Q121. - (Topic 3)
You have a computer that runs Windows 7.
A user reports that he is unable to access network resources. You run Ipconfig.exe as shown in the IPConfig exhibit. (Click the Exhibit button.)
You open Device Manager as shown in the Device Manager exhibit. (Click the Exhibit button.)
You need to ensure that the user can connect to the network.
What should you do?
A. From Device Manager, enable the network adapter.
B. From Device Manager, update the driver for the network adapter.
C. At a command prompt, run Ipconfig /renew.
D. At a command prompt, run Netsh ip set address "local area connection" dhcp.
Answer: A
Explanation:
IP Configuration should look something like this, if network adapter is enabled.
The icon displayed in Device Manager indicates that network adapter is disabled. Therefore, enable the network adapter.
Q122. - (Topic 5)
You administer client computers that have Windows 7 Enterprise installed.
A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876.
You need to connect to the server from a client computer by using Remote Desktop.
What should you do?
A. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876.
B. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option.
C. From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field.
D. From the Advanced tab of your Remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server.
Answer: C
Explanation:
Note:
* mstsc.exe allows you to initiate terminal services commands via the command line, and forms an important part of this additional Windows service.
Incorrect:
Not A: Incorrect syntax.
Q123. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You use Remote Desktop to connect from Computer1 to Computer2.
You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2.
What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.
Answer: C
Explanation:
Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users.
Q124. DRAG DROP - (Topic 6)
A company has an Active Directory forest which is shown in the following graphic.
The company's client computers run Windows 7. You deploy BitLocker Drive Encryption on all the client computers.
You need to configure BitLocker Drive Encryption to back up recovery information to Active Directory for BitLocker protected drives and the Trusted Platform Module (TPM).
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q125. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. Create an EFS Data Recovery Agent by using Group Policy.
B. From User Accounts, select Manage your file encryption certificates.
C. Run the cipher.exe /adduser /user:administrator command.
D. Run the manage-bde -on C: -RecoveryPassword password command.
Answer: A
Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.
Q126. - (Topic 3)
You have a computer that runs Windows 7.
Windows Backup is configured to store backups on an external drive.
You create a new NTFS volume on the computer.
You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups.
What should you do?
A. From Backup and Restore, select Change settings.
B. From Backup and Restore, select Create a system image.
C. From the System Protection tab, create a restore point.
D. From the System Protection tab, enable system protection for the new volume.
Answer: A
Explanation:
Backups are configured and scheduled by using the Backup And Restore console under
System And Security in Control Panel.
The Change Settings option is not available unless you have configured a backup schedule
and performed a backup.
Q127. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed.
The client computers have a third-party firewall application installed.
You configure BranchCache on all computers to run in Distributed Cache mode.
You need to ensure that the client computers can access all cached files.
What should you do?
A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
B. Check permissions.
C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443
D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
F. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
G. Run the netsh branchcache set service mode=DISTRIBUTED command
H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option.
I. Create a Group policy that sets Hash Publication for Branchcache as disabled.
Answer: A
Explanation:
Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic.
You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode.
You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache - Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache - Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.
You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically.
Q128. - (Topic 2)
You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. You encounter that windows is unable to install the necessary device drivers for the mobile device.
You need to ensure that you can synchronize file to the mobile device.
What should you do?
A. From Windows Mobility Center, click Sync settings.
B. From Sync Center, click set up new sync partnerships.
C. From Device Manager, click scan for hardware changes.
D. From Devices and Printers, right-click the device and click troubleshoot.
Answer: D
Explanation:
You cannot sync without the drivers installed. It says unable to install, assuming that it could find the device if it was able to reach attempting to install point. Therefore Troubleshoot.
Q129. - (Topic 1)
You have a computer that runs Windows 7.
You need to configure the computer to meet the following requirements:
. Generate a new security ID (SID) when the computer starts.
. Ensure that the Welcome screen appears when the computer starts.
What should you do?
A. Run Sysprep.exe /oobe /generalize.
B. Run Sysprep.exe /audit /generalize.
C. Run Msconfig.exe and select Selective startup.
D. Run Msconfig.exe and select Diagnostic startup.
Answer: A
Explanation:
To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged./generalize Prepares the Windows installation to be imaged. If you specify this option, all unique system information is removed from the Windows installation. The SID is reset, system restore points are cleared, and event logs are deleted. The next time the computer starts, the specialize configuration pass runs. A new SID is created, and the clock for Windows activation resets (unless the clock has already been reset three times)./oobeRestarts the computer in Windows Welcome mode. Windows Welcome enables users to customize their Windows 7 operating system, create user accounts, and name the computer. Any settings in the oobeSystem configuration pass in an answer file are processed immediately before Windows Welcome starts.
Q130. - (Topic 3)
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.
You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0.
During the migration, you receive the following error message: "Gather was aborted because of an EFS file."
You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2.
What should you do?
A. Add the /efs:copyraw switch to the Loadstate command.
B. Add the /efs:copyraw switch to the Scanstate command.
C. Generate a new Encrypting File System (EFS) certificate on Computer2.
D. Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.
Answer: B
Explanation:
You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey"Encrypted File OptionsYou can use the following options to migrate encrypted files. In all cases, by default, USMT 4.0 fails if an encrypted file is found unless you specify an /efs option. To migrate encrypted files, you must change the default behavior. EFS certificates will be migrated automatically when migrating to Windows Vista or Windows 7. Therefore, you should specify the /efs:copyraw option with the ScanState command to migrate the encrypted files