click below
click below
Normal Size Small Size show me how
70-680 study
Question | Answer |
---|---|
1. Windows components can be added or removed by clicking the Start Bar; Control Panel; Programs; then click: | Turn Windows features on or off. |
2. What can be performed from the Windows 7 DVD? | Run setup.exe from the DVD to start the Windows 7 installation.Use the autoplay feature on the DVD to start the installation. Perform a full installation of Windows 7. |
3. You cannot perform an upgrade to Windows 7 keeping ALL the Windows XP settings!!! | * |
4. Federated Search connectors are installed using what method? | Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install. |
5. What volume types can be used by Windows 7? | FAT exFAT NTFS |
6. The Aero Shake feature will work as long as: | A display adapter compatible with WDDM is installed. The Windows Experience Index is 3 or greater. |
7. You need to identify which applications were installed during the last week | View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel. The informational events should be reviewed from Reliability Monitor. |
8. All the games come with which versions of Windows 7? | Windows Enterprise Edition; Windows Ultimate Edition |
9. Which versions of Windows 7 allow you to join an Active Directory domain? | Windows Professional Edition ; Windows Enterprise Edition ; Windows Ultimate Edition |
10. What is not a minimum requirement to install Windows 7 | 4GB RAM (32-bit)/2 GB RAM (64-bit) |
11. This is not a rating for games | General Audience (G) |
12. You can control when users such as kids can login to Windows 7 with what option? | Start Bar -> Control Panel -> User Accounts and Family Safety -> Setup Parental Controls; and then choose Time Restrictions. |
13. This describes how the user is alerted with system information and configuration alerts: | A flag in the taskbar with a red X indicates there is a problem needing attention. |
14. If you have a router in the network you’re connected to that has an IP address of 192.168.3.1 and the subnet mask of the network is 255.255.255.0; what is a usable IP on the network? | 192.168.3.56 Note: With a /24 subnet the increment is 1; so the range is 192.168.3.0 – 192.168.3.255. So a useable IP would be between 192.168.3.2 – 192.168.3.254. |
15. What command line utility do you use to force a PC to boot Vista by default? | bcdedit.exe |
16. In order to establish a DirectAccess connection to the network; what is the first requirement? | Install a certificate |
17. Windows XP had Outlook Express; Vista has Windows Mail; Windows 7 has: | no preinstalled mail client |
18. This is used to control the security pop-up notifications that appear when programs are run in Windows 7: | User Account Control |
19. What are some Windows PE tools that would be on the disc? | Diskpart ; Oscdimg ; Winpeshl |
20. This can be used to increase the physical memory on your Windows 7 PC | ReadyBoost |
21. What is the Windows 7 command line utility that can be used to manage encrypted data? | Cipher.exe |
22. This will cause the Online Compatibility Check to fail during a Window 7 installation | 512MB of RAM ; A display adapter without WDDM Support |
23. To which edition of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)? | Windows 7 Ultimate (x86) |
24. You must perform a migration rather than an upgrade when you are going from: | Windows XP Professional (x64) to Windows 7 Professional (x64) ; Windows Vista Business (x86) to Windows 7 Professional (x64) ; Windows Vista Home Premium(x64) to Windows 7 Home Premium(x86) |
25. Matt has a home computer with a cable Internet connection and no other computers on his home network. Which method can be used to upgrade from Windows 7 Home Premium to Windows 7 Ultimate? | Windows Anytime Upgrade |
26. This is used to determine if the applications installed on your Windows Vista computer are known to have problems with Windows 7: | Windows 7 Upgrade Advisor |
27. Which operating systems support an offline migration using USMT? | Windows XP Professional ; Windows Vista ; Windows 7 |
28. This is used to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 | USMT ; Windows Easy Transfer |
29. This XML file is used with ScanState to specify information about user profile that should be migrated | MigUser.xml |
30. You can download this from Microsoft's Web site to obtain USMT 4.0 | WAIK |
31. You are creating a WIM system image of a Windows 7 installation on a reference computer. What should you boot to; and what WAIK tool should used? | Boot to Windows PE and use ImageX. |
32. What can you use to create an unattended answer file Windows 7? | The Windows SIMtool in Windows AIK ; Microsoft Notepad |
33. When using the Sysprep tool; what command-line option removes all unique system information? | /generalize |
34. This sysprep option has the Windows Setup configuration pass apply settings to Windows 7 before Windows Welcome starts | /oobeSystem |
35. You want to create a 20-GB native VHD called computer.vhd in a folder called Windows 7 on an external USB hard disk with the drive designation H:. Which command do you use? | create vdisk file=h:\windows7\computer.vhd maximum=20000 |
36. This command can be used to verify that a boot entry is created successfully | bcdedit /v |
37. You have VHDs that are normally offline. They need to receive updates once a week. What tool should be used? | Offline Virtual Machine Servicing Tool |
38. You have system image named Install.wim file in folder C:\Images. You mounted the image as D:\Mount . You want to add third-party drivers in the C:\Drivers\Printer and C:\Drivers\Scanner folders to the mounted image. | dism /image:d:\mount /add-driver /driver:c:\drivers /recurse ; dism /image:d:\mount /add-driver /driver:c:\drivers\printer / ; driver:c:\drivers\scanner |
39. You need to find out the amount of writeable space available on a Windows PE system volume when booted in RAMdisk mode. The PE image is mounted D:\PEMount | dism /image:d:\pemount /get-scratchspace |
40. You have created an answer file called Unattend.xml in the C:\Textfiles\Answer folder. You need to apply it to an image mounted in the C:\Mount folder | dism /image:c:\mount /apply-unattend:c:\textfiles\answer\unattend.xml |
41. A user without administrator privileges attaches a device to a computer running Windows 7. What needs to be true for the device to be installed? | The device driver must have a valid digital signature. ; The device driver must be stored in the device driver store. |
42. A device listed under Non-Plug and Play Drivers in Device Manager is causing problems. You need to immediately stop the device to investigate. How? | Open the Device Properties dialog box in Device Manager. On the Driver tab; click Stop. |
43. You need a fault tolerant disk configuration for your Windows 7 operating system. What type of volume do you use? | Create a RAID-1 volume ; Note: With regards to dynamic disks; the operating system can only reside on a simple dynamic disk; or a mirror set. Windows 7 is capable of making spanned volumes; striped volumes and even raid 5 volumes however. |
44. You want to prohibit read; write; and execute access to all types of external storage. What is the correct device policy? | All Removable Storage Classes: Deny All Access ; Note: This policy is found in a group policy: Computer Configuration -> ; Administrative Templates -> System -> Removable Storage Access ; This is also located under same path in User Configuration. |
45. You assign IP addresses to two computers properly; but are unable ping back and forth. Why? | You need to permit ICMPv4 traffic through the firewalls of both computers |
46. What resource record enables DNS to resolve a host name to an IPv6 address? | AAAA |
47. You need to tell a user how to create screenshots of the actions he performs on the computer; including his mouse actions; so you can provide him better support. What should you tell the user to do? | Run Psr.exe and then click Start Record. |
48. How do you increase the size of a paging file? | From the system properties; modify the Advanced system settings. |
49. You perform regular data backups and system image backups. The system experiences a hard disk failure and you replace the failed hard disk. You need a recovery solution so you start the computer from the installation media. What is the recovery opt | System Image Recovery |
50. What tool can you use to restore a wim image to its original state? | DISM |
51. You encrypted your hard drive with BitLocker. Now you have lost your recovery keys.. What can you do? | Install Windows 7 fresh |
52. You have a 16 bit application and want it to run from the start menu in Windows 7. You installed the application in XP mode. What do you do? | Add the shortcut to the Start menu ; Note: When you run Windows XP Mode the first time; a full desktop will open and you can use it to install applications. Installed applications will automatically appear on the Windows 7 Start Menu. Thereafter; users ca |
53. If you want to access other peoples music from different computers you should? | Put the computers into a Homegroup!! |
54. What is the command to ping an IPv6 address? | ping -6 IPv6 (not Ping -R IPv6) |
55. You need to add a file into a WIM image. What command can be used to mount the image file so that the file can be added? | Use imagex /mountrw |
56. How can you configure Windows 7 so that you can login to remote PC’s using different accounts; and do so automatically? | Add the usernames to the Credential Manager |
57. How can you improve access times to cached contents while using Branch Cache? | Configure BranchCache as Distributed Cache on the client system |
58. How can you prevent users from using any removable drives except for the ones that are already installed? | Prevent removable device installation on the system |
59. You set your computer to Sleep after 10 minutes of inactivity. After 15 minutes idle; the system is still on. What do you need to do to check what is causing the problem? | Using the command powercfg -energy |
60. In disk management; you see the following: How do you expand volume C? | Backup and delete volume D |
61. Computer42 has a shared folder and remote desktop has been enabled. You must satisfy this condition: all computers from subnet A need to access files on the shared folder of Computer42. All computers from subnet B should not be able to access files | Modify the File and Printer Sharing Firewall Rule on Computer42 |
62. Your Windows 7 computer is performing slowly. You believe it is due to an excess of network activity. How can you view the processes that currently generate network activity? | Open Resource Monitor and click the Network tab. |
63. You need to ensure that all files stored in the SALES folder are indexed by Windows Search. What is the least administrative effort that can accomplish this? | Create a new library and add the SALES folder to the library |
64. If you have no available drives to dedicate to backups; what should you do before you run the Configure Backup wizard? | Connect a removable disk. |
65. You update the video card driver on your windows 7 computer and then the computer becomes unresponsive. How can you resolve the problem? | Restart in safe mode and then roll back the video card driver. |
66. You need to ensure that you can install Windows 7 on the hard drive that is attached to a RAID controller | Start the computer from the Windows 7 installation media. From the Install Windows dialog box; click Load Driver. |
67. There is a computer that runs Windows Vista Service Pack 2 (SP2). You need to upgrade the Vista computer to Windows 7. What is the best way to accomplish this? | While booted in to Windows Vista; run Setup.exe from the Windows 7 installation media and select the Upgrade option. |
68. You need to prepare a source computer before it is imaged. What should you do first? | At the command prompt; run the Sysprep command. |
69. The computer currently has no OS. You have a virtual hard disk (VHD) that contains Windows 7. You start the computer from a Windows PE disk; create a partition and copy the VHD to the partition. You need to configure the computer to start from the VH | Diskpart.exe and Bcdboot.exe |
70. You need to identify which of the applications that are currently installed on all of the computers in your network will run on Windows 7. What tool do you use? | Microsoft Application Compatibility Toolkit (ACT) |
71. You need to create a policy that only allows applications that have been digitally-signed by the company to be used. How can this be accomplished? | Create an AppLocker executable rule |
72. Your computer has an IP address of 169.254.34.12. You need to ensure that you can connect to all computers on the network. You could: | Configure a static TCP/IP address. |
73. You create a HomeGroup and need to Allow access to the homegroup when you are connected to private networks; but Block access when connected to public networks | Configure the HomeGroup exception in Windows Firewall to include Home or work(private) networks and block Public networks. |
74. User1 must be allowed to delete all files in Folder1. Members of Group1 must be able to create files in Folder1. All other members of Group1 must be prevented from deleting files they did not create in Folder1. All users must be prevented from modi | Assign Group1 the Write permission. Assign User1 the Modify permission. |
75. You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer. | From the local computer policy; modify the Microsoft Management Console (MMC) settings |
76. Your website’s certificate is self-signed. Users receive a warning message saying there is a problem with the certificate. How can this be solved? | From Certificate Manager; import the Web sites certificate into your Trusted Root Certification Authorities store. |
77. The computers are configured to use BranchCache. You need to temporarily prevent all computers from retrieving cached content from a specific computer | At the command prompt; run Netsh branchcache flush. |
78. You need to ensure that you can read the content of all encrypted files on the computer | Run Cipher.exe /r and then add a data recovery agent from the local security policy. |
79. You have an Active Directory domain and want to minimize network traffic between a main office and a branch office and make sure a computer can only access resources in a certain share while connected to the network. | Enable transparent caching ;Note: Transparent caching aggressively stores files in the offline files cache once they've been read. If a user tries to open the same file again; most (if not all) of the file's information can be read from the local cache; s |
80. You have your DHCP server configured as a Network Access Protection (NAP) enforcement point. You need to configure a computer as a NAP client. How is this accomplished? | From Services; set the Network Access Protection Agent service Startup Type to Automatic. From the NAP Client Configuration console; enable the DHCP Quarantine Enforcement Client. |
81. In your Active Directory domain Windows Remote Management (WinRM) has been enabled on all computers. You need to remotely create additional disk volumes on Computer1 from Computer2. | On Computer2; run Winrs and then run Diskpart |
82. You have a computer running Windows Vista (x86) and need to perform a clean installation of Windows 7 (x64) | Start the computer from the Windows 7 installation media. From the Install Windows dialog box; select the Custom(advanced) option. |
83. You have a computer running Windows XP Service Pack 2. You need to upgrade to Windows 7. How can you accomplish this? | First; upgrade to Windows Vista SP2. Next; while booted into Vista; from the Windows 7 installation media; run Setup.exe and select the Upgrade option. |
84. You need to prepare for a large deployment of Windows 7 by using the minimum amount of administrative effort. What should you do? | On one computer; install Windows 7 and the corporate applications (Remember; not hardware specific) |
85. You need to copy files to a virtual hard disk (VHD) file. What is the procedure? | Run Diskpart.exe and then run the Select and Attach commands Note: Windows 7 has the ability to attach VHD files and assign them drive letters. This can be accomplished from the disk management console or through diskpart.exe |
86. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. | Run Sdbinst.exe |
87. You need to ensure that a client computer always resolves www.trainingcamp.com to the IP address of 131.108.5.32 | Edit the hosts file |
88. A user has write access to a folder but also belongs to a group that has been denied write to the same folder. The user needs to be able to write. What can be done? | Remove the Deny - Write permission for the Group |
89. You need to ensure that when you connect to a specific server you authenticate by using particular account on the PC. What should you do? | From Credential Manager; select Add a Windows credential. |
90. You have an Windows XP computer. You install windows 7 on top of Windows XP. Now you want get the old user profile information that was used in XP and get it into Windows 7… | Use scanstate with the /offlinewinold option |
91. The sync center is used to manage many partnerships … syncing cell phones; pda’s; etc. as well as giving you status information about: | An offline folder sync status |
92. Sysprep /audit is used to customize Windows in Audit Mode. You can run sysprep/audit to configure the system to boot to audit mode on the next reboot. Note: For more information; see the Sysprep Technical Reference. technet.microsoft.com/en-us/lib | * |
93. You are trying to connect a mobile phone to a PC and it can’t find the correct driver. What can be done? | Go into Devices and Printers and select troubleshoot |
94. How do you get updates for windows defender? | Windows update |
95. A user needs help where do they go? | Click the Start Bar -> Help and support -> On the bottom left; select more options. Here they request remote assistance. Note: Know the difference between remote desktop vs. remove assistance and how remote desktop does not need to be enabled to take ad |
96. Disk cleanup has two options; you can free up disk space under the more options tab and either Remove unused programs and features; or (and) delete all but the most recent restore point under System Restore and Shadow Copies. Just understand that th | * |
97. If you have added a new drive and want to back-up to the new drive then select: | Manage Space. If you have added a new drive that has data that needs to be backed up select: Change Settings |
98. If you need to view the license information on a Windows 7 machine you can use the command: | Slmgr.vbs /dli Note: /dli is Display License Information |
99. How do you get a 2GB WIM image file on a series of CD’s. You would run the command: | ImageX /split |
100. You can automate the install of Windows 7 through the use of an answer file. The default answer file is named: | unattend.xml The best place to have the answer file is on a: USB Key. Note: The installation looks for it many locations but this is the easiest. When booting form the DVD media Windows 7 will look for a unattend.xml file on the external UFD (USB Flash D |
101. You are planning to deploy Windows 7 using a .vhd file. You need to ensure that the computer starts from the .vhd and loads using the Out of the Box Experience (oobe). You can: | Copy an install.wim to a .vhd to allow you to deploy using the .vhd and gain oobe!!! Note: Use the WIM2VHD command line tool to allow you to create syspreped VHD Images from any Windows 7 installation source. VHD’s created by WIM2VHD will boot directly t |
102. The broadcasting of the wireless access points SSID has been disabled. Where do you go to allow your computer to connect to the wireless network now that the SSID broadcast has been disabled? | Network and Sharing Center> Manage Wireless networks> Modify the properties of a wireless network. Select the option to connect even if not broadcasting. |
103. To build a VPN to connect to the office select: | Connect to my workplace in the Setup a Connection or Network wizard |
104. If you need to mirror the Windows 7 operating system disk to a newly added drive. You would: | simply select the OS Partition; right-click and select Add mirror. |
105. You have a standalone Windows 7 computer. You navigate to Windows update to change settings. The Data and time settings are grayed out and you cannot select them. You logon as a member of the local administrators group of the computer. To modify | Remove the local policy controlling the settings Note: If the Windows update has been configured through a local policy to: Download and Install at 3:00 am everyday; launching windows update with WUApp.exe will not change the fact that these setting are l |
106. Be careful not to mix up the IE’s Content Advisor vs. Parental Controls. | |
107. You need to ensure that only external (removable) devices you define can be installed. | Enable prevent install of devices not described by other policy settings. Enable the allow install of devices that match any of these device ID’s and then enter the Device ID for the approved USB Devices. |
108. You notice your computer at the branch office is getting very slow. Branch Cache is enabled for your branch office. You need to speed up your computer. What could you run to solve this problem? | Netsh branche cache flush Note: this will temporarily prevent others from trying to retrieve files from your computer in a distributed branch cache mode configuration. |
109. You need to ensure that you can save settings to the etc\hosts file. What should you do? | Start Windows notepad with elevated privileges. Change your UAC settings to notify me only when a program tries to make changes to my computer. Note: This UAC setting change is made through the new UAC control panel applet. |
110. You need to identify all of the encrypted files that are in C:\folder1. The command you will use is: | Cipher c:\folder1 Note: If Cipher.exe is used without parameters; CIPHER displays the encryption state of the current directory and any files it contains. (From cipher help) |
111. You need to allow users to create files; allow users to delete files they create; and prevent users from deleting files created by other users. | Remove all NTFS permissions from the users group Grant the Creator Owners Group the Full Control NTFS permission. |
112. If you have application settings on a Windows Xp or Windows Vista computer that you would like to transfer to Windows 7 you can run: | Loadstate /i:migapp.xml Note: /i (include) Specifies an .xml file that contains rules that define what state to migrate. You can specify this option multiple times in order to specify all of your .xml files (MigApp.xml; MigSys.xml; MigUser.xml and any cus |
113. To connect to a 2008R2 Direct Access server requires which versions of Windows 7? | Enterprise or Ultimate |
114. BitLocker and (BitLocker to go) is only available on Enterprise and Ultimate. However; all versions of Windows 7 can read BitLocker to Go. | |
115. You need to create a .vhd that will deploy Windows 7. The solution must minimize the performance impact of deploying a .vhd. | Use a fixed size disk (instead of a dynamically expanding disk) |
116. You need to connect to a network projector from your Windows 7 computer. | Run the NetProj.exe and provide a path to the projector. |
117. You have an offline virtual hard disk .vhd file that contains an installation of Windows 7 Home Premium. You need to upgrade to Windows 7 ultimate by using the minimum amount of administrative effort. | From a computer that runs Windows 7 attach the .vhd and run DISM/set-edition Note: You can use the Windows® edition-servicing commands to change one edition of Windows® 7 to a higher edition within the same edition family. The edition packages for each po |
118. A standard user has a computer that runs Windows 7. You need to ensure that the user can run Windows Easy Transfer. | Add user1 to the local administrators group |
119. You need to allow a user to update files in the data folder. | Assign the user write permissions to the data folder. |
120. You need a wireless connection to be the first one you connect to (preferred). | Go to Network and Sharing Center and Manage Wireless Networks; modify the settings right click and move up. |
121. To find out when an application got installed. Use the Reliability Monitor. | * |
122. To backup a users EFS Certificate use Cipher /x | * |
123. You have a computer built from a brand new system image. You install a new application and the computer crashes with a BlueScreen. How do you recover? | Boot into Last known good. |
124. You have a Netbook with Windows 7 installed. You need to upgrade the Netbook to enterprise Edition. What doesn’t meet the requirements?: a. 1.6 GHz 32 bit processor b. 1024 GB or RAM c. 1 Video Card with Shared memory d. 4 GB SSD | Need 16GB or more to install Enterprise |
125. Use a config.xml file to prevent some files from being migrated. | * |
126. To change an IP Address with a startup script use Netsh. | * |
127. How can you configure Windows 7 so that users must enter a user name and password when installing applications from the computer. | Modify User Account Control Settings |
128. You need to copy files between computer1 and computer2. The connection that was made is an RDP connection. | In the RDC client specify the local connections and resource settings. |
129. You need to prevent browsing history from being sent to a specific content provider. What should you do? | Enable InPrivate filter and choose content to block or allow. |
130. You need to provide an administrator the ability to view and interact with your current logon session. | From the Start Menu- Help and Support - open Remote Assistance. |
131. Microsoft Deployment Toolkit 2010 (MDT 2010) provides a common console with the comprehensive tools and guidance needed to efficiently manage deployment of Windows 7 and Windows Server 2008 R2. | Microsoft Deployment Toolkit 2010 is the recommended process and toolset to automate desktop and server deployment. Microsoft Deployment Toolkit 2010 provides detailed guidance and job aids for every organizational role involved with large-scale deploymen |
132. ImageX is the command-line tool used to create; edit and deploy Windows disk images in the Windows Imaging Format. It is distributed as part of the free Windows Automated Installation Kit (WAIK). Starting with Windows Vista; Windows Setup uses the W | * |
133. DISM is a command line utility that can be used to modify images; revert changes that were made to an image; add functionality to a 2008 R2 Server and many additional functions. Here are some DISM examples: | To mount an image: dism/mountwim/wimfile:c:\win7\sources\boot.wim/index:1 /mountDir:c:\temp2 To determine which drivers are included in the image: dism/image:c:\temp2 /get-Drivers To add drivers: dism/image:c:\temp2 /add-driver /driver:C:\dell\drivers\r |
134. From the CMD; to see if you have unsigned drivers; run the following: | driverquery /si |
135. L2TP is a VPN protocol that uses IPSEC for encryption and communicates using port 1701. | * |
136. L2TP uses IPSEC; which uses a machine certificate; one on the client; and one on the server | * |
137. SSTP is a newer VPN protocol available on 2008 RRAS machines; the server uses an SSL certificate; just like an SSL web server but it is an SSL VPN server. SSL uses 443 and; as a result; so does SSTP. | * |
138. Msiexec.exe is the command line utility that can be used to install .msi files in a command prompt type environment or via a script. | * |
139. MST files modify the manner in which MSI files are installed | * |
140. You have to make sure that the computer can establish DirectAccess connections. | In order to make sure that the computer can establish DirectAccess connections; a computer certificate should be installed. |
141. Computer1 needs to be configured to make sure that cached files from Share1 are encrypted and when Server1 (which hosts Share1) is disconnected from the network; files located in Share1 are available. | You should make Share1 available offline and enable encryption of offline files on Computer1. |
142. You need to migrate all profiles and user files from Computer1 to Computer2. You need to identify how much space is required to complete the migration. How can this be accomplished? | Scanstate c:\store /nocompress /p should be run on C01. |
143. You have to share Computer1’s video and audio files on the network; what should you do? | The files should be moved to a Media Library. A HomeGroup should be created. |
144. From Computer1; you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You have to make sure that you can recover all EFS encrypted files from Computer2. | You should export the data recovery agent certificate on Computer1. You should import the data recovery agent certificate on Computer2. |
145. If you need to generate a new security ID (SID) or see the Welcome Screen must appear when the computer starts run: | Sysprep.exe /oobe /generalize |
146. To confirm that all device drivers installed are digitally signed you should run: | Sigverif.exe |
147. How can you modify the file extensions that are associated to Internet Explorer? | Open Default Programs and then click Set Associations from Control Panel. |
148. A Router uses 10.10.10.62 with a /27 mask. What is a usable IP in the same subnet? | 10.10.10.40 is an IP that is usable within that subnet |
149. To make sure that the computer always starts Windows Vista by default run: | Bcdedit.exe should be run using the /default parameter |
150. You must establish a DirectAccess connection to the network but your output shows you have no ipv6 address.. | IPv6 should be enabled on the network adapter |
151. To export the user state and the settings of a custom application: | Migapp.xml file should be modified. Scanstate.exe should be run and the /i parameter should be specified. |
152. How can you make sure that every access attempt to a folder is logged | Audit object access should be configured from the local Group Policy |
153. You need to prevent App01 from running during startup; but users must be allowed to run App01 manually. How can this be accomplished? | Startup applications can be modified from the System Configuration tool |
154. On your Windows 7 computer you store documents on the ‘D’ drive. You manually create a restore point and then modify the document. You have to make sure that you are able to restore the current version of the document if the document is modified. Wh | System Protection for volume D should be turned on first |
155. What can be used to dynamically load a network adapter device driver in Windows PE: | Drvload.exe with the device driver path should be specified. |
156. To prevent users from copying files to unencrypted removable drives: | BitLocker Drive Encryption settings should set in a local Group Policy. |
157. The Netsh command can be used to illustrate that the current client is | “not configured as a branch cache client” |
158. You need to make sure that members of the Sales group can modify all the print jobs that they submit. You also need to prevent the Sales group members from modifying print jobs of other users. | Print permission should be assigned to the Sales group from the printers properties. |
159. You want to ensure that you only retain only the last System Protection snapshot of the computer. All other snapshots must be deleted | Disk Cleanup for SystemRestore and Shadow Copies should be run. |
160. An answer file named answer.xml is created. You want to make sure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image? | Run Sysprep.exe /generalize /oobe /unattend:answer.xml |
161. To start the computer from the VHD: | Bcdedit.exe should be run and the Windows Boot Manager settings should be modified. |
162. To ensure that you can remotely execute commands on Computer from Computer1: | Winrm quickconfig should be run on Computer2. |
163. Computer1 runs Windows 7 and remote desktop. Computer2 runs Windows XP Professional. You need to ensure that Computer2 can connect to Computer1 via RDP. | Enable the Allow connections from computers running any version of Remote Desktop setting on Computer1 to ensure connectivity is possible |
164. To prevent Internet traffic from being routed through the VPN connection you can configure the connection to use a split tunnel… How?: | In the Advanced TCP/IP settings of the VPN connection |
165. You need to make sure that User1 is able to grant User2 access to an encrypted file that is present on a computer they both share. How can this be accomplished? | User2 should be instructed to log on to the computer and encrypt a file. User2 will need a certificate issued to him to accomplish this. |
166. A computer needs to be configured to download updates from a local Windows Server Update Services (WSUS) server | Windows Update settings should be modified from the local Group Policy. |
167. To prepare a reference computer for imaging; the action to perform before you create the image is as follows: | The System Preparation (sysprep) tool should be run before the image is created. |
168. To perform an automated installation of Windows 7: | An answer file named autounattend.xml should be created. The file should be placed on a removable drive. |
169. To prevent Internet Explorer from saving any data during a browsing session. | Open an InPrivate Browsing session |
170. You perform an image backup. A virus infects the computer and the computer is caused to become unresponsive. You have to restore the computer as quickly as possible. | The computer should be started from the Windows 7 DVD. The System Image Recovery tool should be used. |
171. You have to make sure that you are able to back up the computer to a local disk drive. | Your user account should be added to the Backup Operators group before the Configure Backup wizard is run |
172. You deny one user access to removable devices on the computer but all other users must have access to the removable drives | A removable storage access policy should be modified from the local Group Policy. |
173. You are running Vista and need a clean install of Windows 7. How can this be accomplished? | Boot from the Windows 7 installation media and select the Custom (advanced) option. Delete and/or format the current partition containing Vista and perform a clean installation of Windows 7. |
174. When using Windows 7 Enterprise (or Ultimate); you must be running with a 64-bit processor and have the 64-bit version of the operating system to address more than 4 GB RAM. | * |
175. To migrate applications from PC1 to PC2: | On PC-1; run Scanstate.exe /i:migapp.xml; On PC-2; run Loadstate.exe /i:migapp.xml |
176. Your recently migrated data includes Excel files. To read them on the new machine; before you migrate the files; Install MS Office | * |
177. To reduce space used by restore points you should run Disk Cleanup. | * |
178. The Rollback driver button is grayed out; and the local user is not an admin | Use Run-As and open Device Manager as an administrator |
179. There are 300 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. What utility should you use? | Microsoft Application Compatibility Toolkit (ACT) |
180. A user installs a third-party media player. He discovers that all media filesnow automatically open by using the third-party media player. You need to ensure that all media files open automatically using Windows Media Player. | From Control Panel; modify the Set your default programs settings. |
181. Your company has an Active Directory domain and there are 200 computers that run Windows 7. Your domain contains a logon script named login.cmd. You plan to deploy a new application named app3.msi by using the logon script. The .msi file to be insta | Msiexec.exe /i \\server3\share3\app3.msi /quiet |
182. You have an application installation package named app3.msi. You need to perform a customized installation of app3.msi. Create a transform file named app3.mst and then run Msiexec.exe /i app3.msi /t app3.mst. | * |
183. Operating system: Windows 7 Professional Processor: 2.2 gigahertz (GHz) (x86) RAM: 2 GB Hardware virtualization: Disabled TPM chip: Disabled You need to ensure that you can run Windows XP Mode on the computer. | Enable hardware virtualization. |
184. There is a computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running Windows Media Player other users must be allowed to run Windows Media Player. | From Application Control Policies; create an executable rule. |
185. You need to ensure that users can only access removable devices that have been previously installed on the computer. (GPO) | Enable the Prevent installation of removable devices setting. |
186. You need to ensure that only a specific version of an application is allowed to run on the computer. Your solution must ensure that all application restrictions are based on the application vendor’s digital signature. | From Application Control Policies; configure a publisher rule. |
187. You have created an application control policy on the computer. You discover that the policy is being not enforced on the computer. What should you do? | Make sure the Application Identity service Startup Type is set to Automatic and start the service if need be. |
188. You need to prevent users from installing a specific removable drive on the computer. You connect the removable drive to the computer. What should you do before editing the GPO? | From Device Manager; identify the device class GUID. (A globally unique identifier or GUID is a special type of identifier used in software applications to provide a unique reference number. The value is represented as a 32 character hexadecimal string; s |
189. You need to prevent members of a local group from starting a specific application. You could use an… | application control policy |
190. You company has an Active Directory domain. All computers are members of the domain. There is an internal Web site that uses Integrated Windows Authentication. You need to ensure that you are automatically authenticated when you connect to the Web | Add the URL of the Web site to the Local intranet zone. |
191. You need to ensure that you can access Web pages on both the Internet and the intranet. You notice that your IE title bar say “Working Offline”. How can you resolve this? | From the Tools menu; click Work Offline. |
192. You open Internet Explorer and access a Web site. The web site displays a page that has misaligned text and graphic images. You need to view the Web page correctly. | Enable Compatibility View. |
193. You open Windows Internet Explorer and access a Web site. You then click the Suggested Sites button; but the suggestions fail to display. You need to obtain suggested sites so you should do what? | From the Start menu; open a new Internet Explorer window. |
194. You need to prevent ActiveX controls from running in Windows Internet Explorer. What setting should you modify? | Security |
195. You have installed a third-party Web browser. HTML files are no longer associated with Windows Internet Explorer. You need to ensure that IE starts whenever a HTML file is opened. | Open the Programs tab and click Make default. |
196. You have a pesky third-party Internet Explorer toolbar installed. You need to temporarily disable the toolbar but you must not affect any other of the installed toolbars. Other than using Firefox what else could you do? | From the Tools menu; open Manage Add-ons and modify the add-on settings. |
197. You Internet Explorer configuration has issues that cause instability when browsing the Internet. You would like IE to use all default settings. How can you make this so? | From the Advanced tab; click Reset. |
198. A user tried to access a Web page and receives an error message stating that the page does not have a rating. What utility could be used to address this? | Content Advisor |
199. If you have a router (default gateway) on the network; and its IP address is 192.168.2.33/27 ; what IP address could you assign to a client computer on the same subnet? | 192.168.2.40 |
200. You need to ensure that a client computer resolves webserver.web.com to only a specific IP address. You should??? | Edit the hosts file. |
201. You need to manually assign an IP address to a computer. Looking at the computers network properties you notice that the TCP/IP v4 box is unchecked. What should you do? | Enable TCP/IPv4. |
202. You discover that a computer has an IP address of 169.254.32.1. You need to ensure that this computer can connect to all computers on the network. What is a good solution to this problem? | Configure a static TCP/IP address. |
203. What is a quick way to ensure that a computer can only communicate with other computers on the local subnet? | Delete the default gateway address. |
204. You need to change the static IP addresses on all the computers by using a startup script. What command should you include in the startup script? | Netsh.exe |
205. need to identify the IPV6 address of a user’s computer. How can you easily walk the user through giving you their IP address? | From the network connection status; click Details. |
206. Your network uses only IPv6. You need to have a DNS record created for a host. What type of record should you create? | AAAA |
207. The IPV6 loopback address is… | ::1 |
208. What service needs to be running for ISATAP to work? | Internet Protocol Helper (IP Helper) service. |
209. You need to identify whether you can connect to Server1 using IPv6. What command line command could you issue? | Ping Server1 -6. |
210. An admin has disabled Service Set Identifier (SSID) broadcasts on the wireless access point and you are now unable to connect to the wireless access point. What can you do to solve this problem? | From Network and Sharing Center; modify the wireless network connection settings. |
211. You need to connect to an access point. You must connect using AES security. A pre-shared key is not configured on the wireless access point. What is your encryption and authentication method? | WPA2-Enterprise |
212. You need to ensure that the computer connects to a particular wireless network first when it is in range; even if other networks are available. To make this happen you can.. | From Network and Sharing Center; modify the Manage Wireless Networks settings. |
213. There are two computers that are not connected to a network. You need to transfer a 1 gigabyte file from one of the computers to the other. What is a way you can get the file transferred? | Create a wireless ad hoc network. |
214. You need to configure your new computer to connect to a wireless network by using the same settings as your old computer. What can you do? | From the wireless network properties of the old computer; copy the network profile to a USB flash drive. |
215. You receive an error message when attempting to connect to a share. You verify it is not the firewall that is causing the issue. Looking at your network cards properties what could you fix? | Client for Microsoft Networks |
216. You need to create a VPN connection on your Windows 7 computer. What is the easiest way to do this? | From Network and Sharing Center; click Set up a new connection or network and then click Connect to a workplace. |
217. You need to ensure that a computer can connect to FTP servers only while it is connected to a private network. You can do this in Windows 7 by.. | From Windows Firewall with Advanced Security; create a new rule. |
218. You need to configure a computer to meet the following requirements: | Allow computers in the local subnet to access the shared folder Prevent computers in remote subnets from accessing the shared folder Allow all computers to connect to this computer by using Remote Desktop Modify the properties of the File and Printer Shar |
219. You need to prevent a custom application from connecting to the Internet. How can this be accomplished? | From Windows Firewall with Advanced Security; create an outbound rule. |
220. You have a computer that runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs) for communication. You need to ensure that Service1 can receive requests from a server. What should you do? | From Windows Firewall with Advanced Security; create a custom rule. |
221. You need to ensure that a computer has exactly the same firewall rules as another computer. You do not want to manually create the rules. What else could you do? | From Windows Firewall with Advanced Security; select Export Policy. |
222. You need to configure a computer to encrypt all inbound connections using IPSec. If a GPO is not an option; what else could you do? | From Windows Firewall with Advanced Security; click Connection Security Rules and then click New Rule. |
223. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What command do you have to run first? | Run Winrm quickconfig on Computer2 |
224. You need to ensure that you can remotely administer three computers by using a PowerShell cmdlet. What is the command? | New-PSSession |
225. You need to provide an administrator the ability to view and interact with your current logon session. What Windows utility would you use? | From the Start menu; open Windows Remote Assistance. |
226. You download a Windows PowerShell snap-in and need to ensure that the snap-in is automatically imported when you open a new PowerShell session. What should you do? | Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option. |
227. You need to prevent the desktop background of a computer from being displayed when you connect via Remote Desktop. This can be accomplished by? | From the Remote Desktop Connection options; modify the Performance setting. |
228. You need to remotely execute a third-party command line tool named disk.exe on Computer2. What is the correct syntax? | Winrs -r:Computer2 disk.exe |
229. You need to ensure that when you connect to Share1 from Computer1; that the files that you open are automatically cached. Where would you find this setting? | On the computer hosting the share; modify the properties of Share1. |
230. You need to ensure that your users can create files in a folder. What is the only permission they need? | Assign Write NTFS permission on the folder. |
231. Users report that they can print to the shared printer; but they cannot delete their print jobs. You need to ensure that users can delete their own print jobs. What permission should you assign and who should you assign it to? | Assign the Manage Documents permission to CREATOR OWNER. |
232. A user tries to access a share over the network. They get an “Access is Denied” error message. What can you do so that the user can access the share? | From the Security settings of the folder; assign the user the Read NTFS permission. |
233. You need to ensure that two computers can join a HomeGroup. What will help solve this problem? | Set the network location to Home network. |
234. You need to configure the permissions on Folder1 to meet the following requirements: | User1 must be allowed to delete all files in Folder Members of Group1 must be able to create files in Folder1 All other members of Group1 must be prevented from deleting files they did not create in Folder1 All users must be prevented from modifying the |
235. You need to prevent the users from using more than 2 GB of disk space on drive C. What is the quickest way to do this? | Enable disk quota management on the computer and configure a default quota limit. |
236. You need to ensure that you can configure permissions on a file. Looking at the properties of the file there is no security tab. What should you do? | Move the file to a disk that is formatted with the NTFS file system. |
237. The Users group has Modify permission to Folder1. You need to configure security on the Folder1 to meet the following requirements: Allow users to create files Allow users to delete files that they create Prevent users from deleting files created by | Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission. |
238. You need to prevent User1 from accessing Control Panel. What is the best way to accomplish this? | Create a new local Group Policy object (GPO) linked to the User1 account. From User Configuration; set Prohibit Access to Control Panel to Enabled. |
239. You need to ensure that you can save changes to the C:\windows\system32\drivers\etc hosts file. What do you need to do? | Start Windows Notepad by using elevated privileges. |
240. You need to ensure that only members of a local group named Group1 can print documents on the printer. Which settings should you modify on the printer? | Security |
241. You run Runas and specify the /savecred parameter to start an application. Now you need to delete the stored password. What should you do? | From Credential Manager; modify the Windows credentials. |
242. You need to ensure that when you connect to a server you authenticate by using a particular account. Therefore you need to.. | From Credential Manager; select Add a Windows credential. |
243. There is a web site that requires HTTPS. The SSL certificate is self-signed and when you browse to the Web site you receive the following warning message: There is a problem with this website’s security certificate. You need to prevent this message | From Certificate Manager; import the Web site s certificate into your Trusted Root Certification Authorities store. |
244. You need to ensure that you can decrypt EFS files on your computer if you forget your password. | From User Accounts; select Create a password reset disk. From User Accounts; select Manage your file encryption certificates. |
245. You need to prevent forms-based credentials from being saved on the computer. What should you do? | Modify the Windows Internet Explorer AutoComplete settings |
246. You need to configure a computer so that only Administrators are authorized to shut down the computer. What should you do? | From the local computer policy; modify the User Rights Assignment. |
247. You need to ensure that you can access all encrypted files on your computer. What command line utility can be used to accomplish this? | At a command prompt; run Cipher.exe. |
248. You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1 for the test. You need to ensure that only the members of Group1 can access the default Web site. What should you do? | Modify the authentication methods of the default Web site. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder (wwwroot is the root directory for your site) |
249. You need to ensure that computers in the branch office can access the cached content on your computer. Currently this is not working. What should you do? | Modify the Windows Firewall with Advanced Security rules. |
250. You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server. Which firewall rule should you enable on the client computers? | BranchCache - Content Retrieval (Uses HTTP) |
251. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. | From the local computer policy; add a data recovery agent. |
252. You need to ensure that you can read the content of all encrypted files on your computer. What should you do? | Run Cipher.exe /r and then add a data recovery agent from the local security policy. |
253. You need to prevent the computer from displaying the username of the last user who logged on. Where is this configured? | From the local computer policy; modify the local security policy. |
254. You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. Your solution must retain the existing files on the USB drive. What i | From a computer that runs Windows 7; disable BitLocker To Go for the USB drive. |
255. Your Encrypting File System (EFS) key is compromised need to create a new EFS key. What is the command? | Cipher.exe /k |
256. You connect to your company s network by using a VPN connection. You discover that when you establish the VPN connection; you are unable to access Internet Web sites. You disconnect the VPN connection and now you can access Internet Web sites. You | From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection; disable the “Use default gateway on remote network setting”. |
257. You cannot copy any files between your computer and the remote computer during a Remote Desktop session. You need to ensure that you can. What should you do? | On your computer; open Remote Desktop Connection and configure the Local devices and resources setting. |
258. Server1 contains a shared folder named Share1. You need to configure Computer1 to ensure that cached files from Share1 are encrypted and ensure that files located in Share1 are available when Computer1 is disconnected from the network. | On Computer1; make Share1 available offline and enable encryption of offline files. |
259. You have configured your computer to enter sleep mode after 10 minutes of inactivity. 15 minutes of idle time later and the computer has not entered sleep mode. You need to identify what is preventing the computer from entering sleep mode. | At a command prompt; run Powercfg -energy. |
260. There is a file server named Server1 that contains a shared folder named Share1. You need to configure Computer1 to: | Minimize network traffic between the main office and the branch office. Ensure that Computer1 can only access resources in Share1 while it is connected to the network On Computer1; enable transparent caching. |
261. You need to identify whether you are working on an offline version of a file. What should you do? | From Windows Explorer; select the file and then view the toolbar. |
262. You need to verify that an offline copy of the folder has been created on your computer. Where should you look? | Open Sync Center and review the status. |
263. You need users to authenticate to a VPN server via smart card authentication. What is the correct authentication protocol for this? | EAP |
264. Your network contains a DHCP server that runs Windows Server 2008 R2 server. This server is configured as a NAP enforcement point and you need to configure the Windows 7 computers as NAP clients. What two items do you need to configure? | From Services; set the Network Access Protection Agent service Startup Type to Automatic. From the NAP Client Configuration console; enable the DHCP Quarantine Enforcement Client. |
265. You connect to the VPN server and you receive the following error message: Your computer does not trust the issuing certification authority (CA) of the VPN server’s certificate. How can you eliminate this problem? | From Certificate Manager; import the server’s certificate into the Trusted Root Certification Authorities store. |
266. The external firewall has TCP port 80 and TCP port 443 open for remote access connections. You have uses that need remote access from their home computers. What type of remote access needs to be configured? | SSTP |
267. You need to record when an incoming connection is allowed through the Windows firewall. What should you do? | From the Windows Firewall with Advanced Security properties; set the logging settings to Log successful connections. |
268. Your Windows Update settings are grayed out. You need to ensure that you can manually change the Windows Update settings on your computer. This can be accomplished by? | From the local Group Policy; modify the Windows Update settings. |
269. You need to verify whether a specific update is installed on your computer. How can you do this? | In Windows Update; examine the update history. |
270. Server1 is a WSUS server. Computer1 is configured to obtain updates from Server1. You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. You need to ensure that Computer1 appears. | On Computer1; run Wuauclt.exe and specify the /detectnow parameter. (Windows Update AutoUpdate Client) |
271. Standard users are never notified when updates are available. You need to ensure that standard users are notified when updates are available. What GPO setting should you configure? | Select “Allow all users to install updates on this computer”. |
272. Your computer is configured to automatically download and install updates. You need to ensure that service packs for Office are automatically installed. How will you do this? | From Windows Update; select Get updates for other Microsoft products. |
273. You need to uninstall a Windows update. What Control Panel item should you use? | Programs and Features |
274. Your computer has been configured to use an intranet Microsoft update service location. You need to view the name of the intranet service location. How can this be accomplished? | Review the contents of the C:\windows\windowsupdate.log file. |
275. You need to ensure that you can create a new partition on Disk 0. There is no un-partitioned space on Disk 0. What should you do? | Shrink volume C. |
276. You need to extend volume C. The D drive is adjacent to C; and then there is some free space. How can you extend C? | Back up and delete volume D. |
277. You plan to install a new application that requires 40 GB of space. The application will be installed to C: but you do not have enough free space. You need to provide 40 GB of free space. What should you do? | Create a mount point. |
278. You have a couple of spare disks installed in your computer. You need to ensure that you can create a stripe set. What should you do first? | Convert all disks to dynamic disks. |
279. You remove a dynamic disk from Computer1 and connect the disk to Computer2. You need to ensure that you can open files on all hard disk drives connected to Computer2. From the disk management console what should you do? | Import a foreign disk. |
280. Your computer has one hard drive. You install a new hard disk in your computer and need to ensure that all the files on the computer are available if a single disk fails. How can you configure your computer to meet the requirement? | Convert both disks to dynamic disks and Mirror them (RAID 1) |
281. You need to identify which applications were installed during the last week. What is the correct utility and where do you look? | From Reliability Monitor; review the informational events. |
282. You need to view the processes that currently generate network activity. What is the correct utility and where do you look? | Open Resource Monitor and click the Network tab. |
283. You need to implement a monitoring solution that meets the following requirements: Sends an e-mail notification when an application error is logged in the event log. Runs a script to restart the computer if an application error occurs between 17:00 | On all the computers; configure an event subscription to a central computer. On the central computer; configure a custom task in the Forwarded Events log |
284. You need to identify the disk; memory; CPU; and network resources that an application is currently using. What is the correct utility to use? | Resource Monitor |
285. You need to identify the hardware failures that have occurred on your computer in the past six months. How would you find this information? | Open Reliability Monitor. |
286. You need to configure your computer to support the collection of Windows system events from other computers. What command line utility can you use? | Wecutil.exe |
287. You need to increase the graphics performance of the computer without modifying the current hardware or drivers. What is the easiest way to accomplish this? | From Performance Options; modify the visual effects. |
288. Your computer uses a USB drive that has ReadyBoost enabled. You need to modify the amount of space that ReadyBoost reserves on the USB drive. How do you do this? | Open Computer and modify the properties of the USB drive. |
289. You have a document in the E:\DOCS folder. You need to ensure that you can restore the current version of a document if the document is modified. What should you do first? | Turn on System Protection for volume E. |
290. You need to ensure that you can back up the computer to a local disk drive. What should you do before you run the backup? | Connect a removable disk. |
291. What type of hardware is required to create a system repair disc? | CD/DVD burner |
292. You need to configure system image backups to meet the following requirements: Automatically create a system image every day without user intervention Retain multiple copies of the system image What type of backup destination should you use? | An external hard disk drive |
293. Your computer has a single 30-GB partition that has 10 GB of free space available. You need to create a system image of the computer by using Windows Backup. What should you do to ensure you can make the image? | Attach an external hard disk. |
294. You need to prevent backups from automatically running when the computer is running on the battery. Where is this done? | From Task Scheduler; modify the Automatic Backup task. |
295. You install a second internal hard disk drive in your computer. You need to ensure that you can use the new disk as a backup destination for your system images. What do you need to do on the disk? | Create an NTFS partition. |
296. You need to ensure that you can recover the operating system and all the files on your computer. To do this you should … | Connect an external hard disk to the computer. Create a system image. |
297. Your computer experiences a hard disk failure. You replace the failed hard disk and need to recover the computer back to just before the crash. You insert the Windows 7 installation media you select | System Image Recovery |
298. You update the driver for your computer’s video card and the computer becomes unresponsive. What is the best way to fix this? | Restart in safe mode and then roll back the video card driver. |
299. A user wants to roll back a driver but the Roll Back Driver option is unavailable. You connect to the computer by using Windows Remote Assistance. How can you assist the user? | Right-click Device Manager and select Run as administrator. |
300. You computer becomes unresponsive and you discover that you need to restore the computer. How can you get it back to its previous functional state with the minimum amount of effort? | From the repair your computer start up mode; restore a system restore point. |
301. You restart your computer and receive a STOP error message. You need to successfully start Windows in the minimum amount of time. How can this be addressed? | Start the computer and select Last Known Good Configuration from the advanced startup options. |
302. Every time you start your computer; you receive a STOP error message. What is the best way to resolve this? | Start the computer; press F8; and then select Repair Your Computer. |
303. Your computer has an ipv6 address assigned and uses /10 prefix. You need to ping another computer that has a /12 prefix. What is the correct syntax? | Ping -6 “their-ip-v6-address” /10 (your prefix) (Ping the other machine’s address; and use your prefix (mask) !!) |
304. You need to add files to %programfiles%\app123 folder without receiving UAC prompts; but you need to keep your machine secure. What should you do? | Change the permissions of the %programfiles%\app123 folder (do not turn off UAC !!!) |
305. How can you keep a shortcut icon on the Taskbar (called pinned) | Select "Pin this program to taskbar" |
306. How can you verify that ComputerB has remote management (WinRM) enabled? | Winrs -r:ComputerB query |
307. You need to allow a user to access web pages that do not have a rating | Modify the settings in Content Advisor |
308. You receive an error message when you attempt to add a mass storage driver during a windows 7 install. How can this be addressed? | From the Install Windows dialog box; click DRIVE OPTIONS (under advanced) |
309. You are configuring permissions on a file but you see no security tab in the files properties.. How can this be solved? | Move the file to a disk that has NTFS |
1. A standard user has a computer that runs Windows 7. You need to ensure that the user can run Windows Easy Transfer. | Add the user to the administrators group |
2. Unlike Remote Desktop, where only one user can be logged in at a time, this utility can allow screen sharing to take place and allow a technician to assist a user who is experiencing difficulties. | From the Start Menu open Remote Assistance |
3. If any user tries to open a folder on a particular Windows 7 computer, you want evidence in the event log. What should you do? | Audit object access should be configured from the local Group Policy |
4. To migrate custom applications from PC1 to PC2 using a custom xml file named mvapp.xml you should… | On PC-1, run Scanstate.exe /i:mvapp.xml, On PC-2, run Loadstate.exe /i:mvapp.xml |
5. Before you edit a GPO you must find a way to identify a removable device so that it can successfully be blocked from installation. How can this be accomplished? | From Device Manager, identify the device class GUID (A globally unique identifier or GUID is a special type of identifier used in software applications to provide a unique reference number. The value is represented as a 32 character hexadecimal string, |
6. You need to manually assign an IP address to a computer. Looking at the computers network connection details you notice that the computer has no TCP/IP v4 address at all. What should you do? | Enable TCP/IPv4 |
7. What is a quick way to ensure that a computer can only communicate with other computers on the local subnet? | Delete the default gateway address |
8. You have decided to use a startup script to automate an IP address change on your client computers. What command should you use? | Netsh.exe |
9. The IPV6 loopback address is… | ::1 |
10. What service needs to be running for ISATAP to work? | Internet Protocol Helper (IP Helper) service |
11. How would you use IPv6 and ping a computer named AcctPCWin7FL2? | Ping AcctPCWin7FL2 -6 |
12. If two computers need to transfer a big file from one of the computers to the other, and there is not currently a network connection between them, you could get the file transferred by? | Create a wireless ad hoc network |
13. You receive an error message when attempting to connect to a share. A successful ping of the server hosting the share verifies it is not the firewall that is causing the issue. Looking at your network card’s properties what could you fix? | Client for Microsoft Networks |
14. You need to prevent the wallpaper of a computer from being displayed when you connect via Remote Desktop. This can be accomplished by? | From the Remote Desktop Connection options, modify the Performance setting |
15. You need to run a command line tool named frog.exe against a remote computer named TTC2. What is the correct syntax? | Winrs -r:TTC2 frog.exe |
16. Where is automatic caching of files enabled? | On the computer hosting the share, modify the properties of the share |
17. If you are trying to modify the security settings of a file but there is no security tab, what should you do so you can set the permissions correctly? | Move the file to a disk that is formatted with the NTFS file system |
18. You need to prevent a user named Matt from accessing Control Panel. What is the best way to accomplish this? | Create a new local Group Policy object (GPO) linked to Matt’s account. From User Configuration, set Prohibit Access to Control Panel to Enabled |
19. Where is the ability to perform such actions as logging on as a batch job, changing the system time, shutting the computer down, backing up the computer etc defined? | From the local computer policy, modify the User Rights Assignment |
20. What is name of the firewall rule that allows a Windows 7 computer to access content from a Branch Cache server? | BranchCache - Content Retrieval (Uses HTTP) |
21. How can a new EFS certificate be created? | Cipher.exe /k |
22. Where are the settings made that allow devices to be redirected when making a remote desktop connection? | Open Remote Desktop Connection and configure the Local devices and resources setting |
23. What do you use to make sure that a some files you have marked to take offline will be available when you shutdown your computer? | Open Sync Center and review the status |
24. What VPN protocol uses the same port as secure web traffic? | SSTP |
25. How do you enable logging in the Windows Firewall with Advanced security? | Properties |
26. How do you force a client computer to check in and register itself with a WSUS server? | Run Wuauclt.exe and specify the /detectnow parameter. (Windows Update AutoUpdate Client) |
27. What needs to be configured so that your computer will receive updates for not just the operating system, but other install programs? | From Windows Update, select Get updates for other Microsoft products |
28. What has to happen before a spanned set, a stripe set, or a raid 5 array can be created? | Convert all disks to dynamic disks |
29. When attempting to move a dynamic disk from one computer to another, the signature of the disk will most like stop the disk from being immediately available. What can you do so that the moved disk will be accessible to the new computer? | Import a foreign disk using the disk management console |
30. Your computer has one hard drive that has 3 partitions. Two of the partitions are of equal size, and the third contains a small amount of unallocated space. You install a new hard disk in your computer would like to create some type of redundant con | Convert both disks to dynamic and create two mirrored volumes |
31. How can the processes that generate disk activity be viewed? | Open Resource Monitor and click the Disk tab |
32. What has to be run from the command line if you are planning on creating event subscriptions? | Wecutil.exe qc |
33. How can you adjust the space allocation on a USB drive for use with ReadyBoost? | Open Computer and modify the properties of the USB drive |
34. If you computer is running on battery power and not A/C power you do not want backups run, potentially killing your battery life. How can this be accomplished? | From Task Scheduler, modify the Automatic Backup task |
35. Before you can store backups on a new disk, what must you do to that disk? | Create an NTFS partition |
36. Your Windows 7 computer contains two drives. You need to ensure that you can recover the operating system and all the files on your computer should you lose both disks. To do this you should … | Connect an external hard disk to the computer ; Create a system image |
37. How could you repair the boot configuration data in a windows image? | Run Imagex with /mountrw, then run bcdedit.exe |
38. Security policy says that all computers on the network must run Windows 7. To preserve user profile information from a computer running Windows XP you could? | Run Windows Easy Transfer, install Windows 7, run Windows Easy Transfer again |
39. There is unallocated space on Disk 0 of a computer running Vista. You are trying to install Windows 7 so you can dual boot between Vista and Windows 7. Vista is installed on Disk 0 in Partition 1. What should you do? | Start the computer from the Windows 7 install media and install Windows 7 into the unallocated space on Disk 0 |
40. Before performing an actual migration you would like to know what documents will be included in the migration when you use the USMT utilities. How can this information be obtained? | Scanstate.exe with the /genmigxml option |
41. If you are using Windows Deployment Services (WDS) on the network, there are several types of images that can be imported and used. What is the image type that actually contains an operating system? | an install image |
42. How can you verify the disk space usage of the previous versions of files? | From system, view the system protection settings |
43. If the User State Migration Tool (USMT) was unable to complete a migration due to encountering some files protected by EFS, what can you do so that the migration is able to be completed successfully? | Add the /efs:copyraw switch to the Scanstate command |
44. To capture a Windows 7 computer to a .Wim file, you should first… | Start the computer using Windows Preinstallation Environment |
45. When executing ipconfig a user is presented with a command prompt containing no network configuration information at all. What can be done to correct this and allow the user to connect to network resources? | In Device Manager, enable the network adapter |
46. A previous employee created a VHD that has a sysprep’d Windows 7 Ultimate image, but he forgot to remove the games before he made the image. How can this be addressed? | Generate an answer file that has InboxGames disabled. On a computer running Windows 7 attach the VHD, run dism, and use /apply-unattend |
47. If Windows XP is installed after Windows 7 in a dual boot configuration, most likely Windows 7 will no longer boot correctly. This is because an older OS was installed after the newer OS and the boot loader information is wrong. How can this be fix | Start the computer from the Windows 7 media and run startup repair |
48. Before an image can be applied to a computer booted from a WinPE disk, what must happen first? | Configure and format the hard drive |
49. Using the local group policy editor, how can standard users be given the ability to install new drivers for their network cards? | Modify the driver installation settings for the computer |
50. When using USMT to migrate user accounts between computers, you discover that the users are unable to log on to the new computers. What do you need to do first? | Enable all user accounts |
51. If you need to transfer all of your users documents and settings from some Windows XP computers, but want to make sure that you DO NOT include pictures and video files you could? | Modify the migdocs.xml |
52. How can you let a standard user connect a USB device and use the device without needing admin credentials? | Pnputil.exe with the i a parameters |
53. To enable a feature like the TFTP client in an image that has already been created, all you need to do is: Mount the image, use dism with the /image and /enable-feature TFTPClient switches. Commit the changes and unmount the image | |
54. To list the drivers that are stored in a .wim image you can? | Run dism and the /get-drivers parameter |
55. How can you install support for the Windows Scripting Host (WSH) into a WinPE image? | Dism |
56. Your Windows 7 computer contains the following folder path: C:\Files\Files1. In the Files1 folder there are two folders, Music1 and Music2. You accidentally delete the Music1 folder and must now restore the folder, but do not want to overwrite any | From Previous versions of the Files1 folder, click copy |
57. To create an unattended answer file to be used with a customized Windows 7 image, what is the correct procedure? | From the windows system image manager open the custom windows image |
58. How would you retrieve an older copy of a file recently over written on the ‘C’ drive of your Windows 7 computer? | From the properties of the file select the previous versions tab |
59. You need to identify all of the encrypted files that are in C:\folder1. The command you will use is: | Cipher c:\folder1 Note: If Cipher.exe is used without parameters, CIPHER displays the encryption state of the current directory and any files it contains. (From cipher help) |