Q221. - (Topic 3) 

You need to prevent a custom application from connecting to the Internet. 

What should you do? 

A. From Windows Firewall, add a program. 

B. From Windows Defender, modify the Allowed items list. 

C. From Windows Firewall with Advanced Security, create an inbound rule. 

D. From Windows Firewall with Advanced Security, create an outbound rule. 

Answer:

Explanation: 

Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1. 

What should you do? 

A. From Windows Firewall with Advanced Security, create a predefined rule. 

B. From Windows Firewall with Advanced Security, create a custom rule. 

C. From Network and Sharing Center, modify the network location settings. 

D. From Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 


Q222. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to configure the computer to meet the following requirements: 

. Generate a new security ID (SID) when the computer starts. 

. Ensure that the Welcome screen appears when the computer starts. 

What should you do? 

A. Run Sysprep.exe /oobe /generalize. 

B. Run Sysprep.exe /audit /generalize. 

C. Run Msconfig.exe and select Selective startup. 

D. Run Msconfig.exe and select Diagnostic startup. 

Answer:

Explanation: 

To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged./generalize Prepares the Windows installation to be imaged. If you specify this option, all unique system information is removed from the Windows installation. The SID is reset, system restore points are cleared, and event logs are deleted. The next time the computer starts, the specialize configuration pass runs. A new SID is created, and the clock for Windows activation resets (unless the clock has already been reset three times)./oobeRestarts the computer in Windows Welcome mode. Windows Welcome enables users to customize their Windows 7 operating system, create user accounts, and name the computer. Any settings in the oobeSystem configuration pass in an answer file are processed immediately before Windows Welcome starts. 


Q223. - (Topic 4) 

You create a new virtual hard disk (VND) on a Windows 7 Enterprise computer. Then you install Windows 7 on the VHD. 

After you reboot the computer, the Windows 7 boot menu shows two different Windows 7 installations titled "Windows 7". 

What should you do? 

A. Add a boot image in WDS. 

B. Run the BCDEdit command. 

C. User Sysprep with an answer file and set the PersistAllDeviceInstalls option in the file to true. 

D. Run the PEImg /Prep command 

E. Create a capture image in WDS. 

F. Run the DiskPart command and the Attach command option. 

G. Run the Start /w ocsetup command. 

H. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. 

I. Run the Dism command with the /Add-Package option. 

J. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. 

K. Run the Dism command with the /Mount-WIM option. 

L. Run the ImageX command with the /Mount parameter. 

M. Run the Dism command with the /Add-Driver option. 

N. User Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc709667(ws.10).aspx 


Q224. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. 

The client computers have a third-party firewall application installed. 

You configure BranchCache on all computers to run in Distributed Cache mode. 

You need to ensure that the client computers can access all cached files. 

What should you do? 

A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. 

B. Check permissions. 

C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443 

D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command. 

F. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

G. Run the netsh branchcache set service mode=DISTRIBUTED command 

H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option. 

I. Create a Group policy that sets Hash Publication for Branchcache as disabled. 

Answer:

Explanation: 

Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic. 

You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode. 

You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache - Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache - Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode. 

You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically. 


Q225. - (Topic 4) 

You use a computer that has Windows SP1 installed. The computer has a shared folder named c:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folders. You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C: \Software folder. 

B. Run the Net Share command. 

C. Run the Net View command. 

D. View the Share permissions on C:\Software. 

Answer:


Q226. DRAG DROP - (Topic 6) 

Your organization needs to perform a Windows Vista to Windows 7 migration for a department with 150 computers. 

You want to use User State Migration Tool (USMT) to automate the migration. 

You need to move user data and custom settings from the source computers to the destination computers by using USMT with minimal downtime or impact to the end users. The transfer must include files in several custom directories located in the root directory of the boot volume. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: 


Q227. - (Topic 5) 

You have a computer that runs Windows 7. The computer is a member of a workgroup. 

You use Encrypting File System (EFS) to protect your local files. 

You need to ensure that you can decrypt EFS files on the computer if you forget your password. 

What should you do? 

A. From Authorization Manager, modify the Authorization Manager options. 

B. Run the cipher.exe /adduser /user:administrator command. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Credential Manager, select Back up vault. 

Answer:

Explanation: Make sure you have a backup of the appropriate encryption certificates 


Q228. - (Topic 2) 

You have a computer that runs Windows 7. 

You need to identify how much disk space is occupied by previous versions. 

What should you do? 

A. At a command prompt, run Diskpart. 

B. At a command prompt, run Vaultcmd. 

C. From System, view the System Protection settings. 

D. From the properties of drive C, view the previous versions settings. 

Answer:

Explanation: 

NOT Diskpart: 

Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.NOT Vaultcmd:Creates, displays and deletes stored credentials.NOT Properties of drive C:Allows you to view contents, but does not show size. 


Q229. - (Topic 5) 

Your company Research department includes client computers that have Windows 7 and Windows Vista installed on separate partitions in a dual-boot configuration. The computers boot into Windows 7 by default or users can choose to boot into Windows Vista during startup. 

The company management has decided that the Windows Vista partition must be deleted from all the computers. 

You need to ensure that the staff of the Research department are not prompted to select a boot option during startup and that Windows 7 is chosen automatically. 

What should you do? 

A. In Windows Vista, from an elevated command prompt, run bcdedit /delete {current}. 

B. Select the Selective startup option button by using msconfig.exe. 

C. In Windows Vista, from an elevated command prompt, run bcdedit /delete {default}. 

D. In Windows 7, from an elevated command prompt, run bcdedit /delete {default}. 

Answer:


Q230. - (Topic 2) 

Your company's chief accountant consults you with a question about a financial spreadsheet. She needs to recover the version of this particular spreadsheet that existed six months ago because it is needed for a financial audit. Using Restore Previous Versions, you find that the oldest version stored is dated three months ago. How can you recover the required file? 

A. Edit the System Protection properties for the volume that hosts the file. Use the Max Usage slider to increase the maximum proportion of the hard disk capacity used for system protection to 70 percent. 

B. Perform a system restore. Select a system restore point that was created six months ago. 

C. Edit the System Protection properties for the volume that hosts the file. Select the Only Restore Previous Versions Of Files setting. 

D. Use the Backup And Restore console to recover the file from a backup set generated six months ago. 

Answer: