP/IP values. The subnet where Host A resides uses a 28-bit subnet mask. Which TCP/IP configuration values should you choose for Host A? To answer, drag a value to each TCP/IP parameter shown in the diagram.
IP Address 10.0.0.97
Subnet Mask 255.255.255.240
Default Gateway 10.0.0.110
You manage a small network with Windows 7 clients, multiple subnets, and servers.You want your computer to be able to resolve a host name for a server on your network to it’s IPv4 address. What should you do? (Select two. Each choice is a possible solution.)
Edit the Hosts file on the computer.
Add an A record on the DNS server.
You manage a network with all Windows 7 clients. As part of your Ipv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?
Ping the address beginning with 2001:
Your company has started the transition to Ipv6. You need to configure records on the DNS server so that clients can submit a host name query and receive back an IPv6 address for the specified host. What should you do?
Create AAAA records
You manage a network with all Windows 7 clients. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP. What should you do?
Ping the address beginning with FE80:
You manage a small office network with a single subnet. The network is connected to the Internet. All client computers run Windows 7. A single server runs Windows Server 2008 R2. Computers are not a member of a domain. Hosts use IPv6 addresses on the private network. All hosts on the private network are assigned host names such as Computer1, Computer2, etc. All computers use a DNS server at the Internet Service Provider (ISP) to resolve hostnames for Internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?
Make sure that LLMNR is enabled on all computers.
You manage a Windows 7 computer connected to a business network using switches and multiple subnets. One day you find that the computer is unable to connect to the Internet, although it can communicate with a few other computers on the local subnet. You type ipconfig /all on the computer and see the following output:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : mydomain.local
Description : Broadcom network adapter
Physical Address : 00-AA-BB-CC-74-EF
DHCP Enabled : Yes
Autoconfiguration Enabled : Yes
IPv4 Address : 160.254.155.1 (Preferred)
Subnet Mask : 255.255.0.0
Default Gateway :
DNS Servers :
What should you do?
Verify that the DHCP server is up and functional.
You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. You need to configure your computer with a static IPv6 address. What should you do?
Run netsh
You have installed a test network with one server and two workstations, all running IPv6. You have disabled Ipv4, and now what to test to make sure that the Ipv6 is used to communicate between hosts. Yo want to ping the link-local address for a host. What should you do?
ping FE80::AB134:7845:10C:9956%12
You have a computer that runs Windows 7 connected to a domain network. One day you find that your computer cannot connect to any network resources. You run the Ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. What should you do?
Run the Ipconfig /release and Ipconfig /renew commands.
Your company has started the transition to Ipv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive back the host name for that computer. What should you do?
Create PTR records.
You manage a Windows 7 computer connected to a business network using switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix : mydomain.local
Description : Broadcom network adapter
Physical Address : 00-AA-BB-CC-74-EF
DHCP Enabled : No
Autoconfiguration Enabled : Yes
Ipv4 Address : 192.168.1.102(Preferred)
Subnet Mask : 255.255.255.0
Default Gateway : 192.168.2.1
DNS Servers 192.168.2.20
What should you do?
Edit the IPv4 properties and change the default gateway.
You have a computer that runs Windows 7. Your network has just transitioned from using Ipv4 to Ipv6. Ipv6 configuration is performed automatically using information received by network routers. The network does not use a DHCPv6 server. Your computer is unable to communicate with a server named Srv1. A ping test to the server using its Ipv6 address works, but fails when you use its host name. What should you do?
Run netsh with the add dnsserver option.
You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer for IPv6 so it is correctly configured with the Ipv6 address, default gateway, and DNS server addresses. What should you do?
Edit the Internet Protocol Version 6 (TCP/IPV6) properties for the network adapter. Select Obtain an IPv6 address automatically and Use the following DNS server addresses.
You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer for IPv6 so it is correctly configured with the IPv6 address, default gateway, and DNS server addresses. The computer is currently configured to get all IPv6 information automatically. What should you do?
Run netsh interface ipv6 add dnsserver
You have a computer that runs Windows 7. Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6. Your computer is having problems communicating on the network. You would like to receive new configuration information from the DHCP server as well as remove all old DNS entries in your local DNS cache. What should you do? (Select two. Each choice is a required part of the solution.)
Run ipconfig /release6 and ipconfig /renew6
Run ipconfig /flushdns
You have just received a new laptop at work that you will use on your company network and at home. The company network uses dynamic addressing, while your home network uses static addressing. You connect the laptop to the company network and everything works fine. When you take your laptop home, you cannot connect to devices on your home network or the Internet. You run ipconfig on the laptop and receive the following output:
Connection-specific DNS Suffix :
IP Address : 169.254.22.74
Subnet Mask : 255.255.0.0
Default Gateway :
You need to be able to connect to both the company network and your home network with the least amount of configuration and cost. What should you do?
Configure an alternate TCP/IP configuration.
You have a computer that runs Windows 7 connected to a domain network. After reconfiguring the static address of an internal Web server named WEB3, your computer can no longer connect to WEB3. However, other users are still able to connect to the same Web server. You need to be able to connect to the website on the WEB3 server. What should you do?
Run ipconfig /flushdns
You have a laptop that runs Windows 7. The laptop uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using. What should you do? (Select two. Each choice is a possible solution.)
Run the netsh command.
View the status for the network connection. Click the Details button.
You have a laptop that runs Windows 7. The laptop uses IPv6. The network connection is configured to obtain an IPv6 address automatically. You need to see the IPv6 address that the network connection is currently using. What should you do? (Select two. Each choice is a possible solution.)
View the status for the network connection. Click the Details button.
Run the netsh command.
You have two computers running Windows 7 named Comp1 and Comp2. Both Comp1 and Comp2 received their IP addresses from a DHCP server in the network, and accessed the Internet through a common default gateway. After several changes in the network infrastructure, Comp1 is the only computer with a connection to the Internet. In addition, Comp1 is now acting as the default gateway and is sharing its Internet connection with Comp2. On Comp2, you are unable to access the Internet. You use the ipconfig /all command and discover the IP address for the Local Area Connection is 192.168.0.25. What should you do?
On Comp2, run ipconfig /renew
You have two computers running Windows 7 named Comp1 and Comp2. Both Comp1 and Comp2 received their IP addresses from a DHCP server in the network, and accessed the Internet through a common default gateway. After several changes in the network infrastructure, Comp1 is the only computer with a connection to the Internet. In addition, Cmop1 is now acting as the default gateway and is sharing its Internet connection with Comp2. On Comp2, you are unable to access the Internet. You use the ipconfig /all command and discover the IP address for the Local Area Connection is 192.168.0.25 with a subnet mask of 255.255.255.0. What should you do?
On Comp2, run ipconfig /renew
You have a Windows 7 Ultimate laptop computer that you use both at home and in the office. The laptop has both an Ethernet and a wireless network connection. At home you have created a simple Ethernet network that connects your home computers to the Internet through a cable modem. A friend comes over to your house for some help configuring his new laptop computer. His computer has a wireless network adapter but not an Ethernet network adapter. He wants to connect his laptop through your network to the Internet to download some drivers. What should you do? (Select two. Each choice is a required part of the solution.)
On your laptop, configure a network bridge. Set up an ad hoc wireless connection between his computer and yours.
Configure the wireless connection to use WPA-Personal
You have a small wireless network with 10 client computers configured in a workgroup. You upgraded the firmware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. You need the greatest amount of security with the least amount of effort, and without replacing any of the wireless infrastructure. What should you do? (Select two.)
Configure each client with the same key.
Implement WPA-PSK.
You have received a new Windows 7 Business edition laptop for use at work. You configure the wireless adapter to connect to the network. You also have a wireless network at home. You configure a second profile for your home network. For several weeks, the wireless connection works fine. Whether you are at home or at work, you can start your computer and make a connection without browsing for the list of available networks. One day you come in to work to find that you can’t connect. You check with the network administrator, and he states that they have prevented the SSID of the company network from being visible. You need to make it as easy as you can to connect to the company wireless network now and in the future. What should you do?
In the wireless network profile, select Connect even if the network is not broadcasting.
You have a laptop computer that runs Windows 7. Your computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company has added an 802.11n wireless router. The router is configured to support 802.11n using one radio, and 802.11b/g with the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connecting automatically using 802.11b. You want the computer to connect first using 802.11n, and only use 802.11b if 802.11n is unavailable. What should you do?
Move the 802.11n profile up in the list of the preferred networks.
You are configuring a small wireless network with 10 client laptops that require network access. You have configured a new wireless access point with an SSID that is not broadcasting. You have manually created a network profile on one computer, which successfully connects to the network. You would like to configure the network profile on the remaining clients with the least amount of effort. What should you do?
Use the Copy this network profile to a USB flash drive option to save the wireless network settings to a USB flash drive. On each additional client, insert the USB drive and run the utility to copy the profile settings to the client.
You want to connect a laptop computer running Windows 7 to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?
Configure the connection with a preshared key and AES encryption.
You have a computer running Windows 7 Professional. The computer is a member of a domain. You need to configure the wireless network card to connect to your network at work. The connection should use a user name and password for authentication with AES encryption. What should you do?
Configure the connection to use WPA2-Enterprise.
You have a laptop that runs Windows 7. The laptop has a built-in Ethernet and wireless network card. The wireless card stops working. You use the PCMCIA slot to add a wireless card to your laptop. After installing the wireless card, the adapter does not show in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem?
In Device Manager, right-click the wireless device and choose Properties. Examine the device configuration.
You have a new Windows 7 Ultimate computer with both a wired and a wireless connection. You want to configure a small wireless network at home. You install a router that connects your network to the Internet and which is the wireless access point. You have turned off SSID broadcast on the Internet router. You will connect devices using a preshared key. You need to configure your laptop to connect to the wireless network, and would like to use the most secure method available to you. What should you do? (Select two. Each choice is a required part of the solution.)
Use WPA2-Personal security.
Manually create a network profile.
You have a computer that runs Windows 7. You need to free up disk space and would like to delete all but the most recent restore point. What should you do? (Select two. Each selection is a complete answer.)
Run Cleanmgr as an administrator, then use the More Options tab to clean up the restore points.
In Disk Cleanup, select Clean up system files, then use the More Options tab to clean up the restore points.
You have a computer that runs Windows 7. You want to modify the disk defragmentation schedule to run twice a week on Wednesdays and Saturdays at 11pm. What should you do?
In Scheduled Tasks, modify the default task to run on Wednesdays and Saturdays.
You have a Windows 7 computer with a single hard disk. You notice that the disk defragmentation schedule has been turned off on your computer. The disk is badly fragmented. You want to run disk defragmentation manually. What should you do?
Run Defrag.
You have a Windows 7 computer shared by multiple users. The computer has a single hard disk with a single partition. You want to make sure that each user can only save up to 4 GB of files on the existing hard disk. Files stored to USB devices should not count towards the limit. What should you do?
Configure disk quotas.
You have a Windows 7 Professional computer that is used by three users. Each user has a folder for storing personal data. Chat copies a file from a CD-RW to his folder and receives the message Insufficient disk space. He finds that he cannot even add data to an existing file and save it. Other users of the computer do not have the same problems. You see that the volume has over 20 GB of free disk space. You need to let Chad create and edit files. What should you do?
Increase the quota limit.
What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier?
Subnet mask
What would a corporation use to allow private IPv4 addresses to communicate with the Internet?
NAT
Which type of IPv6 address is unique throughout the IPv6 universe?
Global
You are troubleshooting your network and want to determine the path that your communications is taking to get to its destination. What command line utility can you use to determine the path that the packets have taken?
tracert
__________ are the rules or languages in which networking is possible.
Protocols
What address is assigned to a computer that fails to locate a DHCP server?
APIPA
What is the default subnet mask for 198.54.65.3?
255.255.255.0
If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation?
/20
Your supervisor has asked you to compile a graphical representation of the network. What is the best method to accomplish this task for your supervisor?
netsh
What layer of the OSI model are the Media Access Control addresses part of?
Data-link
In what class is the address of 156.43.75.212?
Class A
On which layer of the OSI model is IPv4 Addressing included?
Network
What command is used to test network connectivity between two hosts?
Ping
What type of connector does an unshielded twisted pair (UTP. cable use?
RJ45
Which of the following is NOT an IPv4 private address range?
224.0.0.0 through 224.255.255.255
Your Windows 7 computer has two hard drives as shown in the image. The C: drive is running out of space. You would like to move the C:Finances folder to the D: drive. Existing NTFS permissions should be kept on the folder following the move. You want to accomplish this with the least amount of effort possible. What should you do?
Run the convert command, followed by the xcopy command.
You manage a Windows 7 computer. You need to control access to the D:Reports folder as follows:
Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files.
Mary needs to be able to open and view files, but should not be able to modify the files.
Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible. What should you do?
Assign Allow Read & execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, Deny the Write permissions.
An employee has a Windows 7 laptop. The employee has just been fired, but not before he assigned Deny Full Control permission to Everyone to all the files and folders on the laptop. All users, including you, are now blocked from accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do?
Take ownership of the files, and change the permissions.
You manage a Windows 7 computer. For the D:ReportsFinances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions. You need to move the file from the existing folder to the DConfidential folder. You want to keep the existing NTFS permissions on the fold. You want to accomplish this with the least amount of effort possible. What should you do?
Move the file to the new folder.
You have a Windows 7 computer that is shared by multiple users. Sally wants to access a file in the Reports folder. A group named Sales has been granted the Full Control permission to the Reports folder and all subfolders and files. You add Sally as a member of the Sales group, but she still cannot access the file that she needs. You want to let Sally access the Reports folder. What should you do?
Remove Sally from any other groups that have been explicitly denied access to the Reports folder.
You manage a Windows 7 computer. You need to control access to the D:Reports folder as follows:
Members of the Accounting group should be able to open and view all files but not modify them.
Mary needs to be able to modify existing files in the folder, add new files to the folder, but should not be able to delete or rename files. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible. What should you do?
Assign Allow Read & execute, List foldler contents, and Read to the Accounting group. Assign Allow Write to Mary.
You have a small home network with the following computers:
Comp1 runs Windows 7 Home
Comp2 runs Windows 7 Home Premium
Comp3 runs Windows 7 Professional
You want to create a HomeGroup for your network. Which of the following should be part of your configuration? (Select the two most correct answers. Each choice is a required configuration step.)
Create the HomeGroup on Comp2 or Comp3.
Set the network location to Home.
On your Windows 7 computer, you share the D:Apps folder using a sharename of Apps. You need to configure permissions to the share as follows:
Members of the Appusers group should be able to open and view files in the shared folder.
User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group.
You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?
Assign Allow Read permission to Appusers, and assign Deny Read permission to JohnS.
You have a Windows 7 computer that you use at home. You have a small network set up, with each member of the family having their own computer. You would like to share files such as pictures, videos, and music on your computer with other members of your family. Your mother should be able to modify any of these files, while everyone else should only have read-only access. You want to use the simplest method to make these files available while providing the level of access specified. What should you do?
Enable file and printer sharing in the Network and Sharing Center. Share specific folders and configure the necessary permissions.
You have a Windows 7 computer. You use the computer at home with a small network used by members of your family. You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny access to other users. You want to configure the permissions using the least amount of effort possible. What should you do?
Right-click the folder and select Properties. Configure Advanced Sharing on the Sharing tab.
You manage a Windows 7 computer on a small home network. You want to share the following folders on your computer with users on the network:
D:Clipart
D:Fonts
D:VacationPictures
You want to allow access meeting the following requirements:
Users will access all folders through a simple share.
The share should include only these folders and no others.
The folders should remain in their current locations in the file system structure.
What should you do?
Create a library. Add all folders to the library. Share the library with the HomeGroup.
You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and connect it on your home network using a wireless connection. You would like to join the HomeGroup from your laptop that has already been created on your home network. What should you do?
Turn on Network Discovery.
Your Windows 7 computer has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure. You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share. What should you do?
Stop sharing the folder. Share the folder again as Reorg$ with the same permissions as before.
Your Windows 7 computer has a folder named D:SalesDocs. The folder has been shared with the sharename of SalesDocs. The D: drive is formatted with NTFS. The following permissions have been configured for the folder:
NTFS permissions
Users group = Allow-Read
Sales group = Allow-Modify
Share permissions
Users group = Allow-Read
Sales group = Allow-Change
Sally is a member of the the Users and Sales groups. She needs to be able to red and modify all files in the SalesDocs shared folder except for the StyleGuide.doc file. Sally should be able to read StyleGuilde.doc but not modify it. What should you do?
Set Sally’s NTFS permission for SytleGuide.doc to Deny Write.
You have a folder on your Windows 7 computer that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.)
Place the files on an NTFS partition.
Configure both share and NTFS permissions.
On your Windows 7 computer, you share the D:Reports folder using a sharename of Reports. You need to configure permissions on the shared folder as follows:
? Members of the Accounting group should be able to view files, but not modify them.
? Phil, a member of the Accounting group, needs to be able
to open and edit files in the shared folder.
? No one else should be allowed access.
You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?
Add the Accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission.
On your Windows 7 computer, you share the D:Promo folder using a sharename of Promo. The share has been assigned the following permissions:
User/Group Permission
Telesales group Allow Read
Training group Deny Full Control
Managers group Allow Change
Mary user Allow Change

The Mary user account is a member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do? (Choose two. Each choice is a possible solution.)

Change the Training group permission to allow Read.
Remove the Mary user account from the Training group.
You manage a Windows 7 computer. One day you are downloading some new mp3 files to your computer. You save the files directly to the music library on your computer. You want to copy the new files to a different folder on your computer. You view the properties of the Music library and see the dialog shown in the image. What should you do?
Copy the new files from the C:UsersPublicPublic Music folder.
You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and use it on your home network. You would like to create a HomeGroup from your laptop that can be used on your home network. What should you do?
Disjoin your computer from the domain.
You have a folder on your Windows 7 Professional computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they cannot modify any of the files. What should you do?
Modify the NTFS permissions on the folder.
You have a laptop that runs Windows 7. You connect your laptop on the network at work to allow an associate to copy files from your computer. Other computers on the network are not able to discover your computer, and your computer is not able to build an accurate network map in the Network and Sharing Center. You open the Network and Sharing Center and see the information shown in the image. What should you do?
Change the network type to Home.
Your Windows 7 computer has a folder named D:SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows:
? Members of the Sales group should have read-only access to the content in the folder.
? Members of the SalesAdmin group should be able to open, edit, and add new files to the folder.
? No other users should have access.
Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permissions as possible. What should you do?
Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.
You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You travel to a branch office in your company. The branch office has 5 computers running Windows 7 Ultimate edition. Computers in the branch office are not domain members. All computers use a HomeGroup for file sharing. You want to join the HomeGroup in the branch office. What should you do?
Set the network location for the connection to Home.
You manage a Windows 7 computer. The computer has a printer shared with the name of Printer1. You need to modify the permissions that apply to the shared printer for network users. What should you do?
In Devices and Printers, right-click the printer and select Printer properties. Edit the Security settings.
You manage a Windows 7 computer with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users who are not members of this group can print to the printer. You want only members of the Sales group print to Printer1. What should you do?
Remove Everyone from the printer’s access control list.
You have a new laptop computer running Windows 7 Professional. You need to connect your computer to a wired network at work and a wireless network at home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. What should you do?
In Devices and Printers, click Manage default printers.
You manage a computer that runs Windows 7. The computer has a shared printer named Printer1. You want to let Chat pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer. What should you do?
Assign Chad the Allow Manage Documents permission to the printer.
You have a laptop computer running Windows 7 Home Premium. You connect your computer to a wired network at work and a wireless network at home. You want to configure your computer to use a different default printer for each network. What should you do?
Upgrade your computer to Windows 7 Professional.
You manage a Windows 7 computer with a printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:
? Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.
? Damien needs to pause and resume documents for all users, but does not need to change printer properties.
You want to assign the most restrictive permissions that meet the sales manager’s requirements. What should you do? (Choose two. Each choice is a required part of the correct solution.)
Assign Sally the Print permission.
Assign Damien the Manage Documents permission.
You have a new laptop computer running Windows 7 Professional. You need to connect your computer to a wired network at work and a wireless network at home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. In Devices and Printers, you click Manage default printers. Your home wireless network does not appear in the list of available networks. What should you do?
Connect to the wireless network.
You have set up the AccountWizard.exe program to run in Compatibility mode on a Windows 7 computer. After running the program, you find that the large-scale fonts do not appear correctly and the movement of the window appears erratic. Select the settings you would enable to correct these issues. (Select two.)
Disable desktop composition
Disable display scaling on high DPI settings.
You have a computer running Windows 7 Ultimate. For several years, the developers in your company have used a specific application. After installing the application on your computer, it no longer executes correctly. The application worked best on Windows XP machines with Service Pack 3. You need to have the application work correctly on this computer with the least amount of administrative effort. What should you do?
Run the application in compatibility mode.
You manage a network with 30 computers. Each computer is currently running Windows XP. All computers are members of a domain. You need to upgrade the computers to Windows 7 Professional. You will use a system image to deploy a clean installation of Windows 7 to each computer. Before you begin the upgrading process, you need to identify which applications installed on computers can run on Windows 7. What should you do?
Use the Microsoft Application Compatibility Toolkit (ACT).
Drag each application compatibility setting on the left and drop it on the corresponding function that the setting performs.
Turns off automatic resizing of applications when using large-scale fonts > Disable display scaling on high DPI settings.
Disables Aero features > Disable desktop composition.
Allows applications with limited color palette to display properly > Run in 256 colors.
Resolves display problems with menus and buttons > Disable visual themes.
Allows low resolution applications to display properly > Run in 640 x 480 screen resolution.
You have a computer running Windows 7 Enterprise. A custom application works great on previous versions of Windows; however, it does not execute correctly on the Windows 7 computer. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn’t work, you temporarily disabled UAC, but this didn’t fix the problem. You must get the application to work correctly on this computer. What should you do next?
Implement a shim from the Compatibility Administrator.
You have a computer running Windows 7 Professional. You have a custom application that will not run on the computer. The application works well on computers running in 32-bit installation of Windows XP Professional. You decide to use Windows XP mode to run the application. Your computer has the following hardware specifications:
C: drive with 62 GB of free space.
1 GB of RAM, one additional socket available.
One Core 2 duo processor with Intel VT support.
Video card with 128 MB of memory with WDDM support.
You need the computer to run Windows XP mode. What should you do?
Add more memory
You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fin on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn’t work, you temporarily disabled UAC, but this still didn’t fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next?
Run the Compatibility Administrator.
You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should use the digital signature of the software and apply to all current and future versions of the application, regardless of the filename or its location. You decide to create an executable rule with a publisher condition using application control policies. What should you do?
Browse and select the executable file for the application. Modify the rule to include the product name information.
You manage a Windows 7 computer that is shared by multiple users. You want to prevent users from running a common game on the computer. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create a Software Restriction policy rule to protect your computer. What should you do?
Create a hash rule.
You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. If possible, the rule should apply to all current and future versions of the application, regardless of the filename or its location. The application is not digitally signed. What should you do?
Create an executable rule with a file hash condition in application control policies.
You manage a computer that runs Windows 7. You want to find out who has been running a specific game on your computer. You do not want to prevent users from running the program, but instead want to log information when the file runs. The application is not digitally signed. What should you do?
In application control policies, create an executable rule with a path condition that identifies the file. For executable rules, configure “Audit only”.
You manage a computer that runs Windows 7. You want to prevent users from running any file with a .bat or .vbs extension unless the file is digitally signed by your organization. What should you do?
In application control policies, create a script rule with a publisher condition.
You manage several computers that run Windows 7. You would like to have better control over the applications that run on these computers, so you have decided to implement AppLocker. You have created default rules and an executable rule that allows the company’s accounting application to run. You notice that you can still run any program on your test client. What should you do? (Select two. Each choice is a possible solution.)
Set the enforcement mode for executable rules to Enforce rules.
Start the Application Identity service on the client.
You manage a computer running Windows 7 and shared by multiple users. Recently, users have downloaded and installed two malware programs onto the computer. After download, the applications are installed by running programs with a .msi extension. The files are not digitally signed. You want to prevent all users from installing these applications, regardless of how they have obtained the files. What should you do?
In application control policies, create a Windows Installer rule with a file hash condition.
You manage a computer that runs Windows 7. You would like to prevent users from running all software on the computer except for software that has been digitally signed. The rule should apply to all known and unknown software. What should you do?
Configure an executable rule in application control policies with a publisher condition.
You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should apply to all current and future versions of the application, regardless of the filename or its location. What should you do?
Create an executable rule with a publisher condition in application control policies.
What of the following is based on a push technology used with Internet Explorer that notifies you when a Web site is changed?
RSS
Which of the following is used to help prevent attackers that penetrate the computer?s defense from accessing vital system components?
Protected mode
Which of the following is NOT an available security zone found in Internet Explorer?
Custom Sites
Which of the following configures Internet Explorer to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders?
Protected mode
Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?
Accelerators
You are visiting a Web site that worked fine when you were using Internet Explorer 6 on a Windows XP machine. However, you suspect that this Web site is not compatible with Internet Explorer 8?s protected mode. Which of the following should you NOT do when troubleshooting this problem?
Run Internet Explorer as a domain administrator.
What technology is used with IE 8 to help defend against phishing?
SmartScreen Filtering
What feature found in Internet Explorer 8 enables you to surf the Internet without leaving any record of your activities?
InPrivate Filtering
What program that comes with Windows 7 is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism?
Program Compatibility Troubleshooter
You have just installed a new Windows 7 computer for a client. The client asks you to install a software program that has the following minimum software requirements.

256 Memory
1 Gigabyte Hard Drive
Windows XP Operating system

You install the software on the Windows 7 computer and when you select the shortcut to launch the executable the program will not launch. What step would be most appropriate to take next?

Run the program using one of the Windows XP compatibility modes
What specialized program collects compatibility information for web pages and web-based applications?
Internet Explorer Compatibility Test Tool
Software Restriction policies and AppLocker are configured through __________.
Group policies
If you have a program that ran in Windows XP but does not run in Windows 7, what should you load to run the program?
Windows XP Mode
Your organization must upgrade to Windows 7. During the upgrade planning process you discover an application that will not run and is not supported on the Windows 7 platform. The organization must have the application and must upgrade to Windows 7. What solution would you recommend?
Install the program on the Windows 7 computer using Windows XP Mode
You have a program that ran on your Windows XP machine that was running SP2. You try to install the program on Windows 7, but it does not run. What should you try first to overcome this problem?
Configure a Windows emulation mode.
You have a computer that runs Windows 7. You have just read about a new security patch for Windows 7. You install the patch as a Windows Update, but after you reboot and log back on your computer is unstable. What action should you take?
Use Windows Update in the Control Panel to uninstall the update.
You have a computer that runs Windows 7. You need to manually check for updates from Windows Update. What should you do? (Select two. Both answers are complete solutions.)
Run *wuauclt.exe /detectnow*.
Click the *Check for updates* button in Windows Update.
You have a computer that runs Windows 7. Your computer is configured to download and automatically install important (critical) patches using Windows Update. You notice that updates that Microsoft suggests, but does not mark as important, are not being downloaded. You would like these other updates to download and install automatically with the least amount of effort. What should you do?
Configure Windows Update to include recommended updates.
You have a computer that runs Windows 7. Windows Update is continually notifying you to install an update that you have determined that you should not install on your machine due to incompatibility reasons. You want Windows Update to stop notifying you of this update. What should you do?
Hide the update.
You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You find that your computer has not been installing recent updates. You want to see information about how the computer is configured to get updates including the name of the server it tries to contact when checking for and downloading updates. What should you do?
Look through the WindowsUpdate.log file.
You have a stand-alone computer running Windows 7 Professional. You need to determine if the computer has any administrative vulnerabilities. What should you do?
Use Microsoft Baseline Security Analyzer (MBSA)
You have a computer that runs Windows 7. While manually configuring Windows Update, you notice that several settings are grayed out and unchangeable as shown in the image. You want to enable the settings so you can manually configure them. What should you do?
Use Group Policy to modify the Windows Update settings.
You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You need to determine if a specific security update from Windows Update is installed on the computer. What should you do?
Go to Programs and Features in the Control Panel.
You have a computer that runs Windows 7. You would like to configure Windows update to download updates that Microsoft suggests, but does not mark as important. You would like to ensure that updates are installed on the computer without the intervention of an Administrative user. Select the settings that you should enable on the computer.
Give me recommended updates the same way I receive important updates.
Allow all users to install updates on this computer.
You have a computer that runs Windows 7. Recently, a WSUS server was configured and enabled in your internal network. Now you need to configure Windows Update on your computer to search for and download updates from the WSUS server. What should you do?
Set the *Specify intranet Microsoft update service location* setting in Group Policy.
You have a computer running Windows 7. You want to configure Windows to prompt for additional credentials whenever a sensitive action is taken. What should you do?
Edit User Account Control (UAC) settings.
You manage 20 computers running Windows 7 in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. What should you do?
Configure the *User Account Control: Behavior of the elevation prompt for standard users* setting in Group Policy to *Prompt for credentials*.
You have been asked to troubleshoot a Windows 7 computer that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director’s user account is a standard user and not a member of the local Administrators group. You want the UAC prompt to show. What should you do?
Enable the *Run all administrators in Admin Approval Mode* setting in Group Policy.
You have a computer running Windows 7. Prior to installing some software, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but it is not working at all. What should you do?
Reboot the machine.
You have several Windows 7 computers in a domain network. When you install software on the new computers, you discover that it does not run because User Account Control (UAC) causes it to fail. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with UAC. What can you do to get the application to work with UAC? (Choose the best solution.)
Alter the program settings to *Run this program as an administrator*.
You have a computer running Windows 7 Ultimate. You want to modify the default settings for UAC to meet the following criteria:
Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings.
The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt.
Settings should apply to all standard users.
What should you do?
Disable the *Switch to the secure desktop when prompting for elevation* setting in Group Policy.
Which of the following enables the user to manage, configure, or perform certain tasks on an object?
Permissions
Which program or component includes User Accounts?
Control Panel
What is Microsoft’s directory service called?
AD
What program do you use to manage fully all local users and group accounts on a computer running Windows 7?
Computer Management console
Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups?
User rights
What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory?
Domains
Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources?
Authorization
What do you call it when you are loading an application, and you get a credential prompt that makes the rest of the screen dull and unclickable?
Secure desktop
Which program is an MMC snap-in?
Local Users and Groups
You are deploying Windows 7 in the accounting department. You discover that the users of the Windows 7 workstations will need the rights to change the network configuration of their local computers. What local group should you add the accounting users to on the Windows 7 computer? (Choose the most appropriate group)
Network Configuration Operators
Which of the following do you have to create the same user account for on each computer that a user needs to access?
Workgroups
Which account is designed for users that require only temporary access to the computer and is disabled by default?
Guest
Which type of user profile is stored on a shared server drive, which makes it accessible from anywhere on the network?
Roaming user profile
Which of the following is a series of folders associated with a specific user account that contains personal documents and personal settings?
User profile
Which type of user profile is automatically created when a user logs on the computer for the first time and is stored on the computer’s local hard drive?
Local user profile
You have a computer running Windows 7 Professional. The computer is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer. You want to configure the firewall as follows:
Allow a specific port used by the application.
Open the port only for members of the Sales group.
You want to make the change using the least amount of effort possible. What should you do?
In Windows Firewall with Advanced Security, add an outbound rule. Require only secure connections for the rule, and add the Sales group to the list of authorized groups.
You have several computers running Windows 7 Ultimate. Corporate policy states that a specific connection-oriented application must be blocked from accessing the Internet. You must use the Windows Firewall with Advanced Security to complete the task. What should you do?
Create an outbound rule blocking the corresponding TCP port on each machine.
You have several computers running Windows 7 Enterprise. The computers are connected to the network as shown in the image. You have configured static IP addresses for Comp1 and Comp2. To test the connection between the computers, you enter *ping 192.168.23.38* on Comp1’s command prompt; however, the ping is unsuccessful and times out. You then use the *ping 192.168.23.231* on Comp2’s command prompt, but the ping times out again.You need the ping commands to succeed between the two computers. What should you do?
Permit ICMPv4 traffic through the firewalls of both computers.
You have several computers running Windows 7 Ultimate. The computers are members of a workgroup. You need to create many custom firewall rules on each computer. The rules must be specific for the Private network profile. You should complete the task with the least amount of effort as possible. What should you do? (Select two. Each answer is a complete solution.)
Configure one computer with the Windows Firewall with Advanced Security MMC snap-in. Then use the same tool to export the settings and import settings on the remaining machines.
Configure one computer. Use *Netsh advfirewall* to export the firewall settings. Import the settings on the remaining machines.
You have a computer running Windows 7 Enterprise. You need to change how Windows provides notifications when the firewall blocks a new program. Select the link that you would choose to make this change.
Change notification settings.
You manage a laptop computer that runs Windows 7. As part of your security auditing strategy, you would like the system to record packets that have been dropped by firewall rules on your computer. You want to record only the packets dropped on public interfaces. You do not want to record information about allowed packets. What should you do?
In Windows Firewall with Advanced Security, configure logging for the public profile.
You have a laptop running Windows 7 Enterprise. The laptop is used both in a public network and private (work) network. The work network contains FTP servers which hold sensitive data. To protect the data, you need to ensure that the computer can connect to FTP servers only while it is connected to the private (work) network. What should you do?
From Windows Firewall with Advanced Security, create a new rule.
You have a computer running Windows 7 Ultimate. You need to configure Windows Firewall to allow traffic for an application that dynamically opens multiple ports on an as-needed basis. What should you do?
Adda program exception.
You have a computer running Windows 7 Ultimate. The computer has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is a public connection. You need to allow help desk users to use Remote Assistance to help you across the wired network, but want to block any such access from the wireless network. You want to configure Windows Firewall to allow and deny access as described. What should you do?
Enable the Remote Assistance exception only on the private profile.
You manage encrypted files or folders using the *Cipher* command. Drag the specific *Cipher* command on the left and drop it on the function performed on the right.
Adds a recovery agent key > *Cipher /u*
Generates recovery agent keys > *Cipher /r*
Creates a new file encryption key > *Cipher /k*
Displays the encryption state > *Cipher*
Changes the certificate used to encrypt files > *Cipher /rekey*
Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney recently left the company on short notice. Rodney’s manager, Kate, wants access to all of Rodney’s files. You make Kate’s account an administrator for Rodney’s computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney’s documents, receiving an access denied message. You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do?
Log on to the laptop using an account with DRA privileges. Clear the Encrypt attribute on the file.
You have a Windows 7 laptop that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recover agent so you can revery any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first?
Run *cipher /r*.
You have a laptop running Windows 7 Ultimate edition. You have been encrypting files on your computer using EFS and a self-signed certificate. You now want to protect your encrypted files using a certificate on a smart card. You install a smart card reader and obtain a smart card with a new certificate. You want to make sure that all encrypted files use the certificate on the smart card. What should you do first?
Run *rekeywiz*.
Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney shares the laptop with his manager, Kate. Rodney stores private company documents in the C:Data folder on his laptop. Both Rodney and Kate access the documents when they are using the laptop. Rodney is concerned about the documents falling into the wrong hands if his laptop if stolen. Rodney wants to protect the entire contents of the C:Data folder. You want to help Rodney encrypt the contents of the C:Data folder so that Kate and Rodney are the only authorized users. What should you do?
Instruct Rodney to log on to his computer, edit the properties of the C:Data folder, and enable encryption. Add Kate as an authorized user for each file in the C:Data folder.
You have a computer that runs Windows 7. Mary and Mark share the computer. Mary encrypts a file by using Encrypting File System (EFS). When Mary attempts to grant Mark access to the file, she sees the dialog shown in the image. You need to ensure that Mary can grant Mark access to the file. What should you do?
Instruct Mark to log on to the computer and encrypt a file.
You have a Windows 7 laptop that is shared by three users. The computer is a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. You install a smart card reader and obtain a new smart card with a certificate that can be used for EFS recovery. You add a data recovery agent using Group Policy. What should you do next?
Have each user run *cipher /u*.
You have two computers that run Windows 7 Ultimate: Comp1 and Comp2. Both computers are members of a HomeGroup; neither computer is a domain member. On Comp1, you share the C:Files folder with the HomeGroup. The C:Filesdata.doc file is encrypted. From Comp2, you can access all of the files in the C:Files folder except for the data.doc file. What should you do?
Copy your private key from Comp1 to Comp2.
You have two computers that run Windows 7 Professional: Comp1 and Comp2. Both computers are members of a domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do?
Export the recovery agent keys from Comp1 and import them to Comp2.
You have a two computers: Comp1 is running Windows XP Professional and Comp2 is running Windows 7 Professional. After moving EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data. You need to open the EFS-encrypted files on Comp1. What should you do? (Select two. Each answer is a complete solution.)
Use *Cipher.exe* to transfer the encryption certificates.
Use USMT to transfer the encryption certificates.
Your Windows 7 computer has two hard drives as shown in the *Exhibit*. The C:Finances folder and its contents have been encrypted. You need to move the C:FinancesReports.xls file to the D: drive. You want the file to remain encrypted. You want to accomplish this with the least amount of effort possible. What should you do?
Run the *convert* command, followed by the *xcopy* command.
You manage a laptop that runs Windows 7. The laptop is shared by members of the Sales team. Sales team members use standard user accounts to log on to the computer. You want to allow users to change the system time and the time zone. You need to grant them this ability while limiting their ability to perform unrelated tasks. What should you do?
Configure user rights for the Sales group in the local security policy.
You have several computers running Windows 7 Ultimate. The computers are members of a domain. For all the computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?
Use Group Policy
Your organization has decided to implement a wireless infrastructure. They require that the infrastructure be capable of central administration and logging. Based on this information what is the best solution?
WPA-Enterprise
What technology uses the remote client to connect to a remote access server over the Internet?
VPN
What does L2TP use to encrypt data?
IPsec
What do you use to synchronize between your computer, offline drives, and mobile devices?
Sync Center
If you don?t have TPM, how else can you use BitLocker?
Store the encryption key on a USB flash drive.
Which wireless technology is considered a weak encryption protocol?
WEP
Which tool set is designed specifically for mobile PCs?
Windows Mobility Center
What user account has the ability to recover BitLocker drives for an entire organization?
Data recovery agent
Which VPN protocol connects using SSL?
SSTP
What protocol does DirectAccess use to encrypt network communications?
IPSec
__________ is used as an external display that displays images on a screen.
Display projector
What technology is used to encrypt removable USB devices?
BitLocker To Go
Which command is used to manage power?
Powercfg.exe
Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec?
802.11g
What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates?
Network Access Protection
How can you execute commands on a remote computer?
Use winrs.exe.
Which program enables you to connect to a remote computer including servers with no interaction required from the remote computer?
Remote Desktop
What type of backup creates a separate backup of the computer?s system disk and reserve partition that Windows 7 creates on the disk during installation and saves to a VHD file on the backup device?
System image backup
What command do you use to allow remote management communications on a PC so that you can use winrs.exe?
winrm quickconfig
What option starts the computer with a minimal set of generic drivers which are needed to run the system?
Safe mode
You load a driver for your motherboard and now the system does not boot properly. What should you do to overcome this problem? (Choose the best answer.)
Use the Last Known Good Configuration.
Where is the boot menu configuration stored?
BCD registry file
What command do you use to start the System Configuration Tool?
Msconfig
What are duplicates of files that Windows creates as part of a restore point?
Volume shadow copy
Which of the following requires invitations to use?
Remote Assistance
What format supports Virtual PCs that contain the entire content of a hard disk in a single, portal file?
VHD
You want to view the logs shown in the Event Viewer on a remote computer. What should you do?
Use the Connect To Another Computer command in the Action Menu within the Event Viewer.
You are working on a Windows 7 system that continuously fails once you logon to the system. You suspect that a startup application is causing the issue. What can you do to successfully logon to the system
Hold on the Shift key while logging on to the system
Your company will upgrade to Windows Server 2012. The present environment is Windows Server 2008 R2 servers or higher. What is the best path to upgrade to Windows Server 2012?
Clean installation of Windows Server 2012.
What factor is not important for choosing the best Windows Server 2012 edition for your environment?
heating and cooling system of the datacenter
File and Storage Services falls into which of the following basic role categories:
Application Services
Using Features on Demand results in saving potentially significant amounts of disk space. Features on Demand becomes a third installation state per feature in Windows Server 2012. While previous versions allowed only Enable or Disable, Features on Demand provides _______.
Disabled and deleted
The difference between in-place upgrade and a migration is ________.
A migration copies vital information from the existing Server to a clean installation of Windows 2012.
You decide to change the interface on your Windows Server 2012 server. Select the best answer to convert a GUI server to Server Core.
Use Server Manager to start the Remove Roles and Features Wizard.
You want to add a role to several Windows Server 2012 systems on the network. Which of the following is correct?
Use Server Manager on any Windows Server 2012 to connect and install the role to all the systems.
Your company uses virtualized servers extensively and has many offline VMs. A role must be added to some offline VHDs. What do you do?
After selecting Add Roles and Features, you can browse for the offline VHD.
Windows Server 2012 provides hardware-independent NIC teaming or bonding to allow for better network performance and adapter fault tolerance. However, in what scenario is the NIC teaming limited?
When network traffic consists of large TCP sequences
On a Windows Server 2012 server, you decide to change the interface. Select the best answer to convert a GUI server to Server Core.
Use Server Manager to start the Remove Roles and Features Wizard.
What was the partition style(s) prior Windows Server 2008 and Windows Vista?
Master Boot Record (MBR) only
After you create a new VHD, it appears as a _________ in the Disk Management snap-in and in Server Manager.
uninitialized disk
What RAID levels are supported by Windows Server 2012?
RAID levels 0, 1, and 5
What physical disk technology runs at 600 MB/sec. However, it is no longer suitable for large enterprise servers.
SATA
What is the minimum number of physical disks required to create a RAID 5 volume?
3
Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides basic NFS sharing with authentication and permissions. Which do you choose?
NFS Share-Quick
You grant a user the NTFS permissions needed to access a file. You then move the file to a different location. Is the user still able to access the file?
Yes, when you move the file, its permissions go with it.
When you manage permissions in any of the Windows Server 2012 permission systems, you are actually creating and modifying the _______ in an _______.
access control entries; access control list
Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides SMB sharing with full share and NTFS permissions and access to services provided by File Server Resource Manager. Which do you choose?
SMB Share-Advanced
What is the primary tool in Windows Server 2012 to take control of the shares on all your disks on all your servers and exercise granular control over their properties?
File and Storage Services in Server Manager
What is XML Paper Specification (XPS)?
print job files stay a single document format to the print device, rather than conversion through EMS and PCL
To configure a printer pool, you enabled printer pooling on the Ports tab under Printer Properties. You have five print devices ready for the printer pool. Of those five, four are in one room. Of the four, three use the same print driver. Of those three, two print devices are identical. How many print devices are in your printer pool?
3
What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Network-attached Printer Sharing?
They are essentially the same physically. Logically, the print jobs are handled differently.
Which of the following is NOT a basic printer permission?
Take ownership
You have an executive who needs her print jobs handled above those of others. How would you accomplish this advanced printing configuration?
Connect multiple print servers to a single print device
What is the default web address for the PowerShell Web Access Gateway?
https:///pswa
Considering the different ways to remotely manage servers, what allows administrators to use their web browser as a remote management gateway?
Windows PowerShell Web Access Gateway
Considering the different ways to remotely manage servers, what does Microsoft recommend we connect to other servers instead of a Window Server 2012?
Windows workstation
Considering the different ways to remotely manage servers, which allows you to create server groups?
Server Manager
When you originally deployed the AccServer virtual machine on your Windows Server 2012 hypervisor, it stored accounting data from all departments in your orgranization and therefore required a very large virtual disk. However, as your organization has grown, additional department-specific accounting servers have been deployed and much of the data that used to be stored on AccServer has been migrated to them. Because the virtual hard disk file for the AccServer virtual machine is set to grow dynamically, the now unused space in the file can now be reclaimed on the physical hard drive in the Windows server. Click on the option you would use in the Edit Virtual Hard Disk Wizard to do this without reducing the overall storage capacity of the virtual hard disk.
Compact
You need to add additional disk space to the AccServ virtual machine running on a Windows Server 2012 hypervisor. to accomplish this, you decide to create a pass-through disk. Click the option you would use in the virtual machine’s Settings screen to do this.
Physical hard disk:
Which Hyper-V feature in Windows Server 2012 allows you to create read-only parent virtual hard disk files that are linked to child virtual hard disk files that contain only changes made to the parent disk?
differencing disks
You are working in Hyper-V Manager on your Windows Server 2012 system. This system hosts several Windows Server 2008 R2 virtual machines. You create snapshots of these virtual machines nightly as part of your disaster recovery plan. Users are complaining that they can no longer access the virtual servers. In Hyper-V Manager, they are identified as being in a Paused-Critical state. What should you do? (Select two. Each answer is part of the overall solution.)
Install a new physical hard disk in the hypervisor host.

Move the snapshot files to the new hard disk.

You have decided to install multiple virtual servers, all running Windows Server 2011, on a single physical computer. You install Hyper-V on a server that is running Windows Server 2012 Datacenter edition. You need to install the following virtual machines:

3 servers running the Windows Server 2008 Standard edition (32-bit)
4 servers running the Windows Server 2008 R2 Standard edition (64-bit)
3 Servers running the Windows Server 2012 Datacenter edition (64-bit)
To conserve disk space, you decide to use parent and differencing disks. You need to create the virtual hard disks used by the virtual machines. What should you do?

Create 3 fixed disks and 10 differencing disks.
You want to use Hyper-V to create two virtual machines, with each using a common parent installation. Listed below are the steps necessary to complete the configuration. Drag each required step from the list on the left to the spaces on the right. Use only the necessary steps to complete the configuration.
Step 1
Create one fixed disk.
Step 2
Create the virtual machine(s)
Step 3
Install the operating system
Step 4
Install integration services
Step 5
Make the disk(s) read only
Step 6
Create two differencing disks
Step 7
Create the virtual machine(s)
Step 8
Step 9
You currently manage a virtual machine named VM12 that has been installed on the Srv5 physical server. The virtual machine uses a single fixed disk of 100 GB saved in the vdisk1.vhd file. Physical disk space on the server is getting low. When you run Disk Management within the virtual machine, you notice that only 30 GB of space is being used, but the vdisk1.vhd file occupies 100 GB. You want to reduce the physical size of the virtual hard disk What should you do?
Convert the disk to a dynamically expanding disk named vdisk2.vhd. Delete vdisk1.vhd, and rename vdisk2.vhd to vdisk1.vhd.
You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. The virtual machine uses a single dynamic disk of 100 GB. You notice that the physical size of the virtual hard disk is 40 GB, but that the virtual machine reports only a total of 20 GB of files. You want to reduce the physical space used by the virtual hard disk. What should you do?
Compact the disk.
You have previously used Hyper-V to create a parent installation of Windows 7 with three child installations. Child virtual systems are named Client1, Client2, and Client3. The parent virtual hard disk file is named parent vhd, with differencing disks named Client1.vhd, Client2.vhd, and Client2.vhd. You decide that you want to configure the Client2 virtual machine so that it no longer uses a differencing disk. The remaining two virtual machines should continue to use differencing disks from the parent. What should you do?
Merge Client2.vhd with Parent.vhd creating a new file named Client2a.vhd. Delete Client2.vhd and rename Client2a.vhd to Client2.vhd.
You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. The virtual machine runs Windows Server 2012 Enterprise edition and a custom application. You receive an update to the application. You want to save the current state so that if the update causes any problem,s you can easily revert back to the state before the update was installed. What should you do?
Take a snapshot of the virtual machine.
You currently manage a virtual machine named VM12 that has been installed on the Srv5 physical server. The virtual machine uses a single fixed disk of 40 GB saved in the vdisk1.vhd file. The virtual machine is running out of free disk space. The virtual machine currently uses about 39.5 GB of the available disk space. You need to add more disk space to the virtual machine. What should you do?
Expand the vdisk1.vhd disk.
You are the network administrator for *westsim.com*. The network consists fo a single Active Directory domain. All the servers run Windows Server 2012 and all the clients run Windows 8. You are responsible for a server named HV1 that has the Hyper-V role installed. HV1 hosts a virtual machine that runs a custom web application that is in use 24 hours a day. The virtual machine has one hard drive that is hosted on a 127 GB expanding virtual hard drive (.vhd). The server is running out of room. Management would like to upload 100 GB of new media files for use in the web application. You need to provide more storage space inside the virtual machine while minimizing the downtime for the custom web application. What should you do?
Add a new virtual hard dive (.vhd) to a SCSI controller.

Need essay sample on "Windows 7 Configuration"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy