Q191. - (Topic 5)
You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL).
You attempt to connect to the internal website. You receive the following error message:
"There is a problem with this website's security certificate."
You need to be able to connect to the internal website successfully.
What should you do?
A. From Internet Explorer, add the website to the Local Intranet zone.
B. From Certificate Manager, import the website's certificate into the computer's Trusted Publishers store.
C. From Certificate Manager, import the website's certificate into your Trusted Root Certification Authorities store.
D. From Certificate Manager, import the website's certificate into your Personal store.
Answer: D
Q192. - (Topic 2)
You have a computer that runs windows 7.
The network contains a monitoring server named server1 Computer runs a monitoring service named service1.
Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1.
What should you do?
A. From windows Firewall with Advanced Security, create a predefined rule.
B. From windows Firewall with Advanced Security, create custom rule.
C. From the Network and Sharing Center, modify the network location settings.
D. From the Network and Sharing Center, modify the advanced sharing settings.
Answer: B
Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q193. - (Topic 2)
You have a computer that runs windows 7.
The windows experience index displays the subscores in the following.
Component Subscore
Processor 6.9
Memory (RAM) 5.3
Graphics 3.2
Gaming graphics 4.1
Primary hard disk 4.5
You need to increase the Windows Experience Index base score.
What should you do?
A. Add more RAM.
B. Add a second hard disk.
C. Upgrade the video adapter.
D. Upgrade to a faster processor.
Answer: C
Q194. - (Topic 1)
Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
Answer: B
Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker.
Q195. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Create an Easy Transfer file on a network location.
B. Use the Backup and Restore tool to back up data files for all users.
C. Use the Backup and Restore tool to create a system image on a network location.
D. Create a system repair disk.
Answer: A
Q196. - (Topic 3)
You have a computer that runs Windows 7.
You have a system image backup of the computer.
You install a new application that is configured to run as a service.
You restart the computer and receive a STOP error message.
You need to successfully start Windows 7 in the minimum amount of time.
What should you do?
A. Start the computer from the Windows 7 installation media and select Startup Repair.
B. Start the computer and select Last Known Good Configuration from the advanced startup options.
C. Start the computer and select Safe Mode from the advanced startup options. Restore a restore point.
D. Start the computer and select Safe Mode from the advanced startup options. Restore the system image.
Answer: B
Explanation:
Last Known Good Configuration (Advanced) ) feature in Advanced Boot Options is a recovery option that you use to start your computer with the most recent settings that worked. Last Known Good Configuration (Advanced) restores registry information and driver settings that were in effect the last time the computer started successfully. You should use the Last Known Good Configuration (Advanced) feature when you cannot start Windows 7 after you make a change to your computer, or when you suspect that a change that you just made is causing a problem, for example, if you cannot start Windows after you install a new video driver. When you start your computer by using the Last Known Good Configuration (Advanced) feature, Windows 7 uses the configuration stored in the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSetXX (where by XX are numbers starting with 01 and rising in number to 02, 03, 04 and so on). This is the registry key that is used to store the configuration settings for the Drivers and Services on the system. Each time you boot the system, Windows will be assisted booting by using the registry key "HKEY_LOCAL_MACHINE\System\CurrentControlSet" which will point to another control set key, normally HKEY_LOCAL_MACHINE\System\CurrentControlSet01, (depending on how the system is configured) which contains the setting for the current boot process. Each time Windows boots there will also be a values created under the "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Select" key. These contain REG_DWORD data that enable the Control Keys to operate the way they are designed to. These values tell the CurrentControlSet key which numbered CurrentControlSet to point to enable Windows to boot successfully. The data that tells Last Good Known Configuration which numbered CurrentControlSet to load is also stored under these values. They also contain the data that tells Windows which CurrentContolSet not to use, as there is information stored that lets Windows know what CurrentControlSet has failed to load when Windows was unable to boot.
The Last Known Good Configuration CurrentControlSet will change each time the system configuration for the control set changes. This means that each time you install or uninstall a driver or service, a new numbered CurrentControlSet will be created and stored. If you alter the system, and it is then unable to boot, the Last Known Good Configuration will point to the CurrentControlSet that was last used in a successful boot.
This happens each time that Windows boots and there should typically be only four control sets, although it is not uncommon to have five or six of these Control Sets contained in the registry. Windows will keep track of how many Control Sets are stored and should clear old ones once a certain amount is reached.
If installing a new program or device should render the system unbootable, you may be able to use "Last Known Good Configuration" to restore the damaged Control Set registry key with an earlier key that enabled the system to boot. This will remove the registry key(s) that relates to the problem driver or service. It will not remove the actual driver or service but will render it unusable. This could result in any program or device the was installed after the last boot having to be re-installed as their configuration setting will have been over written. When you perform a system restore following a normal boot or following a boot that uses the Last Known Good Configuration (Advanced) option, a restore point is created that enables you to undo the changes if they do not fix your problem. However, if you perform a system restore when the computer is in Safe Mode or by using the System Recovery options, you cannot undo the restore operation. In this case, if your problem is not resolved, you can run another system restore and choose a different restore point.
Q197. - (Topic 1)
Your company has an Active Directory domain. All computers are members of the domain.
Your network contains an internal Web site that uses Integrated Windows Authentication.
From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication.
You verify that your user account has permission to access the Web site.
You need to ensure that you are automatically authenticated when you connect to the Web site.
What should you do?
A. Create a complex password for your user account.
B. Open Credential Manager and modify your credentials.
C. Add the URL of the Web site to the Trusted sites zone.
D. Add the URL of the Web site to the Local intranet zone.
Answer: D
Explanation:
Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone.
Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited.
Q198. HOTSPOT - (Topic 4)
You use a computer that has Windows 7 installed. You install a legacy application named LegApp.
LegApp is designed for Windows 98 and does not support the 16-bit or 32-bit color quality setting.
You need to configure application compatibility settings for LegApp to meet the following requirements:
. Compatible with Windows 98
. The 8-bit color quality setting must be used
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer:
Q199. - (Topic 2)
You have a computer that runs windows vista. The computer has one partition and 1 GB of RAM.
You need to upgrade the computer to windows 7.
What should you do?
A. Add 1 GB of RAM.
B. Create a second partition.
C. Disable User Account Control (UAC).
D. Install windows Vista Service pack 2 (SP2)
Answer: D
Explanation:
You should keep the following in mind prior to and during the upgrade from Windows Vista to Windows 7:
-Perform a full backup of the computer running Windows Vista prior to performing the installation. - That way, if things go wrong, you can do a full restore back to Windows Vista. You must ensure that Windows Vista has Service Pack 1 or later installed before you can upgrade it to Windows 7. - Ensure that you have the Windows 7 product key prior to the upgrade. - You cannot upgrade between processor architectures. An x86 version of Windows Vista cannot be upgraded to an x64 version of Windows 7, and vice versa. - You can upgrade only to an equivalent or higher edition of Windows 7. - You can upgrade Windows Vista Home Premium to Windows 7 Home Premium, Professional, Enterprise, or Ultimate, but not to Windows 7 Starter. Windows 7 Professional is equivalent to Windows Vista Business. - Ensure that there is at least 10 GB of free disk space on the Windows Vista volume prior to attempting the upgrade.Requirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
-1 GHz 32-bit (x86) or 64-bit (x64) processor- 1 GB of system memory- A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory
Q200. DRAG DROP - (Topic 6)
You capture a Windows Image (.wim) file from a reference computer.
You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to target desktops.
You need to encrypt an administrator account password in the answer file used for the image deployment.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer: