We are usually proud of the higher passing ratio. Thousands of customers have handed the Microsoft Microsoft certification exam soon after taking aid from Pass4sure. Many of us are also glad that many of them have made his or her career dreams come true. Lots of customers that have gotten certified come to Pass4sure again pertaining to another certification exam braindumps. They speak highly involving Pass4sure for the best support and higher standard of accuracy with the training materials.
Q1. - (Topic 6)
You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer.
You need to complete the configuration of the computer as a NAP client.
What should you do?
A. From the NAP Client Configuration console, configure the user interface settings.
B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command.
C. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.
D. From the NAP Client Configuration console, configure the Health Registration settings.
Answer: B
Q2. - (Topic 3)
You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer.
You need to prevent the computer from displaying the username of the last user who logged on.
What should you do?
A. From Control Panel, modify the User Profiles settings.
B. From Control Panel, modify the Personalization settings.
C. From the local computer policy, add a policy template.
D. From the local computer policy, modify the local security policy.
Answer: D
Explanation:
How to Prevent the Last Logged-On User Name from Being Displayed
1. Click Start and type secpol.msc in the search box.
2. Press Enter.
3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options.
4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name.
5. Double click this security option and click Enabled.
6. Click OK.
Q3. - (Topic 1)
You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access Web pages on both the Internet and the intranet.
What should you do?
A. From the Files menu, click Work Offline.
B. From the Safety menu, click InPrivate Filtering.
C. From the Security tab, add the intranet Web site to the Trusted sites zone.
D. From the Safety menu, click InPrivate Browsing.
Answer: A
Explanation:
Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation.
(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default.
Q4. - (Topic 1)
You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet. You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0. You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0. You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.10.210 on Perth fails to locate the Brisbane computer's IPv4 address. What is the likely reason for this lack of connectivity?
A. DNS service is not available on the subnet.
B. The computers should have different subnet masks.
C. You have not specified a default gateway.
D. You need to permit ICMPv4 traffic through the firewalls of both computers.
Answer: D
Q5. - (Topic 5)
Your company network includes desktop computers that have Windows XP Professional SP1 64-bit installed.
The company has purchased new portable computers that have Windows 7 Professional 32-bit installed.
You need to be able to migrate user profiles from the desktop computers to the portable computers.
What should you do?
A. Run scanstate /nocompress on the desktop computers.
B. Stop the User Profile Service on the desktop computers.
C. Add each desktop user to the local Administrators on the desktop computers.
D. Replace all versions of Windows 7 with 64-bit.
Answer: D
Q6. - (Topic 5)
You have three computers that run Windows 7 SP1. All computers are connected to the same network subnet of 10.0.10.0/24. The computers' network location is set to the Work network.
You need to join all the computers to a HomeGroup.
What should you do first?
A. Set the network location to the Home network.
B. Enter the HomeGroup password.
C. Enable Network Discovery.
D. Configure Windows Firewall to allow the Netlogon service.
Answer: A
Q7. - (Topic 4)
You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can create a striped volume on the computer.
What should you do?
A. Add an additional hard disk.
B. Convert all disks to dynamic disks.
C. Install a digitally-signed disk driver.
D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.
Answer: B
Explanation:
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost.
You can create striped volumes only on dynamic disks. Striped volumes cannot be extended.
You can create a striped volume onto a maximum of 32 dynamic disks.
Backup Operator or Administrator is the minimum membership required to complete the actions below.
Creating a striped volume
Using the Windows interface
Using a command line
To create a striped volume using the Windows interface
In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume….
Follow the instructions on your screen.
To create a striped volume using a command line
Open a command prompt and type diskpart.
At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume.
At the DISKPART prompt, type create volume stripe [size=<size>]
[disk=<disknumber>[,[<seconddisknumber>,
…]].
Q8. - (Topic 2)
You have a computer that runs Windows 7.
The computer is configured to use an intranet Microsoft update service location.
You need to view the name of the intranet service location.
What should you do?
A. At a command prompt, run Wusa.exe.
B. Open Event Viewer and examine the Application log.
C. Open Windows Update and click View update history.
D. Review the contents of the C:\windows\windowsupdate.log file.
Answer: D
Explanation:
WindowsUpdate.log Provides information about when the Windows Update Agent connects to the WSUS server and retrieves the software updates for compliance assessment and whether there are updates to the agent components.
Q9. - (Topic 1)
You have a computer that runs Windows 7. The computer has System Protection enabled.
You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted.
What should you do?
A. Run Disk Cleanup for Programs and features.
B. Run Disk Cleanup for System Restore and Shadow Copies.
C. From the System Protection Restore settings, select Turn off System Restore.
D. From the System Protection Restore settings, select Only restore previous versions of files.
Answer: B
Explanation:
Shadow info: Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
Q10. - (Topic 1)
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that other computers in the branch office can access the cached content on your computer.
What should you do?
A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.
Answer: D
Explanation:
Distributed Cache Mode Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. You must select Allow the connection for the BranchCache client to be able to send traffic on this port.