TS: Windows 7, Configuring
Question No: 11 – (Topic 1)
Your company has an Active Directory domain. All computers are members of the domain. Your network contains an internal Web site that uses Integrated Windows Authentication.
From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication.
You verify that your user account has permission to access the Web site.
You need to ensure that you are automatically authenticated when you connect to the Web site.
What should you do?
Create a complex password for your user account.
Open Credential Manager and modify your credentials.
Add the URL of the Web site to the Trusted sites zone.
Add the URL of the Web site to the Local intranet zone.
Answer: D Explanation:
Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone.
Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited.
Question No: 12 – (Topic 1)
You have a computer that runs Windows 7. A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users. What should you do?
From the printer#39;s properties, assign the Print permission to the Sales group.
From the printer#39;s properties, assign the Manage Documents permission to the Sales group.
From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
Answer: A Explanation:
The available permissions are:
Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.
Question No: 13 – (Topic 1)
You have a computer that runs Windows 7. You perform an image backup.
A virus infects the computer and causes the computer to become unresponsive. You need to restore the computer as quickly as possible.
What should you do?
Start the computer by using the Last Known Good Configuration feature.
Start the computer from the Windows 7 DVD and then use the Startup Repair tool.
Start the computer from the Windows 7 DVD and then use the System Image Recovery tool.
Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe.
Question No: 14 – (Topic 1)
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?
Question No: 15 – (Topic 1)
You have a computer that runs Windows 7. The computer has two volumes named volume C and volume D.
You create a document on volume D.
You manually create a restore point and modify the document.
You view the properties of the document as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can restore the current version of the document if the document is modified.
What should you do first?
Run Disk Cleanup on volume D.
Enable auditing on the document.
Turn on System Protection for volume D.
Start the Volume Shadow Copy Service (VSS).
Answer: C Explanation: System Protection
System protection regularly creates and saves information about your computer’s system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson.
Question No: 16 – (Topic 1)
You want to create a 20-GB native VHD called Systemvhd in a folder called Windows 7 on an external U hard disk with the drive designation G:. Which command do you use?
create vdisk file=g:\windows7\systemvhd maximum=20000
create vdisk file=g:\windows7\systemvhd.vhd maximum=20000
create vdisk file=g:\windows7\systemvhd.vhd maximum=20
create vdisk file=g:\windows7\systemvhd maximum=20
Question No: 17 – (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives.
What should you do?
From the local Group Policy, modify an application control policy.
From Control Panel, modify the BitLocker Drive Encryption settings.
From Device Manager, modify the settings of all removable devices.
From the local Group Policy, modify a removable storage access policy.
Question No: 18 – (Topic 1)
Which Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts?
Question No: 19 – (Topic 1)
You have a reference computer that runs Windows 7. You plan to deploy an image of the computer.
You create an answer file named answer.xml.
You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?
Imagex.exe /append answer.xml /check
Imagex.exe /mount answer.xml /verify
Sysprep.exe /reboot /audit /unattend:answer.xml
Sysprep.exe /generalize /oobe /unattend:answer.xml
Answer: D Explanation:
To prepare the reference computer for the user, you use the Sysprep utility with the
/generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize
/shutdown Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged.
Question No: 20 – (Topic 1)
You have a standalone computer that runs Windows 7. Multiple users share the computer. You need to ensure that you can read the content of all encrypted files on the computer.
What should you do?
Run the Certificates Enrollment wizard and then run Certutil.exe -importpfx.
Run the Certificates Enrollment wizard and then run Certutil.exe -installcert.
Run Cipher.exe /r and then add a data recovery agent from the local security policy.
Run Cipher.exe /rekey and then import a security template from the local security policy.
Answer: C Explanation: Cipher
Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is quot;deallocated.quot; After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes
a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|