Q71. - (Topic 2) 

You have a computer that runs Windows Vista (x86). 

You need to perform a clean installation of Windows 7 (64-bit). 

What should you do? 

A. From the Windows 7 installation media, run Rollback.exe. 

B. From the Windows 7 installation media, run Migsetup.exe. 

C. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Custom (advanced) option. 

Answer:

Explanation: 

When you are performing a clean installation, you should select Custom (Advanced). Almost all installations ofm Windows 7 that you will perform will be of the Custom (Advanced) type rather than upgrades. You can initiate upgrade installations only from within Windows Vista or Windows 7.NOT Rollback, Migsetup, or Upgrade:Specified clean installation not migration, update or rollback. 


Q72. HOTSPOT - (Topic 6) 

You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed. 

Your manager wants you to upgrade all computers to Windows 7. 

You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista. 

In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. ) 

Answer: 


Q73. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q74. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. From Internet Options, modify the security settings for the Internet zone. 

B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting. 

C. From Internet Options, select Delete browsing history on exit. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:


Q75. - (Topic 3) 

You have a computer that runs Windows 7. 

You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7. 

You need to start Windows 7 in the minimum amount of time. 

What should you do? 

A. From Windows XP, modify the default path in the boot.ini file. 

B. From Windows XP Recovery Console, run the Fixboot command. 

C. Start the computer from the Windows 7 installation media and select Install now. 

D. Start the computer from the Windows 7 installation media and run Startup Repair. 

Answer:

Explanation: When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released 


Q76. - (Topic 4) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

. Include the CPU, Memory, and Disk subsystems. 

. Send notifications to an administrator for predefined thresholds. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:


Q77. - (Topic 2) 

A user telephones your help desk. She has just accidentally deleted a file she was working on earlier that day. 

You have configured her computer to carry out backups every evening, and you installed a new graphics driver two days ago. 

How should you advise the user to retrieve her file? 

A. Open the Backup And Restore console and restore the file from backup. 

B. Use the Restore Previous Versions feature to restore the file. 

C. Open her Recycle Bin, right-click the file, and choose Restore. 

D. Perform a system restore. 

Answer:


Q78. - (Topic 5) 

All client computers in your company network have Windows 7 Professional installed. The computers are configured with automatic scheduled Microsoft updates installation. 

You receive a support call indicating that after the recently installed update, one of the business applications is unable to start on the computers. 

You need to remove the most recent Microsoft update from the computers. 

What should you do first? 

A. From the Programs and Features, open the Installed Updates window. 

B. From the Services console, open the Windows Update service. 

C. From the Event Viewer, open the System log. 

D. From the Task Scheduler, view the WindowsBackup node. 

Answer:


Q79. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 


Q80. - (Topic 3) 

Your company uses Windows Deployment Services (WDS) to deploy Windows 7. 

You create a new image of Windows 7. 

You need to ensure that you can deploy the image by using WDS. 

What should you do? 

A. From the Windows Deployment Services snap-in, add a new install image. 

B. From the Windows Deployment Services snap-in, add a new boot image. 

C. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot. 

D. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images. 

Answer:

Explanation: 

Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image. Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice.