TS: Windows 7, Configuring
Question No: 51 – (Topic 1)
A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate?
Windows Anytime Upgrade
Answer: D Explanation:
Windows Anytime Upgrade
With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Question No: 52 – (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform?
The System Performance Data Collector Set should be run from Performance Monitor.
The informational events should be reviewed from Reliability Monitor.
The Software Environment should be reviewed from System Information.
The System Diagnostics Report should be reviewed from Performance Monitor.
Question No: 53 – (Topic 1)
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that other computers in the branch office can access the cached content on your computer.
What should you do?
Turn on Internet Information Services (IIS).
Configure the computer as a hosted cache client.
Configure the BranchCache service to start automatically.
Modify the Windows Firewall with Advanced Security rules.
Answer: D Explanation: Distributed Cache Mode
Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web
Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. You must select Allow the connection for the BranchCache client to be able to send traffic on this port.
Question No: 54 – (Topic 1)
You have a computer that runs Windows 7. You open the Disk Management snap-in as shown in the exhibit. (Click the Exhibit button.)?
You need to ensure that you can create a new partition on Disk 0. What should you do?
Shrink volume C.
Compress volume C.
Convert Disk 0 into a dynamic disk.
Create and initialize a Virtual Hard Disk (VHD).
Answer: A Explanation:
Needs to have sufficient space in order to create a new partition. Hence shrinking the C:
partition will create additional space that can be used for a new partition.
Question No: 55 – (Topic 1)
To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)?
Windows 7 Home Professional (x86).
Windows 7 Ultimate (x86)
Windows 7 Ultimate (x64)
Windows 7 Enterprise (x64)
Answer: B Explanation: 1048 4079
Windows 7 Upgrade paths:
The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons: All versions are support Hardware wise.
Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory a 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space a graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory XP Mode
Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory
The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 Professional
Windows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.
Windows 7 Enterprise and Ultimate Editions
The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.
Question No: 56 – (Topic 1)
You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after 10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has not entered sleep mode.
You need to identify what is preventing the computer from entering sleep mode. What should you do?
At a command prompt, run Powercfg energy.
At a command prompt, run Systeminfo /s localhost.
From Performance Monitor, review the System Summary.
From Performance Information and Tools, review the detailed performance and system information.
Answer: A Explanation:
Command-line Power Configuration
Powercfg.exe is a command-line utility that you can use from an administrative command prompt to manage Windows 7 power settings. It is possible to use Powercfg.exe to
configure a number of Windows 7 powerrelated settings that you cannot configure through Group Policy or the Advanced Plan Settings dialog box. You can use Powercfg.exe to configure specific devices so that they are able to wake the computer from the Sleep state. You can also use Powercfg.exe to migrate power policies from one computer running Windows 7 to another by using the import and export functionality.
Check the computer for common energy-efficiency and battery life problems. Provides report in Hypertext Markup Language (HTML) format.For more information on Powercfg.exe, consult the following Microsoft TechNet document: http://technet.microsoft.com/en-us/library/cc748940.aspx.
Question No: 57 – (Topic 1)
You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails.
You have two disks and unallocated space on your second disk. What do you do?
Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.256
Create a RAID-0 volume.
Create a RAID-1 volume.
Create a RAID-5 volume.
Question No: 58 – (Topic 1)
Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections.
What should you do?
Install a computer certificate.
Create a new network connection.
Enable the Network Discovery firewall exception.
Add the computer account to the Network Configuration Operators group.
Answer: A Explanation: Certificates
The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication.DirectAccess Client Configuration
Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer’s client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates.
Question No: 59 – (Topic 1)
Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com.
Your network is configured to use only IPv6.
You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.
Which type of record should you request?
Answer: B Explanation:
The resolution of host names to IPv6 addresses is accomplished through DNS (apart from link-local addresses that are not stored by DNS and resolve automatically). The procedure is the same as for IPv4 address resolution with the computer name and IPv6 address pair being stored in a AAAA (quad-A) DNS resource record, which is equivalent to an A or host record for IPv4. Reverse DNS lookup that returns a computer name for an IPv6 address is implemented by a pointer (PTR) DNS resource record that is referred to the IPv6 reverse lookup zone (or tree) ipv6.arpa, which is the equivalent of the in-addr.arpa reverse lookup zone in Ipv4.
AAAAAn AAAA (quad-A) resource record resolves a host name to an IPv6 address.AAn A (address) resource record resolves a host name to an IPv4 address.HINFOHost information (HINFO) resource record. Specifies the type of CPU and operating system in the cpu_type and os_type fields, respectively, for the host DNS domain name in the owner field. Well-known CPU and operating system types that are most often used are noted in RFC 1700. This information can be used by application protocols such as FTP, which use special procedures when communicating with computers of a known CPU and operating system type.
The NAPTR represents a Naming Authority Pointer. NAPTR records map between sets of URNs, URLs and plain domain names and suggest to clients what protocol should be used to talk to the mapped resource. Each NAPTR record contains a service name, a set of flags, a regexp rule, an order value, a preference and a replacement. Multiple records can be chained together in a cascade to rewrite URIs in fairly sophisticated, but deterministic ways. These cascading rules have been standardized in RFC2915 and RFC3403.
Question No: 60 – (Topic 1)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
->User1 must be allowed to delete all files in Folder1
->Members of Group1 must be able to create files in Folder1
->All other members of Group1 must be prevented from deleting files they did not create in
->Folder1 All users must be prevented from modifying the permissions on Folder1
What should you do?
Assign Group1 the Write permission. Assign User1 the Modify permission.
Assign Group1 the Modify permission. Assign User1 the Write permission.
Deny Group1 the Write permission. Assign User1 the Modify permission.
Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A Explanation:
File and Folder Permissions
ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file#39;s contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead amp; ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file#39;s contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|