Q81. DRAG DROP - (Topic 6)
You are a systems administrator for a company that uses Windows 7 computers.
The company plans on upgrading all the computers. You have configured one computer, named SOURCE, with a power plan that meets a criteria for reduced power consumption. You want to test this power plan on another computer named DEST.
You need to transfer the power plan from SOURCE to DEST.
Which three actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q82. - (Topic 2)
You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.)
You need to install Windows 7 in a dual-boot configuration.
What should you do?
A. From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1.
B. From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1.
C. Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1.
D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.
Answer: D
Explanation:
The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive.
To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB. Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive.
When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft.
Q83. - (Topic 1)
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that other computers in the branch office can access the cached content on your computer.
What should you do?
A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.
Answer: D
Explanation:
Distributed Cache Mode Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. You must select Allow the connection for the BranchCache client to be able to send traffic on this port.
Q84. - (Topic 1)
Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two.
A. File Settings and Transfer Wizard
B. USMT
C. Windows Easy Transfer
D. Robocopy.exe
Answer: B,C
Q85. - (Topic 2)
You have a computer that runs Windows Vista.
You need to identify whether the computer can be upgraded to Windows 7.
Which tool should you use?
A. Windows Anytime Upgrade for Windows 7
B. Windows Anytime Upgrade for Windows Vista
C. Windows 7 Upgrade Advisor
D. Windows Vista Upgrade Advisor
Answer: C
Explanation:
Windows 7 Upgrade Advisor Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft's\ Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista. Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7. NOT Windows Anytime Upgrade A similar compatability report is generated during the upgrade process, but the version created by the Windows 7 Upgrade Advisor is more likely to be up to date.NOT VistaQuestion specifies upgrading to Windows 7 from Windows Vista, not upgrading to Windows Vista.
Q86. - (Topic 5)
You manage several client computers in an organization.
You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization.
What should you do?
A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting.
B. Configure an AppLocker Windows Installer rule.
C. Configure the User Account Control (UAC) settings on all client computers to always notify.
D. Create a custom GPO to configure a software restriction policy.
Answer: A
Q87. DRAG DROP - (Topic 6)
You capture a Windows Image (.wim) file from a reference computer.
You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to target desktops.
You need to encrypt an administrator account password in the answer file used for the image deployment.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q88. - (Topic 2)
You have a computer that runs windows 7.
The computer is configured as shown in the following table.
You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1.
You need to provide 40 GB of free space for the application.
What should you do?
A. Create a shortcut.
B. Create hard link.
C. Create a mount point.
D. Change the quota settings.
Answer: C
Explanation:
Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.
Q89. - (Topic 1)
Which of the following is not a minimum requirement to install Windows 7?
A. 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor
B. 4GB RAM (32-bit)/2 GB RAM (64-bit)
C. 16 GB available disk space (32-bit)/20 GB (64-bit)
D. DirectX 9 graphics processor with WDDM 1.0 or higher driver.
Answer: B
Q90. - (Topic 5)
You plan to deploy Windows 7 images.
You need to ensure that you can deploy images by using the Windows Preinstallation Environment (Windows PE).
What should you add to the Windows PE image?
A. Imagex.exe
B. Mighost.exe
C. Usmtutils.exe
D. Loadstate.exe
Answer: A