• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/206

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

206 Cards in this Set

  • Front
  • Back
what filename extension is applied by default to custom consoles that are created for the mmc?
a. .mmc
b .msc
c .con
d .mcn
.msc
which users are able to manage mandatory profiles on Windows computers?
a the user who uses the profile
b server operators
c power users
d administrators
administrators
Which MMC snap in would you load to access system monitor?
a system monitor
b reliability monitor
c activeX control
d performance logs and alerts
activeX control
If you wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user?
a administrator user account
b standard user account
c power user account
d authenticated user account
standard user account
you have installed a clean installation of windows 7 on your computer. You want to create an image of the new installation to use as a basis for remote installs. What windows 7 utility should you use to accomplish this?
a WDS
b Windows SIM
c ImageX
d Sysprep
ImageX
Which of the following statements is true regarding the built in administrator account in windows 7?
a does not exist
b is disabled by default
c has no permissions
d is not a member of the administrators group.
b
which accesibility utility is used to read aloud screen text? a read aloud
b orator
c dialog manager
d narrator
narrator
You have just purchased a new computer that has windows 7 preinstalled. you want to migrate existing users from a previous computer that was running windows xp professional Which two files would you use to manage tis process through the user state migration tool?
a usmt. exe
b ScanState.exe
c Loadstate.exe
d Windows7Migrate.exe
scanstate.exe
loadstate.exe
You have scheduled a specific program that is required by the accounting department to run as a scheduled task every day. When you log on as an administrator, you can run the task, but when the scheduled task is supposed to run, it does not run properly. You have already verified that the Task Scheduler task is running. What else should you check?
a that the task has been configured to run in unattended mode.
b make sure the user who is scheduled to run the task has the appropriate permissions.
c make sure the time is properly synchronised on the computer
d verify the the process manager task is running.
b make sure user has appropriate permissions
You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure?
a pop up blocker
b RSS reader
c Phishing filter
d add-on manager
Phishing filter
Which windows 7 utilities should you configure to prevent spyware?
a windows defender
b phishing filter
c pop up blocker
d windows onecare
windows defender
which of the following will occur when the computer enters sleep mode?
a the computer will be shut down gracefully
b data will be saved to the hard disk
c the monitor and the hard disk will be turned off, but the computer will remain in a fully active state
d the user sessio will not be available when you resume activity on the computer
b data will be saved to the hard disk
You want to ensure that the last 100 RSS feed updates are stored. What should you do?
a configure the RSS feed to automatically download attatched files
b Modify the schedule so that the RSS feed is updated more than once a day
c turn on feed reading view in IE
d modify the archive setting so that the last 100 items are stored.
d modify the archive setting so that the last 100 items are stored
what is the CIDR equivalent for 255.255.255.224?
a /24
b /25
c /26
d/27
d /27
You are configuring a new windows 7 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform?
a install a printer
b install network drivers
c configure WPA keys.
d modify the desktop settings
a, c, d
What subnet mask should you use with the network address 192.168.10.0?
255.255.255.0
You are using a laptop running windows 7 home premium. You want to synchronize files between your laptop and a network foler. Which of the following actions must you perform first i order to enable synchronization to occur between your laptop and the network folder?
a upgrade your laptop to Windows 7 ultimate
b enable one way synchronization between the laptop and the network folder
c enable two way synchronization between the laptop and the network foler
d configure the files on you laptop as read only
a upgrade your laptop to windows 7 ultimate
You have a DNS server that contais corrupt information. You fix the problem with the DNS server, but one of your users is complaining that they are still unable to access Internet resources. You verify that everything works on another computer on the same subnet. Which command can you use to fix the problem?
a Ipconfig / flush
b Ipconfig /flushdns
c Ping /flush
d Grope /flushdns
b ipconfig/flushdns
which of the following can be configured on a VPN client so it can access a VPN server?
a IP address
b MAC address
c domain name
d connection address
ip address, domain name
which of the following statements are true regarding the creation of a group in windows 7?
a only members of the administrators group can create users on a windows 7 computer
b group names can be up to 64 characters
c group names can contain spaces
d group names can be the same as usernames but not the same as other group names on the computer
a, c
administrators only
can contain spaces
you need to expand the disk u are considering using spanned volumes. Which of the following statements is/are true concerning spanned volumes?
a spanned volumes can contain space fro 2 to 32 physical drives
b spanned voumes can contain space from 2 to 24 physical drives.
c spanned voumes can be formatted as FAT32 or NTFS partitions.
d spanned volumes can be formatted only as NTFS partitions.
a,c 2-32 drives
can be formatted as FAT32 or NTFS
Your email provider uses POP3 and SMTP, What pjort should you open on the firewall?
25
You need windows 7 to be the primary operating system on a dual boot machine. Which file do you configure for this?
a boot.ini
b bcdedit
c bcboot.ini
d bcdboot
bcdedit
which of the following versions of windows7 can be upgraded to windows 7 ultimate edition?
a windows 7 home starter
b windows 7 professional
c windows 7 home premium
d windows 7 businesss
b,d professional and business
Which of the following can be configured by setting parental controls?
a when your children can access the computer
b what websites you children can view
cwhat programs your children can access
d what other computers on your home network your children can access
a,b,c
how do you access the advanced boot menu in windows 7 during the boot process?
f8
You have two remote sites with Windows 7 machines. You need to share data across the slow sites. What feature can help with this?
a link detection
b branchCache
c DirectAccess
d DirectCache
branchCache
which utiity is used to upgrade a FAT32 partition to NTFS?
a UPFS
b UPGRADE
c Disk Manager
d CONVERT
CONVERT
Which of the following audit policy options allows you to track events related to file and print object access?
a file and object access
b audit object access
c audit file and pring access
d audit all file and print events
audit object access
which of the following are new features to windows 7?
a windows 7 taskbar
b jump list
c windows xp mode
d windows touch
all
what feature of windows vista is a vertical sidebar on the screen?
a parental controls
b jump list
c windows sidebar
d windows firewall
c windows sidebar
What operating systems support NAP?
a windows xp with sp2
b windows xp with sp3
c windows vista
d windows 7
b c d everything after sp2
which windows 7 feature is a new feature that allows you to connect a device to the machine and then the windows 7 operating system shows a graphical picture of the device for use?
a device manager
b device stage
c staging manager
d ADD/remove hardware
b device stage
Which windows 7 feature can you use to assure the managers that all of their windows xp applications will continue to work after upgrading to windows 7?
a windows xp compatibility checker
b windows xp application center
c windows xp mode
d windows xp application upgrade tool
c windows xp mode
Which of these are new features of Internet Explorer 8?
a Instant search
b root hints
c accelerators
d web slices
a c d not root hints
You are the IT administrator for a large computer training company that uses laptops for all its employees. Currently the users have to connect to the wireless network through the wireless network adapter. Windows 7 now includes this built in as which feature?
a Available network finder ANF
b view networks VN
Network Availability Viewer NAV
ViewAvailable Networks VAN
d VAN
What features allow you to set up a home network using windows 7?
a home networking
b homegroups
c quick connect
d networking groups
b homegroups
which new windows 7 feature allows you to quickly access files that you have been working on?
a quick connect
b jump lists
c file finder
d quick file access
b jump lists
which windows 7 feature has built in touchscreen technology?
a windows touch screen
b windows pure touch
c windows touch
d windows pure screen
c windows touch
You are the network administrator for a large organization that has decided to convert all of its windows xp machines to windows 7. How can it put windows 7 on all the windows xp machines without losing the users information?
a upgrade all the windows xp machines to windows 7
b format all the xp machines and do a clean install of windows 7
c use a migration tool to migrate all the users data and then load a clean copy of windows 7
d do nothing. the windows xp machines can't be upgraded without losing all the user's data.
c migration tool
You are the network administrator for a mid-size organization. You have a machine with windows vista and you need to load windows 7. You want to make the machine dual boot. you install windows 7 on a new partition on the machine. You want the machine to start in windows vista by default. How do you accomplish this?
a change the boot. ini file so that windows vista is the default.
b edit bcdedit.exe with the /default papramater to set windows vista as the default
c delete the windows 7 boot.ini file so the machine reverts to vista by default
d edit the bcdedit.exe with the /order parameter to set windows vista as the default.
b bcedit/default
how can you verify that all machnes in the company that are running windows vista can upgrade to windows 7?
a check windows vista machines against the hardware compatibility list.
b install windows 7 on all the machines to see if they operate properly
c call the manufacturer of all the machines
d ask users to email the specs of their machines and chec against manufacturer websites.
a hardware compatibility list
You have just completed the install on one of your new windows 7 machines. After the install is complete, what's the next step in making sure the machine is ready to be used?
a set up the machine to dual boot
b check microsoft's website for all updates and patches.
c configure the sethc.exe file
d load microsof office
b updates and patches
which of the following can be migrated from windows xp machines to windows 7 machines using windows easy transfer?
a user accounts
b folders and files
c program settings
d internet settings
e favorites
f email messages, contacts and settings
a b c d e f
which of the following options can be configured in windows update?
a check for updates
b change settings
c view update history
d restore hidden updates
a b c d
you are installing windows 7 on a new machine. the machine has encountered installation errors. which files can you view to see the errors or issues?
a setupact.log
b setuplog.log
c setupdc.log
d setuperr.log
a d
setupact.log
setuperr.log
In order to use the encrypting file system, which windows 7 versions can you install?
a home edition
b home premium edition
c professional edition
d enterprise edition
c d professional and enterprise
you have a machine that is currently running windows vista ultimate edition. which windows 7 editions can you upgrade this machine to?
a home premium edition
b professional edition
c enterprise edition
d ultimate edition
d ultimate edition
which of the following services are required to use WDS?
a DNS
b WINS
c DHCP
d Active Directory
a c d DNS DHCP Active directory
What command line utility should you use to configure a WDS server?
a ImageX
b WDSUTIL
c Setup.exe
d The WDS icon in control panel
b WDSUTIL
what requirement must be met on a client computer to upgradefrom windows xp professional to windows 7 from a WDS server?
a the computer must use a PXE based boot ROM
b the computer must contain an NTFS partition.
c the computer must use identical hardware configureations as the reference image.
d there is no option to upgrade with WDS
d no option
what program can you use to create unattended answer files via a GUI interface?
a ImageX
b Answer Manager
c Windows system image manager
d system preparation tool
c Windows system image manager
bob is using WDS to install 100 clients that are identically configured. The first 65 computers are installed with no problems. When he tries to install the other 35, the machines all receive a 169.254.x.x number along with an error. which of the following would cause this failure?
a the wds server has been authorized to serve only 65 clients.
b the WINS server is no longer available
c the DHCP server does not have enough IP addresses to allocate to the WDS clients.
d the network bandwidth has become saturated.
c DHCP server does not have enough addresses
You run a training department that needs the same software installed from scratch
on the training computers each week. You decide to use ImageX to deploy disk images.
Which Windows 7 utility can you use in conjunction with ImageX to create these disk
images?
A. UAF
B. Answer Manager
C. Setup Manager
D. System Preparation Tool
d system preparation tool
You are trying to decide whether you want to use WDS as a method of installing
Windows 7 within your company. Which of the following options is not an advantage
to using a WDS automated installation?
A. The Windows 7 security is retained when you restart the computer.
B. Windows 7 installation media does not need to be deployed to each computer.
C. Unique information is stripped out of the installation image so that it can be copied to
other computers.
D. You can quickly recover the operating system in the event of a system failure
c unique information is stripped...
You are trying to decide whether you want to use WDS as a method of installing
Windows 7 within your company. Which of the following options is not an advantage
to using a WDS automated installation?
A. The Windows 7 security is retained when you restart the computer.
B. Windows 7 installation media does not need to be deployed to each computer.
C. Unique information is stripped out of the installation image so that it can be copied to
other computers.
D. You can quickly recover the operating system in the event of a system failure.
c unique information is stripped...
You are the network manager of the XYZ Corporation. You are in charge of developing
an automated deployment strategy for rolling out new Windows 7 computers. You want
to install a WDS server and are evaluating whether an existing server can be used as a
WDS server for Windows 7 deployment. Which of the following is not a requirement for
configuring the WDS server?
A. The remote installation folder must be NTFS version 3.0 or later.
B. The remote installation folder must reside on the system partition.
C. RIS must be installed on the server.
D. The existing server must run Windows Server 2003 with Service Pack 1 installed.
b the remote installation folder must reside on the system partition
You are using WDS to install 20 Windows 7 computers. When the clients attempt to
use WDS, they are not able to complete the unattended installation. You suspect that the
WDS server has not been configured to respond to client requests. Which one of
the following utilities would you use to configure the WDS server to respond to client
requests?
A. Active Directory Users and Computers
B. Active Directory Users and Groups
C. WDS MMC snap - in
D. WDSMAN
c WDS MMC snap-in
You want to install a group of 25 computers using disk images created in conjunction with
the System Preparation Tool. Your plan is to create an image from a reference computer and
then copy the image to all the machines. You do not want to create a SID on the destination
computer when you use the image. Which Sysprep.exe command - line option should you
use to set this up?
A. /specialize
B. /generalize
C. /oobe
D. /quiet
b generalize
You are planning on deploying 100 new Windows 7 computers throughout your company.
Each new computer is similarly configured. You want to create a reference image that will
then be applied to the remaining images. Which of the following utilities should you use?
A. WDSUTIL
B. Setup.exe
C. Windows SIM
D. ImageX
d ImageX
You are a network technician for your company, and you need to deploy Windows 7 to
multiple computers. You want to automate the installation of Windows 7 so that no user
interaction is required during the installation process. Which of the following utilities could
you use?
A. Windows SIM
B. ImageX
C. System Preparation Tool
D. WDSUTIL
a Windows SIM
You want to initiate a new installation of Windows 7 from the command line. You plan to
accomplish this by using the Setup.exe command - line setup utility. You want to use an
answer file with this command. Which command - line option should you use?
A. /unattend
B. /apply
C. /noreboot
D. /generialize
a / unattend should be autounattend
You have manually created an answer file that you want to use to deploy an image that you
have previously created. Before deploying the image, you want to ensure that your answer
file will work with the image. Which of the following tools could you use to validate the
answer file?
A. System Preparation Tool
B. Windows SIM
C. ImageX
D. WDSUTIL
b Windows SIM
15. You have created a Windows 7 image that you will copy to a DVD and deploy to several
new computers. You want to use an answer file to automate the setup process. Where
should the answer file be located so that you can use it during installation?
A. On a network share
B. On a WDS server
C. On a separate DVD
D. At the root of the DVD
d at the root of the DVD
You are planning on deploying a new Windows 7 image to 100 client computers
that are similarly configured. You are using the Windows SIM tool to create an answer
file that will be used to automate the installation process. You want each computer
to contain two partitions, one for the system partition and one that will function as a
data partition. You need to modify the answer file to support this configuration. Which
component of the answer file will you need to modify?
A. oobeSystem
B. auditSystem
C. Windows PE
D. specialize
c Windows PE
Your company has recently hired a new employee. You need to deploy Windows 7 on
the new employee ’ s computer. You have previously created a Windows 7 image using
the ImageX utility and have successfully deployed it to other computers. You want to use
ImageX to deploy the image to the new employee ’ s computer. Which ImageX option will
you need to use?
A. /apply
B. /capture
C. /mount
D. /verify
a /apply
You are using WDS to deploy Windows 7 images across your organization, and you
are using the WDSUTIL command - line utility to perform this task. You want to copy
a previously created image from the image store using this utility. Which option of
WDSUTIL should you use?
A. /move
B. /copy - image
C. /get
D. /enable
b /copy-image
You are using the Windows SIM tool to create an answer file to be used when deploying
new Windows 7 images. You are editing the configuration passes too so that the desired
settings are entered during the installation process. You are currently editing the specialize
component of the answer file. Which of the following information should you include in
this component of the answer file?
A. Hard disk partitioning information
B. Product key information
C. Windows Welcome screen settings
D. Domain and network settings
d domain and network settings
You have recently installed Windows 7 onto a reference computer that will be used to create
an image that can then be deployed to sales employees ’ computers. You have installed and
configured several proprietary sales applications on the computer. You have previously used
the System Preparation Tool to remove any system - specific information from the computer,
and you plan to use ImageX to create the image from this reference computer. Which
option of the ImageX utility can you use to accomplish your goal?
A. /apply
B. /capture
C. /mount
D. /verify
b /capture
Will has installed Windows 7 on his Windows XP computer. The machine is now a
dual - boot computer. He has FAT32 for Windows XP and NTFS for Windows 7. In
addition, he boots his computer to Windows XP Professional for testing an application ’ s
compatibility with both operating systems. Which of the following file systems will be seen
by both operating systems?
A. Only the FAT32 partition will be seen by both operating systems.
B. Only the NTFS partition will be seen by both operating systems.
C. Neither the FAT32 partition nor the NTFS partition will be seen by both
operating systems.
D. Both the FAT32 partition and the NTFS partition will be seen by both
operating systems.
d both
You are the network administrator for a large company that has decided to use EFS. You
have two Windows 7 machines, named machine1 and machine2. Both of these Windows 7
machines are part of a Windows Server 2008 domain. From machine1 you can recover all
EFS encrypted files for all users in the entire domain. You need to be able to do the same
from machine2. How do you accomplish this task?
A. From machine1, export the data recovery agent certificate and import that certificate
onto machine2.
B. On a domain controller, add machine1 as the master EFS machine.
C. From machine1, export the data recovery agent certificate and import that certificate
onto the EFS server.
D. On a domain controller, add machine2 as the EFS recovery agent machine.
a from machine 1, export the data recovery agent certificate and import that certificate onto machine2
Alexandria is the payroll manager and stores critical files on her local drive for added
security on her Windows 7 computer. She wants to ensure that she is using the disk
configuration with the most fault tolerance and the highest level of consistent availability.
Which of the following provisions should she use?
A. Disk striping
B. Spanned volumes
C. Mirrored volumes
D. Extended volume
c mirrored volumes
Paige is considering upgrading her basic disk to a dynamic disk on her Windows 7
computer. She asks you for help in understanding the function of dynamic disks. Which of
the following statements are true of dynamic disks in Windows 7? (Choose all that apply.)
A. Dynamic disks can be recognized by older operating systems such as Windows NT 4
in addition to new operating systems such as Windows 7.
B. Dynamic disks are supported only by Windows 2000 Server and Windows
Server 2003.
C. Dynamic disks support features such as simple partitions, extended partitions,
spanned partitions, and striped partitions.
D. Dynamic disks support features such as simple volumes, extended volumes, spanned
volumes, mirrored volumes, and striped volumes.
d volumes
Cindy is using Windows 7 on her laptop computer, and the C: partition is running out of
space. You want to identify any areas of free space that can be reclaimed from temporary
files. What utility should you use?
A. Disk Cleanup
B. Disk Manager
C. Disk Administrator
D. Disk Defragmenter
a disk cleanup
Rob is using Windows 7 to store video files. He doesn ’ t access the files very often and
wants to compress the files to utilize disk space. Which of the following options allows you
to compress files in Windows 7?
A. Compression.exe
B. Cipher.exe
C. Packer.exe
D. Windows Explorer
d windows explorer
Maggie wants the highest level of security possible for her data. She stores the data on an
NTFS partition and has applied NTFS permissions. Now she wants to encrypt the files
through EFS (Encrypting File System). Which command - line utility can she use to manage
data encryption?
A. Encrypt
B. Cipher
C. Crypto
D. EDS
b Cipher
You have compressed a 4 MB file into 2 MB. You are copying the file to another computer
that has a FAT32 partition. How can you ensure that the file will remain compressed?
A. When you copy the file, use the XCOPY command with the /Comp switch.
B. When you copy the file, use the Windows Explorer utility and specify the option Keep
Existing Attributes.
C. On the destination folder, make sure that you set the option Compress Contents To
Save Disk Space in the folder ’ s properties.
D. You can ’ t maintain disk compression on a non - NTFS partition.
d cannot maintain compression on non- NTFS disk
Julie wants to allow her assistant, Tylor, access to several files that she has encrypted with
EFS. How can she allow Tylor to access the files on her computer?
A. Julie should export and email her encryption key to Tylor.
B. Julie should configure NTFS permissions to provide Tylor with full access to the files.
C. Julie should import Tylor ’ s encryption key and add Tylor ’ s certificate to each file to
which Tylor should have access.
D. Julie should configure share permissions to provide Tylor with full access to the files
over the network.
c
Will is the manager of human resources in your company. He is concerned that members of
the Administrators group, who have implied access to all NTFS resources, will be able to
easily view the contents of the sensitive personnel files. What is the highest level of security
that can be applied to the payroll files?
A. Apply NTFS permissions to the files.
B. Encrypt the files with EFS.
C. Secure the files with the Secure.exe command.
D. Encrypt the files with HSP.
b encrypt the files with EFS
Bruce frequently works with a large number of files. He is noticing that the larger the files
get, the longer it takes to access them. He suspects that the problem is related to the files
being spread over the disk. What utility can be used to store the files sequentially on the disk?
A. Disk Defragmenter
B. Disk Manager
C. Disk Administrator
D. Disk Cleanup
a
You are the network administrator for a small company. You have a laptop that you use to
test an application that is deployed to several users who have access to only a Windows XP
computer. To accommodate the testing of the application, you have a laptop that dual - boots
between Windows 7 and Windows XP. You currently have Windows XP on the C: drive
and Windows 7 on the D: drive. Both partitions are formatted with FAT32. You decide to
convert the D: drive to NTFS so that you can apply additional security to some of the files.
You use the Convert command - line utility to convert the D: drive. Before you reboot and
convert the drive, you realize that you should not have converted the drive. How can you
cancel the conversion process?
A. Use Convert D: /cancel .
B. Use Convert D: /fs:FAT .
C. In Disk Administrator, select Tools  Cancel Conversion for Drive C:.
D. Edit the Registry setting for HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Control\SessionManager to autocheck autochk * .
d edit registry settings
Cathy is the payroll manager at your company. The day before the payroll is processed,
Cathy is involved in a minor car accident and spends two days in the hospital. She has
Windows 7 installed as a part of a workgroup and has encrypted the payroll files with EFS.
All of the EFS settings for the computer are set to default values. How can these files be
accessed in her absence?
A. The Administrator user account can access the files by backing up the files, restoring
the files on the computer where the recovery agent is located, and disabling the files ’
Encrypt The Contents To Secure Data option.
B. The Administrator user account can access the files by using the unencrypt
command - line utility.
C. The Administrator user account can access the files by using the encrypt - d
command.
D. Unless a DRA has been configured, there will be no access to the files.
d
You have an extremely large database that needs to be stored on a single partition. Your
boss asks you about the maximum capacity for an NTFS partition. Assuming you are using
4 KB clusters, what is the correct answer?
A. 16 TB
B. 64 GB
C. 132 GB
D. 32 GB
a 16 TB
You have just added a new disk to your computer that supports hot swapping. Your
computer now has three physical drives. What is the fastest way to allow Windows 7 to
recognize the new disk?
A. Restart the computer.
B. In Disk Manager, select Action  Rescan Disk.
C. In Disk Management, select Action  Rescan Disk.
D. In System Tools, select Update Disks.
c Disk Management - Rescan disk
You have a 10 MB image file that you want to email to another user in the marketing
department. Which of the following should you do in order to email the image?
A. Encrypt the image with EFS.
B. Configure compression on the directory in which the image file is stored.
C. Right - click the image file and select Send To  Compressed (Zipped) folder.
D. Use the Compact command - line utility.
c
You are installing a new hard drive into your computer, which dual - boots between
Windows 7 and Windows XP. You will be storing large and sensitive files on this drive.
You will need to access these files from either operating system. You need to determine
the file system to use when formatting the disk. Which of the following should you use?
A. NTFS
B. FAT32
C. FAT16
D. CDFS
a NTFS
You are administering a Windows 7 computer. You suspect that the disk in the computer
may have some bad sectors. You want to determine if the disk does have any bad sectors
and fix them if possible. Which utility could you use to accomplish this?
A. DiskPart
B. Check Disk
C. Disk Cleanup
D. Disk Defragmenter
b
You are the human resources administrator for your company. You have recently been
assigned a Windows 7 laptop computer. You have added a new directory named HR to
the computer. You want to ensure that all files that are stored within the HR directory
are encrypted. You will use the Cipher utility to accomplish this. Which of the following
options should you use with the Cipher utility?
A. /D
B. /E
C. /R
D. /X
b
You are a system administrator for your company. You are managing a Windows 7
computer. You issue the following command at a command prompt: Compact /C . Which
of the following will occur as a result of issuing this command?
A. All files located on the C: drive will be compressed.
B. All files located on the C: drive will be uncompressed.
C. All files within the specified directory will be compressed.
D. All files within the specified directory will be uncompressed.
c
You are the system administrator for your company. You are configuring the services on a
Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to
restart. Which tab of the service ’ s Properties dialog box should you use?
A. General
B. Log On
C. Recovery
D. Dependencies
c Recovery
The system administrator of your network wants to edit the Registry, including setting
security on the Registry keys. What primary utility or utilities that support full editing of
the Windows 7 Registry should the system administrator use? (Choose all that apply.)
A. REGEDIT
B. REDIT
C. REGEDT32
D. REGEDITOR
a c
The system administrator of your network wants to edit the Registry, including setting
security on the Registry keys. What primary utility or utilities that support full editing of
the Windows 7 Registry should the system administrator use? (Choose all that apply.)
A. REGEDIT
B. REDIT
C. REGEDT32
D. REGEDITOR
a c
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset
the keyboard speed and the mouse pointer rate. Which utility should she use to configure
the keyboard and mouse properties?
A. Control Panel
B. Computer Management
C. Microsoft Management Console
D. Registry Editor
a
Denise is using a laptop computer that uses ACPI. She wants to see what percentage of the
battery power is still available. She also wants to know if Hibernation has been configured.
Which of the following utilities should she use?
A. Device Manager
B. Computer Manager
C. Battery meter
D. MMC
c
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset
the keyboard speed and the mouse pointer rate. Which utility should she use to configure
the keyboard and mouse properties?
A. Control Panel
B. Computer Management
C. Microsoft Management Console
D. Registry Editor
a control panel
Denise is using a laptop computer that uses ACPI. She wants to see what percentage of the
battery power is still available. She also wants to know if Hibernation has been configured.
Which of the following utilities should she use?
A. Device Manager
B. Computer Manager
C. Battery meter
D. MMC
c battery meter
You are administering a computer that is used by several customer support representatives
for your company. The support representatives use a custom application to report support
incidents. After the application is updated, it stops functioning properly and one of the
programmers who wrote the application indicates that a Registry change needs to
be made to the computer. You need to ensure that the change is applied for each user of the
computer. Which Registry key should you modify?
A. HKEY_CLASSES_ROOT
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY_USERS
c HKEY_Local_Machine
You have a user, Rob, who uses a laptop computer running Windows 7. You have
configured the laptop to enter Sleep mode after 30 minutes of inactivity. What will occur
when the computer enters Sleep mode?
A. The data will be saved to the hard disk, and the computer will shut down.
B. The data will be erased from RAM, and the computer will shut down.
C. The monitor will be turned off, but the hard disks will remain active.
D. The data will be saved to the hard disk, and the computer will be put into a power -
saving state.
d the data will be saved to the hard disk and the computer will be put into a power-saving state.
You are administering a computer that is used by several customer support representatives
for your company. The support representatives use a custom application to report support
incidents. After the application is updated, it stops functioning properly and one of the
programmers who wrote the application indicates that a Registry change needs to
be made to the computer. You need to ensure that the change is applied for each user of the
computer. Which Registry key should you modify?
A. HKEY_CLASSES_ROOT
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY_USERS
c
You want to speed up the resume time on your computer after it is put into Hibernation
mode. You have installed a hybrid hard disk drive into your Windows 7 computer. Which
technology should you use to accomplish your goal?
A. ReadyDrive
B. ReadyBoost
C. Superfetch
D. SuperDrive
a
You have a user, Rob, who uses a laptop computer running Windows 7. You have
configured the laptop to enter Sleep mode after 30 minutes of inactivity. What will occur
when the computer enters Sleep mode?
A. The data will be saved to the hard disk, and the computer will shut down.
B. The data will be erased from RAM, and the computer will shut down.
C. The monitor will be turned off, but the hard disks will remain active.
D. The data will be saved to the hard disk, and the computer will be put into a power -
saving state.
d
A new employee named Crystal has been supplied with a Windows 7 laptop computer.
You have configured Crystal ’ s computer with the Power Saver power plan, and you used
the default options. Which of the following will occur after 20 minutes of inactivity on
Crystal ’ s computer?
A. The display will be turned off, but the hard disk will remain active.
B. The hard disk will be turned off, but the display will remain active.
C. Both the hard disk and the display will be turned off.
D. No components will be turned off.
c both the hard disk and the display will be turned off
You want to speed up the resume time on your computer after it is put into Hibernation
mode. You have installed a hybrid hard disk drive into your Windows 7 computer. Which
technology should you use to accomplish your goal?
A. ReadyDrive
B. ReadyBoost
C. Superfetch
D. SuperDrive
a
A new employee named Crystal has been supplied with a Windows 7 laptop computer.
You have configured Crystal ’ s computer with the Power Saver power plan, and you used
the default options. Which of the following will occur after 20 minutes of inactivity on
Crystal ’ s computer?
A. The display will be turned off, but the hard disk will remain active.
B. The hard disk will be turned off, but the display will remain active.
C. Both the hard disk and the display will be turned off.
D. No components will be turned off.
c
You are the network administrator for a medium - sized company. You support all user
Desktop issues. Gary is using the default Windows 7 Desktop on his laptop computer. Gary
wants to change his Desktop settings. Which of the following options should Gary use to
configure the Desktop in Windows 7?
A. Right - click an empty space on the Desktop and choose Personalize from the context
menu.
B. Select Control Panel  System.
C. Right - click My Computer and choose Manage from the context menu.
D. Right - click My Computer and choose Properties from the context menu.
a
You are the network administrator for a medium - sized company. You support all user
Desktop issues. Gary is using the default Windows 7 Desktop on his laptop computer. Gary
wants to change his Desktop settings. Which of the following options should Gary use to
configure the Desktop in Windows 7?
A. Right - click an empty space on the Desktop and choose Personalize from the context
menu.
B. Select Control Panel  System.
C. Right - click My Computer and choose Manage from the context menu.
D. Right - click My Computer and choose Properties from the context menu.
a
You work on the help desk for a large company. One of your users calls you and reports
that they just accidentally deleted their C:\Documents\Timesheet.xls file. What is the
easiest way to recover this file?
A. In Folder Options, click the Show Deleted Files option.
B. In Folder Options, click the Undo Deleted Files option.
C. Click the Recycle Bin icon on the Desktop and restore the deleted file.
D. Restore the file from your most recent tape backup.
c
Dennis has a new display adapter and monitor. He wants to set display properties for
his Desktop. Which of the following options are not set through the Personalization
dialog box?
A. Desktop background
B. Screen saver
C. Special visual effects for your Desktop
D. Contrast and brightness of the monitor
d
Dennis has a new display adapter and monitor. He wants to set display properties for
his Desktop. Which of the following options are not set through the Personalization
dialog box?
A. Desktop background
B. Screen saver
C. Special visual effects for your Desktop
D. Contrast and brightness of the monitor
d
You sit in a busy area of the office. Sometimes, you forget to log off or lock the computer
when you leave your desk. How can you configure your computer so that it will become
password - protected if it is idle for more than 10 minutes?
A. Through the Logon/Logoff icon in Control Panel
B. Through the Screen Saver option on the Personalization dialog box
C. Through the Security icon in Control Panel
D. Through the Security properties of Local Users and Groups
b
You are an administrator for your company ’ s network. You want to configure the clock
and stock ticker to be displayed on the Desktop of your users ’ computers. How can you
accomplish this task?
A. Through Control Panel  Personalization
B. Through Control Panel  Desktop Gadgets
C. Through Control Panel  Windows Sidebar Properties
D. Through Control Panel  Ease of Access Center
b
You are configuring an image of Windows 7 that will be deployed to a new office location
for your company. You are configuring the Desktop. You want to automatically hide the
Taskbar when it ’ s not being used. You also do not want the Taskbar to be moved by
the users. How can you configure these options?
A. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Toolbars tab
B. By right - clicking an empty space of the Taskbar, selecting Properties, and configuring
the Taskbar tab
C. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Notification Area tab
D. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Start Menu tab
b
You are the network administrator for a manufacturing company. You are configuring
several Windows 7 computers for a group of newly hired engineers. You want to optimize
the new computers to use the Windows Aero theme. How can you accomplish this task?
A. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Display Settings
B. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Desktop Background
C. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Screen Saver
D. By right - clicking an empty space of the Desktop and selecting Personalize. Then choose
your theme.
d
You are configuring a computer to be deployed to another network administrator. You
want to allow the other administrator to quickly access the Administrative Tools options
available with Windows 7. How can you accomplish this task?
A. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Desktop on the Toolbars tab
B. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Show Quick Launch on the Taskbar tab
C. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Customize button on the Start Menu tab
D. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Customize on the Notification Area tab
c
You are the network administrator for a large company. One of your users calls and states
that they are getting an error every time they start an application. You want to see what the
user is doing and what the error is. How can you accomplish this?
A. Remote Desktop
B. Hyper - V
C. Remote Assistance
D. Virtual PC
c
You are a consultant for a large organization. Some employees contact you at 11:00 p.m.
and state that one of the servers is down. No one is in the office to fix the problem. How
can you connect to the server fix the problem?
A. Remote Desktop
B. Hyper - V
C. Remote Assistance
D. Virtual PC
a
You are the network administrator for a large organization that wants to set up a secure
VPN between two of the company ’ s locations using the Internet. Both sides of the VPN use
Windows Server 2008. What is the best protocol to use to set up the VPN?
A. PPTP
B. L2TP
C. SSTP
D. PPP
c
You are the network administrator for a large organization. You have a user that needs you
to connect and help them with a Windows 7 issue. You want to use Remote Assistance for
the connection. Which of the following allows you to easily set up a Remote Assistance
session?
A. Easy Connect
B. Quick Connect
C. User Connect
D. Fast Connect
a
You are the network administrator for a large organization. You have a user that needs you
to connect and help them with a Windows 7 issue. You want to use Remote Assistance for
the connection. Which of the following allows you to easily set up a Remote Assistance
session?
A. Easy Connect
B. Quick Connect
C. User Connect
D. Fast Connect
a easy connect
You are the network administrator for your organization. You are asked by your manager
to modify a few file extensions that are associated with Internet Explorer. How can you
accomplish this task?
A. In Control Panel, open Default Programs and then click Set Associations. Set the
proper file extensions.
B. In Internet Explorer, set extensions on the extension tab.
C. In Control Panel, open System and then click Set Associations. Set the proper file
extensions.
D. In Internet Explorer, set extensions on the advanced tab.
a control Panel - Default programs -set associations
You are the network administrator for a large organization. You are in charge of
implementing company policies. One company policy states that you have to prevent
Internet Explorer from saving any data during a user ’ s browsing session. How do you
accomplish this?
A. Set the Internet Security settings to disabled.
B. Run the browsers in the InPrivate session.
C. InPrivate sessions should be disabled.
D. Private sessions should be enabled.
b run the browsers in the inprivate session
You are the network administrator for a large organization. A user calls you and says that
when they try to connect to the internal website, they are prompted for authentication. The
user has the rights to access the internal site due to the fact that all users and computers are
part of a domain and the internal website uses Integrated Windows Authentication. How
do you make sure that the user is automatically authenticated when they connect?
A. Change the user ’ s local permissions to administrator.
B. The Local site’s URL should be added to the Local internet zone.
C. The Local site’s security credentials should be added to the trusted sites zone.
D. The internet security level should be lowered to lowest.
b
You are the network administrator for your organization. Your organization has been using
Windows XP, and you are now switching all users to Windows 7 Professional. Some of the
XP applications do not run properly in Windows 7. How can you allow these applications
to run on Windows 7?
A. Run the applications in XP mode.
B. Get newer versions of the applications.
C. Disable the Windows 7 Compatibility Mode.
D. Write your own shim to solve the issues.
a
You are using Windows 7 Home edition and you have an XP application that worked well
with XP but is having issues running on Windows 7. What steps can you take to help solve
this issue?
A. Change the Applications security settings.
B. Change the Applications Compatibility Mode to Windows XP.
C. Enable the Windows 7 operating system to XP Compatible.
D. Upgrade the application.
b
Which versions of Windows 7 has XP mode automatically built into the operating system?
Choose all that apply.
A. Install and use Windows Virtual PC
B. Enterprise Edition
C. Ultimate Edition
D. Professional Edition
b c d
You are the network administrator for a large organization. One of your users calls you and
states that they think they are having issues with their network card. What tool can you use
to see if the hardware is working properly?
A. Device Hardware Utility
B. Manage Hardware Utility
C. Device Manager
D. Device Configuration
c
You are the network administrator for a large organization. You have a Windows 7
machine that is working fine but you downloaded a newer version of the network adapter
driver. You install the new network adapter driver on the Windows 7 machine. After you
load the driver, the network device stops working properly. Which tool should you use to
help you fix the problem?
A. Driver Rollback
B. Driver Repair Utility
C. Reverse Driver Application
D. Windows 7 Driver Compatibility tool
a
You have installed Windows 7 with Internet Explorer 8 and now some of the websites
that you used to visit no longer display their content correctly. How can you solve this
issue?
A. Download the IE8 Compatibility utility.
B. Enable the IE8 Compatibility view.
C. Run the Application Compatibility Mode.
D. Install the IE7 viewer.
b
You are a help desk technician for your company. You are configuring Internet Explorer,
and you want to ensure that cookies that are stored on the computer are not accessible to
any websites. Which privacy setting should you configure to accomplish your goal?
A. Block All Cookies
B. High
C. Medium High
D. Medium
a block all cookies
You are the network administrator for a large organization that is thinking of switching
from Windows XP to Windows 7. Your manager is worried about applications not being
compatible with Windows 7. What options do you have to make sure applications work
with Windows 7? (Choose all that apply.)
A. XP Mode
B. Shims
C. Application Compatibility Mode
D. Windows 7 Compatibility Utility
a b c
You have recently installed Windows 7 on your computer. You are configuring Internet
Explorer, and you want to ensure that cookies are not saved from any website that does not
have a compact privacy policy. Which privacy setting should you configure to accomplish
your goal?
A. Block All Cookies
B. High
C. Medium High
D. Medium
b high
Your network administrator has provided you with a new laptop with Windows 7 installed
on it. You are using Internet Explorer. When typing search phrases into the Instant Search
box, you discover that search results are being displayed only for Amazon.com . You want
search phrases to search the Web, not Amazon.com . What should you do?
A. Disable all add - ons.
B. Configure Internet Explorer as your default browser.
C. Add additional web - based search providers in the Manage IE add - ons section.
D. Configure a web - based search provider as your default home page.
c
You have downloaded and installed several Internet Explorer add - ons. You want to view
the add - ons that have been used during your current browsing session. Which option of the
Manage Add - Ons dialog box should you select to view this information?
A. Add - Ons That Have Been Used By Internet Explorer
B. Currently Loaded Add - Ons button in Internet Explorer
C. Add - Ons That Run Without Requiring Permission
D. Downloaded ActiveX Controls (32 - bit)
b
You are the network manager for a large organization. Your company is switching from
Windows XP to Windows 7 and needs to have XP Mode automatically built into the
operating system. Which Windows 7 editions can you use? (Choose all that apply.)
A. Basic Edition
B. Enterprise Edition
C. Home Edition
D. Ultimate Edition
b d
You have a manager who wants to be able to watch their stock quotes continually
throughout the day. How can you set this up?
A. Set up Stock Web Slice.
B. Have them keep IE on the stock page.
C. Use Microsoft Instant Messenger to watch the stocks.
D. Download a stock ticker.
a
You want to set up IE8 so that you prevent your 8 - year - old daughter from viewing any
website with nudity. How do you accomplish this?
A. Enable the IE8 Nudity filter in the Security tab.
B. Use Content Advisor and block all sites with nudity.
C. Enable the IE8 Nudity filter in the Privacy tab.
D. Enable the IE8 Nudity filter in the Advanced tab.
b
You are running a Windows 7 machine. You want to load a copy of Windows Vista on the
machine for testing and training. How can you accomplish this?
A. Format the machine, load Windows Vista, and then load Windows 7.
B. Download Windows Virtual PC and create a Windows Vista virtual hard disk.
C. Download Hyper - V and create a Windows Vista virtual hard disk.
D. Download Virtual Server and create a Windows Vista virtual hard disk.
b
You recently visited a website that automatically downloaded and installed spyware onto your
computer. You want to prevent spyware from being installed in the future. You have enabled
Pop - up Blocker. What else can you do to minimize your risk of downloading spyware?
A. Enable Phishing Filter.
B. Disable all add - ons.
C. Delete your browsing history.
D. Enable Protected Mode.
d
You have a user that has access to the applications folder on your network server. This user
belongs to the following groups:
NTFS
Sales Read only
Marketing Full Control
Shared Permissions
Sales Read only
Marketing Change
When this user logs into the applications folder from their Windows 7 machine, what are
their effective permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
c
You are setting up a machine for a home user who does not know much about computers. You
do not want to make the user a local administrator but you do want to give this user the right
to change Windows Updates manually. How can you configure this?
A. Modify the LGPO for Windows Update to allow the user to make changes manually.
B. Explain to the user how to log on as the Administrator account.
C. Set Windows Update modifications to anyone.
D. This can ’ t be done. Only administrators can change Windows Update.
a
You are the administrator for a large organization with multiple Windows Server 2008
domain controllers and multiple domains. You have a Windows 7 machine that is set up
for all users to access. You have an application called StellApp.exe that everyone on this
Windows 7 computer can use except for the sales group. How do you stop the sales group
from accessing this one application?
A. Deny the Everyone group the rights to the application.
B. Create an executable rule from the Application Control Policy.
C. Create a security role from the Application Control Policy.
D. Give the Everyone group full control of the application.
b
You have a Windows 7 machine that multiple users access. All users have the rights to use
USB removable devices but you need to deny one user from using USB removable devices.
How do you accomplish this?
A. Deny the one user from using the machine.
B. Set a USB rule on Hardware Manager.
C. Deny all users from using USB devices.
D. Create a removable storage access policy through an LGPO.
d
You are the system administrator for a large organization. You have a Windows 7 machine
that all users can access. There is a folder on the Windows 7 machine called Apps. You
need to set up auditing on this folder. How do you accomplish this task?
A. From the Local Group Policy, enable Directory Service Access.
B. From the Local Group Policy, enable Audit Object Access.
C. From the Local Group Policy, enable Account Access.
D. From the Local Group Policy, enable File And Folder Access.
b
You have a user named Will who has access to the Finance folder on your network server.
Will belongs to the following groups:
NTFS
Admin Full Control
Finance Modify
Shared Permissions
Admin Full Control
Finance Change
When Will logs into the Finance folder from his Windows 7 machine, what are his effective
permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
a
You are the network administrator for a large organization. You have a Windows 7
machine that needs to prevent any user from copying unencrypted files from the
Windows 7 machine to any removable disk. How do you accomplish this task?
A. Within the System icon in Control Panel, set the BitLocker Drive Encryption.
B. Within the Hardware icon in Control Panel, set the BitLocker Drive Encryption.
C. Within the Device Manager icon in Control Panel, set the BitLocker Drive Encryption.
D. Within a Local Group Policy, set the BitLocker Drive Encryption.
d
In which editions of Windows 7 can you enable BitLocker? (Choose all that apply.)
A. Windows 7 Home Edition
B. Windows 7 Basic Edition
C. Windows 7 Ultimate Edition
D. Windows 7 Enterprise Edition
c d
You organization has decided to install a Windows Server Update Service (WSUS). You
have a Windows 7 machine that needs to have the updates done from the WSUS server
instead of directly from Microsoft ’ s website. How do you accomplish this?
A. Modify the Local Group Policy for the Windows Update to receive updates from the
WSUS server.
B. Modify the Windows Update icon in Control Panel to receive updates from the WSUS
server.
C. Modify the System icon in Control Panel for the Windows Update to receive updates
from the WSUS server.
D. Modify the WSUS server to force this Windows 7 machine to receive updates from the
WSUS server.
a
Your network ’ s security has been breached. You are trying to redefine security so that a user
cannot repeatedly attempt user logon with different passwords. To accomplish this, which of
the following items (in the Local Security Settings dialog box shown here) should you define?
A. Password Policy
B. Account Lockout Policy
C. Audit Policy
D. Security Options
b
You are the network administrator for a Fortune 500 company. The accounting department
has recently purchased a custom application for running financial models. To run properly,
the application requires that you make some changes to the computer policy. You decide to
deploy the changes through a Local Group Policy setting. You suspect that the policy is not
being applied properly because of a conflict somewhere with another Local Group Policy
setting. What command should you run to see a listing of how the group policies have been
applied to the computer and the user?
A. GPResult
B. GPOResult
C. GPAudit
D. GPInfo
a GPResult
You have a Windows 7 computer that is located in an unsecured area. You want to track
usage of the computer by recording user logon and logoff events. To do this, which of the
following auditing policies must be enabled?
A. Audit Account Logon Events
B. Audit Account Management
C. Audit Process Tracking
D. Audit System Events
a
You are the administrator for a printing company. After you configure the Password Must
Meet Complexity Requirements policy, several users have problems when changing their
passwords. Which of the following passwords meet the minimum complexity requirements?
(Choose all that apply.)
A. aBc - 1
B. Abcde!
C. 1247445Np
D. !@#$%^ & *( - []
b c
You are the system administrator for Stellacon Corp. You have a computer that is shared by
many users. You want to ensure that when users press Ctrl+Alt+Del to log on, they do not
see the name of the last user. What do you configure?
A. Set the security option Clear User Settings When Users Log Off.
B. Set the security option Interactive Logon: Do Not Display Last User Name In Logon
Screen.
C. Set the security option Prevent Users From Seeing Last User Name.
D. Configure nothing; this is the default setting.
b
Mary has access to the R & D folder on your network server. Mary ’ s user belongs to the following
groups:
NTFS
Sales Read only
Marketing Read only
Shared Permissions
Sales Read only
Marketing Change
When Mary logs into the R & D folder from her Windows 7 machine, what are her effective
permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
b
You have recently hired Will as an assistant for network administration. You have not
decided how much responsibility you want Will to have. In the meantime, you want Will
to be able to restore files on Windows 7 computers in your network, but you do not want
Will to be able to run the backups. What is the minimum assignment that will allow Will to
complete this task?
A. Add Will to the Administrators group.
B. Grant Will the Read right to the root of each volume he will back up.
C. Add Will to the Backup Operators group.
D. Grant Will the user right Restore Files And Directories.
d
You are the network administrator of a medium - sized company. Your company requires a
fair degree of security and you have been tasked with defining and implementing a security
policy. You have configured password policies so that users must change their passwords
every 30 days. Which password policy would you implement if you want to prevent users
from reusing passwords they have used recently?
A. Passwords Must Be Advanced
B. Enforce Password History
C. Passwords Must Be Unique
D. Passwords Must Meet Complexity Requirements
b
You have a network folder that resides on an NTFS partition on a Windows 7 computer.
NTFS permissions and Share permissions have been applied. Which of the following statements
best describes how Share permissions and NTFS permissions work together if they
have been applied to the same folder?
A. The NTFS permissions will always take precedence.
B. The Share permissions will always take precedence.
C. The system will look at the cumulative Share permissions and the cumulative NTFS
permissions. Whichever set is less restrictive will be applied.
D. The system will look at the cumulative Share permissions and the cumulative NTFS
permissions. Whichever set is more restrictive will be applied.
d
You are the network administrator for a bookstore. You install Windows 7 on a new
computer. Before you connect the computer to the Internet, you want to ensure that the
appropriate features are enabled. You open Windows Security Center and notice that there
are features that require addressing. Which of the following features are not included with
Windows 7?
A. Firewall protection
B. Spyware protection
C. Virus protection
D. Automatic update protection
c
You are the Active Directory administrator for your company. A Windows 7 computer
has been purchased for the finance department, and you want to monitor it for unauthorized
access. You configure the Audit Object Access policy to audit both success and failure
events. However, when you look at the security event log a few days later, you do not see
any entries related to file access. What is the most likely reason for this behavior?
A. Auditing has not been enabled for the appropriate files and folders.
B. A conflicting Group Policy setting is overriding your configuration.
C. Another administrator has disabled your Group Policy setting.
D. Object access events are found in the system event log.
a
You are the network administrator for a large organization that has decided to implement
DirectAccess. What are some of the requirements needed to install DirectAccess? Choose
all that apply.
A. Windows Server 2008 R2 running the DirectAccess feature
B. Windows certificate authority server
C. DNS
D. WINS
a b c
You are the network administrator for a midsize company that uses Windows Server 2008
R2 and Windows 7. All Windows 7 machines receive their IP address from DHCP. You
have a Windows 7 machine and need to identify its IPv6 address. How can you accomplish
this task? Choose all that apply.
A. Click Details from the network connection status.
B. Type ipconfig /all at the command prompt.
C. Type ipconfig /view at the command prompt.
D. Choose properties of My Computer.
a b
You are hired by friends to set up a network in their home. They have four machines in
their home that are all connected by a router. There is currently no network in place. They
want to be able to share audio and video files among their family members. How can you
set up the network? Choose two.
A. Install a Windows Server 2008 R2 domain controller.
B. Create a HomeGroup.
C. All audio and video files should be moved to the media library.
D. Move all audio and video files to a shared folder on the Windows Server 2008 R2
machine.
b c
You are the network administrator for a large organization that has decided to use
DirectAccess. You have configured all requirements for DirectAccess. You have a Windows
7 machine that is not connecting through DirectAccess. You run an ipconfig and get the
following information:
Ethernet adapter local area connection
Connection - specifi c DNS suffi x: Stellacon.com
IPv4 address: 192.168.20.40
Subnet mask: 255.255.255.0
Default gateway: 192.168.20.1
There are no other confi guration settings for this Windows 7 machine. What needs to be
done fi rst to confi gure this machine to use DirectAccess?
A. Enable IPv6 on the network adapter
B. Remove the connection - specific DNS suffix
C. Remove the default gateway
D. Change the subnet mask
a
You are the network administrator for a midsize company that uses both desktops and
laptops. All laptops use Windows 7 and have been connected to a wireless access point.
You disable the service set identifier (SSID), and now your laptops can no longer connect to
the access point. What do you need to do to allow the laptops to connect?
A. Reboot the laptops.
B. Modify the wireless network connection settings on the laptops.
C. Reboot the access point.
D. Disconnect and reconnect the laptops to the domain.
b
You have made a Windows 7 virtual hard disk ( .vhd ) and installed that .vhd onto a
machine. You want to be sure that the machine boots up using the Windows 7 .vhd . What
do you need to modify?
A. Disk Management
B. Fdisk
C. bcdedit
D. boot.ini
c
You are the network administrator for a midsize company that uses both desktops and
laptops. All laptops use Windows 7 and have been connected to a wireless access point that
is configured to use Advanced Encryption Standard (AES) security. There is no preshared
password key being used. You need to connect a new Windows 7 laptop to the access point.
How would you set up the security setting on the laptop?
A. WPA2 - Personal
B. WPA2 - Enterprise
C. WPA - Personal
D. WAP security
b
You are the network administrator for a large organization that uses Windows Server 2008
R2 and Windows 7. You have two Windows 7 machines named Client1 and Client2. You
want to be able to remotely execute commands on Client2 from Client1 ’ s machine. How
can you accomplish this task?
A. Run WinRM quickconfig on Client1
B. Run WinRM quickconfig on Client2
C. Run WinRM execute on Client1
D. Run WinRM execute on Client2
b
You are the network administrator for a small organization that has decided to switch
the company ’ s TCP/IP subnet mask. They have chosen to use 255.255.255.240. What
do the subnet ranges go by in a 240 subnet mask?
A. 4
B. 8
C. 16
D. 32
c
You have two DHCP servers on your network. Your computer accidentally received the
wrong IP and DNS server configuration from a DHCP server that was misconfigured.
The DHCP server with the incorrect configuration has been disabled. What commands
could you use to release and renew your computer ’ s DHCP configuration? Choose two.
A. ipconfig /release
B. ipconfig /registerdhcp
C. ipconfig /renew
D. ipconfig /flushdhcp
a c
You have two DHCP servers on your network. Your computer accidentally received the
wrong IP and DNS server configuration from a DHCP server that was misconfigured.
The DHCP server with the incorrect configuration has been disabled. What commands
could you use to release and renew your computer ’ s DHCP configuration? Choose two.
A. ipconfig /release
B. ipconfig /registerdhcp
C. ipconfig /renew
D. ipconfig /flushdhcp
a c
10. You are the network administrator for a small organization that has decided to switch
the company ’ s TCP/IP subnet mask. They have chosen to use 255.255.255.240. What
do the subnet ranges go by in a 240 subnet mask?
A. 4
B. 8
C. 16
D. 32
c
You are the network administrator for your company. After configuring a new computer
and connecting it to the network, you discover that you cannot access any of the computers
on the remote subnet by IP address. You can access some of the computers on the local
subnet by IP address. What is the most likely problem?
A. Incorrectly defined IP address
B. Incorrectly defined subnet mask
C. Incorrectly defined default gateway
D. Incorrectly defined DNS server
c
A user cannot access a server in the domain. After troubleshooting, you determine that
the user cannot access the server by name but can access the server by IP address. What
is the most likely problem?
A. Incorrectly defined IP address
B. Incorrectly defined subnet mask
C. Incorrectly defined DHCP server
D. Incorrectly defined DNS server
d
You have a Windows 7 machine that needs to have a static TCP/IP address. You assign the
IP address to the machine and you now want to register the computer with DNS. How can
you do this from the Windows 7 machine?
A. ipconfig /renewDNS
B. ipconfig /flushDNS
C. ipconfig /DNS
D. ipconfig /registerDNS
d
You are the network administrator for a large organization that has just opened a new site
location. The new site location has a slow link between the site and the main office. What
can you implement to help with the slower link between the main site and the remote site?
A. BranchCache
B. SiteCache
C. LinkCache
D. BranchLink
a
You need to set up a Windows 7 machine for testing and training. You want to set this
Windows 7 machine up on an XP machine and you want to keep the XP machine as the
primary operating system. What utility can you use to create a Windows 7 testing and
training environment?
A. Microsoft Hyper - V
B. Windows Virtual PC
C. Microsoft Virtual Server
D. Microsoft Virtualization Server
b
You are the network administrator for a large organization that has implemented a new
site. All machines in the remote site are Windows 7. The new site link is slow, and you want
to implement BranchCache. You do not want to implement a BranchCache server in the
remote location. How would you configure BranchCache?
A. Hosted mode
B. Distributed cache mode
C. Shared mode
D. Server mode
b distributed cache mode
You are the network administrator for a small organization. Your organization has
implemented Windows 7 on all client machines. You want to implement another line of
security on the Windows 7 machine so unauthorized users can ’ t access the machines. What
can you implement on the Windows 7 machines?
A. Windows Data Protection
B. Windows Encryption Protection
C. Windows Firewall
D. Windows Secure Data Protocol
c
You are the network administrator for a large organization with many laptop users who
go on the road. You want these users to be able to connect to the network without using a
VPN or taking over the server console. What can you implement?
A. DirectAccess
B. Remote Access
C. Remote Desktop
D. Remote Server
a
You are the network manager for a small company. You have a junior IT administrator who
did some installations last week on a Windows 7 machine. How can you see what applications
were installed last week on the Windows 7 machine?
A. View the informational events of Reliability Monitor.
B. Open Control Panel, Add/Remove programs.
C. Check Event Viewer system logs.
D. View the data collector sets.
a
You are the network administrator for Stellacon Corporation. Users in the sales department
have been complaining that the Sales application is slow to load. Using Performance Monitor,
you create a baseline report for one of the computers, monitoring memory, the processor,
the disk subsystem, and the network subsystem. You notice that the disk subsystem has
a high load of activity. What other subsystem should you monitor before you can know for
sure whether you have a disk subsystem bottleneck?
A. Memory
B. Processor
C. Network
D. Application
a
Your accounting department runs a processor - intensive application and you are trying to
determine whether their current computers need to have the processors upgraded. You load
a test computer with a configuration identical to the production computers ’ and run a program
that simulates a typical user ’ s workload. You monitor the Processor  % Processor
Time counter. What average value for this counter would indicate a processor bottleneck?
A. Over 5 percent
B. Over 50 percent
C. Over 60 percent
D. Over 85 percent
d
You are the network administrator for a large corporation. The accounting department
requires that a specific application, STELLAPP.EXE , be run every day to create daily reports
on accounting activity. The application needs to be run at 6 p.m. on Monday through
Friday. The accounting manager has asked you to automate the process so reports are
generated on the specified schedule without any user interaction. Which Windows 7 utility
should you use?
A. Task Scheduler
B. Automated Scheduler
C. Task Manager
D. Task Automater
a
You are the network administrator for a large company. The payroll manager has Windows
7 installed on her desktop computer. The computer has the following configuration:
■ Dual Pentium 4 processors
■ 1 GB of RAM
■ Two physical SCSI disks
■ Disk 0 has volume C:
■ Disk 1 has volume D:
■ 1.5 GB page file on partition C:
■ 100 Mbps Fast Ethernet NIC
The payroll manager requires the use of a database application. She has come to you to
report that when the database application is running, the computer slows down very
signifi cantly, and she is unable to run any other applications. You run Reliability and
Performance Monitor on her computer and record the following information when the
database application is running:
■ Sustained processor utilization is at 100 percent for both processors.
■ There are a significant number of hard page faults.
When you record the data for the computer when the database application is not
running, you record the following information:
■ Average processor utilization is at 30 percent.
■ There are a significant number of hard page faults.
The database application is critical to the fi nance manager ’ s job. In order to be able
to better manage her productivity, which two of the following actions will have the
greatest impact on optimizing her computer ’ s performance? Choose two.
A. Upgrade the processors in her computer.
B. Add memory to the computer.
C. Split the page file over D: and E:.
D. Increase the page file to 3 GB.
a b
You are the network administrator for an organization that has decided to migrate to
Windows 7. Part of your job requires that you are able to complete the following:
■ Collect data from the local or remote Windows 7 computers on the network. You
can collect data from a single computer or multiple computers concurrently.
■ View data as it is being collected in real time, or historically from collected data.
Which Windows 7 application can you use to achieve your task?
A. Event Viewer
B. Computer Monitor
C. Windows 7 Monitor
D. Performance Monitor
d
You are the network administrator for a large organization. You are running Windows 7
machines throughout your network along with Windows Server 2008 R2. You need to use
Event Viewer to review event logs for Critical and Error events only. You need to see all of
these events from the logs. What do you do to achieve this?
A. Use the Administrative Events view.
B. Create a custom view and choose Administrative Events.
C. Do a search on the system log for all of these events.
D. Create a custom view and select Critical, Error, and Verbose for all logs.
d
You are the network administrator for an organization that runs Windows Server 2008
R2 and Windows 7. You are asked by your IT manager to collect performance data on a
Windows 7 machine, for a period of three weeks. The IT manager wants CPU utilization,
disk utilization, and memory utilization all included in the data collected. How should you
accomplish this?
A. Create a user - defined data collector set.
B. Create a custom performance set.
C. Create a trace event.
D. Create a session data collector set.
a
You are the network administrator for a large organization that uses both Windows Server
2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily.
You perform an image backup on the Windows 7 machine. The Windows 7 machine then
gets struck by a virus and will not start up properly. What can you do to get the Windows 7
machine up and running the fastest possible way?
A. Because of the virus, the best thing is to rebuild the machine from scratch.
B. Start the computer from the Windows 7 DVD and then use the System Image
Recovery tool.
C. Start the computer from the Windows 7 DVD and then use the Image Restore utility.
D. Use a Windows 7 boot disk and run the Image Restore utility.
b
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want
the machine to retain only the last System Protection snapshot that was taken. What should
you do?
A. Run Disk Cleanup for System Restore and then run Shadow Copies.
B. Disable Shadow Copies and run System Protection.
C. Set the Keep Only Last Shadow Copy option in System Protection.
D. Enable Shadow Copies and then set the Keep Only Last Shadow Copy option.
a or open system protection and select delete?
You are the network administrator for a small company. You manage the computers for the
marketing department, all of which are running the Windows 7 operating system. You are
making several configuration changes to the manager ’ s computer to enhance performance.
Before you make any changes, you want to create a restore point that can be used if any
problems arise. How do you manually create a restore point?
A. By using the System Restore utility
B. By using the System Protection tab of the System Properties dialog box
C. By using the System Configuration utility
D. By using the Startup Repair tool
b
Your computer uses a SCSI adapter that supports a SCSI drive, which contains your
Windows 7 system and boot partitions. After updating the SCSI driver, you restart
your computer, but Windows 7 will not load. You need to get this computer up and running
as quickly as possible. Which of the following repair strategies should you try first to
correct your problem?
A. Restore your computer ’ s configuration with your last backup.
B. Boot your computer with the Last Known Good Configuration.
C. Boot your computer with the Safe Mode option.
D. Boot your computer to the Recovery Console and manually copy the old driver back to
the computer.
b
You are about to install a new driver for your CD - ROM drive, but you are not 100 percent
sure that you are using the correct driver. Which of the following options will allow you to
most easily return your computer to the previous state if the new driver is not correct?
A. Safe Mode
B. Roll Back Driver
C. System Restore utility
D. Startup Repair Tool
b
After you updated Will ’ s computer, his system files became corrupted due to a virus and now
need to be restored. Which of the following processes should you use to fix the problem?
A. Restore a backup.
B. Restore an image.
C. Use the Startup Repair tool.
D. Boot to Safe mode.
c
You are unable to boot your Windows 7 computer, so you decide to boot the computer to
Safe mode. Which of the following statements regarding Safe mode is false?
A. When the computer is booted to Safe mode, there is no network access.
B. Safe mode loads all the drivers for the hardware that is installed on the computer.
C. When you run Safe mode, boot logging is automatically enabled.
D. When you run Safe mode, the screen resolution is set to 8030 × 600.
b
You have been having problems with your Windows 7 computer. You decide to start the
computer by using the Enable Boot Logging option on the Advanced Boot Options menu.
Where can you find the log file that is created?
A. \Windows\ntbtlog.txt
B. \Windows\System32\ntbtlog.txt
C. \Windows\ntboot.log
D. \Windows\System32\ntboot.log
a
You have purchased a new computer with Windows 7 installed. After modifying the
system so that it is configured just how you want it, you want to back up the system so
that if anything happens, you can restore the files and settings. Which of the following
should you do?
A. Back up your files by using the Back Up Files button in the Backup And Restore Center.
B. Create an image of your computer by using the Create An Image link in the Backup
And Restore Center.
C. Use the System Repair tool to take an image of your computer.
D. Use Shadow Copies to create a previous version of the files.
b
You have a computer that runs Windows 7. You upgrade the network adapter driver on the
computer. After the upgrade, you can no longer access network resources. You open Device
Manager and see a warning symbol next to the network adapter. You need to restore access
to network resources. What should you do?
A. Roll back the network adapter driver.
B. Assign a static IP address to the network adapter.
C. Disable the network adapter and scan for hardware changes.
D. Uninstall the network adapter and scan for hardware changes.
a
You need to back up the existing data on a computer before you install a new application. You
also need to ensure that you are able to recover individual user files that are replaced or deleted
during the installation. What should you do?
A. Create a System Restore point.
B. Perform an Automated System Recovery (ASR) backup and restore.
C. In the Backup And Restore Center window, click the Back Up Now button.
D. In the Backup And Restore Center window, click the Back Up Computer button.
c
Your data recovery strategy must meet the following requirements:
■ Back up all data files and folders in C:\Data .
■ Restore individual files and folders in C:\Data .
■ Ensure that data is backed up to and restored from external media.
What should you do?
A. Use the Previous Versions feature to restore the files and folders.
B. Use the System Restore feature to perform backup and restore operations.
C. Use the NTBackup utility to back up and restore individual files and folders.
D. Use the Backup And Restore Center to back up and restore files.
d
You need to ensure that you can recover system configuration and data if your computer
hard disk fails. What should you do?
A. Create a system restore point.
B. Create a backup of all file categories.
C. Create a Complete PC Backup and Restore image.
D. Perform an Automated System Recovery (ASR) backup.
c
You have a computer that runs Windows 7. Your computer has two volumes, C: and
D:. Both volumes are formatted by using the NTFS file system. You need to disable
previous versions on the D: volume. What should you do?
A. From System Properties, modify the System Protection settings.
B. From the properties of the D: volume, modify the Quota settings.
C. From the properties of the D: volume, modify the Sharing settings.
D. From the Disk Management snap - in, convert the hard disk drive that contains the
D: volume to Dynamic.
a
You have a computer that runs Windows 7. You configure a backup job to back up all files
and folders on an external NTFS file system hard disk drive. The backup job fails to back
up all files that have the encryption attribute set. You need to back up all encrypted files.
The backed up files must remain encrypted. What should you do?
A. Manually copy the encrypted files to the external hard disk drive.
B. Schedule a backup job to occur when you are not logged on to the computer.
C. Enable Volume Shadow Copy on the external drive and schedule a backup job.
D. Add the certificate of the local administrator account to the list of users who can
transparently access the files, and schedule a backup job.
a
You have a computer that runs Windows 7. You use Windows Complete PC Backup and
Restore to create a backup image. You need to perform a complete restore of the computer.
What are two possible ways to begin the restore? (Each correct answer presents a complete
solution. Choose two.)
A. Open the Windows Backup And Restore Center and click Advanced Restore.
B. Open the Windows Backup And Restore Center and click Restore Computer.
C. Start your computer. From the Advanced Boot Options menu, select Repair Your
Computer.
D. Start the computer by using the Windows 7 installation media. Select Repair Your
Computer.
c d
You are the network administrator for your organization. You are asked by a junior
administrator when he should create restore points. Which of the following are times when
restore points should be created? Choose all that apply.
A. Weekly
B. Before installing applications or drivers
C. Before significant system events
D. Before System Restore is used to restore files (so you can undo the changes if necessary)
a b c d
You install Windows 7 on a new computer. You update the video card driver and restart
the computer. When you start the computer, the screen flickers and then goes blank. You
restart the computer and receive the same result. You need to configure the video card
driver. What should you do first?
A. Restart the computer in Safe mode.
B. Restart the computer in Debugging mode.
C. Restart the computer in low - resolution video mode.
D. Insert the Windows 7 installation media into the computer, restart, and use System
Recovery to perform a startup repair.
a
You are asked by your managers to start a Windows 7 machine to allow for Kernel
Debugging. How would you start the machine?
A. Advanced options, Kernel Mode
B. Advanced options, Debugging Mode
C. Advanced options, Kernel Debugging Mode
D. Advanced options, Safe Mode
b
you are the network administrator for a midsize company that uses both desktops and laptops. All laptops use windows 7 and have been connected to a wireless access point that is configured to use Advanced Encryption standard (AES) security. there is no preshared password key being used. You need to connect a new Windows 7 laptop to the access point. How would you set up the security setting on the laptop?
a WPA2-Personal
b WPA2-Enterprise
c WPA-Personal
d WAP security
b WPA2- Enterprise