42
Configuring Windows 7 Question Number (ID): 1 (680P_1.2_03) You want to upgrade a computer running the x64 version of Windows Vista Enterprise SP1 to Windows 7.To which of the following Windows 7 versions and editions can you upgrade? (Each correct answer presents a complete solution. Choose two.) 1. Windows 7 Ultimate x64 <Correct> 2. Windows 7 Enterprise x86 3. Windows 7 Ultimate x86 4. Windows 7 Enterprise x64 <Correct> 5. »Windows 7 Home Premium x64 6. Windows 7 Home Premium x86 7. Windows 7 Professional x86 8. »Windows 7 Professional x64 Question Number (ID): 2 (680P_2.4_05) Which of the following tools can you use to convert an operating system ¡mage, captured using ImageX, into a bootable virtual hard disk (VHD) file? 1. ImageX.exe 2. Dism.exe 3. »Bcdedit.exe 4. WIM2VHD.wsf <Correct> Question Number (ID): 3 (680P_3.2_08) Your organization is in the process of preparing the deployment of Windows 7 Enterprise. You will be migrating from Windows XP. There are five applications that people in your organization use on their computers running Windows XP that do not run on Windows 7. You have been unable to develop compatibility modes for these applications using the Application Compatibility Toolkit. Which of the following solutions should you use to deploy these applications to the computers running Windows 7 without compromising security? 1. Deploy Windows XP Mode and install the applications on the virtual machine. <Correct> 2. Disable User Account Control (UAC).

Configuring Windows 7

  • Upload
    jugu85

  • View
    962

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Configuring Windows 7

Configuring Windows 7

Question Number (ID): 1 (680P_1.2_03)

You want to upgrade a computer running the x64 version of Windows Vista Enterprise SP1 to Windows 7.To which

of the following Windows 7 versions and editions can you upgrade? (Each correct answer presents a complete

solution. Choose two.)

1. Windows 7 Ultimate x64 <Correct>

2. Windows 7 Enterprise x86

3. Windows 7 Ultimate x86

4. Windows 7 Enterprise x64 <Correct>

5. »Windows 7 Home Premium x64

6. Windows 7 Home Premium x86

7. Windows 7 Professional x86

8. »Windows 7 Professional x64

Question Number (ID): 2 (680P_2.4_05)

Which of the following tools can you use to convert an operating system ¡mage, captured using ImageX, into a

bootable virtual hard disk (VHD) file?

1. ImageX.exe

2. Dism.exe

3. »Bcdedit.exe

4. WIM2VHD.wsf <Correct>

Question Number (ID): 3 (680P_3.2_08)

Your organization is in the process of preparing the deployment of Windows 7 Enterprise. You will be migrating

from Windows XP.

There are five applications that people in your organization use on their computers running Windows XP that do

not run on Windows 7. You have been unable to develop compatibility modes for these applications using the

Application Compatibility Toolkit.

Which of the following solutions should you use to deploy these applications to the computers running Windows 7

without compromising security?

1. Deploy Windows XP Mode and install the applications on the virtual machine. <Correct>

2. Disable User Account Control (UAC).

Page 2: Configuring Windows 7

3. »Run the applications with Administrative credentials.

4. Install the applications natively on a server running Windows Server 2008 R2 Remote Desktop.

Question Number (ID): 4 (680P_1.3_04)

You have 20 computers running Windows Vista that are about to be decommissioned and replaced with 20

computers running Windows 7. Encrypting File System is used extensively within your organization.

Which of the following tools can you use to transfer user settings and encrypted documents from the computers

that you will decommission to the computers that will serve as replacements so that users can still access their

content? (Each correct answer presents a complete solution. Choose two.)

1. Bcdedit.exe

2. »Windows Easy Transfer <Correct>

3. Robocopy.exe

4. Xcopy.exe

5. »User State Migration Tool (USMT) <Correct>

Question Number (ID): 5 (680P_2.4_03)

Which of the following tools can you use to ensure that a virtual hard disk (VHD) that has Windows 7 Enterprise

installed is kept up to date with software updates while offline? (Each correct answer presents part of the solution.

Choose two.)

1. »System Center Virtual Machine Manager 2008 <Correct>

2. System Center Operations Manager 2007

3. System Center Data Protection Manager 2007

4. »Offline Virtual Machine Servicing Tool <Correct>

5. Dism.exe

Question Number (ID): 6 (680P_2.1_03)

You have prepared a computer running Windows 7 with a specific configuration that is appropriate for your

organization's network environment. You will be using Windows Deployment Services (WDS) to deploy an image

based on this configuration to future clients on your network.

Page 3: Configuring Windows 7

Which type of image can you use to create a Windows Image (WIM) file of the prepared computer running

Windows 7 and transfer it to the WDS server?

1. Install image

2. »Boot-only image

3. Discover image

4. Capture image <Correct>

Question Number (ID): 7 (680P_1.2_02)

You have a group of computers running Windows Vista RTM. All computers are members of a Windows Server

2008 domain. You want to upgrade these computers to Windows 7.

Which of the following steps should you take on each of these computers prior to attempting the upgrade?

1. Run sysprep/oobe.

2. Remove the computers from the Windows Server 2008 domain.

3. Install Windows Vista SP1. <Correct>

4. »Run Bootcfg.exe.

Question Number (ID): 8 (680P_3.2_02)

An older application purchased for computers in your organization that ran Microsoft Windows NT 4.0 exhibits

problems when run on a computer that has Windows 7 Enterprise installed. The application appears to execute

but has problems displaying. When you configure the computer to use the Windows 7 Basic display theme rather

than Aero, the application displays properly. You want to allow users to use the Aero user interface (Ul) in general

but have it disabled while this particular application is executing. Which of the following compatibility settings

should you configure to accomplish this goal?

1. Configure the application to run in Windows NT 4.0 SP5 compatibility mode.

Page 4: Configuring Windows 7

2. »Configure the application to run in Windows XP SP2 compatibility mode.

3. Enable Disable Desktop Composition. <Correct>

4. Configure the application to run with the Administrator privilege level.

Question Number (ID): 9 (680P_2.3_04)

You have configured a large USB storage device so that when it is connected to a computer configured to boot

from USB, the computer boots into the Windows PE environment. The large USB device hosts a customized

Windows Image (WIM) file named Win7image.wim.

Which of the following tools can you use to apply this image to the hard disk drive of a computer that you have

booted using the large USB storage device?

1. »lmagex.exe <Correct>

2. Bcdedit.exe

3. Dism.exe

4. Sysprep.exe

Question Number (ID): 10 (680P_2.3_02)

You are attempting to install Windows 7 from a customized image hosted on a Windows Deployment Services

(WDS) server. The computer that you are attempting the install on has a Preboot Execution Environment (PXE)-

compliant network card. When you tum on the computer, you receive a message that no operating system is

present.

Which of the following courses of action should you pursue to resolve this problem?

1. Configure the computer's BIOS to boot from USB.

Page 5: Configuring Windows 7

2. Configure the computer's BIOS to boot from the network adapter. <Correct>

3. »Boot the computer from a Windows 7 installation disk.

4. Boot the computer from a disk configured with Windows PE.

Question Number (ID): 11 (680P_4.5_07)

Which of the following applications can a user who requires support use to forward a Remote Assistance invitation

from a computer running Windows 7 to your organization's help desk personnel? (Each correct answer presents a

complete solution. Choose two.)

1. Microsoft Office Outlook 2007 <Correct>

2. Windows Live Messenger <Correct>

3. »Windows PowerShell

4. »Windows Remote Shell

5. Telnet

Question Number (ID): 12 (680P_3.3_07)

Which of the following rules can you create to block applications from a specific publisher on 25 computers

running Windows 7 Professional?

1. »AppLocker Path rule

2. AppLocker Publishing rule

3. AppLocker Hash rule

4. Software Restriction Policy Hash rule <Correct

Question Number (ID): 13 (680P_2.3_05)

You have just booted into the Windows PE environment and used lmagex.exe to apply a customized image to a

computer's hard disk.

Which of the following steps must you take before you can deploy the computer to a user?

1. Use Dism.exe to commit the WIM file.

2. »Use BCDboot to initialize the Boot Configuration Data (BCD) store and copy boot environment files to the

system partition.<Correct>

3. Use Dism.exe to mount the WIM file.

Page 6: Configuring Windows 7

4. Use BCDedit to modify the computer's boot configuration.

Question Number (ID): 14 (680P_3.3_01)

You want to use AppLocker to restrict the use of applications in your environment to a specific set of approved

products.

Which of the following editions of Windows 7 support AppLocker-related policies? (Each correct answer presents a

complete solution. Choose two.)

1. Windows 7 Starter

2. »Windows 7 Ultimate <Correct>

3. »Windows 7 Enterprise <Correct>

4. Windows 7 Home Premium

5. Windows 7 Professional

Question Number (ID): 15 (680P_4.4_06)

You want to configure a program rule that will allow authenticated connections to a particular program executing

on a laptop computer running Windows 7 when that computer is connected to your organization's local area

network (LAN). When computers are connected to your organizational network, users authenticate against Active

Directory Domain Services (AD DS).

Authenticated connections should not be allowed to this program from hosts on the laptop computer's home LAN

or when the laptop is connected to a public network, such as one in an airport lounge.

Which of the following should you do when configuring the rule?

1. Configure the rule to apply to the Public profile.

2. Configure the rule to apply to all profiles.

3. Configure the rule to apply to the Domain profile. <Correct>

4. »Configure the rule to apply to the Private profile.

Question Number (ID): 16 (680P_2.2_05)

You have copied the Windows 7 installation image, Install.wim, overto the directory C:\lmages on your computer

running Windows 7.

Which of the following must you do before you can make modifications to the image using Dism.exe?

1. Capture the image using I m a g e X.

Page 7: Configuring Windows 7

2. Copy the image file to a USB storage device.

3. Reset the image using Sysprep.

4. »Mount the image using Deployment Image Servicing and Management (Dism.exe). <Correct>

Question Number (ID): 17 (680P_4.1_05)

There is no Dynamic Host Configuration Protocol (DHCP) server on your local area network.

Which of the following commands can you use to set the Domain Ñame System (DNS) server address of a

computer running Windows 7 Professional to 172.16.0.101?

1. Netsh interface ip set dns "Local Area Connection" static 172.16.0.101 <Correct>

2. Netsh interface ip delete dns "Local Area Connection" static 172.16.0.101

3. Netsh interface ip set wins "Local Area Connection" static 172.16.0.101

4 . »Netsh interface i p set dns "Local Area Connection" source=dhcp

Question Number (ID): 18 (680P_2.2_04)

Which of the following commands can you use to add a software update called Update.msu, stored in the

C:\Updates directory, to a Windows installer image that is mounted in the C:\lmg-mnt directory?

1. sysprep /oobe /generalize

2. dism /image:C:\img-mnt/Enable-Feature update.msu

3. dism /¡mage:C:\img-mnt /Add-Driver /driver:C:\updates\update.msu

4. »dism /image:C:\img-mnt /Add-Package /PackagePath:C:\updates\update.msu <Correct>

Question Number (ID): 19 (680P_4.4_03)

You need to ensure that technicians that work on your organization's client operating system help desk are able to

connect at all times, using Remote Desktop Client (RDC), to computers running Windows 7 on the local area

network regardless of any new firewall rules that might be applied in the future. Only technicians should be able to

establish RDC connections. All computers running Windows 7 in your organization are members of the same Active

Directory Domain Services (AD DS) domain.

Which of the following configuration settings should you apply when creating the rule allowing RDC connections?

(Each correct answer presents part of the solution. Choose two.)

1. Configure the rule to block the connection.

Page 8: Configuring Windows 7

2. Configure the rule to allow the connection if it is secure. <Correct>

3. »Configure the rule to require connections be encrypted.

4. Configure the rule to allow the connection.

5. »Configure the rule to override block rules. <Correct>

Question Number (ID): 20 (680P_4.5_06)

You need to manage a computer remotely running Windows 7 using Windows PowerShell. You are currently using

a computer running Windows Vista. The computer running Windows Vista has Windows PowerShell 1.0 installed.

Which of the following steps do you need to take to so that you can meet your goal? (Each correct answer presents

part of the solution. Choose two.)

1. » On the computer running Windows Vista, upgrade Windows PowerShell to versión 2.0. <Correct>

2. Run winrm -quickconfig on the computer running Windows 7. <Correct>

3. Enable Remote Desktop on the computer running Windows 7.

4. Enable Remote Assistance on the computer running Windows 7.

5. Run winrm -quickconfig on the computer running Windows Vista.

Question Number (ID): 21 (680P_1.3_06)

Which of the following must you do before you can start a migration with the network method when using

Windows Easy Transfer?

1. Log on to the destination computer and run Loadstate.exe.

2. Run Sysprep.exe on the source computer.

3. »Log on to the destination computer and run Windows Easy Transfer. <Correct>

4. Log on to the destination computer and run Scanstate.exe.

Question Number (ID): 22 (680P_2.3_06)

Which of the following tools can you use to deploy customized Windows 7 images automatically to client

computers in your organization that have Preboot Execution Environment (PXE)-compliant network adapters?

(Each correct answer presents a complete solution. Choose two.)

1. Deployment Image Servicing and Management (DISM)

2. System Center Configuration Manager 2007 <Correct>

Page 9: Configuring Windows 7

3. Windows Automated Installation Kit (Windows AIK)

4. »Windows Deployment Services (WDS) <Correct>

5. Windows PE

Question Number (ID): 23 (680P_2.2_06)

You are planning to add múltiple packages to a Windows 7 image file using Deployment Image Servicing and

Management

(Dism.exe). Several of these packages require other packages to be installed beforehand.

Which of the following steps can you take to ensure that packages are installed in the required order?

1. Duplícate the image. Configure one image with the prerequísites and another with the other packages.

2. Apply an Unattend.xml answer file to the image. <Correct>

3. »Convert the image to virtual hard disk (VHD) format and use the Offline Virtual Machine Servicing Tool to add

the packages.

4. Merge an image with the prerequisite packages added with an image with all other packages added.

Question Number (ID): 24 (680P_2.1_01)

You want to configure the system image that you are in the process of capturing so that it does not boot directly to

the Microsoft Windows Welcome screen after installation. Instead, you want to be able to verify the integrity of

the installation and add any necessary applications before end user deployment.

Which of the following should you do?

1. Use Sysprep with the OOBE option

2. Use Sysprep with the Audit option <Correct>

3. »Use Dism with the OOBE option

4. Use Dism with the Audit option

Configuring Windows 7

Question Number (ID): 25 (680P_1.3_01)

Your organization has 50 computers running Windows XP Professional (x64) that you want to replace with 50

computers running Windows 7 Enterprise (x64).

Page 10: Configuring Windows 7

Which of the following tools can you use to automate the process of migrating user profile data from the original

computers to the replacement computers?

1. The User State Migration Tool (USMT) 4 <Correct>

2. Bcdedit.exe

3. »Windows Easy Transfer

4. Dism.exe

Question Number (ID): 26 (680P_1.2__04)

To which of the following editions of Windows 7 can you upgrade a computer running Windows Vista Business?

(Each correct answer presents a complete solution. Choose three.)

1. Windows 7 Enterprise <Correct>

2. Windows 7 Ultimate <Correct>

3. »Windows 7 Starter

4. »Windows 7 Home Basic

5. »Windows 7 Professional <Correct>

Question Number (ID): 27 (680P_4.1_03)

You want to set a static Internet Protocol (IP) address of 172.16.55.152/28 on the Local Area Connection interface

of a computer running Windows 7 Enterprise.

Which of the following commands accomplishes this goal?

1. Netsh interface ipv4 set address name="Local Area Connection" static 172.16.55.152 255.255.255.248

172.15.55.135

2. »Netsh interface ipv4 set address name="Local Area Connection" static 172.16.55.152 255.255.255.240

172.15.55.135

3. Netsh interface ipv4 set address name="Local Area Connection" static 172.16.55.152 255.255.255.240

172.15.55.145<Correct>

4. Netsh interface ipv4 set address name-'Local Area Connection" static 172.16.55.152 255.255.255.224

172.15.55.145

Question Number (ID): 28 (680P_2.3_03)

You want to use Windows Deployment Services (WDS) to deploy a highly customized Windows 7 image to a group

of laptop computers that do not have DVD-ROM drives or Preboot Execution Environment (PXE)-compliant

network adapters.

Page 11: Configuring Windows 7

Which of the following tools can you use to allow these computers to receive an operating system image from the

WDS server?

1. »Configure a USB storage device with a bootable installation image.

2. Configure a USB storage device with a bootable instance of Windows PE.

3. Configure a USB storage device with a bootable WDS discover image. <Correct>

4. Configure a USB storage device with a bootable WDS capture image.

Question Number (ID): 29 (680P_3.3_06)

You have blocked all applications from a publisher named Contoso Ltd. in an AppLocker publisher rule that is

applied in a Group

Policy Object (GPO) named Beta, which is linked to the domain level in your Windows Server 2008 R2 network

environment.

Users in the Research group need to be able to execute an application signed by Contoso Ltd called Alpha. Users in

the research group should not be able to execute other applications from this publisher, and other users in the

organization should not be able to execute Alpha.

Which of the following strategies should you pursue to accomplish this goal? (Each correct answer presents part of

the solution. Choose two.)

1. Configure a local Group Policy on the computers of users in the Research group with a publishing rule that

allows applications published by Contoso.

2. Configure a new GPO, link it at the domain level, and filter it so that it applies to users in the research group.

Configure a publishing rule to block all applications from Contoso but create an exemption for application Alpha.

<Correct>

3. Use security filtering on GPO Beta so that it does not apply to the Research group. <Correct>

4. »Configure a new GPO, link it at the domain level, and filter it so that it applies to users in the research group.

Configure a publishing rule to allow all applications from Contoso but create an exemption for application Alpha.

5. »Configure a local Group Policy on the computers of users in the Research group with a publishing rule that

allows Alpha.

Question Number (ID): 30 (680P_4.1_04)

Page 12: Configuring Windows 7

All Internet Protocol (IP) addresses issued to client computers on your organization's network from Dynamic Host

ConfigurationProtocol (DHCP) servers are within the private IP address range.

Which of the following IP addresses, when returned by an IPCONFIG query issued in a Command Prompt window,

would indicate that a computer running Windows 7 has not received an address from a local DHCP server?

1. 169.254.15.123 <Correct>

2. 172.16.15.123

3. 10.254.15.123

4. >>192.168.15.123

Question Number (ID): 31 (680P_3.3_09)

You are in the process of developing AppLocker policies for your organization. You want to test the rules to make

sure that approved applications are allowed and that applications from specific publishers are blocked before

deploying the policies on the network. You create a Group Policy Object (GPO) containing your AppLocker policies

and apply it to a Test organizational unit (OU).

Which of the following AppLocker properties should you configure to determine whether the policies are correct

without actually restricting the use of any applications?

1. Set the Executable Rules option to Audit Only. <Correct>

2. Set the Windows Installer Rules option to Audit Only.

3. »Set the Executable Rules option to Enforce Rules, But Allow Setting To Be Overwritten.

4. Set the Windows Installer Rules option to Enforce Rules, But Allow Setting To Be Overwritten.

Question Number (ID): 32 (680P_4.5_05)

You work for Fabrikam's Denmark subsidiary. The Denmark head office is located in Copenhagen. There are branch

offices in the towns of Billund and Odense, which are connected to the Copenhagen office by a high-speed wide

area network (WAN). All users in your organization have computers running Windows 7. Due to budget cuts,

support staff is available only at the branch office locations, two days per week. Help desk calis are routed to the

Copenhagen office at all other times. You need to be able to provide guidance regularly to users in the branch

offices to help them with complex tasks using a complex in-house application.

Which of the following operating system components could you use to provide this help when talking users

through these tasks over the phone?

1. Remote Assistance <Correct>

2. »Windows Remote Shell (WinRS)

3. Windows LiveMeeting

Page 13: Configuring Windows 7

4. Windows PowerShell 2.0

5. Remote Desktop

Question Number (ID): 33 (680P_4.3_04)

Which of the following command-line Utilities can you use to connect to a wireless network?

1. »Ping.exe

2. Telnet.exe

3. Ftp.exe

4. Netsh.exe <Correct>

5. lpconfig.exe

Question Number (ID): 34 (680P_1.1_04)

You have a large number of desktop computers in your organization that have Windows XP Professional installed.

Each computer has múltiple disk drives. You want to perform a gradual migration to Windows 7 Professional, but

you still want to allow users to access older applications in Windows XP.

Which of the following strategies could you pursue to allow this access?

1. »lnstall Windows 7 on a separate volume from Windows XP. Configure the computer to dual-boot. <Correct>

2. Install Windows 7 on a virtual hard disk (VHD). Configure the computer to dual-boot.

3. Install Windows XP on a virtual hard disk (VHD). Configure the computer to dual-boot.

4. Install Windows 7 on the same volume as Windows XP. Configure the computer to dual-boot.

Question Number (ID): 35 (680P_3.3__08)

Which of the following AppLocker rules would you configure to allow users to install software that is in MSI format

published by Contoso, Ltd., on their computers running Windows 7 Enterprise?

1. Windows Installer rules <Correct>

2. Executable rules

Page 14: Configuring Windows 7

3. »DLL rules

4. Script rules

Question Number (ID): 36 (680P_3.4_02)

Your organization's intranet is heavily optimized for earlier versions of Windows Internet Explorer. This means that

clients using Windows 7 are not always able to view pages hosted on the intranet servers properly.

Which Internet Explorer 8 setting could you configure to resolve this problem, while minimally affecting the way

that other sites, designed for Internet Explorer 8, are displayed?

1. Enable InPrivate Browsing.

2. »Disable the Pop-Up Blocker.

3. Enable the Display Intranet Sites In Compatibility View option. <Correct>

4. Enable the Display All Websites In Compatibility View option.

5. In Internet Options, change the Privacy setting to Médium.

Question Number (ID): 37 (680P_4.5_01)

All of the client computers in your organization run Windows 7. You allow employees to connect to their

computers running Windows 7 remotely through a Terminal Services Gateway Server on the perimeter network.

As a security measure, you want to limit these incoming remote desktop connections to computers running

Windows Vista and Windows 7.

Which of the following settings should you configure on the Remote tab of each computer running Windows 7 to

meet this goal?

1. Remote Desktop: Allow Connections From Computers Running Any Versión of Remote Desktop

2. »Remote Assistance: Allow Remote Assistance Connections To This Computer

3. Remote Desktop: Don't Allow Connections To this Computer

4. Remote Desktop: Allow Connections Only From Computers Running Remote Desktop With Network Level

Authentication <Correct>

Question Number (ID): 38 (680P_2.1_05)

You want to create a bootable USB storage device containing a Windows PE image so that you can capture a

reference Windows

Page 15: Configuring Windows 7

7 deployment using ImageX.

Which of the following tools do you need to deploy to create this tool?

1. Deployment Image Servicing and Management (Dism.exe) tool

2. Windows Deployment Services (WDS)

3. »Windows Automated Installation Kit (Windows AIK) <Correct>

4. Bcdedit

Question Number (ID): 39 (680P_4.3_03)

You have recently purchased a new UPnP router.

Which of the following items should you select from the Set Up A Connection Or Network wizard in Windows 7 to

configure this router?

1. Set Up A Wireless Ad Hoc Network

2. Connect To The Internet

3. Manually Connect To A Wireless Network

4. Set Up A Dial-Up Connection

5. »Set Up A Network <Correct>

6. Connect To A Workplace

Question Number (ID): 40 (680P_3.2_04)

Which of the following tools can you use to determine if an application that works on a computer running

Windows XP will work on a computer running Windows 7?

1. »Microsoft Application Compatibility Toolkit (ACT) <Correct>

2. Microsoft Deployment Toolkit

3. Windows Automated Installation Kit (Windows AIK)

4. Windows 7 Upgrade Advisor

Question Number (ID): 41 (680P_4.4_02)

You have a computer running Windows 7 Enterprise named Canberra that is used by several developers in your

organization as a platform to test Web applications. You have an existing Windows Firewall with Advanced Security

rule applied to Canberra that allows access to the computer on port 80. Presently, hosts from any network in your

Page 16: Configuring Windows 7

organization are able to access the Web server on port 80. You want to limit access so that only hosts on the

10.100.20.0/24 network are able to access the Web server on

Canberra. Users on this network access Canberra from computers that are not members of an Active Directory

Domain Services (AD DS) domain.

Which of the following modifications should you make to the existing rule to accomplish this goal?

1. Modify the protocol to which the rule applies.

2. Modify the scope of the rule. <Correct>

3. Modify the profiles in which the rule is active.

4. »Modify the users and computers to which the rule applies.

Question Number (ID): 42 (680P_2.3_07)

Which of the following components must be installed on the computer running Windows Server 2008 that you

install the Microsoft Deployment Toolkit (MDT) 2010 on if you want to support light touch deployment to clients

with Preboot Execution Environment (PXE)-compatible network adapters? (Each correct answer presents part of

the solution. Choose two.)

1. »Windows Deployment Services (WDS) <Correct>

2. System Center Operations Manager 2007

3. »Windows Automated Installation Kit (Windows AIK) <Correct>

4. Windows Server Update Services (WSUS)

5. System Center Data Protection Manager 2007

Question Number (ID): 43 (680P_3.2_07)

Your organization creates custom software. Several users have mentioned that they are having problems with

running your applications on Windows 7. You had to develop a solution involving shims in the past to get the

software working on Windows Vista. When you try to use the default Windows Vista and Windows XP

compatibility modes for the application in Windows 7, you still encounter problems. You suspect this is because

the default Windows 7 compatibility modes do not apply the shims that your organization has developed in the

past to get the application working on Windows Vista.

Which of the following steps could you take to help resolve the problems your organization's application has when

running on Windows 7?

1. Virtualize the application using Microsoft Virtual PC 2007.

2. Virtualize the application using Hyper-V.

3. »Create a Custom Compatibility Mode using Application Compatibility Toolkit (ACT). <Correct>

4. Create a Custom Compatibility Fix using the Application Compatibility Toolkit (ACT).

Page 17: Configuring Windows 7

Question Number (ID): 44 (680P_4.2_04)

Which of the following commands will add a default gateway with the address 2001:db8:0:2f3b:2aa:ff:fe28:9c5a to

the interface named Local Area Connection?

1. netsh interface ipv6 delete route ::/0 "Local Area Connection" 2001:db8:0:2f3b:2aa:ff:fe28:9c5a

2. netsh interface ipv6 add route ::/0 "Local Area Connection" 2001:db8:0:2f3b:2aa:ff:fe28:9c5a <Correct>

3. »netsh interface ipv6 set address "Local Area Connection" 2001 :db8:0:2f3b:2aa:ff:fe28:9c5a

4. netsh interface ipv6 delete address "Local Area Connection" 2001:db8:0:2f3b:2aa:ff:fe28:9c5a

Question Number (ID): 45 (680P_4.4_04)

You are in the process of configuring the Windows Firewall settings for a group of computers running Windows 7

Enterprise. You want to ensure that all connections are blocked when the computer's owner is connected to a

network at an Internet cafe or airport lounge. You also want to ensure that when the computer's owner is

connected to your organization's network, authorized applications hosted on the computer can be contacted by

other hosts on the network, though unauthorized applications should still be blocked. Finally, you do not want

users to be bothered by notifications from the firewall.

Which of the following settings should you configure on the dialog box shown in the exhibit? (Each correct answer

presents part of the solution. Choose three.)

1. Home Or Work (Private) Network Location Settings: Turn Off Windows Firewall

2. »Public Network Location Settings: Turn On Windows Firewall <Correct>

3. Home Or Work (Private) Network Location Settings: Turn On Windows Firewall <Correct>

4. »Home Or Work (Private) Network Location Settings: Notify Me When Windows Firewall Blocks A New Program

5. Home Or Work (Private) Network Location Settings: Block All Incoming Connections, Including Those In The List

Of Allowed

Programs

6. »Public Network Location Settings: Block All Incoming Connections, Including Those In The List Of Allowed

Programs <Correct>

7. Public Network Location Settings: Notify Me When Windows Firewall Blocks A New Program

8. Public Network Location Settings: Turn Off Windows Firewall

Question Number (ID): 46 (680P_3.3_05)

You have configured a set of AppLocker rules for a group of laptop computers running Windows 7 Ultimate, but

you have found that users are still able to start applications that you have created a rule to block.

Which of the following steps can you take to resolve this issue?

Page 18: Configuring Windows 7

1. Configure the Application Experience service with the Automatic startup type.

2. Configure the AppID Service service with the Automatic startup type. <Correct>

3. »Configure the Application Management service with the Automatic startup type.

4. Configure the BranchCache service with the Automatic startup type.

Question Number (ID): 47 (680P_1.1_03)

Which of the following editions of Windows 7, when installed normally to a hard disk, can you dual-boot with an

installation of Windows 7 on a virtual hard disk (VHD) file? (Each correct answer presents a complete solution.

Choose two.)

1. »Windows 7 Enterprise <Correct>

2. Windows 7 Professional

3. Windows 7 Starter

4. »Windows 7 Ultimate <Correct>

5. Windows 7 Home Premium

Question Number (ID): 48 (680P_1.3_07)

You are preparing to perform a wipe and load migration to Windows 7 on a computer that is currently running

Windows XP Professional.

Which of the following methods can you use to ensure that all user profile data is transferred during this

migration?

1. Windows Easy Transfer using the removable USB storage device option <Correct>

2. Robocopy.exe using the removable USB storage device option

3. »Windows Easy Transfer using the Network option

4. Windows Easy Transfer using the Easy Transfer Cable option

Question Number (ID): 49 (680P_3.1_01)

A manager at a small business that you provide support for has a laptop computer with Windows 7 Ultimate

installed. The manager has administrator privileges on his laptop computer. Since he acquired the computer, he

has upgraded the graphics adapter driver manually several times using files located on the vendor's Web site. Last

week, the manager upgraded the driver to versión 4.2.

Since installing this new driver, the computer has encountered STOP errors once every few hours. The manager

has downloaded versión 4.1 of the driver from the vendor's Web site. The Windows Display Driver Model driver

available through Windows Update is versión 4.0.

Which of the following steps can you take to resolve this problem with a minimum of administrative effort?

Page 19: Configuring Windows 7

1. »Roll back the 4.2 versión of the driver. <Correct>

2. Install versión 4.1 of the driver manually.

3. Uninstall versión 4.2 of the driver.

4. Use Windows Update to update the driver.

Question Number (ID): 50 (680P_1.3_03)

You want to use the User State Migration Tool (USMT) to migrate data from a computer running Windows XP

Professional to a computer running Windows 7. You want to perform the migration on the computer running

Windows XP Professional while it is offline.

Which of the following steps must you take? (Each correct answer presents part of the solution. Choose three.)

1. »Boot the computer with Windows 7 installed using Windows PE.

2. »Run Loadstate.exe on the computer with Windows 7 installed. <Correct>

3. Run Scanstate.exe on the computer with Windows XP installed. <Correct>

4. Run Loadstate.exe on the computer with Windows XP installed.

5. Boot the computer with Windows XP installed using Windows PE. <Correct>

6. »Run Scanstate.exe on the computer with Windows 7 installed.

Question Number (ID): 51 (680P_3.1_07)

Developers at your company are writing a device driver for a specific piece of scientific hardware that will attach to

computers running Windows 7. These drivers are revised regularly and need to be tested in computers running

Windows 7 that are located in your company's test lab. You want to be able to install the drivers, but you do not

want to go to the trouble of digitally signing the drivers each time there is a revisión. You press F8 while the

computer is booting up.

Which option should you select to allow unsigned drivers to work temporarily with the Windows 7 computer?

1. Debugging Mode

2. Disable Driver Signature Enforcement <Correct>

3. »Last Known Good Configuration (Advanced)

4. Disable Automatic Restart On System Failure

Question Number (ID): 52 (680P_2.4_01)

Which of the following toois can you use to create and attach a virtual hard disk (VHD) file?

Page 20: Configuring Windows 7

1. »Diskpart.exe <Correct>

2. Dism.exe

3. Sysprep.exe

4. Bcdedit.exe

Question Number (ID): 53 (680P_2.2_01)

You want to modify an existing Windows 7 Install.wim file so that it contains third-party driver packages for

hardware that is present on your organization's workstations.

Which of the following command-line Utilities can you use to make this modification?

1. Diskpart.exe

2. Bcdedit.exe

3. Dism.exe <Correct>

4. »Sysprep.exe

Question Number (ID): 54 (680P_2.4_02)

Which of the following tools can you use to configure a computer running Windows 7 to allow it to boot into a

second installation of

Windows 7 that is stored in a virtual hard disk (VHD) file hosted on the computer running a Windows 7 system

volume?

1. »Diskpart.exe

2. Dism.exe

3. Bcdedit.exe <Correct>

4. Sysprep.exe

Question Number (ID): 55 (680P_4.1_07)

Your computer running Windows 7 has two network interfaces.

Which of the following commands can you use to determine which IPv4 address is assigned to each specific

interface?

1. Ping

2. »lpconfig <Correct>

Page 21: Configuring Windows 7

3. Tracert

4. Netstat

Question Number (ID): 56 (680P_2.1_04)

You have created a reference installation of Windows 7 Enterprise (x64) and Windows 7 Professional (x86).

Which of the following Windows PE images and ImageX Utilities do you need to use to capture these installations

as WIM files?

1. Windows PE (x64), ImageX (x64)

2. Windows PE (x86), ImageX (x86) <Correct>

3. Windows PE (x86), ImageX (x64)

4. »Windows PE (x64), ImageX (x86)

Question Number (ID): 57 (680P_2.1_02)

You have prepared a reference installation of Windows 7 that you want to capture and transfer to a shared folder

on your organization's Windows Server 2008 network. You have booted into Microsoft Windows PE.

Which utility should you use to capture the operating system image?

1. Dism.exe

2. Bcdedit.exe

3. »lmagex.exe <Correct>

4. Sysprep.exe

Question Number (ID): 58 (680P_1.2_07)

A user at your organization has purchased a laptop that has Windows 7 Home Premium installed on it. The user

wants to protect their data using BitLocker and BitLocker To Go.

Which edition of Windows 7 should you upgrade to allow the user to meet this objective?

1. »Windows 7 Starter

2. Windows 7 Ultimate <Correct>

3. Windows 7 Professional

Page 22: Configuring Windows 7

4. No upgrade required

Question Number (ID): 59 (680P_1.3_05)

You encounter an error when attempting to use the User State Migration Tool to migrate several user profiles

stored on a computer running Windows Vista to a computer running Windows 7. All these users regularly encrypt

files and folders using Encrypting File System.

Which of the following can you do to resolve this problem?

1. Use Loadstate.exe with the /efs:copyraw option on the computer running Windows 7.

2. »Use Scanstate.exe with the /efs:copyraw option on the computer running Windows 7.

3. Use Loadstate.exe with the /efs:copyraw option on the computer running Windows Vista.

4. Use Scanstate.exe with the /efs:copyraw option on the computer running Windows Vista. <Correct>

Question Number (ID): 60 (680P_3.1_04)

You are having problems with a hardware device driver installed on a desktop computer that has Windows 7

Ultimate installed.

According to the device's properties in Device Manager, the device driver versión is 8.3.3.0. You check with the

vendor and with Microsoft Update and find that no newer device driver is available. Previous versions of the driver

are not available on the vendor's

Web site or through Microsoft Update. Other computers in your organization, which also have the device, have

device driver versión 8.3.2.9 installed. These computers are not experiencing problems.

Which of the following could you do to resolve this issue?

1. Roll back the driver. <Correct>

2. »Update the driver.

3. Disable the device.

4. Uninstall the driver.

Question Number (ID): 61 (680P_1.2_01)

On which of the following computers can you perform a direct upgrade to Windows 7 Professional?

1. A computer running Windows XP Professional

2. A computer running Windows 2000 Professional

Page 23: Configuring Windows 7

3. A computer running Windows Vista Business <Correct>

4. »A computer running Windows 7 Ultimate

5. A computer running Windows Vista Ultimate

Question Number (ID): 62 (680P_1.2_01)

Which of the following command-line utilities can you use to display a copy of the IPv4 and IPv6 routing tables on a

computer running Windows 7?

1. Netstat <Correct>

2. Ping

3. Ipconfig

4. »Tracert

Question Number (ID): 63 (680P_2.2_02)

Which format do the application installation files have to be in to be added to a Windows Image (WIM) file using

the Deployment Image Servicing and Management (Dism.exe) tool?

1. Cabinet (CAB) <Correct>

2. EXE

3. virtual hard disk (VHD)

4. »WIM

Question Number (ID): 64 (680P_4.2_03)

Which of the following commands can you use to configure manually the Local Area Connection interface of a

computer running

Windows 7 to use a Domain Ñame Server (DNS) server at address fd00:0:0:ffde::1b?

Page 24: Configuring Windows 7

1. netsh interface ipv6 set dnsservers "Local Area Connection" fd00:0:0:ffdf::1a

2. »netsh interface ipv6 set dnsservers "Local Area Connection" static fd00:0:0:ffde::1b <Correct>

3. netsh interface ipv6 delete dnsservers "Local Area Connection" fd00:0:0:ffde::1b

4. netsh interface ipv6 set dnsservers "Local Area Connection" source=dhcp

Question Number (ID): 65 (680P_3.3_03)

Users in your organization need to use an application that has no accompanying digital signature. You want to

minimize the chance that users will be able to execute unauthorized applications.

Which of the following AppLocker rules should you create to meet these goals?

1. A publisher rule

2. A hash rule <Correct>

3. A certifícate rule

4. »A path rule

Question Number (ID): 66 (680P_1.1_06)

Which of the following tools can you use to prepare a USB storage device so that you can use it as an installation

source for a clean Windows 7 installation?

1. Sysprep.exe

2. »Bcdedit.exe

3. Loadstate.exe

4. Diskpart.exe <Correct>

Question Number (ID): 67 (680P_1.2_05)

You work for a charity organization in southeast Asia. Your organization recently purchased several computers

running Windows 7 Home Basic. Your organization does not have a volume licensing agreement with Microsoft.

Which editions of Windows 7 can you upgrade a computer running Windows 7 Home Basic to using Windows

Anytime Upgrade? (Each correct answer presents a complete solution. Choose three.)

1. Windows 7 Starter

Page 25: Configuring Windows 7

2. »Windows 7 Home Premium <Correct>

3. »Windows 7 Enterprise

4. »Windows 7 Professional <Correct>

5. Windows 7 Ultimate <Correct>

Question Number (ID): 68 (680P_3.4_03)

You are configuring Windows Internet Explorer on a new computer running Windows 7 for your grandmother. You

are concerned that your grandmother might be taken in by phishing scams and want her to be warned visually if

she navigates to a Web site that has been reported to Microsoft as being suspicious.

Which of the following Internet Explorer 8 features should you enable for your grandmother?

1. InPrivate Blocking

2. »lnPrivate Browsing

3. Pop-Up Blocker

4. SmartScreen Filter <Correct>

Question Number (ID): 69 (680P_1.1_05)

You have 10 existing computers running Windows Vista, on which you want to deploy Windows 7 in a dual-boot

configuration. The computers running Windows Vista are configured with single volumes that consume each

computer's entire hard disk drive. Each computer running Windows Vista has more than 50 GB of free space on

this volume.

Which of the following steps should you take to enable these computers to support dual-boot with the Windows 7

operating

system? (Each correct answer presents part of the solution. Choose three.)

1. Create two new volumes using Diskpart.

2. Use Diskpart to delete the existing volume.

3. »lnstall Windows 7 on the existing volume.

4. Use Diskpart to shrink the existing volume. <Correct>

5. »Create a new volume using Diskpart. <Correct>

6. »lnstall Windows 7 on the new volume. <Correct>

Page 26: Configuring Windows 7

Question Number (ID): 70 (680P_1.2_08)

Your organization has 50 computers running Windows Vista Enterprise x86 deployed. You recently upgraded the

RAM in all these computers from 2 GB to 8 GB. You want to ensure that all 8 GB are usable when you deploy

Windows 7 on the same hardware.

Which of the following plans should you implement?

1. Migrate the computers to Windows 7 Enterprise x86.

2. Upgrade the computers to Windows 7 Enterprise x86.

3. Upgrade the computers to Windows 7 Enterprise x64.

4. »Migrate the computers to Windows 7 Enterprise x64. <Correct>

Question Number (ID): 71 (680P_3.3_02)

Which of the following AppLocker rules should you use to allow a specific application published by a trusted third-

party vendor to be used, regardless of the directory the application executable is placed in and without requiring

you to modify the rule each time an update is released for the application?

1. Path rules

2. Publisher rules <Correct>

3. »Certificate rules

4. Hash rules

Question Number (ID): 72 (680P_4.4_01)

You work supporting computers running Windows 7 Enterprise. Several developers in your organization need

assistance in setting up firewall rules for a network-aware application that runs as part of SvcHost.exe on their

computers. Other clients on the local network need to be able to access this application. You use the Netstat.exe

utility to determine the port that the application listens on.

Which of the following Windows Firewall with Advanced Security rule types should you use to allow this access?

1. Outbound port rule

2. »Outbound program rule

3. Inbound program rule

Page 27: Configuring Windows 7

4. Inbound port rule <Correct>

Question Number (ID): 73 (680P_2.4_04)

Which of the following tools can you use to configure the deployment of bootable virtual hard disks (VHDs)

containing Windows 7 Enterprise? (Each correct answer presents a complete solution. Choose two.)

1. »Microsoft Deployment Toolkit (MDT) 2010 <Correct>

2. Offline Virtual Machine Servicing Tool

3. Windows Deployment Services (WDS) <Correct>

4. »Windows Server Update Services (WSUS)

Question Number (ID): 74 (680P_3.1_05)

One of the people in a small business that you consult for is having problems with her mouse. You suspect that the

problem is the current driver. The user wishes to keep using the mouse, and the mouse works without exhibiting

any problems when connected to another computer. The driver properties are displayed in the exhibit.

Which of the following troubleshooting strategies could you employ in an attempt to resolve this problem? (Each

correct answer presents a complete solution. Choose two.)

1. Update the driver manually. <Correct>

2. Uninstall the driver.

3. Disable the device.

4. »Roll back to a previous driver.

5. »Use Windows Update to install a new driver. <Correct>

Question Number (ID): 75 (680P_1.1_02)

You want to perform a fresh installation of Windows 7 on 10 laptop computers that do not have DVD-ROM drives.

You want to use a shared folder on your network as an installation source. You plan to boot the laptop computers

from a USB storage device.

Which of the following software should you place on the USB storage device to accomplish your goal?

1. Windows PE <Correct>

2. Bcdedit.exe

3. »Windows Deployment Services (WDS)

4. Dism.exe

Page 28: Configuring Windows 7

Question Number (ID): 76 (680P_4.3_05)

You have a laptop computer that has Windows 7 installed. The wireless networks in one of the buildings you work

in are configured not to broadcast their SSIDs.

Which of the following options in the Set Up A Connection Or Network wizard can you use to connect your laptop

computer's wireless adapter to the hidden wireless network?

1. Set Up A Network

2. Set Up A Wireless Ad Hoc Network

3. Manually Connect To A Wireless Network <Correct>

4. »Connect To A Workplace

Question Number (ID): 77 (680P_3.2_01)

You are in the process of preparing a migration of users from computers running Windows XP Professional to

computers running Windows 7. Your organization uses a custom application that users are able to execute on their

computers running Windows XP without administrator privileges. All group policies in your environment apply at

the domain level. During testing, you find that you are unable to execute the application when after you install it

on a test computer running Windows 7 Professional.

Which of the following courses of action could you pursue to resolve this issue?

1. Configure the application to run in compatibility mode for Windows XP SP2. <Correct>

2. Create an AppLocker rule for the custom application.

3. »Configure the application to run with the Administrator privilege level.

4. Create a Software Restriction Policy for the custom application.

Question Number (ID): 78 (680P_4.2_02)

You issue the command netsh interface ipv6 show addresses on a computer running Windows 7. The interface

address comes up as fe80::5efe:10.20.30.221.

Page 29: Configuring Windows 7

Which of the following IPv4 networks is the adapter with this Intra-Site Automatic Tunnel Addressing Protocol

(ISATAP) address located on?

1. 10.20.30.192 /27 <Correct>

2. >>10.20.30.192 /28

3. 10.20.10.192 /27

4. 10.20.10.192 /28

Question Number (ID): 79 (680P_3.3__05)

Which of the following technologies can you use to execute scripts remotely on a computer running Windows 7

that no user has logged on to?

1. Subsystem for UNIX-based Applications

2. RIP Listener

3. »Windows Remote Shell (WinRS) <Correct>

4. Remote Assistance

Question Number (ID): 80 (680P_4.5_04)

The vendor that manufactured the network adapter used on your organization's computers running Windows 7

Enterprise has released a new device driver. The new driver improves performance. You want to test this driver on

a reference computer before rolling it out to other computers in your organization. When you run Windows

Update on the reference computer, no new optional components are listed.

Which of the following methods could you use to update the driver on the reference computer to the versión

released by the vendor?

1. Download the driver files from the vendor's Web site and run Windows Update.

2. »Download the driver files from the vendor's Web site and then manually update the driver. <Correct>

3. Uninstall the current network adapter driver and reboot the computer.

4. Roll back the current network adapter driver and then run Windows Update.

Page 30: Configuring Windows 7

Question Number (ID): 81 (680P_2.2_03)

You want to add several third-party device drivers to an existing image.

Which of the following steps must you take to accomplish this goal? (Each corred answer presents part of the

solution. Choose three.)

1. Mount the Windows Image (WIM) ¡mage to a temporary directory using Dism /mount-wim. <Correct>

2. »Add the drivers using Dism /Add-Package.

3. »Add the drivers using Dism /Add-Driver. <Correct>

4. Commit the changes using Dism /unmount-wim /commit. <Correct>

5. »Add the drivers using Dism /Enable-Feature.

Question Number (ID): 82 (680P_1.3_08)

You want to perform a side by side migration using the User State Migration Tool (USMT).

Which of the following tasks should you perform on the destination computer prior to running Scanstate.exe on

the source computer?

1. Run Sysprep.exe on the destination computer.

2. Create a shared folder on the destination computer. <Correct>

3. »Run Scanstate.exe on the destination computer.

4. Run Loadstate.exe on the destination computer.

Question Number (ID): 83 (680P_2.2_07)

You want a set of configuration tasks to run on a computer running Windows 7 Enterprise after the operating

system has been deployed through Windows Deployment Services (WDS).

Which of the following tools allows you to configure such tasks?

1. Windows PE

2. WDS

3. Sysprep

4. »Microsoft Deployment Toolkit (MDT) <Correct>

Page 31: Configuring Windows 7

Question Number (ID): 84 (680P_2.4_06)

Which of the following editions of Windows 7 Professional can you boot from a virtual hard disk (VHD) file when

you configure the boot sequence with Bcdedit? (Each correct answer presents a complete solution. Choose two.)

1. Windows 7 Starter

2. »Windows 7 Home Premium

3. »Windows 7 Ultimate <Correct>

4. Windows 7 Enterprise <Correct>

5. Windows 7 Professional

Question Number (ID): 85 (680P_3.4_04)

Your teenage cousin has just purchased a laptop computer that has Windows 7 Ultímate installed. He has asked

you what steps he can take to minimize the amount of data stored on the computer related to his Web surfing

activities.

Which of the following Windows Internet Explorer 8 features should you recommend to him?

1. Tell him to enable InPrivate Browsing from the Safety menú. <Correct>

2. »Tell him to enable the Compatibility View from the Tools menú.

3. Tell him to enable SmartScreen Filtering from the Safety menú.

4. Tell him to enable the Pop-up Blocker from the Tools menú.

Question Number (ID): 86 (680P_1.1_01)

You have a laptop computer that does not have a DVD-ROM drive. There are no computers running Windows

Server 2008 in your network environment. You do not have access to Windows PE.

Which of the following installation sources can you use to install Windows 7 on this computer?

1. A network share

2. Windows Deployment Services (WDS)

3. »A USB storage device <Correct>

4. DVD-ROM

Page 32: Configuring Windows 7

Question Number (ID): 87 (680P_3.1_03)

You are responsible for managing desktop computers at Fabrikam. Fabrikam uses many customized applications.

Several times in the past, problems with new device drivers have caused some of these custom applications to

crash. You want to ensure that only device drivers that you have tested are able to be instalied on the computers

running Windows 7 in your organization.

Which of the following options should you select in the Device Installation Settings dialog box shown in the

exhibit?

1. Only Install Driver Software from Windows Update If It Is Not Found On My Computer

2. Yes, Do This Automatically (Recommended)

3. »Always Install the Best Driver Software From Windows Update

4. Never Install Driver Software from Windows Update <Correct>

Question Number (ID): 88 (680P_1.2_06)

Which of the following installation sources can you use to perform an upgrade of a computer running Windows

Vista to the Windows 7 operating system? (Each correct answer presents a complete solution. Choose three.)

1. A DVD-ROM <Correct>

2. A USB storage device <Correct>

3. A network share <Correct>

4. »Windows Deployment Services (WDS)

Question Number (ID): 89 (680P_3.4_01)

You are responsible for managing desktop computers at Contoso, which has a partnership with the company

Fabrikam. Several users in your organization regularly connect to the Fabrikam intranet. Because these users had

their computers' operating system upgraded to Windows 7, they have noticed that many of the pages on the

Fabrikam intranet site do not display correctly. Users who connect to Fabrikam using computers running Windows

XP do not have this problem.

Which of the following Windows Internet Explorer 8 features should you advise them to use to resolve this

problem?

1. »Compatibility View <Correct>

2. InPrivate Blocking

3. InPrivate Browsing

Page 33: Configuring Windows 7

4. SmartScreen Filtering

Question Number (ID): 90 (680P_3.3_04)

Alpha is an application required by users in your organization. Alpha is published by Tailspin Toys. All applications

published by Tailspin Toys are located in the C:\Program FilesVTailspin Toys directory. You want to block all other

applications published by Tailspin Toys except Alpha.

Which of the following AppLocker rules should you create to meet your goal?

1. A publisher rule that blocks all applications from Tailspin Toys, with Alpha as an exemption. <Correct>

2. A publisher rule that allows all applications from Tailspin Toys, with Alpha as an exemption.

3. »A path rule that blocks all applications in the C:\Program FilesVTailspin Toys directory.

4. A path rule that allows all application in the C:\Program FilesVTailspin Toys directory.

Question Number (ID): 91 (680P_2.1_06)

Which of the following must you do to automate the Windows Deployment Services (WDS) Image Capture Wizard

so that a reference system is automatically captured and uploaded to the WDS server without administrator

intervention? (Each correct answer presents part of the solution. Choose three.)

1. Create a WDS discover image and save Unattend.xml within the image.

2. Add the new WDS discover image to the WDS server.

3. Add the new WDS capture image to the WDS server. <Correct>

4. »Create a WDSCapture.inf file. <Correct>

5. Create an Unattend.xml file.

6. Create a WDS capture image and save WESCapture.inf within the image. <Correct>

Page 34: Configuring Windows 7

Question Number (ID): 92 (680P_3.1_06)

A computer running Windows 7 is experiencing intermittent STOP errors after several device drivers were

updated.

Which of the following tools can you use to determine which device driver is causing the problem? (Each correct

answer presents a complete solution. Choose two.)

1. Resource Monitor

2. »Task Manager

3. Reliability Monitor <Correct>

4. Performance Monitor

5. Driver Verifier Manager <Correct>

Question Number (ID): 93 (680P_4.3_02)

Your laptop computer connects through an internal cellular modem to the Internet. You want to allow your friend,

who is visiting with her laptop, to connect to the Internet. Both laptop computers are running Windows 7 and have

wireless network adapters.

Which of the following Ítems should you select on the Set Up A Connection Or Network wizard on your laptop

computer so that you can share your Internet connection with your friend?

1. Connect To the Internet

2. Set Up A Wireless Ad Hoc Network <Correct>

3. Set Up A Dial-Up Connection

4. »Manually Connect To A Wireless Network

5. Set up A Network

6. Connect To A Workplace

Page 35: Configuring Windows 7

Question Number (ID): 94 (680P_4.1_08)

You execute the lpconfig command on a computer that runs Windows 7 Enterprise. You get the results shown in

the exhibit.

Which of the following commands would you execute to verify that the computer has connectivity with the local

area network?

1. »ping 192.168.15.56

2. ping contoso.internal

3. tracert 192.168.15.56

4. ping 192.168.15.1 <Correct>

5. tracert contoso.internal

Question Number (ID): 95 (680P_3.4_05)

You are responsible for managing desktop computers at Contoso. Contoso has a partnership with the Fabrikam

company. Several users in your organization need to connect to a secure site on the Fabrikam intranet,

https://invoice.fabrikam.internal, but they keep getting an error related to the Web site's identity when they try to

navigate to the site.

Which of the following steps can they take to resolve this problem?

1. Import a certifícate from the Fabrikam Certifícate Authority (CA). <Correct>

2. Disable the SmartScreen filter.

3. »Configure Windows Internet Explorer to work in Compatibility Mode.

4. Configure Windows Internet Explorer to work in InPrivate Mode.

Question Number (ID): 96 (680P_4.3_01)

You are configuring the wireless networks on your laptop computer. You regularly work in two different buildings,

Building 1 and Building 2. Each building has two wireless networks. Building 1 has networks Alpha and Beta.

Building 2 has networks Delta and Gamma. You would like your computer to connect to network Alpha when you

are in Building 1 and network Gamma when you are in Building 2. If a network you want to use is unavailable, you

would like to connect to the alternative network in that building.

In what order should these networks be listed in the Manage Wireless Networks dialog box? (Each correct answer

presents part of the solution. Choose two.)

1. Ensure that network Gamma is above network Delta in the list. <Correct>

Page 36: Configuring Windows 7

2. Ensure that network Delta is above network Gamma in the list.

3. Ensure that network Beta is above network Alpha in the list.

4. »Ensure that network Delta is above network Alpha in the list.

5. Ensure that network Alpha is above network Beta in the list. <Correct>

Question Number (ID): 97 (680P_1.1_08)

You are examining several small form-factor laptop computers. These laptops have the following specifications:

* 1.5 GHz processor

* 256 MB RAM

* 10 GB SSD HDD

* A 1024 x 600 resolution display

Other models of these laptop computers have improved specifications.

Which of the hardware components needs to be improved before it will be possible to install Windows 7

successfully on the computer? (Each correct answer presents part of the solution. Choose two.)

1. The máximum display resolution setting

2. »The RAM <Correct>

3. The hard disk drive <Correct>

4. »The processor

Question Number (ID): 98 (680P_3.2_06)

Which of the following products can you use to view potential compatibility issues for intranet Web sites and Web

applications?

1. Microsoft Deployment Toolkit

2. Microsoft Application Compatibility Toolkit (ACT) <Correct>

3. Windows Automated Installation Kit (Windows AIK)

4. »Microsoft Baseline Security Analyzer (MBSA)

Page 37: Configuring Windows 7

Question Number (ID): 99 (680P_4.3_06)

The network adapter configuration of a computer running Windows 7 is displayed in the exhibit. The computer is

unable to communicate with the network.

Which of the following steps could you take to restore connectivity?

1. Right-click Local Area Connection 2 and then click Bridge Connections.

2. From an elevated command prompt, execute the ipconfig /renew command.

3. »From the Set Up A Connection Or Network wizard, click Set Up A Network.

4. Select Local Area Connection and then click Enable This Network Device. <Correct>

Question Number (ID): 100 (680P_4.1_01)

Which of the following commands, when used to set the Internet Protocol (IP) address of a computer running

Windows 7, will NOT lead to network connectivity problems?

1. Netsh interface ipv4 set address name="Locai Area Connection" static 231.40.10.15 255.255.255.0 231.40.10.1

2. »Netsh interface ipv4 set address name="Local Area Connection" static 172.16.47.24 255.255.192.0 172.16.0.1

<Correct>

3. Netsh interface ipv4 set address name-'Local Area Connection" static 10.0.10.10 255.255.255.0 10.0.0.1

4. Netsh interface ipv4 set address name="Local Area Connection" static 192.168.15.10 255.255.255.0

192.168.10.1

Question Number (ID): 101 (680P_4.2_01)

Which of the following commands can you use to assign the IPv6 address fd00:0:0:ffde::1a to the interface "Local

Area Connection"?

1. netsh interface ípv4 delete address "Local Area Connection" fd00:0:0:ffde::1a

2. netsh interface ipv6 set address "Local Area Connection" fd00:0:0:ffde::1a <Correct>

3. »netsh interface ipv4 set address "Local Area Connection" fd00:0:0:ffde::1a

4. netsh interface ipv6 delete address "Local Area Connection" fd00:0:0:ffde::1a

Page 38: Configuring Windows 7

Question Number (ID): 102 (680P_1.3_02)

Which of the following steps must you take prior to running Scanstate.exe when performing an offline migration

with the User State Migration Tool (USMT)?

1. Boot the computer to be migrated into Safe Mode.

2. Run Sysprep.exe on the computer to be migrated.

3. »Run Dism.exe on the computer to be migrated.

4. Boot the computer to be migrated into Windows PE. <Correct>

Question Number (ID): 103 (680P_1.1_07)

You have prepared a USB storage device with the Windows 7 installation files. You connect this device to a

computer and turn the computer on, but you receive a message that no operating system is present.

Which of the following steps should you take to resolve this problem?

1. Configure the computer's BIOS to boot from the floppy disk drive.

2. Configure the computer's BIOS to boot from the network.

3. »Configure the computer's BIOS to boot from the DVD-ROM drive.

4. Configure the computer's BIOS to boot from an attached USB device. <Correct>

Question Number (ID): 104 (680P_4.4_05)

You are in the process of configuring Windows Firewall Connection Security Rules for the computers running

Windows 7 in your environment. You want to allow computers running Windows 7 at Contoso to accept

unauthenticated connections from computers on the help desk network. Help desk computers are located on the

192.168.1.0/24 network. Incoming connections from all other networks should authenticate using Internet

Protocol Security.

Which of the following types of connection security rule should you create to accomplish this goal?

1. Isolation

2. »Authentication exemption <Correct>

3. Tunnel

4. Server-to-server

Page 39: Configuring Windows 7

Question Number (ID): 105 (680P_4.5_02)

You want to allow users to connect to their computers using Remote Desktop without making them members of

the local Administrators group.

To which of the following local groups should you add the user accounts to which you want to grant this access?

1. »Backup Operators

2. Power Users

3. HomeUsers

4. Remote Desktop Users <Correct>

Question Number (ID): 106 (680P_3.2_03)

You are attempting to install a program that was originally written for the Windows XP Professional operating

system on a computer running Windows 7 Professional. Because the application was written before the release of

Windows Vista, it does not provide a User Account Control prompt when it needs to use elevated privileges during

the installation process, and the installation fails. This application is critical; not havíng it instalied would block the

user from migrating to Windows 7.

Which of the following techniques could you use to get this application to install?

1. »Right-click the installer file and edit the compatibility settings. Configure the installer to use Windows XP

compatibility mode

2. Log on using the local administrator account and execute the installer.

3. Right-click the installer file and edit the compatibility settings. Configure the installer to use Windows Vista

compatibility mode.

4. Right-click the installer file and select Run As Administrator. <Correct>

Question Number (ID): 107 (680P_4.5_03)

Which of the following must you do to prepare a computer running Windows 7 computers so that you can manage

it remotely using Windows Remote Shell (WinRS)? (Each correct answer presents part of the solution. Choose

two.)

1. »Open a WinRM exception in Windows Firewall. <Correct>

2. Enable Remote Desktop.

3. »Enable a Telnet exception in Windows Firewall.

4. Enable a WinRM listener. <Correct>

Page 40: Configuring Windows 7

5. Enable a Remote Desktop exception in Windows Firewall.

6. Configure a Telnet server.

Question Number (ID): 108 (680P_4.3_07)

You have an inkjet printer in your home office and a láser printer available at work. You want to use Location

Aware Printing.

What steps can you take to ensure that you print to the appropriate printer depending on your location? (Each

correct answer presents part of the solution. Choose two.)

1. »Configure the Computer Location Group Policy Ítem.

2. Configure the inkjet printer to be the Default printer when you are connected at work.

3. »Configure the inkjet printer to be the Default printer when you are connected at home. <Correct>

4. Configure the láser printer to be the Default printer when you are connected at home.

5. Configure the Pre-populate Printer Search Location Text Group Policy item.

6. Configure the láser printer to be the Default printer when you are connected at work. <Correct>

Question Number (ID): 109 (680P_2.3_01)

Which of the following methods can you use to deploy a customized Windows 7 image to 100 computers on your

network while

meeting three objectives: minimizing the time to perform the installation, minimizing network traffic, and

minimizing the amount of physical resources required?

1. »lnstall Windows 7 from a Windows Deployment Services (WDS) server. <Correct>

2. Install Windows 7 from a network share.

3. Install Windows 7 on each computer from a universal serial bus storage device.

4. Install Windows 7 on each computer using a DVD-ROM.

Page 41: Configuring Windows 7

Question Number (ID): 110 (680P_4.2_05)

Which of the following tools can you use to verify IPv6 connectivity with another host on your local network with

the IPv6 address fd00:0:0:ffde::1b?

1. »Nslookup

2. Ipconfig

3. Ping <Correct>

4. Netstat

Question Number (ID): 111 (680P_3.2_05)

Which of the following tools can you use to assess whether an update released on Microsoft Update adversely

affects the functionality of custom software developed by your organization to execute on computers running

Windows 7?

1. Windows Server Update Services (WSUS)

2. »Microsoft Application Compatibility Toolkit (ACT) <Correct>

3. Windows Automated Installation Kit (Windows AIK)

4. Microsoft Deployment Toolkit

Question Number (ID): 112 (680P_3.4_06)

Several users have reported that Windows Internet Explorer fails when they navigate to a particular page on your

organization's intranet. The page serves up custom content using a browser toolbar that was developed by a

partner organization. You want to verify that the software from the partner organization is causing the problem.

Which of the following could you do to accomplish this goal?

1. Enable the SmartScreen filter.

2. »Configure Internet Explorer to use the High privacy setting.

3. Use Manage Add-Ons to disable add-ons and navigate to the Web site. <Correct>

4. Disable the Pop-Up Blocker.

Page 42: Configuring Windows 7

Question Number (ID): 113 (680P_4.1_02)

Which change should you make to resolve the Internet Protocol (IP) address configuration problem shown in the

exhibit?

1. Change the default gateway address to 10.25.25.1.

2. Change the default gateway address to 10.25.24.1. <Correct>

3. Change the default gateway address to 10.26.25.1.

4. Change the default gateway address to 10.24.24.1.