Q271. - (Topic 6) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create a system repair disk. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on an external hard disk. 

D. Create an Easy Transfer file on an external hard disk. 

Answer:


Q272. - (Topic 6) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. What should you do? 

A. From Display, click Connect to a projector. 

B. From Network and Sharing Center, create a temporary network and run Displayswitch.exe. 

C. From Device Manager, click Add legacy hardware. 

D. From the command prompt, run the NetProj command. 

Answer:


Q273. - (Topic 1) 

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point. 

You need to connect a computer that runs Windows 7 to the wireless access point. 

Which security setting should you select for the wireless connection? 

A. 802.1x 

B. WPA-Personal 

C. WPA2-Enterprise 

D. WPA2-Personal 

Answer:

Explanation: 

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server). WPA2-Enterprise WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program: 

-EAP-TLS 

-EAP-TTLS/MSCHAPv2 

-PEAPv0/EAP-MSCHAPv2 

-PEAPv1/EAP-GTC 

-EAP-SIM 

If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X. 


Q274. - (Topic 2) 

A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named 

Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. (Click the Exhibit button.) 

The permissions for Group1 are shown in the Group1 Permissions exhibit. (Click the Exhibit button.) 

You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do? 

A. On Folder1, assign the Full control permission to User1. 

B. On Folder1, remove the Deny - Write permission for Group1. 

C. Share Folder1. Assign User1 the Read and Change share permission. 

D. Share Folder1. Assign Group1 the Read and Change share permission. 

Answer:


Q275. - (Topic 3) 

You have a computer that runs Windows 7. 

Windows Backup is configured to store backups on an external drive. 

You create a new NTFS volume on the computer. 

You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups. 

What should you do? 

A. From Backup and Restore, select Change settings. 

B. From Backup and Restore, select Create a system image. 

C. From the System Protection tab, create a restore point. 

D. From the System Protection tab, enable system protection for the new volume. 

Answer:

Explanation: 

Backups are configured and scheduled by using the Backup And Restore console under 

System And Security in Control Panel. 

The Change Settings option is not available unless you have configured a backup schedule 

and performed a backup. 


Q276. - (Topic 1) 

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

The solution must also reduce the amount of bandwidth used between the two offices. 

What should you do? 

A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:

Explanation: 

Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista. and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack. 


Q277. - (Topic 6) 

You work as the desktop support technician at Abc.com. 

The Abc.com network consists of a single Active Directory domain named Abc.com. 

All client computers on the Abc.com network run Windows Vista Business. 

You have been instructed to upgrade a client computer named GB680 to Microsoft Windows 7 Professional. 

GB680 has the following specifications: 

Drive C (system drive) with 12 GB of free space 

Drive D (data drive) with 40 GB of free space 

Four memory slots with two occupied by 512 MB memory sticks 

One 2.0 GHz 32-bit processor 

You need to ensure that Windows 7 Professional can be installed on GB680. 

What should you do? 

A. Install Windows 7 on Drive D. 

B. Create more free space on Drive C. 

C. Upgrade the memory. 

D. Upgrade the processor. 

Answer:


Q278. - (Topic 1) 

Which of the following is not a rating for games in Windows 7? 

A. General Audience (G) 

B. Everyone (E) 

C. Teen (T) 

D. Adults Only (AO) 

Answer:


Q279. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. Create an EFS Data Recovery Agent by using Group Policy. 

B. From User Accounts, select Manage your file encryption certificates. 

C. Run the cipher.exe /adduser /user:administrator command. 

D. Run the manage-bde -on C: -RecoveryPassword password command. 

Answer:

Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever. 


Q280. - (Topic 2) 

You need to increase the size of a paging file. 

What should you do? 

A. From Disk Management, shrink the boot partition. 

B. From Disk Management, shrink the system partition. 

C. From System, modify the Advanced system settings. 

D. From System, modify the System protection settings. 

Answer:

Explanation: 

1. Click Start, right-click My Computer, and then click Properties. 

2. In the System Properties dialog box, click the Advanced tab. 

3. In the Performance pane, click Settings. 

4. In the Performance Options dialog box, click the Advanced tab. 

5. In the Virtual memory pane, click Change. 

6. Change the Initial size value and the Maximum size value to a higher value, click Set, and then click OK. 

7. Click OK to close the Performance Options dialog box, and then click OK to close the System Properties dialog box. 

Adjusting Paging File SizeFor virtual-memory support, Windows 2000 creates one paging file called Pagefile.sys on the disk or volume on which the operating system is installed. The default size is equal to 1.5 times the amount of physical memory. A small paging file limits what can be stored and might exhaust your virtual memory for applications. If you are short on RAM, more paging occurs, which generates extra activity for your disks and slows response times for the system.Expand the Default SizeExpanding the default size of the paging file can increase performance if applications are consuming virtual memory and the full capacity of the existing file is being used. To determine how large your paging file should be based on your system workload, monitor the Process (_Total)\Page File Bytes counter. This indicates, in bytes, how much of the paging file is being used. A large paging file uses disk storage space, so do not create a large paging file on a disk that is very active (for example, one that services heavy application or network activity) or one that has limited space. Change the file size gradually and test performance until you find the optimal balance between paging file and disk space usage. The operating system requires a minimum of 5 MB of free space on a disk. For more information, see "Examining and Tuning Disk Performance" in this book. Before increasing the file size, make sure you have adequate disk space, particularly on your servers.