• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/219

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

219 Cards in this Set

  • Front
  • Back
What filename extension is applied by default to custom consoles that are created for
the MMC?
A. .mmc
B. .msc
C. .con
D. .mcn
B. When you create a custom console for the MMC, the .msc fi lename extension is
automatically applied. See Chapter 3 for more information.
You want to create roaming profiles for users in the sales department. They frequently
log on at computers in a central area. The profiles should be configured as mandatory
and roaming profiles. Which users are able to manage mandatory profiles on Windows 7
computers?
A. The user who uses the profile
B. Server operators
C. Power users
D. Administrators
D. Only members of the Administrators group can manage mandatory profi les.
See Chapter 6 for more information.
You want to monitor the CPU, memory, and disk usage on your computer to ensure that
there are no bottlenecks. Which MMC snap - in would you load to access System Monitor?
A. System Monitor
B. Reliability Monitor
C. ActiveX Control
D. Performance Logs and Alerts
C. Select ActiveX Control in the Add/Remove Snap - in dialog box. Then, from the
Insert ActiveX Control dialog box, select System Monitor Control to access the System
Monitor utility. You can also access the System Monitor view by opening Performance
Monitor. See Chapter 8 for more information.
If you wanted to require that a user enter an Administrator password to perform
administrative tasks, what type of user account should you create for the user?
A. Administrator User account
B. Standard User account
C. Power User account
D. Authenticated User account
B. You would create a standard user account for the user. Standard users must provide
the credentials of an administrator account when prompted by User Account Control
(UAC) in order to perform administrative tasks. See Chapter 6 for more information.
You have installed a clean installation of Windows 7 on your computer. You want to create
an image of the new installation to use as a basis for remote installs. What Windows 7
utility should you use to accomplish this?
A. WDS
B. Windows SIM
C. ImageX
D. Sysprep
C. You can use the ImageX utility to create an image of a Windows 7 installation.
After the image has been created, you can prepare the image with a utility such as the
System Preparation Tool (Sysprep). The image can then be used for remote installations
of Windows 7. See Chapter 2 for more information.
Which of the following statements is true regarding the built - in Administrator account in
Windows 7? (Choose all that apply.)
A. The built - in Administrator account does not exist in Windows 7.
B. The built - in Administrator account is disabled by default in Windows 7.
C. The built - in Administrator account has no permissions in Windows 7.
D. The built - in Administrator account is not a member of the Administrators group in
Windows 7.
B. The built - in Administrator account is disabled by default in Windows 7. However,
it can be enabled through Local Users and Groups or by modifying the Accounts:
Administrator Account Status GPO setting. See Chapter 6 for more information.
You have a user with limited vision. Which accessibility utility is used to read aloud screen
text, such as the text in dialog boxes, menus, and buttons?
A. Read - Aloud
B. Orator
C. Dialog Manager
D. Narrator
D. The Narrator utility uses a sound output device to read onscreen text. See
Chapter 4 for more information.
You have just purchased a new computer that has Windows 7 preinstalled. You want
to migrate existing users from a previous computer that was running Windows XP
Professional. Which two files would you use to manage this process through the User
State Migration Tool?
A. usmt.exe
B. ScanState.exe
C. LoadState.exe
D. Windows7Migrate.exe
B, C. Windows 7 ships with a utility called the User State Migration Tool (USMT)
that is used by administrators to migrate users from one computer to another via a
command - line utility. The USMT consists of two executable fi les: ScanState.exe and
LoadState.exe . See Chapter 1 for more information.
You have scheduled a specific program that is required by the accounting department to
run as a scheduled task every day. When you log on as an administrator, you can run the
task, but when the scheduled task is supposed to run, it does not run properly. You have
already verified that the Task Scheduler task is running. What else should you check?
A. Verify that the task has been configured to run in unattended mode.
B. Make sure the user who is scheduled to run the task has the appropriate permissions.
C. Make sure the time is properly synchronized on the computer.
D. Verify that the Process Manager task is running.
B. If you are using Task Scheduler and your jobs are not running properly, make
sure the Task Scheduler service is running and is confi gured to start automatically.
You should also ensure that the user who is confi gured to run the scheduled task has
suffi cient permissions to run it. See Chapter 8 for more information.
You are the network administrator for your company. Recently, one of your users in the
accounting department has reported that they were unsure whether a banking website
was legitimate or not. You want to configure a utility that will verify whether a website is
known to be fraudulent. Which utility should you configure?
A. Pop - up Blocker
B. RSS Reader
C. Phishing Filter
D. Add - on Manager
C. Internet Explorer 8 ships with Phishing Filter, which can help verify whether a
website is known to be fraudulent or not. Phishing Filter helps to prevent malicious
websites from masquerading as legitimate sites in order to obtain your personal or
fi nancial information. See Chapter 5 for more information.
You have a user, Jan, who suspects that her Windows 7 computer has been infected with
spyware. You remove the spyware from her computer and want to prevent spyware from
infecting it in the future. Which of the following Windows 7 utilities should you configure?
A. Windows Defender
B. Phishing Filter
C. Pop - up Blocker
D. Windows OneCare
A. Windows Defender is an antispyware program included with Windows 7. It offers
real - time protection from spyware and other unwanted software. You can also confi gure
Windows Defender to scan for spyware on a regular basis. See Chapter 6 for more
information.
You are configuring power settings on your laptop. You configure the laptop to enter sleep
mode after a specified period of inactivity. Which of the following will occur when the
computer enters Sleep mode?
A. The computer will be shut down gracefully.
B. Data will be saved to the hard disk.
C. The monitor and hard disk will be turned off, but the computer will remain in a fully
active state.
D. The user session will not be available when you resume activity on the computer.
B. Sleep mode is a combination of Standby mode and Hibernation mode. When Sleep mode
is confi gured, the user ’ s session is quickly accessible on wakeup, but the data is saved to the
hard disk. Sleep mode is the preferred power - saving mode in Windows 7. See Chapter 4 for
more information.
You are using Internet Explorer to access several RSS feeds that you subscribe to. One
of the feeds stores only the 10 most recent updates. You want to ensure that the last 100
updates are stored. What should you do?
A. Configure the RSS feed to automatically download attached files.
B. Modify the schedule so that the RSS feed is updated more than once a day.
C. Turn on feed reading view in IE.
D. Modify the archive setting so that the last 100 items are stored.
D. Internet Explorer 8 provides the ability to read and subscribe to RSS feeds. You can
confi gure several options for RSS feeds, such as how often the feed is checked for updates,
whether attachments are automatically downloaded, and how many updates are stored for
the feed. See Chapter 5 for more information.
What is the CIDR equivalent for 255.255.255.224?
A. /24
B. /25
C. /26
D. /27
D. A subnet mask of 255.255.255.224 equals a CIDR of /27. CIDR is the number of on
bits See Chapter 7 for more information.
You are configuring a new Windows 7 computer for a new employee. You configure the
new user with a standard user account. Which of the following functions will the new
employee be allowed to perform? (Choose all that apply.)
A. Install a printer.
B. Install network drivers.
C. Configure WPA keys.
D. Modify the Desktop settings.
A, C, D. Standard users are allowed to perform a variety of tasks, such as install printers,
confi gure wireless keys, and modify their Desktop settings. See Chapter 6 for more
information.
You are the network administrator for Stellacon. Your network consists of 200 Windows 7
computers, and you want to assign static IP addresses rather than use a DHCP server. You
want to configure the computers to reside on the 192.168.10.0 network. What subnet mask
should you use with this network address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
C. You should use the subnet mask 255.255.255.0 on your network in this scenario.
The IP network address 192.168.10.0 is a Class C address. Class C addresses, by default,
use the subnet mask 255.255.255.0. The network portion of the address is 192.168.10,
and the host portion of the address can be 1 to 254. See Chapter 7 for more information.
You are using a laptop running Windows 7 Home Premium. You want to synchronize
files between your laptop and a network folder. Which of the following actions must you
perform first in order to enable synchronization to occur between your laptop and the
network folder?
A. Upgrade your laptop to Windows 7 Ultimate.
B. Enable one - way synchronization between the laptop and the network folder.
C. Enable two - way synchronization between the laptop and the network folder.
D. Configure the files on your laptop as read - only.
A. To enable synchronization of fi les between your laptop and a network folder, you
must fi rst upgrade your laptop to a version of Windows 7 that supports synchronization
with network folders, such as Windows 7 Ultimate. Windows Sync Center also supports
synchronization of fi les between computers and mobile devices. See Chapter 4 for more
information.
You have a DNS server that contains corrupt information. You fix the problem with the
DNS server, but one of your users is complaining that they are still unable to access Internet
resources. You verify that everything works on another computer on the same subnet.
Which command can you use to fix the problem?
A. IPCONFIG /flush
B. IPCONFIG /flushdns
C. PING /flush
D. GROPE /flushdns
B. The IPCONFIG /flushdns command is used to purge the DNS Resolver cache.
The IPCONFIG command displays a computer ’ s IP confi guration. See Chapter 7 for
more information.
Which of the following information can be configured on a VPN client so that it can access
a VPN server? (Choose two answers.)
A. IP address
B. MAC address
C. Domain name
D. Connection address
A, C. When you confi gure a VPN connection, you must specify the IP address or
host domain name of the computer to which you ’ ll connect. See Chapter 4 for more
information.
Which of the following statements are true regarding the creation of a group in Windows 7?
(Choose two.)
A. Only members of the Administrators group can create users on a Windows 7 computer.
B. Group names can be up to 64 characters.
C. Group names can contain spaces.
D. Group names can be the same as usernames but not the same as other group names on
the computer.
A, C. Only administrators can create new groups on a Windows 7 computer. Group
names can contain up to 256 characters and can contain spaces. Group names must be
unique to the computer, different from all the other usernames and group names that
have been specifi ed on that computer. See Chapter 6 for more information.
You need to expand the disk space on your Windows 7 computer. You are considering
using spanned volumes. Which of the following statements is/are true concerning spanned
volumes? (Choose all that apply.)
A. Spanned volumes can contain space from 2 to 32 physical drives.
B. Spanned volumes can contain space from 2 to 24 physical drives.
C. Spanned volumes can be formatted as FAT32 or NTFS partitions.
D. Spanned volumes can be formatted only as NTFS partitions.
A, C. You can create a spanned volume from free space that exists on a minimum of
2 to a maximum of 32 physical drives. When the spanned volume is initially created
in Windows 7, it can be formatted with FAT32 or NTFS. If you extend a volume
that already contains data, however, the partition must be NTFS. See Chapter 3 for
more information.
Which of the following versions of Windows 7 support the Windows Aero interface?
(Choose all that apply.)
A. Windows 7 Home Basic
B. Windows 7 Home Premium
C. Windows 7 Business
D. Windows 7 Ultimate
B, C, D. The new Windows Aero interface is not available on Windows 7 Home Basic. It is
available on Windows 7 Home Premium, Windows 7 Business, and Windows 7 Ultimate.
See Chapter 4 for more information.
Your home computer network is protected by a firewall. You have configured your
Windows 7 home computer to use Windows Mail. After you configure your email
accounts, you discover that you are unable to send email messages from Windows Mail.
Your email provider uses POP3 and SMTP. What port should you open on the firewall?
A. 25
B. 110
C. 443
D. 995
A. Port 25 should be opened on the fi rewall. SMTP is used for outbound mail and uses
port 25. POP3, which is used for receiving inbound mail, uses port 110. See Chapter 7
for more information.
You need Windows 7 to be the primary operating system on a dual - boot machine. Which
file do you configure for this?
A. boot.ini
B. bcdedit
C. bcboot.ini
D. bcdboot
B. You should confi gure the bcdedit utility to confi gure your boot order. See Chapter 1
for more information.
Which of the following versions of Windows 7 can be upgraded to Windows 7 Ultimate
Edition? (Choose all that apply.)
A. Windows 7 Home Starter
B. Windows 7 Professional
C. Windows 7 Home Premium
D. Windows 7 Business
B, D. You can upgrade Windows 7 Professional, and Windows 7 Business to Windows 7
Ultimate Edition. See Chapter 1 for more information.
You are configuring a Windows 7 computer that is going to be used by your children. You
are configuring access restrictions using the Parental Controls feature of Windows 7. Which
of the following can be configured by setting Parental Controls? (Choose all that apply.)
A. When your children can access the computer
B. What websites your children can view
C. What programs your children can access
D. What other computers on your home network your children can access
A, B, C. Using Parental Controls, you can confi gure what websites your children can
access, when they can use the computer, what games they can play, and what programs
they can run, and you can view reports regarding their activity. See Chapter 5 for
more information.
How do you access the Advanced Boot Menu in Windows 7 during the boot process?
A. Press the spacebar.
B. Press F6.
C. Press F8.
D. Press F10.
C. During the boot process, you are prompted to press F8 to access the Advanced Boot
Menu. See Chapter 9 for more information.
You have two remote sites with Windows 7 machines. You need to share data across the
slow sites. What feature can help with this?
A. Link Detection
B. BranchCache
C. DirectAccess
D. DirectCache
B. BranchCache allows multiple sites with slower links to share data quickly and
effi ciently. See Chapter 7 for more information.
Which utility is used to upgrade a FAT32 partition to NTFS?
A. UPFS
B. UPGRADE
C. Disk Manager
D. CONVERT
D. The CONVERT utility is used to convert an FAT32 partition to NTFS. See Chapter 3
for more information.
You want to be able to track which users are accessing the C:\PAYROLL folder and whether
the access requests are successful. Which of the following audit policy options allows you
to track events related to file and print object access?
A. File And Object Access
B. Audit Object Access
C. Audit File And Print Access
D. Audit All File And Print Events
B. Though all four options seem plausible, only the Audit Object Access option actually
exists. Audit Object Access is used to enable auditing of access to fi les, folders, and
printers. Once you enable auditing of object access, you must enable fi le auditing through
NTFS security or enable print auditing through printer security. See Chapter 6 for more
information.
You are the network administrator for a mid - size organization that wants to start looking
at migrating their computer systems to Windows 7. They have asked you to explain the
new features of Windows 7 to all the department heads. Which of the following are new
features to Windows 7? (Choose all that apply.)
A. Windows 7 Taskbar
B. Jump List
C. Windows XP Mode
D. Windows Touch
A, B, C, D. Windows 7 has included many new features, including the Windows 7 Taskbar,
Jump Lists, a new preview pane, Windows Touch, Windows XP Mode, simpler home
networking, Device Stage, View Available Networks (VAN), and the new Windows Internet
Explorer 8 (IE8).
You are the network administrator for a small company that has just switched its machines
from Windows XP to Windows Vista and Windows 7. One of the users who has Windows
Vista asks you why there is a vertical sidebar on the screen. What feature of Windows Vista
is this?
A. Parental controls
B. Jump List
C. Windows Sidebar
D. Windows Firewall
C . Windows Vista introduced a new vertical bar that is displayed on the side of the
Desktop, and this is called the Windows Sidebar. The Windows Sidebar has mini
applications running within the bar called gadgets. Windows 7 has removed the sidebar,
but you can still continue to use gadgets.
Your company has asked you to implement Network Access Protection (NAP) on the
network. You already have Windows Server 2008 installed on your servers but your
organization wants to know which client operating systems will support NAP. What
operating systems support NAP? Choose all that apply.
A. Windows XP with SP2
B. Windows XP with SP3
C. Windows Vista
D. Windows 7
B, C, D . Network Access Protection (NAP) is a compliancy checking platform that is
included with Windows 2008 Server, Windows Vista, Windows 7, and Windows XP with
SP3. NAP allows you to create compliancy policies that check computers before allowing
them access to the network.
You are the IT manager for a medium - size organization. Your organization is looking
at upgrading its Windows XP machines to Windows 7. The managers have heard of a
new feature that allows you to connect a device to the machine and then the Windows 7
operating system shows a graphical picture of the device for use. Which Windows 7 feature
are they referring to?
A. Device Manager
B. Device Stage
C. Staging Manager
D. ADD/Remove Hardware
B . Device Stage is new to the Windows 7 operating system family. Device Stage allows you
to connect a compatible device to your PC and a picture of the device will appear. This
allows you to easily share fi les between devices and computers.
You are the IT manager for your organization. The organization is looking at upgrading all
of its machines from Windows XP to Windows 7. Many of the managers are concerned that
their Windows XP applications won ’ t be compatible with Windows 7. Which Windows 7
feature can you use to assure the managers that all of their Windows XP applications will
continue to work?
A. Windows XP Compatibility Checker
B. Windows XP Application Center
C. Windows XP Mode
D. Windows XP Application Upgrade tool
C . With Windows XP Mode, an organization that chooses to upgrade to Windows 7 will
still have the ability to run older Windows XP applications on the Windows 7 operating
system.
Your organization has approached you to give a presentation on the new Internet Explorer
8. During the presentation, one of the managers asks you to let them know what some of its
new features are. Which of the following can you tell them about? (Choose all that apply.)
A. Instant Search
B. Root Hints
C. Accelerators
D. Web Slices
A, C, D . Some of the new features of IE8 are Instant Search, accelerators, and Web
Slices. Instant Search allows you to quickly access search requests without typing in the
entire search criteria. Accelerators allow you to accelerate actions on Internet services
and applications. Web Slices are instances on a website that you want to access without
accessing the site.
You are the IT administrator for a large computer training company that uses laptops for
all its employees. Currently the users have to connect to the wireless network through the
wireless network adapter. Windows 7 now includes this built in as which feature?
A. Available Network Finder (ANF)
B. View Networks (VN)
C. Network Availability Viewer (NAV)
D. View Available Networks (VAN)
D . The feature the question is referring to is View Available Networks (VAN). Before
Windows 7, when you used a wireless network adapter, you would choose the wireless
network that you want to connect to by using the wireless network adapter properties. In
Windows 7, this is built into the operating system.
You are the network administrator for a mid - size company. One of the managers has come
into your office and asked you about setting up a network in his house. He wants to use
Windows 7. What feature allows him to set up a home network using Windows 7?
A. Home Networking
B. HomeGroups
C. Quick Connect
D. Networking Groups
B . HomeGroups provide an easy way to set up a network using Windows 7. Windows
7 will search for your home network, and if one is found, it will connect after the
HomeGroup password is entered. If a home network is not found, a networking wizard will
automatically create a password for the HomeGroup so other computers can join.
Which new Windows 7 feature allows you to quickly access files that you have been
working on?
A. Quick Connect
B. Jump Lists
C. File Finder
D. Quick File Access
B . Jump Lists are a new feature in Windows 7 that allows you to quickly access fi les
that you have been working on. Another advantage to using Jump Lists is that certain
applications, like Windows Media Player, can be preset, and in the case of Internet
Explorer, you could view all the recent websites that you have visited.
You are the IT Manager for a pharmaceutical company. The company wants to create
a medication dispenser that can be used on the floors of hospital units. The dispensers
have to work through touchscreen technology. Which Windows 7 feature has built - in
touchscreen technology?
A. Windows Touch Screen
B. Windows Pure Touch
C. Windows Touch
D. Windows Pure Screen
C . Windows Touch allows you to control the operating system and its applications by using
a touchscreen. Touchscreens can be placed on laptops, tabletops, GPS devices, phones, and
now on the Windows 7 operating system.
You are the network administrator for a large organization that has decided to convert
all of its Windows XP machines to Windows 7. How can it put Windows 7 on all the
Windows XP machines without losing the users ’ information?
A. Upgrade all the Windows XP machines to Windows 7.
B. Format all the XP machines and do a clean install of Windows 7.
C. Use a migration tool to migrate all the users ’ data and then load a clean copy of
Windows 7.
D. Do nothing. The Windows XP machines can ’ t be upgraded without losing all the
user ’ s data.
C . You can ’ t upgrade Windows XP to Windows 7, so you must use a migration tool to
migrate all the users ’ data and then install a clean copy of Windows 7.
You are the network administrator for a mid - size organization. You have a machine
with Windows Vista and you need to load Windows 7. You want to make the
machine dual - boot. You install Windows 7 on a new partition on the machine. You want
the machine to start in Windows Vista by default. How do you accomplish this?
A. Change the Boot.ini file so that Windows Vista is the default.
B. Edit Bcdedit.exe with the /default parameter to set Windows Vista as the default.
C. Delete the Windows 7 Boot.ini file so the machine reverts to Vista by default.
D. Edit the Bcdedit.exe with the /order parameter to set Windows Vista as the default.
B . Windows 7 and Windows Vista no longer use a boot.ini fi le to control the boot order.
Using the Bcdedit /default command will allow you to confi gure Vista as the default
operating system.
Alexandria, your network manager, has been asked by the organization to verify that all
machines in the company that are running Windows Vista can upgrade to Windows 7.
How can Alexandria perform this task?
A. She can check the Windows Vista machines against the Hardware Compatibility List.
B. She can install Windows 7 on all the machines to see if they operate properly.
C. She can call the manufacture of all the machines and ask to see if each machine
is compatible.
D. She can ask each user to email her the specifications of their machines and then go
online to the machine manufacturer to find out if they will run Windows 7 properly.
A . To fi nd out if a machine is compatible with Windows 7, just check the machine with the
Hardware Compatibility List. The hardware listed on the HCL has been tested to verify
compatibility.
You have just completed the install on one of your new Windows 7 machines. After the
install is complete, what ’ s the next step in making sure the machine is ready to be used?
A. Set up the machine to dual - boot.
B. Check Microsoft ’ s website for all updates and patches.
C. Configure the sethc.exe file.
D. Load Microsoft Office.
B . After you install the Windows 7 operating system, the next step would be to load all
updates and patches. You can download these patches for free from Microsoft ’ s website by
using Windows Update.
You are the network administrator for an organization that wants to convert all of its
Windows XP machines to Windows 7. Your organization wants to keep as much user data
as possible. You decide to use Windows Easy Transfer. Which of the following can be
migrated to the new machines using Windows Easy Transfer? (Choose all that apply.)
A. User accounts
B. Folders and files
C. Program settings
D. Internet settings
E. Favorites
F. Email messages, contacts, and settings
A, B, C, D, E, F . The Windows Easy Transfer can migrate everything listed in the options.
Which of the following options can be configured in Windows Update? (Choose all
that apply.)
A. Check For Updates
B. Change Settings
C. View Update History
D. Restore Hidden Updates
A, B, C, D . Windows Update also includes Updates: Frequently Asked Questions and
Installed Updates as two other confi gurable options.
You are the network administrator for a small organization that needs to consolidate
equipment. You want to make sure all machines are multibootable between Windows 7,
Windows Vista, and Windows XP. In what order do you load the operating system to
accomplish this task?
A. Windows 7, Windows Vista, Windows XP
B. Windows 7, Windows XP, Windows Vista
C. Windows XP, Windows Vista, Windows 7
D. Windows Vista, Windows 7, Windows XP
C . To make the machine multibootable, you must make sure the oldest operating systems is
always be loaded fi rst. So, for example, if you want to dual - boot Windows 7 and Windows
Vista, Windows Vista must be loaded fi rst.
You are installing Windows 7 on a new machine. The machine has encountered installation
errors. Which files can you view to see the errors or issues? (Choose two.)
A. setupact.log
B. setuplog.log
C. setupdc.log
D. setuperr.log
A, D . The action log includes all of the actions that were performed during the setup process
and a description of each action. The action log is stored as \Windows\setupact.log .
The error log includes any errors that occurred during the installation. The error log is
stored as \Windows\setuperr.log
You are a network administrator that has decided to implement Windows 7. You have to be
able to use the Encrypting File System (EFS). Which Windows 7 versions can you install?
(Choose all that apply.)
A. Home Edition
B. Home Premium Edition
C. Professional Edition
D. Enterprise Edition
C, D . To use the Encrypting File System (EFS), you must install Windows 7 Professional,
Windows 7 Enterprise, or Windows 7 Ultimate.
You have a machine that is currently running Windows Vista Ultimate edition. You would
like to upgrade this machine to Windows 7. Which Windows 7 editions can you upgrade
this machine to? Choose all that apply.
A. Home Premium Edition
B. Professional Edition
C. Enterprise Edition
D. Ultimate Edition
D . If you are upgrading a version of Windows Vista Ultimate, you must upgrade the
machine to Windows 7 Ultimate.
You are the network administrator of a large corporation. Your company has decided to
use WDS to install 100 client computers. You have set up the WDS server and now want
to test a single WDS client to make sure the installation will go smoothly. Which of the
following services are required to use WDS? (Choose all that apply.)
A. DNS
B. WINS
C. DHCP
D. Active Directory
A,C,D . DNS, DHCP, and Active Directory must be properly confi gured and running for
WDS services to work. The WDS server must also be installed and confi gured.
You are the network administrator for a large organization. You are in charge of developing
a plan to install 200 Windows 7 computers in your company ’ s data center. You decide
to use WDS. You are using a Windows Server 2008 domain and have verified that your
network meets the requirements for using WDS services. What command - line utility should
you use to configure the WDS server?
A. ImageX
B. WDSUTIL
C. Setup.exe
D. The WDS icon in Control Panel
B . WDSUTIL is a command - line utility that can be used to confi gure the WDS server.
Several other confi guration options need to be specifi ed on the WDS server and you can set
them using WDSUTIL.
Your company has a variety of client computers that are running Windows XP Professional.
You want to upgrade these machines to Windows 7 using WDS. What requirement must be
met on a client computer to upgrade to Windows 7 from a WDS server?
A. The computer must use a PXE - based boot ROM.
B. The computer must contain an NTFS partition.
C. The computer must use identical hardware configurations as the reference image.
D. There is no option to upgrade with WDS.
D . If you are using WDS, it is not possible to upgrade from Windows XP Professional; you
can only install a fresh copy of Windows 7. Unattended installations can be used to support
automated upgrades.
Will is the network manager for a large company. He has been tasked with creating a
deployment plan to automate installations for 100 computers that need to have Windows 7
installed. Will wants to use WDS for the installations. To fully automate the installations,
he needs to create an answer file. Will does not want to create the answer files with a
text editor. What other program can he use to create unattended answer files via a GUI
interface?
A. ImageX
B. Answer Manager
C. Windows System Image Manager
D. System Preparation Tool
C . Windows System Image Manager (SIM) is used to create unattended answer fi les in
Windows 7. It uses a GUI - based interface to set up and confi gure the most common options
that are used within an answer fi le.
Bob is using WDS to install 100 clients that are identically configured. The first
65 computers are installed with no problems. When he tries to install the other 35, the
machines all receive a 169.254. x.x number along with an error. Which of the following
would cause this failure?
A. The WDS server has been authorized to serve only 65 clients.
B. The WINS server is no longer available.
C. The DHCP server does not have enough IP addresses to allocate to the WDS clients.
D. The network bandwidth has become saturated.
C . To access the WDS server, the WDS clients must be able to access the DHCP server.
Each WDS client will use an IP address from the DHCP server ’ s scope, so you should
ensure that the DHCP server has enough addresses to accommodate all of the WDS clients.
You run a training department that needs the same software installed from scratch
on the training computers each week. You decide to use ImageX to deploy disk images.
Which Windows 7 utility can you use in conjunction with ImageX to create these disk
images?
A. UAF
B. Answer Manager
C. Setup Manager
D. System Preparation Tool
D . Once you have a reference computer installed, you can use the System Preparation
Tool to prepare the computer to be used with disk imaging. ImageX is a utility that can
be used to create a disk image after it is prepared using the System Preparation Tool. The
image can then be transferred to the destination computer(s).
You are trying to decide whether you want to use WDS as a method of installing
Windows 7 within your company. Which of the following options is not an advantage
to using a WDS automated installation?
A. The Windows 7 security is retained when you restart the computer.
B. Windows 7 installation media does not need to be deployed to each computer.
C. Unique information is stripped out of the installation image so that it can be copied to
other computers.
D. You can quickly recover the operating system in the event of a system failure.
C . Unique information is stripped out of the installation image when you use the System
Preparation Tool to create a disk image — for example, the unique SID that is applied
to every computer. Unique information is then generated when the target computer is
installed.
You are the network manager of the XYZ Corporation. You are in charge of developing
an automated deployment strategy for rolling out new Windows 7 computers. You want
to install a WDS server and are evaluating whether an existing server can be used as a
WDS server for Windows 7 deployment. Which of the following is not a requirement for
configuring the WDS server?
A. The remote installation folder must be NTFS version 3.0 or later.
B. The remote installation folder must reside on the system partition.
C. RIS must be installed on the server.
D. The existing server must run Windows Server 2003 with Service Pack 1 installed.
B . When you confi gure your WDS server, the remote installation folder should not reside
on the system partition.
You are using WDS to install 20 Windows 7 computers. When the clients attempt to
use WDS, they are not able to complete the unattended installation. You suspect that the
WDS server has not been configured to respond to client requests. Which one of
the following utilities would you use to configure the WDS server to respond to client
requests?
A. Active Directory Users and Computers
B. Active Directory Users and Groups
C. WDS MMC snap - in
D. WDSMAN
C . You enable WDS servers to respond to client requests through the Windows
Deployment Services (WDS) Microsoft Management Console (MMC) snap - in. In the PXE
Properties dialog box, enable the option Respond To Client Computers.
You want to install a group of 25 computers using disk images created in conjunction with
the System Preparation Tool. Your plan is to create an image from a reference computer and
then copy the image to all the machines. You do not want to create a SID on the destination
computer when you use the image. Which Sysprep.exe command - line option should you
use to set this up?
A. /specialize
B. /generalize
C. /oobe
D. /quiet
B . The /generalize options prevents system - specifi c information from being included in
the image. The Sysprep.exe command can be used with a variety of options. You can see a
complete list by typing sysprep /? at a command - line prompt.
You are planning on deploying 100 new Windows 7 computers throughout your company.
Each new computer is similarly configured. You want to create a reference image that will
then be applied to the remaining images. Which of the following utilities should you use?
A. WDSUTIL
B. Setup.exe
C. Windows SIM
D. ImageX
D . ImageX is a command - line utility that can be used to create and manage Windows 7
image ( .wim ) fi les. You can confi gure a reference installation as desired and then use ImageX
to create an image of the installation that can then be deployed to the remaining computers.
You are a network technician for your company, and you need to deploy Windows 7 to
multiple computers. You want to automate the installation of Windows 7 so that no user
interaction is required during the installation process. Which of the following utilities could
you use?
A. Windows SIM
B. ImageX
C. System Preparation Tool
D. WDSUTIL
A . SIM is a graphical utility that can be used to create an answer fi le. Answer fi les can be
used to automate the installation routine so that no user interaction is required.
You want to initiate a new installation of Windows 7 from the command line. You plan to
accomplish this by using the Setup.exe command - line setup utility. You want to use an
answer file with this command. Which command - line option should you use?
A. /unattend
B. /apply
C. /noreboot
D. /generialize
A . The /unattend option can be used with the Setup.exe command to initiate an
unattended installation of Windows 7. You should also specify the location of the answer
fi le to use when using the Setup.exe utility.
You have manually created an answer file that you want to use to deploy an image that you
have previously created. Before deploying the image, you want to ensure that your answer
file will work with the image. Which of the following tools could you use to validate the
answer file?
A. System Preparation Tool
B. Windows SIM
C. ImageX
D. WDSUTIL
B . You can use the SIM tool to validate an answer fi le, even if the answer fi le was manually
created in a text editor.
You have created a Windows 7 image that you will copy to a DVD and deploy to several
new computers. You want to use an answer file to automate the setup process. Where
should the answer file be located so that you can use it during installation?
A. On a network share
B. On a WDS server
C. On a separate DVD
D. At the root of the DVD
D . During a DVD - based setup, an answer fi le can be used to automate the installation
process. The Windows Setup program implicitly searches for an answer fi le in several
locations, including the root of the DVD.
You are planning on deploying a new Windows 7 image to 100 client computers
that are similarly configured. You are using the Windows SIM tool to create an answer
file that will be used to automate the installation process. You want each computer
to contain two partitions, one for the system partition and one that will function as a
data partition. You need to modify the answer file to support this configuration. Which
component of the answer file will you need to modify?
A. oobeSystem
B. auditSystem
C. Windows PE
D. specialize
C . You would confi gure formatting and partitioning information in the Windows PE
component of the answer fi le. The options specifi ed in this confi guration pass will occur
before the image will be copied to the local computer.
Your company has recently hired a new employee. You need to deploy Windows 7 on
the new employee ’ s computer. You have previously created a Windows 7 image using
the ImageX utility and have successfully deployed it to other computers. You want to use
ImageX to deploy the image to the new employee ’ s computer. Which ImageX option will
you need to use?
A. /apply
B. /capture
C. /mount
D. /verify
A . To deploy the Windows 7 image using ImageX, you will need to use the /apply option.
This option applies the selected image to a specifi ed drive volume.
You are using WDS to deploy Windows 7 images across your organization, and you
are using the WDSUTIL command - line utility to perform this task. You want to copy
a previously created image from the image store using this utility. Which option of
WDSUTIL should you use?
A. /move
B. /copy - image
C. /get
D. /enable
B . You should use the /copy option of the WDSUTIL utility to copy an image from the
image store.
You are using the Windows SIM tool to create an answer file to be used when deploying
new Windows 7 images. You are editing the configuration passes too so that the desired
settings are entered during the installation process. You are currently editing the specialize
component of the answer file. Which of the following information should you include in
this component of the answer file?
A. Hard disk partitioning information
B. Product key information
C. Windows Welcome screen settings
D. Domain and network settings
D . The specialize component of the answer fi le will contain information specifi c to the
target computer, such as domain information and network settings.
You have recently installed Windows 7 onto a reference computer that will be used to create
an image that can then be deployed to sales employees ’ computers. You have installed and
configured several proprietary sales applications on the computer. You have previously used
the System Preparation Tool to remove any system - specific information from the computer,
and you plan to use ImageX to create the image from this reference computer. Which
option of the ImageX utility can you use to accomplish your goal?
A. /apply
B. /capture
C. /mount
D. /verify
B . To create a Windows 7 image from a reference computer using the ImageX utility, you
should use the /capture option. This option captures the image into a new WIM fi le.
Will has installed Windows 7 on his Windows XP computer. The machine is now a
dual - boot computer. He has FAT32 for Windows XP and NTFS for Windows 7. In
addition, he boots his computer to Windows XP Professional for testing an application ’ s
compatibility with both operating systems. Which of the following file systems will be seen
by both operating systems?
A. Only the FAT32 partition will be seen by both operating systems.
B. Only the NTFS partition will be seen by both operating systems.
C. Neither the FAT32 partition nor the NTFS partition will be seen by both
operating systems.
D. Both the FAT32 partition and the NTFS partition will be seen by both
operating systems.
D. Both Windows 7 and Windows XP Professional support FAT32 and the NTFS fi le
systems, so both fi le systems will be viewable on both operating systems.
You are the network administrator for a large company that has decided to use EFS. You
have two Windows 7 machines, named machine1 and machine2. Both of these Windows 7
machines are part of a Windows Server 2008 domain. From machine1 you can recover all
EFS encrypted files for all users in the entire domain. You need to be able to do the same
from machine2. How do you accomplish this task?
A. From machine1, export the data recovery agent certificate and import that certificate
onto machine2.
B. On a domain controller, add machine1 as the master EFS machine.
C. From machine1, export the data recovery agent certificate and import that certificate
onto the EFS server.
D. On a domain controller, add machine2 as the EFS recovery agent machine.
A. In Windows 7, it is possible to share encrypted fi les with another person or between
computers. To share encrypted fi les, you must have a valid EFS certifi cate for the user who
should have access to the fi les.
Alexandria is the payroll manager and stores critical files on her local drive for added
security on her Windows 7 computer. She wants to ensure that she is using the disk
configuration with the most fault tolerance and the highest level of consistent availability.
Which of the following provisions should she use?
A. Disk striping
B. Spanned volumes
C. Mirrored volumes
D. Extended volume
C . Windows 7 supports mirrored volumes and mirrored volumes allow you to have fault
tolerance in the event of a single hard disk failure.
Paige is considering upgrading her basic disk to a dynamic disk on her Windows 7
computer. She asks you for help in understanding the function of dynamic disks. Which of
the following statements are true of dynamic disks in Windows 7? (Choose all that apply.)
A. Dynamic disks can be recognized by older operating systems such as Windows NT 4
in addition to new operating systems such as Windows 7.
B. Dynamic disks are supported only by Windows 2000 Server and Windows
Server 2003.
C. Dynamic disks support features such as simple partitions, extended partitions,
spanned partitions, and striped partitions.
D. Dynamic disks support features such as simple volumes, extended volumes, spanned
volumes, mirrored volumes, and striped volumes.
D. Dynamic disks are supported by Windows 7 as well as by Windows XP, Windows Vista,
Windows 2000, Windows Server 2003, and Windows Server 2008. Windows 7 supports
mirrored volumes.
Cindy is using Windows 7 on her laptop computer, and the C: partition is running out of
space. You want to identify any areas of free space that can be reclaimed from temporary
files. What utility should you use?
A. Disk Cleanup
B. Disk Manager
C. Disk Administrator
D. Disk Defragmenter
A. The Disk Cleanup utility is used to identify areas of space that may be reclaimed
through the deletion of temporary fi les or Recycle Bin fi les.
Rob is using Windows 7 to store video files. He doesn ’ t access the files very often and
wants to compress the files to utilize disk space. Which of the following options allows you
to compress files in Windows 7?
A. Compression.exe
B. Cipher.exe
C. Packer.exe
D. Windows Explorer
D. In Windows 7, one way you can compress fi les is through Windows Explorer. Windows
7 has no programs called Compression or Packer. The Cipher program is used to encrypt
or decrypt fi les. The command - line option for managing fi le and folder compression is
Compact.
Maggie wants the highest level of security possible for her data. She stores the data on an
NTFS partition and has applied NTFS permissions. Now she wants to encrypt the files
through EFS (Encrypting File System). Which command - line utility can she use to manage
data encryption?
A. Encrypt
B. Cipher
C. Crypto
D. EDS
B. The Cipher utility is used to encrypt or decrypt fi les. Windows 7 doesn ’ t have a program
called Encrypt, Crypto, or EDS. If you want to manage fi le encryption through a GUI
utility, you can use Windows Explorer.
You have compressed a 4 MB file into 2 MB. You are copying the file to another computer
that has a FAT32 partition. How can you ensure that the file will remain compressed?
A. When you copy the file, use the XCOPY command with the /Comp switch.
B. When you copy the file, use the Windows Explorer utility and specify the option Keep
Existing Attributes.
C. On the destination folder, make sure that you set the option Compress Contents To
Save Disk Space in the folder ’ s properties.
D. You can ’ t maintain disk compression on a non - NTFS partition.
D. Windows 7 data compression is supported only on NTFS partitions. If you move the fi le
to a FAT32 partition, then it will be stored as uncompressed.
Julie wants to allow her assistant, Tylor, access to several files that she has encrypted with
EFS. How can she allow Tylor to access the files on her computer?
A. Julie should export and email her encryption key to Tylor.
B. Julie should configure NTFS permissions to provide Tylor with full access to the files.
C. Julie should import Tylor ’ s encryption key and add Tylor ’ s certificate to each file to
which Tylor should have access.
D. Julie should configure share permissions to provide Tylor with full access to the files
over the network.
C. To allow Tylor to access her encrypted fi les, Julie should import Tylor ’ s encryption
key and then add that key to each fi le to which Tylor should have access. Adding share
permissions or NTFS permissions will not allow another user to access an encrypted fi le
unless that user ’ s encryption key has been added to the fi le. Exporting and emailing Julie ’ s
key to Tylor will not allow Tylor to access the fi le.
Will is the manager of human resources in your company. He is concerned that members of
the Administrators group, who have implied access to all NTFS resources, will be able to
easily view the contents of the sensitive personnel files. What is the highest level of security
that can be applied to the payroll files?
A. Apply NTFS permissions to the files.
B. Encrypt the files with EFS.
C. Secure the files with the Secure.exe command.
D. Encrypt the files with HSP.
B. You can increase the level of security on folders and fi les on an NTFS partition by using
Encrypting File System (EFS). Only a user who is confi gured as a DRA with the correct
private key or who has explicitly been provided permission can access this data.
Bruce frequently works with a large number of files. He is noticing that the larger the files
get, the longer it takes to access them. He suspects that the problem is related to the files
being spread over the disk. What utility can be used to store the files sequentially on the disk?
A. Disk Defragmenter
B. Disk Manager
C. Disk Administrator
D. Disk Cleanup
A. The Disk Defragmenter utility is used to rearrange fi les so that they are stored contiguously
on the disk. This optimizes access to those fi les. You can also defragment disks through the
command - line utility Defrag.
You are the network administrator for a small company. You have a laptop that you use to
test an application that is deployed to several users who have access to only a Windows XP
computer. To accommodate the testing of the application, you have a laptop that dual - boots
between Windows 7 and Windows XP. You currently have Windows XP on the C: drive
and Windows 7 on the D: drive. Both partitions are formatted with FAT32. You decide to
convert the D: drive to NTFS so that you can apply additional security to some of the files.
You use the Convert command - line utility to convert the D: drive. Before you reboot and
convert the drive, you realize that you should not have converted the drive. How can you
cancel the conversion process?
A. Use Convert D: /cancel .
B. Use Convert D: /fs:FAT .
C. In Disk Administrator, select Tools  Cancel Conversion for Drive C:.
D. Edit the Registry setting for HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Control\SessionManager to autocheck autochk *
D. The only way to cancel an NTFS conversion prior to reboot is to edit the Registry setting
for HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SessionManager to
autocheck autochk * . Once the conversion has taken place, there is no way to reverse the
conversion process.
Cathy is the payroll manager at your company. The day before the payroll is processed,
Cathy is involved in a minor car accident and spends two days in the hospital. She has
Windows 7 installed as a part of a workgroup and has encrypted the payroll files with EFS.
All of the EFS settings for the computer are set to default values. How can these files be
accessed in her absence?
A. The Administrator user account can access the files by backing up the files, restoring
the files on the computer where the recovery agent is located, and disabling the files ’
Encrypt The Contents To Secure Data option.
B. The Administrator user account can access the files by using the unencrypt
command - line utility.
C. The Administrator user account can access the files by using the encrypt - d
command.
D. Unless a DRA has been configured, there will be no access to the files.
D. By default, a Windows 7 computer that is installed as a stand - alone computer or
a part of a workgroup has no DRA automatically confi gured. You will not be able to
access her fi les.
You have an extremely large database that needs to be stored on a single partition. Your
boss asks you about the maximum capacity for an NTFS partition. Assuming you are using
4 KB clusters, what is the correct answer?
A. 16 TB
B. 64 GB
C. 132 GB
D. 32 GB
A. You can have NTFS partitions that are up to 16 TB with 4 KB clusters or 256 TB with
64 KB clusters. NTFS supports the largest partitions of any of the fi le systems supported by
Windows 7.
You have just added a new disk to your computer that supports hot swapping. Your
computer now has three physical drives. What is the fastest way to allow Windows 7 to
recognize the new disk?
A. Restart the computer.
B. In Disk Manager, select Action  Rescan Disk.
C. In Disk Management, select Action  Rescan Disk.
D. In System Tools, select Update Disks.
C . Select Action  Rescan Disk in the Disk Management utility. The disk will then be
listed through the Disk Management utility and can be confi gured as needed.
You have a 10 MB image file that you want to email to another user in the marketing
department. Which of the following should you do in order to email the image?
A. Encrypt the image with EFS.
B. Configure compression on the directory in which the image file is stored.
C. Right - click the image file and select Send To  Compressed (Zipped) folder.
D. Use the Compact command - line utility.
C . You can send the image in a compressed fi le in order to limit the size of the image
while emailing it. Compressing an image in a zipped fi le can often drastically reduce the
size of the image fi le and make it easier to email to other users. To send the image fi le to a
compressed folder, you can right - click the fi le and select Send To  Compressed (Zipped)
Folder.
You are installing a new hard drive into your computer, which dual - boots between
Windows 7 and Windows XP. You will be storing large and sensitive files on this drive.
You will need to access these files from either operating system. You need to determine
the file system to use when formatting the disk. Which of the following should you use?
A. NTFS
B. FAT32
C. FAT16
D. CDFS
A. You should use NTFS when formatting the new disk. Only NTFS supports both fi le
encryption and fi le compression. Both Windows XP and Windows 7 can access NTFS
partitions, so fi le access should not be a problem.
You are administering a Windows 7 computer. You suspect that the disk in the computer
may have some bad sectors. You want to determine if the disk does have any bad sectors
and fix them if possible. Which utility could you use to accomplish this?
A. DiskPart
B. Check Disk
C. Disk Cleanup
D. Disk Defragmenter
B. To check a disk to determine if it has any bad sectors, you can use the Check Disk
utility, which can be accessed from the command line by typing Chkdsk . The Check Disk
utility can discover and attempt to fi x bad sections on hard disks.
You are the human resources administrator for your company. You have recently been
assigned a Windows 7 laptop computer. You have added a new directory named HR to
the computer. You want to ensure that all files that are stored within the HR directory
are encrypted. You will use the Cipher utility to accomplish this. Which of the following
options should you use with the Cipher utility?
A. /D
B. /E
C. /R
D. /X
B. You should use the /E option with the Cipher utility. The /E option
encrypts the specifi ed directory and confi gures all fi les subsequently added to the
directory to be encrypted.
You are a system administrator for your company. You are managing a Windows 7
computer. You issue the following command at a command prompt: Compact /C . Which
of the following will occur as a result of issuing this command?
A. All files located on the C: drive will be compressed.
B. All files located on the C: drive will be uncompressed.
C. All files within the specified directory will be compressed.
D. All files within the specified directory will be uncompressed.
C. By issuing the command Compact /C , you ensure that all fi les within the specifi ed
directory will be compressed. The Compact utility can be used to compress fi les and
directories from a command line. The /C option compresses the selected fi les.
You are the system administrator for your company. You are configuring the services on a
Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to
restart. Which tab of the service ’ s Properties dialog box should you use?
A. General
B. Log On
C. Recovery
D. Dependences
C. You can confi gure what actions will occur if the service fails to start on the Recovery
tab of the service’s Properties dialog box. For example, you can confi gure the service to
attempt to restart, or you can confi gure the computer to reboot.
The system administrator of your network wants to edit the Registry, including setting
security on the Registry keys. What primary utility or utilities that support full editing of
the Windows 7 Registry should the system administrator use? (Choose all that apply.)
A. REGEDIT
B. REDIT
C. REGEDT32
D. REGEDITOR
A, C. In Windows 7, you can edit the Registry with REGEDIT or REGEDT32. You should
always use extreme caution when editing the Registry because improper confi gurations can
cause the computer to fail to boot.
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset
the keyboard speed and the mouse pointer rate. Which utility should she use to configure
the keyboard and mouse properties?
A. Control Panel
B. Computer Management
C. Microsoft Management Console
D. Registry Editor
A. You confi gure keyboard and mouse properties in Control Panel.
Denise is using a laptop computer that uses ACPI. She wants to see what percentage of the
battery power is still available. She also wants to know if Hibernation has been configured.
Which of the following utilities should she use?
A. Device Manager
B. Computer Manager
C. Battery meter
D. MMC
C. On a laptop computer, Denise can use the battery meter to view the amount of battery
power available and to change the power plan confi gured for the computer.
You are administering a computer that is used by several customer support representatives
for your company. The support representatives use a custom application to report support
incidents. After the application is updated, it stops functioning properly and one of the
programmers who wrote the application indicates that a Registry change needs to
be made to the computer. You need to ensure that the change is applied for each user of the
computer. Which Registry key should you modify?
A. HKEY_CLASSES_ROOT
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY_USERS
C. You will need to make the Registry modifi cation in the HKEY_LOCAL_MACHINE
Registry key. This key provides confi guration information that is accessible regardless of
who is logged onto the computer.
You have a user, Rob, who uses a laptop computer running Windows 7. You have
configured the laptop to enter Sleep mode after 30 minutes of inactivity. What will occur
when the computer enters Sleep mode?
A. The data will be saved to the hard disk, and the computer will shut down.
B. The data will be erased from RAM, and the computer will shut down.
C. The monitor will be turned off, but the hard disks will remain active.
D. The data will be saved to the hard disk, and the computer will be put into a power -
saving state.
D. When the computer enters Sleep mode, the data will be saved to the hard disk and the
computer will be put into a power-saving state. Sleep mode combines the features of standby
and Hibernation so that all data is saved to the hard disk, but the computer restores faster
than if the computer were put into Hibernation mode.
You want to speed up the resume time on your computer after it is put into Hibernation
mode. You have installed a hybrid hard disk drive into your Windows 7 computer. Which
technology should you use to accomplish your goal?
A. ReadyDrive
B. ReadyBoost
C. Superfetch
D. SuperDrive
A. You should use the Windows ReadyDrive technology to help speed the resume time
of your computer after it has been put into Hibernation mode. ReadyDrive is a new
technology that is used in conjunction with hybrid hard disk drives, which combine fl ash
memory with standard hard disk technology. This allows data to be stored in fl ash memory,
which enables the hard disk to remain spun down longer and also improves the time
required for the computer to resume after being put into Hibernation mode.
A new employee named Crystal has been supplied with a Windows 7 laptop computer.
You have configured Crystal ’ s computer with the Power Saver power plan, and you used
the default options. Which of the following will occur after 20 minutes of inactivity on
Crystal ’ s computer?
A. The display will be turned off, but the hard disk will remain active.
B. The hard disk will be turned off, but the display will remain active.
C. Both the hard disk and the display will be turned off.
D. No components will be turned off.
C. When a Windows 7 computer is confi gured with the Power Saver power plan, the
computer’s display and hard disk will be turned off after 20 minutes of inactivity in order
to conserve energy. The computer will be put into sleep mode after 1 hour of inactivity
when using the Power Saver power plan.
You are the network administrator for a medium - sized company. You support all user
Desktop issues. Gary is using the default Windows 7 Desktop on his laptop computer. Gary
wants to change his Desktop settings. Which of the following options should Gary use to
configure the Desktop in Windows 7?
A. Right - click an empty space on the Desktop and choose Personalize from the context
menu.
B. Select Control Panel  System.
C. Right - click My Computer and choose Manage from the context menu.
D. Right - click My Computer and choose Properties from the context menu.
A. The easiest way to confi gure the Desktop is by right-clicking an open area of the
Desktop and choosing Personalize.
You work on the help desk for a large company. One of your users calls you and reports
that they just accidentally deleted their C:\Documents\Timesheet.xls file. What is the
easiest way to recover this file?
A. In Folder Options, click the Show Deleted Files option.
B. In Folder Options, click the Undo Deleted Files option.
C. Click the Recycle Bin icon on the Desktop and restore the deleted file.
D. Restore the file from your most recent tape backup.
C. The easiest way to recover a deleted fi le is to restore it from the Recycle Bin. The
Recycle Bin holds all of the fi les and folders that have been deleted as long as there is space
on the disk. From this utility, you can retrieve or permanently delete fi les.
Dennis has a new display adapter and monitor. He wants to set display properties for
his Desktop. Which of the following options are not set through the Personalization
dialog box?
A. Desktop background
B. Screen saver
C. Special visual effects for your Desktop
D. Contrast and brightness of the monitor
D. Through the Personalization dialog box, you can set your Desktop background, the
screen saver to be used by your computer, and any special visual effects for your Desktop.
Contrast and brightness of the monitor are typically set through the monitor’s controls.
You sit in a busy area of the office. Sometimes, you forget to log off or lock the computer
when you leave your desk. How can you configure your computer so that it will become
password - protected if it is idle for more than 10 minutes?
A. Through the Logon/Logoff icon in Control Panel
B. Through the Screen Saver option on the Personalization dialog box
C. Through the Security icon in Control Panel
D. Through the Security properties of Local Users and Groups
B. The Screen Saver option of the Personalization dialog box allows you to select a screen
saver that will start after the computer has been idle for a specifi ed amount of time. You
can confi gure the screen saver options to require the user’s password in order to resume the
computer’s normal function. When the password is invoked, the computer will be locked.
To access the locked computer, you must enter the password of the user who is currently
logged on or an administrator password.
You are an administrator for your company ’ s network. You want to configure the clock
and stock ticker to be displayed on the Desktop of your users ’ computers. How can you
accomplish this task?
A. Through Control Panel  Personalization
B. Through Control Panel  Desktop Gadgets
C. Through Control Panel  Windows Sidebar Properties
D. Through Control Panel  Ease of Access Center
B. You can confi gure notifi cation area options, such as displaying the clock and stock
ticker, through Control Panel  Desktop Gadgets. Windows 7 has removed the Windows
Vista Sidebar.
You are configuring an image of Windows 7 that will be deployed to a new office location
for your company. You are configuring the Desktop. You want to automatically hide the
Taskbar when it ’ s not being used. You also do not want the Taskbar to be moved by
the users. How can you configure these options?
A. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Toolbars tab
B. By right - clicking an empty space of the Taskbar, selecting Properties, and configuring
the Taskbar tab
C. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Notification Area tab
D. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Start Menu tab
B. You can confi gure Taskbar options by right-clicking an empty space of the Taskbar,
selecting Properties, and then confi guring the Taskbar tab. This tab contains several
options for confi guring the Taskbar, such as Lock The Taskbar, Auto-Hide The Taskbar,
and Use Small Icons.
You are the network administrator for a manufacturing company. You are configuring
several Windows 7 computers for a group of newly hired engineers. You want to optimize
the new computers to use the Windows Aero theme. How can you accomplish this task?
A. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Display Settings
B. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Desktop Background
C. By right - clicking an empty space of the Desktop, selecting Personalize, and clicking
Screen Saver
D. By right - clicking an empty space of the Desktop and selecting Personalize. Then choose
your theme.
D. You can confi gure user interface settings by clicking an empty space on the Desktop and
selecting Personalize. The Themes for Windows 7 will appear. The Windows 7 Aero theme
includes user interface elements, such as transparent windows and color schemes.
You are configuring a computer to be deployed to another network administrator. You
want to allow the other administrator to quickly access the Administrative Tools options
available with Windows 7. How can you accomplish this task?
A. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Desktop on the Toolbars tab
B. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Show Quick Launch on the Taskbar tab
C. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking the
Customize button on the Start Menu tab
D. By right - clicking an empty space of the Taskbar, selecting Properties, and clicking
Customize on the Notification Area tab
C. You can confi gure Start Menu options by clicking an empty space of the Taskbar,
selecting Properties, and clicking the Customize button on the Start Menu tab, which opens
the Customize Start Menu dialog box. This dialog box provides a list of confi guration
options that customize how items are displayed on the Start menu. The System
Administrative Tools option confi gures how the Administrative Tools icon is displayed. You
can confi gure the Administrative Tools icon to be displayed on the All Programs menu, to
be displayed on both the All Programs menu and the Start Menu, or not to be displayed on
either the Start Menu or the All Programs menu.
You are the network administrator for a large company. One of your users calls and states
that they are getting an error every time they start an application. You want to see what the
user is doing and what the error is. How can you accomplish this?
A. Remote Desktop
B. Hyper - V
C. Remote Assistance
D. Virtual PC
C. Remote Assistance is what you want to use to see the user’s actions and the error.
Remote Desktop does not allow a user to work with you during your connection. Hyper-V
and Virtual PC have nothing to do with remote connections.
You are a consultant for a large organization. Some employees contact you at 11:00 p.m.
and state that one of the servers is down. No one is in the office to fix the problem. How
can you connect to the server fix the problem?
A. Remote Desktop
B. Hyper - V
C. Remote Assistance
D. Virtual PC
A. Remote Desktop allows you to connect to a machine and take over the session. Remote
Assistance requires that a user invite you to the connection.
You are the network administrator for a large organization that wants to set up a secure
VPN between two of the company ’ s locations using the Internet. Both sides of the VPN use
Windows Server 2008. What is the best protocol to use to set up the VPN?
A. PPTP
B. L2TP
C. SSTP
D. PPP
C. SSTP is the newest of the tunneling protocols and it is available when tunneling with
a Windows 2008. The way SSTP works is that SSPT allows encapsulated Point-to-Point
Protocol (PPP) packets to be transmitted over an HTTP connection.
You are the network administrator for a large organization. You have a user that needs you
to connect and help them with a Windows 7 issue. You want to use Remote Assistance for
the connection. Which of the following allows you to easily set up a Remote Assistance
session?
A. Easy Connect
B. Quick Connect
C. User Connect
D. Fast Connect
A. The Easy Connect method for getting remote assistance is new for Windows 7. Easy
Connect uses Peer Name Resolution Protocol (PNRP) to set up direct peer-to-peer transfer
using a central machine on the Internet to establish the connection.
You are the network administrator for your organization. You have been asked by the
owner of the company to verify that all drivers installed on the Windows 7 machines are
signed drivers. How do you accomplish this task?
A. Run Verify.exe at the command prompt.
B. Run a scan in Device manager.
C. Run Sigverif.exe at the command prompt.
D. Run Drivers.exe at the command prompt.
C . Running the Sigverif.exe program will run a check against all the drivers installed on
your machine and then notify you of any drivers that are unsigned.
ou are the network administrator for your organization. You are asked by your manager
to modify a few file extensions that are associated with Internet Explorer. How can you
accomplish this task?
A. In Control Panel, open Default Programs and then click Set Associations. Set the
proper file extensions.
B. In Internet Explorer, set extensions on the extension tab.
C. In Control Panel, open System and then click Set Associations. Set the proper file
extensions.
D. In Internet Explorer, set extensions on the advanced tab.
A . The Default Programs icon in Control Panel allows you to set fi le extension associations
to the various programs in Windows 7.
You are the network administrator for a large organization. You are in charge of
implementing company policies. One company policy states that you have to prevent
Internet Explorer from saving any data during a user ’ s browsing session. How do you
accomplish this?
A. Set the Internet Security settings to disabled.
B. Run the browsers in the InPrivate session.
C. InPrivate sessions should be disabled.
D. Private sessions should be enabled.
B . The InPrivate session prevents the browsing history from being recorded and does not
allow temporary internet fi les to be retained. Cookies, usernames, passwords, and form
data will not remain in IE8 following the closing of the InPrivate session, nor will there be
any footprints or data pertaining to the InPrivate browsing session.
You are the network administrator for a large organization. A user calls you and says that
when they try to connect to the internal website, they are prompted for authentication. The
user has the rights to access the internal site due to the fact that all users and computers are
part of a domain and the internal website uses Integrated Windows Authentication. How
do you make sure that the user is automatically authenticated when they connect?
A. Change the user ’ s local permissions to administrator.
B. The Local site’s URL should be added to the Local internet zone.
C. The Local site’s security credentials should be added to the trusted sites zone.
D. The internet security level should be lowered to lowest.
B . Because all users and computers are part of the domain and the internal website uses
Integrated Windows Authentication, once you add the URL to the Local internet zone
properties, the Windows Authentication will take over.
You are the network administrator for your organization. Your organization has been using
Windows XP, and you are now switching all users to Windows 7 Professional. Some of the
XP applications do not run properly in Windows 7. How can you allow these applications
to run on Windows 7?
A. Run the applications in XP mode.
B. Get newer versions of the applications.
C. Disable the Windows 7 Compatibility Mode.
D. Write your own shim to solve the issues.
A . Windows XP mode is available on Windows 7 Professional, Ultimate, and Enterprise
editions and allows you to run XP applications on Windows 7 properly.
You are using Windows 7 Home edition and you have an XP application that worked well
with XP but is having issues running on Windows 7. What steps can you take to help solve
this issue?
A. Change the Applications security settings.
B. Change the Applications Compatibility Mode to Windows XP.
C. Enable the Windows 7 operating system to XP Compatible.
D. Upgrade the application.
B . If a Windows XP application worked before but it is not working correctly in Windows 7,
you can set that application to run in Compatibility Mode for a previous operating system.
Which versions of Windows 7 has XP mode automatically built into the operating system?
Choose all that apply.
A. Install and use Windows Virtual PC
B. Enterprise Edition
C. Ultimate Edition
D. Professional Edition
A . Windows Virtual PC allows you to install previous versions of 32-bit operating system
like XP so that you can continue to run applications.
You are the network administrator for a large organization. One of your users calls you and
states that they think they are having issues with their network card. What tool can you use
to see if the hardware is working properly?
A. Device Hardware Utility
B. Manage Hardware Utility
C. Device Manager
D. Device Configuration
C . Device Manager is the utility included with Windows 7 that allows you to confi gure
and manage your devices and hardware. You can also confi gure your drivers within Device
Manager.
You are the network administrator for a large organization. You have a Windows 7
machine that is working fine but you downloaded a newer version of the network adapter
driver. You install the new network adapter driver on the Windows 7 machine. After you
load the driver, the network device stops working properly. Which tool should you use to
help you fix the problem?
A. Driver Rollback
B. Driver Repair Utility
C. Reverse Driver Application
D. Windows 7 Driver Compatibility tool
A . Driver Rollback allows you to replace a newly installed driver with the previous driver.
You can do the driver rollback using the Device Manager utility.
You have installed Windows 7 with Internet Explorer 8 and now some of the websites
that you used to visit no longer display their content correctly. How can you solve this
issue?
A. Download the IE8 Compatibility utility.
B. Enable the IE8 Compatibility view.
C. Run the Application Compatibility Mode.
D. Install the IE7 viewer.
B . Windows Internet Explorer 8 is a new release of Microsoft ’ s web browser included
in Windows 7, and some websites may not be updated to use the new features of IE8 or
display their content correctly. Problems may exist, such as misaligned images or text.
When you use Compatibility View, IE8 will display a web page the way it would have been
displayed in Internet Explorer 7 (which should correct any display issues).
You are a help desk technician for your company. You are configuring Internet Explorer,
and you want to ensure that cookies that are stored on the computer are not accessible to
any websites. Which privacy setting should you configure to accomplish your goal?
A. Block All Cookies
B. High
C. Medium High
D. Medium
A . To block any website from accessing cookies stored on the local computer, you should
set the privacy setting to Block All Cookies. The Block All Cookies setting prevents cookies
from being saved on the computer and prevents any existing cookies from being read by
websites.
You are the network administrator for a large organization that is thinking of switching
from Windows XP to Windows 7. Your manager is worried about applications not being
compatible with Windows 7. What options do you have to make sure applications work
with Windows 7? (Choose all that apply.)
A. XP Mode
B. Shims
C. Application Compatibility Mode
D. Windows 7 Compatibility Utility
A, B, C . Windows 7 has some built - in options to make sure your Windows XP applications
work with Windows 7. They include XP Mode, shims (created by Microsoft), and Application
Compatibility Mode. You can also download and run Windows Virtual PC with a Windows
XP virtual hard disk.
You have recently installed Windows 7 on your computer. You are configuring Internet
Explorer, and you want to ensure that cookies are not saved from any website that does not
have a compact privacy policy. Which privacy setting should you configure to accomplish
your goal?
A. Block All Cookies
B. High
C. Medium High
D. Medium
B . To block cookies from any websites that do not have a compact privacy policy, you
should set the privacy setting to High. The High setting prevents any cookies from being
saved for websites that do not contain a compact privacy policy, and prevents any cookies
from being saved that have the potential of saving information that can be used to contact
you without your explicit consent.
Your network administrator has provided you with a new laptop with Windows 7 installed
on it. You are using Internet Explorer. When typing search phrases into the Instant Search
box, you discover that search results are being displayed only for Amazon.com . You want
search phrases to search the Web, not Amazon.com . What should you do?
A. Disable all add - ons.
B. Configure Internet Explorer as your default browser.
C. Add additional web - based search providers in the Manage IE add - ons section.
D. Configure a web - based search provider as your default home page.
C . You should confi gure additional web - based search providers in the IE8 add - ons section.
To confi gure this, click on Tools, Internet Options, and then hit the Settings button in the
Search section of the General tab.
You have downloaded and installed several Internet Explorer add - ons. You want to view
the add - ons that have been used during your current browsing session. Which option of the
Manage Add - Ons dialog box should you select to view this information?
A. Add - Ons That Have Been Used By Internet Explorer
B. Currently Loaded Add - Ons button in Internet Explorer
C. Add - Ons That Run Without Requiring Permission
D. Downloaded ActiveX Controls (32 - bit)
B . A list of add - ons that have been used by Internet Explorer during the current browsing
session can be viewed by selecting the Currently Loaded Add - Ons button in the Internet
Explorer option of the Manage Add - Ons dialog box. You can use the Manage Add - Ons
dialog box to view, enable, and disable add - ons that have been installed on your computer.
You are the network manager for a large organization. Your company is switching from
Windows XP to Windows 7 and needs to have XP Mode automatically built into the
operating system. Which Windows 7 editions can you use? (Choose all that apply.)
A. Basic Edition
B. Enterprise Edition
C. Home Edition
D. Ultimate Edition
B, D . Windows XP Mode is available for Windows 7 Enterprise, Ultimate, and
Professional. If you need to run XP in any other version of Windows 7, you must download
and use Microsoft Windows Virtual PC.
You have a manager who wants to be able to watch their stock quotes continually
throughout the day. How can you set this up?
A. Set up Stock Web Slice.
B. Have them keep IE on the stock page.
C. Use Microsoft Instant Messenger to watch the stocks.
D. Download a stock ticker.
A . Web Slices in Windows Internet Explorer 8 allows IE8 to check for updates of web
page content you may frequently want to have. This is an excellent way to check your local
weather or stock quotes or even watch an auction item in EBay.
With Web Slices, you can add the piece of the web page with the content you ’ re looking
for to the new favorites bar and IE8 will check it for you and give you a visual clue when the
content changes. You can control how often IE8 checks for changes as well as have IE8 play
a sound when Web Slice content is found on a page and even when an update to content is
discovered.
You want to set up IE8 so that you prevent your 8 - year - old daughter from viewing any
website with nudity. How do you accomplish this?
A. Enable the IE8 Nudity filter in the Security tab.
B. Use Content Advisor and block all sites with nudity.
C. Enable the IE8 Nudity filter in the Privacy tab.
D. Enable the IE8 Nudity filter in the Advanced tab.
B . The Content Advisor allows you to rate sites for their content. Some of that content may
contain use of tobacco, alcohol, nudity, drugs, gambling, etc.
You are running a Windows 7 machine. You want to load a copy of Windows Vista on the
machine for testing and training. How can you accomplish this?
A. Format the machine, load Windows Vista, and then load Windows 7.
B. Download Windows Virtual PC and create a Windows Vista virtual hard disk.
C. Download Hyper - V and create a Windows Vista virtual hard disk.
D. Download Virtual Server and create a Windows Vista virtual hard disk.
B . Windows Virtual PC gives you the ability to set up virtualization on a client operating
system. This is benefi cial for anyone in the industry who has to do testing or confi guration.
You recently visited a website that automatically downloaded and installed spyware onto your
computer. You want to prevent spyware from being installed in the future. You have enabled
Pop - up Blocker. What else can you do to minimize your risk of downloading spyware?
A. Enable Phishing Filter.
B. Disable all add - ons.
C. Delete your browsing history.
D. Enable Protected Mode.
D . You should enable Protected Mode. Protected Mode isolates Internet Explorer and
prevents information from being written outside of the Temporary Internet Files unless you
allow it. By enabling Protected Mode, you will be notifi ed before any application is able
to write to other areas of the operating system. To enable Protected Mode, open Internet
Explorer, click Tools, click Internet Options, click the Security tab, and select the Enable
Protected Mode option.
You have a user that has access to the applications folder on your network server. This user
belongs to the following groups:
NTFS
Sales Read only
Marketing Full Control
Shared Permissions
Sales Read only
Marketing Change
When this user logs into the applications folder from their Windows 7 machine, what are
their effective permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
C . To fi gure out a user ’ s rights, you must fi rst add up what their effective NTFS rights are
and their effective Shared permissions. Then the most restrictive set takes precedence. So
in this example, the user ’ s NTFS rights were Full Control and the Shared permissions were
Change, so Change would be the effective permission.
You are setting up a machine for a home user who does not know much about computers. You
do not want to make the user a local administrator but you do want to give this user the right
to change Windows Updates manually. How can you configure this?
A. Modify the LGPO for Windows Update to allow the user to make changes manually.
B. Explain to the user how to log on as the Administrator account.
C. Set Windows Update modifications to anyone.
D. This can ’ t be done. Only administrators can change Windows Update.
A . You do not want this user to have any administrator rights. To allow this user to change
Windows Update manually, you must set this in a LGPO.
You are the administrator for a large organization with multiple Windows Server 2008
domain controllers and multiple domains. You have a Windows 7 machine that is set up
for all users to access. You have an application called StellApp.exe that everyone on this
Windows 7 computer can use except for the sales group. How do you stop the sales group
from accessing this one application?
A. Deny the Everyone group the rights to the application.
B. Create an executable rule from the Application Control Policy.
C. Create a security role from the Application Control Policy.
D. Give the Everyone group full control of the application.
B . Application Control Policy (AppLocker) allows you to confi gure a Denied list and an
Accepted list for applications or users. Applications that are confi gured on the Denied list
will not run on the system or by specifi c groups and applications on the Accepted list will
operate properly.
You have a Windows 7 machine that multiple users access. All users have the rights to use
USB removable devices but you need to deny one user from using USB removable devices.
How do you accomplish this?
A. Deny the one user from using the machine.
B. Set a USB rule on Hardware Manager.
C. Deny all users from using USB devices.
D. Create a removable storage access policy through an LGPO.
D . LGPOs are policies that you can set on a local Windows 7 machine to limit hardware
and user usage. You also have the ability to control individual users within the Local Group
Policy.
You are the system administrator for a large organization. You have a Windows 7 machine
that all users can access. There is a folder on the Windows 7 machine called Apps. You
need to set up auditing on this folder. How do you accomplish this task?
A. From the Local Group Policy, enable Directory Service Access.
B. From the Local Group Policy, enable Audit Object Access.
C. From the Local Group Policy, enable Account Access.
D. From the Local Group Policy, enable File And Folder Access.
B . Audit Object Access enables auditing of access to fi les, folders, and printers.
You have a user named Will who has access to the Finance folder on your network server.
Will belongs to the following groups:
NTFS
Admin Full Control
Finance Modify
Shared Permissions
Admin Full Control
Finance Change
When Will logs into the Finance folder from his Windows 7 machine, what are his effective
permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
A . Will ’ s NTFS rights were Full Control and the Shared permissions were Full Control, so
Full Control would be the effective permission.
You are the network administrator for a large organization. You have a Windows 7
machine that needs to prevent any user from copying unencrypted files from the
Windows 7 machine to any removable disk. How do you accomplish this task?
A. Within the System icon in Control Panel, set the BitLocker Drive Encryption.
B. Within the Hardware icon in Control Panel, set the BitLocker Drive Encryption.
C. Within the Device Manager icon in Control Panel, set the BitLocker Drive Encryption.
D. Within a Local Group Policy, set the BitLocker Drive Encryption.
D . Windows 7 comes with a new feature called BitLocker Drive Encryption. BitLocker
encrypts the entire system drive. New fi les added to this drive are encrypted automatically.
To confi gure BitLocker, you must either use a Local Group Policy or use the BitLocker icon
in Control Panel.
In which editions of Windows 7 can you enable BitLocker? (Choose all that apply.)
A. Windows 7 Home Edition
B. Windows 7 Basic Edition
C. Windows 7 Ultimate Edition
D. Windows 7 Enterprise Edition
C, D . BitLocker Drive Encryption is a data protection feature available in Windows
Enterprise and Ultimate editions of Windows 7.
You organization has decided to install a Windows Server Update Service (WSUS). You
have a Windows 7 machine that needs to have the updates done from the WSUS server
instead of directly from Microsoft ’ s website. How do you accomplish this?
A. Modify the Local Group Policy for the Windows Update to receive updates from the
WSUS server.
B. Modify the Windows Update icon in Control Panel to receive updates from the WSUS
server.
C. Modify the System icon in Control Panel for the Windows Update to receive updates
from the WSUS server.
D. Modify the WSUS server to force this Windows 7 machine to receive updates from the
WSUS server.
A . Within Windows Update, you cannot specify a WSUS server. You need to specify the
WSUS server through the use of a Local Group Policy.
Your network ’ s security has been breached. You are trying to redefine security so that a user
cannot repeatedly attempt user logon with different passwords. To accomplish this, which of
the following items (in the Local Security Settings dialog box shown here) should you define?
A. Password Policy
B. Account Lockout Policy
C. Audit Policy
D. Security Options
B . Account Lockout Policy, a subset of Account Policy, is used to specify options that
prevent a user from attempting multiple failed logon attempts. If the Account Lockout
Threshold value is exceeded, the account will be locked. The account can be reset based on
a specifi ed amount of time or through administrator intervention.
You are the network administrator for a Fortune 500 company. The accounting department
has recently purchased a custom application for running financial models. To run properly,
the application requires that you make some changes to the computer policy. You decide to
deploy the changes through a Local Group Policy setting. You suspect that the policy is not
being applied properly because of a conflict somewhere with another Local Group Policy
setting. What command should you run to see a listing of how the group policies have been
applied to the computer and the user?
A. GPResult
B. GPOResult
C. GPAudit
D. GPInfo
A . The Group Policy Result Tool is accessed through the GPResult command - line utility.
The gpresult command displays the resulting set of policies that were enforced on the
computer and the specifi ed user during the logon process.
You have a Windows 7 computer that is located in an unsecured area. You want to track
usage of the computer by recording user logon and logoff events. To do this, which of the
following auditing policies must be enabled?
A. Audit Account Logon Events
B. Audit Account Management
C. Audit Process Tracking
D. Audit System Events
A . Audit Account Logon Events is used to track when a user logs on, logs off, or makes a
network connection. You can confi gure auditing for success or failure, and audited events
can be tracked through Event Viewer.
You are the administrator for a printing company. After you configure the Password Must
Meet Complexity Requirements policy, several users have problems when changing their
passwords. Which of the following passwords meet the minimum complexity requirements?
(Choose all that apply.)
A. aBc - 1
B. Abcde!
C. 1247445Np
D. !@#$%^ & *( - []
B, C . The password Abcde! meets complexity requirements because it is at least six
characters long and contains uppercase letters, lowercase letters, and symbols. The
password 1247445Np meets complexity requirements because it is at least six characters
long and contains uppercase letters, lowercase letters, and numbers. Complex passwords
must be at least six characters long and contain three of the four types of characters —
uppercase letters, lowercase letters, numbers, and symbols.
You are the system administrator for Stellacon Corp. You have a computer that is shared by
many users. You want to ensure that when users press Ctrl+Alt+Del to log on, they do not
see the name of the last user. What do you configure?
A. Set the security option Clear User Settings When Users Log Off.
B. Set the security option Interactive Logon: Do Not Display Last User Name In Logon
Screen.
C. Set the security option Prevent Users From Seeing Last User Name.
D. Configure nothing; this is the default setting.
B . The security option Interactive Logon: Do Not Display Last User Name is used to
prevent the last username in the logon screen from being displayed in the logon dialog box.
This option is commonly used in environments where computers are used publicly.
Mary has access to the R & D folder on your network server. Mary ’ s user belongs to the following
groups:
NTFS
Sales Read only
Marketing Read only
Shared Permissions
Sales Read only
Marketing Change
When Mary logs into the R & D folder from her Windows 7 machine, what are her effective
permissions?
A. Full Control
B. Read only
C. Change
D. Read and Write
B . Mary ’ s NTFS rights were Read only and the Shared permissions were Change, so Read
only would be the effective permission.
You have recently hired Will as an assistant for network administration. You have not
decided how much responsibility you want Will to have. In the meantime, you want Will
to be able to restore files on Windows 7 computers in your network, but you do not want
Will to be able to run the backups. What is the minimum assignment that will allow Will to
complete this task?
A. Add Will to the Administrators group.
B. Grant Will the Read right to the root of each volume he will back up.
C. Add Will to the Backup Operators group.
D. Grant Will the user right Restore Files And Directories.
D . The Restore Files And Directories user right allows a user to restore fi les and directories
regardless of fi le and directory permissions. Assigning this user right is an alternative to
making a user a member of the Backup Operators group.
You are the network administrator of a medium - sized company. Your company requires a
fair degree of security and you have been tasked with defining and implementing a security
policy. You have configured password policies so that users must change their passwords
every 30 days. Which password policy would you implement if you want to prevent users
from reusing passwords they have used recently?
A. Passwords Must Be Advanced
B. Enforce Password History
C. Passwords Must Be Unique
D. Passwords Must Meet Complexity Requirements
B . The Enforce Password History policy allows the system to keep track of a user ’ s password
history for up to 24 passwords. This prevents a user from using the same password
over and over again.
You have a network folder that resides on an NTFS partition on a Windows 7 computer.
NTFS permissions and Share permissions have been applied. Which of the following statements
best describes how Share permissions and NTFS permissions work together if they
have been applied to the same folder?
A. The NTFS permissions will always take precedence.
B. The Share permissions will always take precedence.
C. The system will look at the cumulative Share permissions and the cumulative NTFS
permissions. Whichever set is less restrictive will be applied.
D. The system will look at the cumulative Share permissions and the cumulative NTFS
permissions. Whichever set is more restrictive will be applied.
D . When both NTFS and Share permissions have been applied, the system looks at the
effective rights for NTFS and Share permissions and then applies the most restrictive of
the cumulative permissions. If a resource has been shared, and you access it from the
local computer where the resource resides, then you will be governed only by the NTFS
permissions.
You are the network administrator for a bookstore. You install Windows 7 on a new
computer. Before you connect the computer to the Internet, you want to ensure that the
appropriate features are enabled. You open Windows Security Center and notice that there
are features that require addressing. Which of the following features are not included with
Windows 7?
A. Firewall protection
B. Spyware protection
C. Virus protection
D. Automatic update protection
C . Virus protection is not included with Windows 7 and should be purchased separately.
Windows Firewall, Windows Defender, and Windows Update are included with Windows 7.
You are the Active Directory administrator for your company. A Windows 7 computer
has been purchased for the finance department, and you want to monitor it for unauthorized
access. You configure the Audit Object Access policy to audit both success and failure
events. However, when you look at the security event log a few days later, you do not see
any entries related to file access. What is the most likely reason for this behavior?
A. Auditing has not been enabled for the appropriate files and folders.
B. A conflicting Group Policy setting is overriding your configuration.
C. Another administrator has disabled your Group Policy setting.
D. Object access events are found in the system event log.
A . The most likely reason there are no fi le access entries in the security event log is that you
did not enable auditing for the appropriate fi les and folders. This behavior is true of print
auditing as well.
You are the network administrator for a large organization that has decided to implement
DirectAccess. What are some of the requirements needed to install DirectAccess? Choose
all that apply.
A. Windows Server 2008 R2 running the DirectAccess feature
B. Windows certificate authority server
C. DNS
D. WINS
A, B, C . To implement DirectAccess, your network must have a Windows Server 2008 R2
machine with the DirectAccess feature installed. You must also have a certifi cate authority
(CA) server to issue a certifi cate to the DirectAccess clients. You must also have a domain
controller and DNS server.
You are the network administrator for a midsize company that uses Windows Server 2008
R2 and Windows 7. All Windows 7 machines receive their IP address from DHCP. You
have a Windows 7 machine and need to identify its IPv6 address. How can you accomplish
this task? Choose all that apply.
A. Click Details from the network connection status.
B. Type ipconfig /all at the command prompt.
C. Type ipconfig /view at the command prompt.
D. Choose properties of My Computer.
A, B . You can see what the IPv6 address is by clicking the Details button from the network
connection status or by typing ipconfi g /all . There is no such command as ipconfig /
view , and the My Computer properties will not show IP address confi guration information.
You are hired by friends to set up a network in their home. They have four machines in
their home that are all connected by a router. There is currently no network in place. They
want to be able to share audio and video files among their family members. How can you
set up the network? Choose two.
A. Install a Windows Server 2008 R2 domain controller.
B. Create a HomeGroup.
C. All audio and video files should be moved to the media library.
D. Move all audio and video files to a shared folder on the Windows Server 2008 R2
machine.
B, C . Create a new HomeGroup and set the password. Use that password and join all
computers to the same HomeGroup. By default, all fi les in the media library are available to
all members of the HomeGroup.
You are the network administrator for an organization with two sites (as shown in the
diagram). You need to install a new Windows 7 machine into site 1. Which TCP/IP address
can you assign to the new Windows 7 machine?
Windows Server 2008 R2
192.168.2.98
255.255.224.0
Gateway 192.168.2.97
Windows 7 Machine
192.168.2.33
255.255.255.224
Gateway 192.168.2.62
New Windows 7 Machine
IP address
192.168.2.62/27
Main Branch
Site1
A. 192.168.2.32
B. 192.168.2.31
C. 192.168.2.41
D. 192.168.2.63
C . The company ’ s subnet mask is 255.255.224.0. This subnet mask uses
subnet ranges of 32. So the subnet ’ s layout is 32 – 63, 64 – 95, 96 – 127, 128 – 159, 160 – 191
and 192 – 223. Now when you subnet, you can ’ t use the fi rst or last number of any
range. The fi rst number represents the network ID, and the last number represents the
broadcast. So because the router and the one Windows 7 computer fall within the 32 – 63
range, your new Windows 7 machine must fall within this range. 32 is the network ID
and can ’ t be used, and 63 is the broadcast and can ’ t be used. So the only available
addresses are from 33 – 62, and the only available unused IP address in that range is
192.168.2.41.
You are the network administrator for a large organization that has decided to use
DirectAccess. You have configured all requirements for DirectAccess. You have a Windows
7 machine that is not connecting through DirectAccess. You run an ipconfig and get the
following information:
Ethernet adapter local area connection
Connection - specifi c DNS suffi x: Stellacon.com
IPv4 address: 192.168.20.40
Subnet mask: 255.255.255.0
Default gateway: 192.168.20.1
There are no other confi guration settings for this Windows 7 machine. What needs to be
done fi rst to confi gure this machine to use DirectAccess?
A. Enable IPv6 on the network adapter
B. Remove the connection - specific DNS suffix
C. Remove the default gateway
D. Change the subnet mask
A . IPv6 is a requirement of DirectAccess, and you need to have IPv6 enabled on this
Windows 7 machine.
You are the network administrator for a midsize company that uses both desktops and
laptops. All laptops use Windows 7 and have been connected to a wireless access point.
You disable the service set identifier (SSID), and now your laptops can no longer connect to
the access point. What do you need to do to allow the laptops to connect?
A. Reboot the laptops.
B. Modify the wireless network connection settings on the laptops.
C. Reboot the access point.
D. Disconnect and reconnect the laptops to the domain.
B . You need to change the wireless network connection settings on the laptops to allow
these laptop users to connect to the reconfi gured access point.
You have made a Windows 7 virtual hard disk ( .vhd ) and installed that .vhd onto a
machine. You want to be sure that the machine boots up using the Windows 7 .vhd . What
do you need to modify?
A. Disk Management
B. Fdisk
C. bcdedit
D. boot.ini
C . To allow the Windows 7 .vhd fi le to be the default operating system, you must
confi gure the bcdedit command. The bcdedit command replaced the boot.ini fi le when
Microsoft Vista was released.
ou are the network administrator for a midsize company that uses both desktops and
laptops. All laptops use Windows 7 and have been connected to a wireless access point that
is configured to use Advanced Encryption Standard (AES) security. There is no preshared
password key being used. You need to connect a new Windows 7 laptop to the access point.
How would you set up the security setting on the laptop?
A. WPA2 - Personal
B. WPA2 - Enterprise
C. WPA - Personal
D. WAP security
B . When it comes to WPA, there are two versions: WPA2 - Personal and WPA2 - Enterprise.
WPA2 - Personal allows you to set up WPA2 by using a shared password key. WPA2 -
Enterprise allows you to set up WPA2 by using a server for verifi cation. Because all users
are using AES with no shared password key, WPA2 - Enterprise is the setting that you would
choose.
You are the network administrator for a large organization that uses Windows Server 2008
R2 and Windows 7. You have two Windows 7 machines named Client1 and Client2. You
want to be able to remotely execute commands on Client2 from Client1 ’ s machine. How
can you accomplish this task?
A. Run WinRM quickconfig on Client1
B. Run WinRM quickconfig on Client2
C. Run WinRM execute on Client1
D. Run WinRM execute on Client2
B . The WinRM quickconfig command confi gures a machine to accept WS - Management
commands from a remote machine.
You are the network administrator for a small organization that has decided to switch
the company ’ s TCP/IP subnet mask. They have chosen to use 255.255.255.240. What
do the subnet ranges go by in a 240 subnet mask?
A. 4
B. 8
C. 16
D. 32
C . On a 240 subnet mask, the ranges go by 16. Because this is a Class C, the ranges would
be 16 – 31, 32 – 47, 48 – 63, 64 – 79, 80 – 95, 96 – 111, 112 – 127, 128 – 143,
144 – 159, 160 – 175, 176 – 191, 192 – 207, 208 – 223, and 224 – 239. Now remember, in a Class
C address, these are not all usable. You have to subtract the fi rst number (network ID) and
the last number (broadcast).
You have two DHCP servers on your network. Your computer accidentally received the
wrong IP and DNS server configuration from a DHCP server that was misconfigured.
The DHCP server with the incorrect configuration has been disabled. What commands
could you use to release and renew your computer ’ s DHCP configuration? Choose two.
A. ipconfig /release
B. ipconfig /registerdhcp
C. ipconfig /renew
D. ipconfig /flushdhcp
C . Because the fi rst octet starts with 192, it ’ s a Class C. If the fi rst octet starts with 1 – 126,
it ’ s a Class A. 128 – 191 is a Class B, and 192 – 223 is a Class C.
You are the network administrator for your company. Your service provider has
assigned you the network address 192.168.154.0. You have been granted the entire range to
use. What class of address have you been assigned?
A. Class A
B. Class B
C. Class C
D. Class D
C . The default gateway is the router ’ s IP address. The default gateway allows you to get
from your subnet to another subnet.
You are the network administrator for your company. After configuring a new computer
and connecting it to the network, you discover that you cannot access any of the computers
on the remote subnet by IP address. You can access some of the computers on the local
subnet by IP address. What is the most likely problem?
A. Incorrectly defined IP address
B. Incorrectly defined subnet mask
C. Incorrectly defined default gateway
D. Incorrectly defined DNS server
D . The DNS server turns a host name into an IP address so you can connect to a machine
by the machine name. If you can connect to a machine by using the TCP/IP address but not
the name, DNS is the issue
You have a Windows 7 machine that needs to have a static TCP/IP address. You assign the
IP address to the machine and you now want to register the computer with DNS. How can
you do this from the Windows 7 machine?
A. ipconfig /renewDNS
B. ipconfig /flushDNS
C. ipconfig /DNS
D. ipconfig /registerDNS
D . Ipconfig /registerDNS will automatically register the Windows 7 machine with the
DNS server. The registration will include the Windows 7 machine name and the IP address.
You are the network administrator for a large organization that has just opened a new site
location. The new site location has a slow link between the site and the main office. What
can you implement to help with the slower link between the main site and the remote site?
A. BranchCache
B. SiteCache
C. LinkCache
D. BranchLink
A . BranchCache enables an organization with slower links between offi ces to cache data so
that downloads between offi ces do not have to occur each time a fi le is accessed.
You need to set up a Windows 7 machine for testing and training. You want to set this
Windows 7 machine up on an XP machine and you want to keep the XP machine as the
primary operating system. What utility can you use to create a Windows 7 testing and
training environment?
A. Microsoft Hyper - V
B. Windows Virtual PC
C. Microsoft Virtual Server
D. Microsoft Virtualization Server
B . Windows Virtual PC is a client version of virtualization software. Microsoft Hyper - V
and Microsoft Virtual Server are both virtualization software that require the Windows
Server operating system. Because you are running Windows XP, you would
use Windows Virtual PC.
You are the network administrator for a large organization that has implemented a new
site. All machines in the remote site are Windows 7. The new site link is slow, and you want
to implement BranchCache. You do not want to implement a BranchCache server in the
remote location. How would you configure BranchCache?
A. Hosted mode
B. Distributed cache mode
C. Shared mode
D. Server mode
B . There are only two types of BranchCache modes: hosted and distributed cache. Hosted
mode requires a BranchCache server in the remote location, and distributed
cache mode uses the Windows 7 machines in the remote locations as distribution points.
You are the network administrator for a small organization. Your organization has
implemented Windows 7 on all client machines. You want to implement another line of
security on the Windows 7 machine so unauthorized users can ’ t access the machines. What
can you implement on the Windows 7 machines?
A. Windows Data Protection
B. Windows Encryption Protection
C. Windows Firewall
D. Windows Secure Data Protocol
C . Windows Firewall, which is included with Windows 7, helps to prevent unauthorized
users or malicious software from accessing your computer. Windows Firewall does not
allow unsolicited traffi c (traffi c that was not sent in response to a request) to pass through
the fi rewall.
You are the network administrator for a large organization with many laptop users who
go on the road. You want these users to be able to connect to the network without using a
VPN or taking over the server console. What can you implement?
A. DirectAccess
B. Remote Access
C. Remote Desktop
D. Remote Server
A . DirectAccess enables remote users to work on their corporate network when they are
away from the offi ce without the need of a VPN. As long as the remote user is connected
to the Internet, DirectAccess will automatically connect the remote user to the corporate
network without the need of any user intervention.
You are the network manager for a small company. You have a junior IT administrator who
did some installations last week on a Windows 7 machine. How can you see what applications
were installed last week on the Windows 7 machine?
A. View the informational events of Reliability Monitor.
B. Open Control Panel, Add/Remove programs.
C. Check Event Viewer system logs.
D. View the data collector sets.
A. By viewing the informational events of Reliability Monitor, you will be able to see
which application got installed by the installation date.
You are the network administrator for Stellacon Corporation. Users in the sales department
have been complaining that the Sales application is slow to load. Using Performance Monitor,
you create a baseline report for one of the computers, monitoring memory, the processor,
the disk subsystem, and the network subsystem. You notice that the disk subsystem has
a high load of activity. What other subsystem should you monitor before you can know for
sure whether you have a disk subsystem bottleneck?
A. Memory
B. Processor
C. Network
D. Application
A. You should check the memory counters. If your computer does not have enough memory,
it can cause excessive paging, which may be perceived as a disk subsystem bottleneck.
Your accounting department runs a processor - intensive application and you are trying to
determine whether their current computers need to have the processors upgraded. You load
a test computer with a configuration identical to the production computers ’ and run a program
that simulates a typical user ’ s workload. You monitor the Processor  % Processor
Time counter. What average value for this counter would indicate a processor bottleneck?
A. Over 5 percent
B. Over 50 percent
C. Over 60 percent
D. Over 85 percent
D . If the average Processor  % Processor Time counter is consistently above 85 percent, a
processor bottleneck may be indicated. Normally this number will spike up and down over
time. A spike over 85 percent is not necessarily alarming. If the average is over 85 percent,
then a bottleneck is indicated and a second processor or a faster one should be installed.
You are the network administrator for a large corporation. The accounting department
requires that a specific application, STELLAPP.EXE , be run every day to create daily reports
on accounting activity. The application needs to be run at 6 p.m. on Monday through
Friday. The accounting manager has asked you to automate the process so reports are
generated on the specified schedule without any user interaction. Which Windows 7 utility
should you use?
A. Task Scheduler
B. Automated Scheduler
C. Task Manager
D. Task Automater
A . To automate scheduled tasks, you use Task Scheduler. You can schedule tasks to be run
based on the schedule you specify and the user account that should be used to run the task.
5. You are the network administrator for a large company. The payroll manager has Windows
7 installed on her desktop computer. The computer has the following configuration:
■ Dual Pentium 4 processors
■ 1 GB of RAM
■ Two physical SCSI disks
■ Disk 0 has volume C:
■ Disk 1 has volume D:
■ 1.5 GB page file on partition C:
■ 100 Mbps Fast Ethernet NIC
The payroll manager requires the use of a database application. She has come to you to
report that when the database application is running, the computer slows down very
signifi cantly, and she is unable to run any other applications. You run Reliability and
Performance Monitor on her computer and record the following information when the
database application is running:
■ Sustained processor utilization is at 100 percent for both processors.
■ There are a significant number of hard page faults.
When you record the data for the computer when the database application is not
running, you record the following information:
■ Average processor utilization is at 30 percent.
■ There are a significant number of hard page faults.
The database application is critical to the fi nance manager ’ s job. In order to be able
to better manage her productivity, which two of the following actions will have the
greatest impact on optimizing her computer ’ s performance? Choose two.
A. Upgrade the processors in her computer.
B. Add memory to the computer.
C. Split the page file over D: and E:.
D. Increase the page file to 3 GB.
A, B . The greatest improvement in performance for this computer can be obtained by
upgrading the processors and adding more physical RAM. Because the database application
is using 100 percent processor utilization over a sustained period, you need to upgrade
the processors. The hard page faults indicate that you also have a memory bottleneck.
Although moving or increasing the page fi le might have an impact on performance, neither
would have as large an impact as adding more physical memory.
You are the network administrator for an organization that has decided to migrate to
Windows 7. Part of your job requires that you are able to complete the following:
■ Collect data from the local or remote Windows 7 computers on the network. You
can collect data from a single computer or multiple computers concurrently.
■ View data as it is being collected in real time, or historically from collected data.
Which Windows 7 application can you use to achieve your task?
A. Event Viewer
B. Computer Monitor
C. Windows 7 Monitor
D. Performance Monitor
D . Performance Monitor enables you to collect data from your local computer or remote
Windows 7 machine, from a single computer or multiple computers concurrently; view data
as it is being collected in real time, or historically from collected data; have full control over
the selection of what data will be collected, by selecting which specifi c objects and counters
will be collected; choose the sampling parameters that will be used, meaning the time
interval that you want to use for collecting data points and the time period that will be used
for data collection.
You are the network administrator for a large organization. You are running Windows 7
machines throughout your network along with Windows Server 2008 R2. You need to use
Event Viewer to review event logs for Critical and Error events only. You need to see all of
these events from the logs. What do you do to achieve this?
A. Use the Administrative Events view.
B. Create a custom view and choose Administrative Events.
C. Do a search on the system log for all of these events.
D. Create a custom view and select Critical, Error, and Verbose for all logs.
D . You would have to create a custom view to achieve this task. You could not use the
Administrative Events view (default custom view) because it also includes all warnings.
You are the network administrator for an organization that runs Windows Server 2008
R2 and Windows 7. You are asked by your IT manager to collect performance data on a
Windows 7 machine, for a period of three weeks. The IT manager wants CPU utilization,
disk utilization, and memory utilization all included in the data collected. How should you
accomplish this?
A. Create a user - defined data collector set.
B. Create a custom performance set.
C. Create a trace event.
D. Create a session data collector set.
A . Data collector sets are used to collect data into a log so the data can be reviewed.
You can view the log fi les with Performance Monitor.
While using Performance Monitor, you use the following output mode.Which output mode are you using?
A. Histogram bar view
B. Graph view
C. Report view
D. Line view
D . The graphic is an example of a line view output. The three options are line view,
histogram bar view, and report view.
While using Performance Monitor, you use the following output mode.
Which output mode are you using?
A. Histogram bar view
B. Graph view
C. Report view
D. Line view
A . The graphic is an example of a histogram bar view output. The three options are line
view, histogram bar view, and report view.
You are the network administrator for a large organization that uses both Windows Server
2008 R2 and Windows 7. One of the Windows 7 machines needs to be backed up daily.
You perform an image backup on the Windows 7 machine. The Windows 7 machine then
gets struck by a virus and will not start up properly. What can you do to get the Windows 7
machine up and running the fastest possible way?
A. Because of the virus, the best thing is to rebuild the machine from scratch.
B. Start the computer from the Windows 7 DVD and then use the System Image
Recovery tool.
C. Start the computer from the Windows 7 DVD and then use the Image Restore utility.
D. Use a Windows 7 boot disk and run the Image Restore utility.
B. After starting the machine with the Windows 7 DVD, you can use the System Image
Recovery tool to reload the backup image that you created.
You need to back up Windows 7, but the backup must be backed up to a local disk drive.
When you start the backup, you see the following screen:
What action do you need to perform?
A. Log on as the backup administrator.
B. Log on as the system administrator.
C. Add a local hard disk to the machine by using Computer Management and then run
the backup again.
D. Run the backup utility in protected mode.
C. When you are using the backup utility and no local disks are present, you must either
confi gure an installed disk or physically install a hard disk before running the backup utility.
You can also save your backups to a network location.
You are the system administrator for a large organization that uses Windows Server R2 and
Windows 7. You have a Windows 7 machine and have enabled System Protection. You want
the machine to retain only the last System Protection snapshot that was taken. What should
you do?
A. Run Disk Cleanup for System Restore and then run Shadow Copies.
B. Disable Shadow Copies and run System Protection.
C. Set the Keep Only Last Shadow Copy option in System Protection.
D. Enable Shadow Copies and then set the Keep Only Last Shadow Copy option.
A. You have to run the Disk Cleanup utility to delete the previous versions
and then run Shadow Copies in System Protection. There is no Keep Only Last Shadow
Copy option.
You are the network administrator for a small company. You manage the computers for the
marketing department, all of which are running the Windows 7 operating system. You are
making several configuration changes to the manager ’ s computer to enhance performance.
Before you make any changes, you want to create a restore point that can be used if any
problems arise. How do you manually create a restore point?
A. By using the System Restore utility
B. By using the System Protection tab of the System Properties dialog box
C. By using the System Configuration utility
D. By using the Startup Repair tool
B. To manually create a restore point or to restore your computer to a previous restore
point, you use the System Protection tab of the System Properties dialog box. Although
System Restore uses restore points, you do not use the System Restore utility to create a
restore point.
Your computer uses a SCSI adapter that supports a SCSI drive, which contains your
Windows 7 system and boot partitions. After updating the SCSI driver, you restart
your computer, but Windows 7 will not load. You need to get this computer up and running
as quickly as possible. Which of the following repair strategies should you try first to
correct your problem?
A. Restore your computer ’ s configuration with your last backup.
B. Boot your computer with the Last Known Good Configuration.
C. Boot your computer with the Safe Mode option.
D. Boot your computer to the Recovery Console and manually copy the old driver back to
the computer.
B. If you need to get a stalled computer up and running as quickly as possible, you should
start with the Last Known Good Confi guration option. This option is used when you ’ ve
made changes to your computer ’ s hardware confi guration and are having problems restarting.
The Last Known Good Confi guration will revert to the confi guration used the last time
the computer was successfully booted. Although this option helps overcome confi guration
errors, it will not help for hardware errors.
You are about to install a new driver for your CD - ROM drive, but you are not 100 percent
sure that you are using the correct driver. Which of the following options will allow you to
most easily return your computer to the previous state if the new driver is not correct?
A. Safe Mode
B. Roll Back Driver
C. System Restore utility
D. Startup Repair Tool
B. The Roll Back Driver option is the easiest way to roll back to a known good driver. You
could also use the System Restore utility to roll back your computer to a known restore
point if you make harmful changes to your computer, but Driver Rollback is easier and
faster.
After you updated Will ’ s computer, his system files became corrupted due to a virus and now
need to be restored. Which of the following processes should you use to fix the problem?
A. Restore a backup.
B. Restore an image.
C. Use the Startup Repair tool.
D. Boot to Safe mode.
C. To quickly repair the system fi les, you can use the Startup Repair tool. You can restore
an image by using the Backup And Repair Center, but it is faster to use the Startup Repair
tool. Additionally, you will not lose any personal fi les by using the Startup Repair tool.
Alternatively, you could try to use System Restore to go back to a previous checkpoint.
You are unable to boot your Windows 7 computer, so you decide to boot the computer to
Safe mode. Which of the following statements regarding Safe mode is false?
A. When the computer is booted to Safe mode, there is no network access.
B. Safe mode loads all the drivers for the hardware that is installed on the computer.
C. When you run Safe mode, boot logging is automatically enabled.
D. When you run Safe mode, the screen resolution is set to 8030 × 600.
B. When you run your computer in Safe mode, you simplify your Windows 7
confi guration. Only the drivers that are needed to get the computer up and running
are loaded.
You have been having problems with your Windows 7 computer. You decide to start the
computer by using the Enable Boot Logging option on the Advanced Boot Options menu.
Where can you find the log file that is created?
A. \Windows\ntbtlog.txt
B. \Windows\System32\ntbtlog.txt
C. \Windows\ntboot.log
D. \Windows\System32\ntboot.log
A. When you enable boot logging, the fi le created is \ Windows\ntbtlog.txt . This log fi le
is used to troubleshoot the boot process.
You have purchased a new computer with Windows 7 installed. After modifying the
system so that it is configured just how you want it, you want to back up the system so
that if anything happens, you can restore the files and settings. Which of the following
should you do?
A. Back up your files by using the Back Up Files button in the Backup And Restore Center.
B. Create an image of your computer by using the Create An Image link in the Backup
And Restore Center.
C. Use the System Repair tool to take an image of your computer.
D. Use Shadow Copies to create a previous version of the files.
B. You should create an image of your computer by using the Create An Image link in the
Backup And Restore Center. Images back up everything on your computer. File backups
cannot be used to back up system fi les and settings.
You have a computer that runs Windows 7. You upgrade the network adapter driver on the
computer. After the upgrade, you can no longer access network resources. You open Device
Manager and see a warning symbol next to the network adapter. You need to restore access
to network resources. What should you do?
A. Roll back the network adapter driver.
B. Assign a static IP address to the network adapter.
C. Disable the network adapter and scan for hardware changes.
D. Uninstall the network adapter and scan for hardware changes.
A. The Roll Back Driver option is the fastest way to return the driver to the previous
version. You could also use System Restore, but Driver Rollback is easier and faster.
You need to back up the existing data on a computer before you install a new application. You
also need to ensure that you are able to recover individual user files that are replaced or deleted
during the installation. What should you do?
A. Create a System Restore point.
B. Perform an Automated System Recovery (ASR) backup and restore.
C. In the Backup And Restore Center window, click the Back Up Now button.
D. In the Backup And Restore Center window, click the Back Up Computer button.
C. The Backup Now button allows you to start a backup and confi gure a Windows 7
backup.
Your data recovery strategy must meet the following requirements:
■ Back up all data files and folders in C:\Data .
■ Restore individual files and folders in C:\Data .
■ Ensure that data is backed up to and restored from external media.
What should you do?
A. Use the Previous Versions feature to restore the files and folders.
B. Use the System Restore feature to perform backup and restore operations.
C. Use the NTBackup utility to back up and restore individual files and folders.
D. Use the Backup And Restore Center to back up and restore files.
D. If you need to back up and restore your Windows 7 machine, you need to use the
Windows 7 Backup And Restore Center.
You need to ensure that you can recover system configuration and data if your computer
hard disk fails. What should you do?
A. Create a system restore point.
B. Create a backup of all file categories.
C. Create a Complete PC Backup and Restore image.
D. Perform an Automated System Recovery (ASR) backup.
C. Using images allows you to back up and restore your entire Windows 7 machine instead
of just certain parts of data.
You have a computer that runs Windows 7. You upgrade the network adapter driver on the
computer. After the upgrade, you can no longer access network resources. You open Device
Manager and see a warning symbol next to the network adapter. You need to restore access
to network resources. What should you do?
A. Roll back the network adapter driver.
B. Assign a static IP address to the network adapter.
C. Disable the network adapter and scan for hardware changes.
D. Uninstall the network adapter and scan for hardware changes.
A. The Roll Back Driver option is the fastest way to return the driver to the previous
version. You could also use System Restore, but Driver Rollback is easier and faster.
You have a computer that runs Windows 7. Your computer has two volumes, C: and
D:. Both volumes are formatted by using the NTFS file system. You need to disable
previous versions on the D: volume. What should you do?
A. From System Properties, modify the System Protection settings.
B. From the properties of the D: volume, modify the Quota settings.
C. From the properties of the D: volume, modify the Sharing settings.
D. From the Disk Management snap - in, convert the hard disk drive that contains the
D: volume to Dynamic.
A. If you need to disable previous versions on the D: volume, this needs to be done from
the System Protection settings from the computer system properties.
You need to back up the existing data on a computer before you install a new application. You
also need to ensure that you are able to recover individual user files that are replaced or deleted
during the installation. What should you do?
A. Create a System Restore point.
B. Perform an Automated System Recovery (ASR) backup and restore.
C. In the Backup And Restore Center window, click the Back Up Now button.
D. In the Backup And Restore Center window, click the Back Up Computer button.
C. The Backup Now button allows you to start a backup and confi gure a Windows 7
backup.
You have a computer that runs Windows 7. You configure a backup job to back up all files
and folders on an external NTFS file system hard disk drive. The backup job fails to back
up all files that have the encryption attribute set. You need to back up all encrypted files.
The backed up files must remain encrypted. What should you do?
A. Manually copy the encrypted files to the external hard disk drive.
B. Schedule a backup job to occur when you are not logged on to the computer.
C. Enable Volume Shadow Copy on the external drive and schedule a backup job.
D. Add the certificate of the local administrator account to the list of users who can
transparently access the files, and schedule a backup job.
A. You have to manually copy all the encrypted fi les because the backup software will not
work with the encrypted fi les in Windows 7.
Your data recovery strategy must meet the following requirements:
■ Back up all data files and folders in C:\Data .
■ Restore individual files and folders in C:\Data .
■ Ensure that data is backed up to and restored from external media.
What should you do?
A. Use the Previous Versions feature to restore the files and folders.
B. Use the System Restore feature to perform backup and restore operations.
C. Use the NTBackup utility to back up and restore individual files and folders.
D. Use the Backup And Restore Center to back up and restore files.
D. If you need to back up and restore your Windows 7 machine, you need to use the
Windows 7 Backup And Restore Center.
You have a computer that runs Windows 7. You use Windows Complete PC Backup and
Restore to create a backup image. You need to perform a complete restore of the computer.
What are two possible ways to begin the restore? (Each correct answer presents a complete
solution. Choose two.)
A. Open the Windows Backup And Restore Center and click Advanced Restore.
B. Open the Windows Backup And Restore Center and click Restore Computer.
C. Start your computer. From the Advanced Boot Options menu, select Repair Your
Computer.
D. Start the computer by using the Windows 7 installation media. Select Repair Your
Computer.
C, D. There are two ways to repair system fi les on Windows 7. You can do it by using
the installation CD and choosing Repair during the installation or you can boot to the
advanced options and select Repair.
You need to ensure that you can recover system configuration and data if your computer
hard disk fails. What should you do?
A. Create a system restore point.
B. Create a backup of all file categories.
C. Create a Complete PC Backup and Restore image.
D. Perform an Automated System Recovery (ASR) backup.
C. Using images allows you to back up and restore your entire Windows 7 machine instead
of just certain parts of data.
You have a computer that runs Windows 7. You upgrade the network adapter driver on the
computer. After the upgrade, you can no longer access network resources. You open Device
Manager and see a warning symbol next to the network adapter. You need to restore access
to network resources. What should you do?
A. Roll back the network adapter driver.
B. Assign a static IP address to the network adapter.
C. Disable the network adapter and scan for hardware changes.
D. Uninstall the network adapter and scan for hardware changes.
A. The Roll Back Driver option is the fastest way to return the driver to the previous
version. You could also use System Restore, but Driver Rollback is easier and faster.
You are the network administrator for your organization. You are asked by a junior
administrator when he should create restore points. Which of the following are times when
restore points should be created? Choose all that apply.
A. Weekly
B. Before installing applications or drivers
C. Before significant system events
D. Before System Restore is used to restore files (so you can undo the changes if necessary)
A, B, C, D. Restore points allow you to bring your system back to a previous point in time,
and they should be created at all of the times listed.
You have a computer that runs Windows 7. Your computer has two volumes, C: and
D:. Both volumes are formatted by using the NTFS file system. You need to disable
previous versions on the D: volume. What should you do?
A. From System Properties, modify the System Protection settings.
B. From the properties of the D: volume, modify the Quota settings.
C. From the properties of the D: volume, modify the Sharing settings.
D. From the Disk Management snap - in, convert the hard disk drive that contains the
D: volume to Dynamic.
A. If you need to disable previous versions on the D: volume, this needs to be done from
the System Protection settings from the computer system properties.
You install Windows 7 on a new computer. You update the video card driver and restart
the computer. When you start the computer, the screen flickers and then goes blank. You
restart the computer and receive the same result. You need to configure the video card
driver. What should you do first?
A. Restart the computer in Safe mode.
B. Restart the computer in Debugging mode.
C. Restart the computer in low - resolution video mode.
D. Insert the Windows 7 installation media into the computer, restart, and use System
Recovery to perform a startup repair.
A. Starting the computer in Safe mode loads the basic VGA drivers and allows you to fi x
any video issues including using the Driver Rollback utility.
You have a computer that runs Windows 7. You configure a backup job to back up all files
and folders on an external NTFS file system hard disk drive. The backup job fails to back
up all files that have the encryption attribute set. You need to back up all encrypted files.
The backed up files must remain encrypted. What should you do?
A. Manually copy the encrypted files to the external hard disk drive.
B. Schedule a backup job to occur when you are not logged on to the computer.
C. Enable Volume Shadow Copy on the external drive and schedule a backup job.
D. Add the certificate of the local administrator account to the list of users who can
transparently access the files, and schedule a backup job.
A. You have to manually copy all the encrypted fi les because the backup software will not
work with the encrypted fi les in Windows 7.
You need to back up the existing data on a computer before you install a new application. You
also need to ensure that you are able to recover individual user files that are replaced or deleted
during the installation. What should you do?
A. Create a System Restore point.
B. Perform an Automated System Recovery (ASR) backup and restore.
C. In the Backup And Restore Center window, click the Back Up Now button.
D. In the Backup And Restore Center window, click the Back Up Computer button.
C. The Backup Now button allows you to start a backup and confi gure a Windows 7
backup.
You are asked by your managers to start a Windows 7 machine to allow for Kernel
Debugging. How would you start the machine?
A. Advanced options, Kernel Mode
B. Advanced options, Debugging Mode
C. Advanced options, Kernel Debugging Mode
D. Advanced options, Safe Mode
B. Debugging mode runs the Kernel Debugger. The Kernel Debugger is an advanced
troubleshooting utility.
You have a computer that runs Windows 7. You use Windows Complete PC Backup and
Restore to create a backup image. You need to perform a complete restore of the computer.
What are two possible ways to begin the restore? (Each correct answer presents a complete
solution. Choose two.)
A. Open the Windows Backup And Restore Center and click Advanced Restore.
B. Open the Windows Backup And Restore Center and click Restore Computer.
C. Start your computer. From the Advanced Boot Options menu, select Repair Your
Computer.
D. Start the computer by using the Windows 7 installation media. Select Repair Your
Computer.
C, D. There are two ways to repair system fi les on Windows 7. You can do it by using
the installation CD and choosing Repair during the installation or you can boot to the
advanced options and select Repair.
Your data recovery strategy must meet the following requirements:
■ Back up all data files and folders in C:\Data .
■ Restore individual files and folders in C:\Data .
■ Ensure that data is backed up to and restored from external media.
What should you do?
A. Use the Previous Versions feature to restore the files and folders.
B. Use the System Restore feature to perform backup and restore operations.
C. Use the NTBackup utility to back up and restore individual files and folders.
D. Use the Backup And Restore Center to back up and restore files.
D. If you need to back up and restore your Windows 7 machine, you need to use the
Windows 7 Backup And Restore Center.
You need to ensure that you can recover system configuration and data if your computer
hard disk fails. What should you do?
A. Create a system restore point.
B. Create a backup of all file categories.
C. Create a Complete PC Backup and Restore image.
D. Perform an Automated System Recovery (ASR) backup.
C. Using images allows you to back up and restore your entire Windows 7 machine instead
of just certain parts of data.
You are the network administrator for your organization. You are asked by a junior
administrator when he should create restore points. Which of the following are times when
restore points should be created? Choose all that apply.
A. Weekly
B. Before installing applications or drivers
C. Before significant system events
D. Before System Restore is used to restore files (so you can undo the changes if necessary)
A, B, C, D. Restore points allow you to bring your system back to a previous point in time,
and they should be created at all of the times listed.
You have a computer that runs Windows 7. Your computer has two volumes, C: and
D:. Both volumes are formatted by using the NTFS file system. You need to disable
previous versions on the D: volume. What should you do?
A. From System Properties, modify the System Protection settings.
B. From the properties of the D: volume, modify the Quota settings.
C. From the properties of the D: volume, modify the Sharing settings.
D. From the Disk Management snap - in, convert the hard disk drive that contains the
D: volume to Dynamic.
A. If you need to disable previous versions on the D: volume, this needs to be done from
the System Protection settings from the computer system properties.
You install Windows 7 on a new computer. You update the video card driver and restart
the computer. When you start the computer, the screen flickers and then goes blank. You
restart the computer and receive the same result. You need to configure the video card
driver. What should you do first?
A. Restart the computer in Safe mode.
B. Restart the computer in Debugging mode.
C. Restart the computer in low - resolution video mode.
D. Insert the Windows 7 installation media into the computer, restart, and use System
Recovery to perform a startup repair.
A. Starting the computer in Safe mode loads the basic VGA drivers and allows you to fi x
any video issues including using the Driver Rollback utility.
You are asked by your managers to start a Windows 7 machine to allow for Kernel
Debugging. How would you start the machine?
A. Advanced options, Kernel Mode
B. Advanced options, Debugging Mode
C. Advanced options, Kernel Debugging Mode
D. Advanced options, Safe Mode
B. Debugging mode runs the Kernel Debugger. The Kernel Debugger is an advanced
troubleshooting utility.
You have a computer that runs Windows 7. You configure a backup job to back up all files
and folders on an external NTFS file system hard disk drive. The backup job fails to back
up all files that have the encryption attribute set. You need to back up all encrypted files.
The backed up files must remain encrypted. What should you do?
A. Manually copy the encrypted files to the external hard disk drive.
B. Schedule a backup job to occur when you are not logged on to the computer.
C. Enable Volume Shadow Copy on the external drive and schedule a backup job.
D. Add the certificate of the local administrator account to the list of users who can
transparently access the files, and schedule a backup job.
A. You have to manually copy all the encrypted fi les because the backup software will not
work with the encrypted fi les in Windows 7.
You have a computer that runs Windows 7. You use Windows Complete PC Backup and
Restore to create a backup image. You need to perform a complete restore of the computer.
What are two possible ways to begin the restore? (Each correct answer presents a complete
solution. Choose two.)
A. Open the Windows Backup And Restore Center and click Advanced Restore.
B. Open the Windows Backup And Restore Center and click Restore Computer.
C. Start your computer. From the Advanced Boot Options menu, select Repair Your
Computer.
D. Start the computer by using the Windows 7 installation media. Select Repair Your
Computer.
C, D. There are two ways to repair system fi les on Windows 7. You can do it by using
the installation CD and choosing Repair during the installation or you can boot to the
advanced options and select Repair.
You are the network administrator for your organization. You are asked by a junior
administrator when he should create restore points. Which of the following are times when
restore points should be created? Choose all that apply.
A. Weekly
B. Before installing applications or drivers
C. Before significant system events
D. Before System Restore is used to restore files (so you can undo the changes if necessary)
A, B, C, D. Restore points allow you to bring your system back to a previous point in time,
and they should be created at all of the times listed.
You install Windows 7 on a new computer. You update the video card driver and restart
the computer. When you start the computer, the screen flickers and then goes blank. You
restart the computer and receive the same result. You need to configure the video card
driver. What should you do first?
A. Restart the computer in Safe mode.
B. Restart the computer in Debugging mode.
C. Restart the computer in low - resolution video mode.
D. Insert the Windows 7 installation media into the computer, restart, and use System
Recovery to perform a startup repair.
A. Starting the computer in Safe mode loads the basic VGA drivers and allows you to fi x
any video issues including using the Driver Rollback utility.
You are asked by your managers to start a Windows 7 machine to allow for Kernel
Debugging. How would you start the machine?
A. Advanced options, Kernel Mode
B. Advanced options, Debugging Mode
C. Advanced options, Kernel Debugging Mode
D. Advanced options, Safe Mode
B. Debugging mode runs the Kernel Debugger. The Kernel Debugger is an advanced
troubleshooting utility.