Q111. - (Topic 2)
You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.)
You need to install Windows 7 in a dual-boot configuration.
What should you do?
A. From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1.
B. From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1.
C. Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1.
D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.
Answer: D
Explanation:
The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive.
To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB. Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive.
When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft.
Q112. - (Topic 5)
You use a portable computer that has Windows 7 SP1 Ultimate installed.
You update the driver for the computer's video card and the computer becomes unresponsive.
You need to be able to roll back the video card driver.
What should you do?
A. Restart the computer in safe mode.
B. Start the computer, press F8, and then select Repair Your Computer.
C. Boot the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image.
D. Start the computer, press F8, and then select Debugging Mode.
Answer: A
Q113. - (Topic 5)
You use a desktop computer that has Windows 7 SP1 Ultimate installed. As part of a disaster recovery plan, you perform regular data backups and system image backups of the desktop computer.
The hard disk drive in the computer fails after a power outage. You replace the hard disk drive and restart the desktop computer by using the Windows 7 SP1 installation media.
You need to recover the computer to its previous state.
What should you do?
A. Use Startup Repair.
B. Use the command prompt.
C. Use System Image Recovery.
D. Perform a system restore.
Answer: C
Explanation:
System Image Recovery
Enables you to implement a System Image restore. You would choose this option if your hard disk failed or needed to be wiped. If system changes are causing problems, you would choose the System Restore option.
NOT Startup Repair
Automatically fixes problems that prevent Windows from starting. If Windows 7 had boot problems during a previous restart, a normal boot (without accessing the Advanced Boot dialog box) gives you the option of selecting Startup Repair.
NOT System Restore
Gives you another method of starting a system restore to a previous restore point. Because you can access this menu when you boot from a DVD-ROM, this lets you repair your system when recent changes to system settings prevent your computer from booting normally.
NOT Command Prompt
Gives access to the file system, volumes, and files through a command-line interface.
Q114. - (Topic 1)
You want to prohibit read, write, and execute access to all types of external storage devices.
What computer policy setting do you enable?
A. All Removable Storage: Allow Direct Access In Remote Sessions
B. All Removable Storage Classes: Deny All Access
C. Removable Disks: Deny Read Access
D. Removable Disks: Deny Write Access
Answer: B
Q115. - (Topic 2)
You have a computer that runs Windows 7. You connect to your company's network by using a VPN connection.
You discover that when you establish the VPN connection, you are unable to access Internet Web sites.
When you disconnect the VPN connection, you can access Internet Web sites.
You need to access Internet Web sites while you are connected to the VPN.
What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.
Answer: D
Explanation:
To prevent the default route from being created In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box.
Q116. - (Topic 4)
Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically.
The DNS and WINS servers on the company network have been taken offline for upgrades.
Users report that they can no longer access the Internet.
You need to provide access to the Internet for the computers during the maintenance.
What should you do?
A. Change the IP address of the primary WINS to a public name server.
B. Change the IP address of the default gateway.
C. Change the IP address of the primary DNS to a public DNS.
D. Change the client IP address and subnet mask.
Answer: C
Q117. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
The stored password needs to be deleted.
What action should you perform?
A. The Windows credentials should be modified from Credential Manager.
B. The Authorization Manager options should be modified from Authorization Manager.
C. Del should be run and the /p parameter should be specified.
D. Runas should be run and the /noprofile parameter should be specified.
Answer: A
Q118. - (Topic 1)
Which of the following is not a volume type usable by Windows 7?
A. FAT
B. exFAT
C. NTFS
D. All of the above a volume types in Windows 7.
Answer: D
Q119. - (Topic 5)
You plan to install Windows 7 on a new portable computer.
The computer will be shared by users who speak English, French, and German.
You need to select an edition of Windows 7 that enables users to change languages as required.
Which edition should you choose?
A. Starter
B. Ultimate
C. Home Premium
D. Professional
Answer: B
Q120. - (Topic 3)
You need to configure a computer to encrypt all inbound connections by using IPSec.
What should you do?
A. From Network and Sharing Center, click Connect to a network.
B. From Network and Sharing Center, click Set up a new connection or network.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.
Answer: D
Explanation:
Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not.