70-682

Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician


Note: The answer is for reference only, you need to understand all question.
QUESTION 1
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the technician can view the configurations of the DHCP servers. What should you do?
A. Instruct the technician to customize the Start menu to display the administrative tools.
B. Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.
C. Request that the technician be added to the Server Operators group in Active Directory.
D. Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.

Answer: B
Question 2
Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit. (Click the Exhibit button.) You need to resolve the network connectivity issue. The solution must adhere to the company policy. What should you instruct help desk to do?


A. Modify the network configuration and define the IPv4 default gateway.
B. Modify Windows Firewall and enable File and Printer Sharing in the public profile.
C. Modify Windows Firewall and enable File and Printer Sharing in the domain profile.
D. Modify the network configuration to automatically obtain an IP address and a DNS server address.

Answer: D Question 3


Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?
A. BranchCache
B. DirectAccess
C. Distributed File System Replication (DFSR)
D. Universal Group Membership Caching

Answer: A
Question 4
All client computers on your company network were recently migrated from Windows XP to Windows 7. Employees use Internet Explorer 8. Each time employees access a Web application, they are prompted to install an add-on. After each installation, the application restarts and prompts the employees to install the add-on again. You need to ensure that employees can run the application. What should you do?
A. Use a script to install the add-on in Windows XP Mode.
B. Use a script to run the application in Windows XP Compatibility Mode.
C. Add the class identifier of the add-on to the Add-on list in Group Policy.
D. Set the Deny all add-ons unless specifically allowed in the Add-on list Group Policy setting to Disabled.
Answer: C
Question 5

All client computers on your company network were recently upgraded from Windows Vista to Windows7. Several employees use a scanner to import document images into a database. They install a new scanning application on their computers. The application updates the device driver for the scanners as part of the installation process. Employees report that the application can no longer connect to the scanner. You need to ensure that the employees can use the scanner. What should you do?
A. Roll back the device driver to the previous version.
B. Reinstall the application in Windows Vista compatibility mode.
C. Set the application compatibility properties to run the application as an administrator.
D. Restart the computer by using the System Configuration tool to load only basic devices and services.

Answer: A
Question 6
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?
A. Modify the time zone for the computer.
B. Modify the IPv4 settings on the computer.
C. Create an A record for the computer in an internal DNS zone.
D. Request that an administrator create a prestaged computer account in the domain.

Answer: B
Question 7
Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?
A. Configure the IPv6 protocol on the Windows 7 computers.
B. Configure the network shares on the Windows 7 computers to include the user names of all employees.
C. Configure the network shares on the Windows XP computers to include the user names of all employees.

D. Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

Answer: D
Question 8
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?
A. Create an Audit only restriction based on the version of the software.
B. Create an Audit only restriction based on the publisher of the software.
C. Create an Enforce rule restriction based on the version of the software.
D. Create an Enforce rule restriction based on the publisher of the software.

Answer: C
Question 9
All client computers on your company network run Windows 7. A computer is unable to connect to network resources. The configuration of the computer is as shown in the following table. You need to ensure that the computer is able to connect to network resources. What should you do?

A. Change the IP address to 131.107.3.254.
B. Change the subnet mask to 255.255.248.0.
C. Change the default gateway to 131.107.0.1.
D. Change the preferred DNS server to 131.107.3.1.

Answer: C
Question 10
All client computers on your company network run Windows 7 and are members of an Active Directory Domain

Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?
A. Configure the Network authentication (Shared mode) setting.
B. Apply a Wireless Network Policy to set the network type to WPA-PSK.
C. Apply a Wireless Network Policy to automatically connect to the company wireless network.
D. Apply a Wireless Network Policy to set the company wireless network as the preferred network.

Answer: D
Question 11
All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?
A. Set the VPN server to Layer 2 Tunneling Protocol.
B. Set the VPN server to Secure Socket Tunneling Protocol.
C. Set the VPN server to Internet Key Exchange version 2.
D. Configure the Direct Access feature on the VPN server.

Answer: A
Question 12
Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?
A. Configure a Windows Connect Now Group Policy.
B. Configure a Wireless Network (IEEE 802.11) Policy.
C. Delete the rogue network from the Network and Sharing Center on each computer.
D. Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

Answer: B
Question 13
Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?

A. Event Forwarding
B. MSConfig.exe
C. Problem Steps Recorder
D. Reliability Monitor

Answer: B
Question 14
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?
A. Create Executable Rules by selecting the Create Default Rules option.
B. Create Windows Installer Rules by selecting the Create Default Rules option.
C. Create the following Windows Installer Rule.Deny C Everyone -%OSDRIVE%\Users\\Downloads\*
D. Create the following Executable Rule.Deny -Everyone -%OSDRIVE%\Users\\Documents\*

Answer: A
Question 15
All client computers on your company network run Windows 7. The Finance department staff run an application that collects data from 09.30 hours to 15.00 hours everyday. After data collection, the application generates reports that contain data aggregation for the day and the previous week. During report generation, the Finance department staff experience slow performance on their computers. You discover that the usage of the processor on these computers is between 90 and 100 percent. You need to reduce the impact of report generation on the Finance computers. What should you do?
A. Set the priority of the application to Low.
B. Set the priority of the application to Real-time.
C. Configure the processor affinity mask to ensure that the application uses all the available processors.
D. Modify the memory settings of the computers to optimize the performance of the background applications.
Answer: A Question 16

Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?
A. Event Trace Data Collector Set
B. Performance Counter Data Collector Set
C. Performance Counter Alert Data Collector Set
D. System Configuration Information Data Collector Set

Answer: B
Question 17
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?
A. WLAN AutoConfig
B. WWAN AutoConfig
C. Computer Browser
D. Portable Device Enumerator Service

Answer: B
Question 18
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords. You need to minimize the number of account lockouts that occur after the users change their passwords. What should you instruct the users to do?


A. Delete all entries from the Credential Manager vault.
B. Change their passwords and then create a password reset disk.
C. Change their passwords and then configure App2 to log on by using a service account.
D. Change their passwords and then log off and log back on to their computers.

Answer: C
Question 19
Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Each day, 100 users in Office2 download a 5-MB product catalog file from a share on Server1. The network administrator reports that the downloads cause an excessive load on the WAN link between Office1 and Office2. You need to recommend a solution to minimize WAN utilization. The solution must not require that additional servers be deployed. What should you recommend?


A. BranchCache in distributed cache mode
B. BranchCache in hosted cache mode
C. Distributed File System Replication (DFSR)
D. File Server Resource Management (FSRM)

Answer: A
Question 20
Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Humongous Insurance users who work at Fabrikam report that when they move between different wireless networks, they are prompted to manually reconnect to the VPN. You need to ensure that the users can automatically reconnect to the VPN when they move between wireless networks. What should you request?


A. that a network administrator create a CNAME record named AUTODISCOVER in the humongousinsurance.com DNS zone
B. that a network administrator enable Network Load Balancing on NPAS1
C. that users use only IKEv2-based VPN connections
D. that users use only SSTP-based VPN connections

Answer: C
Question 21
Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \\AppServer1\AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario Users in branch office 2 map drives to shared folders on SRV1. The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access. You need to ensure that the users can access the shared folders if the WAN link fails. What should you do?


A. Instruct a desktop support technician to configure Offline Files on the Windows 7 computers.
B. Instruct a desktop support technician to configure BranchCache on the Windows 7 computers.
C. Request that a domain administrator deploy a domain controller in branch office 2.
D. Request that a domain administrator enable Universal Group Membership Caching for branch office 2.

Answer: A
Question 22
Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \\AppServer1\AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario VPN users report that they cannot access shared resources in the branch offices. They can access shared resources in the main office. Users in the main office report that they can access shared resources in the branch offices. You need to ensure that the VPN users can access shared resources in the

branch offices. What should you request?

A. that a change be made to the routing table on VPN1
B. that VPN1 be configured to support PPTP-based VPN connections
C. that the routers between the main office and the branch offices be reconfigured
D. that a DNS record for servers in the branch offices be added to the Internet DNS zone for fourthcoffee.com

Answer: A
Question 23
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees. Active Directory ConfigurationThe network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP ConfigurationThe DHCP servers are configured as shown in the following table. Computer Information All corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with DirectAccess. The company is running a pilot project to test DirectAccess for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario The help desk reports that remote desktop connections are not enabled on the public computers in the chalets. Consequently, the help desk must instruct local staff to enable remote desktop connections on each public computer. You need to ensure that remote desktop connections are enabled when public computers are deployed in the chalets. What should you do?


A. Enable Remote Desktop Connection in the standard computer image.
B. Instruct the help desk to enable Windows Remote Management (WinRM) on the public computers.
C. Request that a network administrator create a logon script for the domain.

D. Request that a network administrator create a new Group Policy to enable remote desktop connections. Link the new Group Policy to each site.

Answer: A
Question 24
Start of repeated scenarioYou are an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees. Active Directory ConfigurationThe network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP ConfigurationThe DHCP servers are configured as shown in the following table. Computer Information All corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with DirectAccess. The company is running a pilot project to test DirectAccess for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario Remote users report that after they renew their smart card certificates, they are unable to log on to their computers by using their smart cards. You need to ensure that users can log on by using their smart cards. What should you instruct the users to do?



A. Change their smart card PINs.
B. Request a new smart card certificate.
C. Log on by using their user names and passwords, and then lock and unlock their computers.
D. Establish a VPN connection from the logon screen and use their smart cards for authentication.

Answer: D
Question 25
Start of repeated scenarioYou are an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees.
Active Directory ConfigurationThe network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP Configuration The DHCP servers are configured as shown in the following table. Computer InformationAll corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with DirectAccess. The company is running a pilot project to test DirectAccess for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario Users report that it takes a long time to access resources by using DirectAccess. You need to provide the network administrator with a network capture of DirectAccess traffic. Which tool should you use?



A. Netsh.exe
B. Netstat.exe
C. Perfmon.exe
D. Winsat.exe

Answer: A
Question 26
You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?

A. From Credential Manager, add a Windows credential.
B. From Credential Manager, add a certificate-based credential.
C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Answer: C
Question 27
You have a computer that runs Windows 7. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first?
A. Run Sdbinst.exe.
B. Run Msiexec.exe.
C. Right-click the application executable file and modify the compatibility settings.
D. Right-click the application executable file and modify the advanced security settings.

Answer: A
Question 28
You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
A. Msconfig.exe
B. Slui.exe
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter

Answer: C
Question 29
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy?
A. Enable the Prevent redirection of USB devices setting.
B. Enable the Prevent installation of removable devices setting.
C. Disable the WPD Devices. Deny read access setting.
D. Disable the Allow administrators to override Device Installation Restriction policies setting.


Answer: B
Question 30
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What should you do?
A. Run Winrm quickconfig on Computer1.
B. Run Winrm quickconfig on Computer2.
C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

Answer: B
Question 31
You have a computer that runs Windows 7. A user installs a third-party media player on the computer. You discover that all media files automatically open by using the third-party media player. You need to ensure that all media files open automatically by using Windows Media Player. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Select a media file. Right-click the file and select Open with.
B. Select a media file. Right-click the file and select Restore previous versions.
C. From Control Panel, modify the Set your default programs settings.
D. From Control Panel, modify the Set program access and computer defaults settings.

Answer: C
Question 32
You start a computer by using Windows Preinstallation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?
A. Run Peimg.exe and specify the device driver path.
B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the InitializeNetwork command.
Answer: B
Question 33

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request?
A. A
B. AAAA
C. HINFO
D. NAPTR

Answer: B
Question 34
You have a computer that runs Windows 7. You connect to your companys network by using a VPN connection. You discover that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites. You need to access Internet Web sites while you are connected to the VPN. What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

Answer: D
Question 35
You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You need to start the computer from the VHD. What should you do?
A. From Diskpart.exe, run Select vdisk.
B. From Disk Management, modify the active partition.
C. Run Bootcfg.exe and specify the /default parameter.
D. Run Bcdedit.exe and modify the Windows Boot Manager settings.
Answer: D
Question 36
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do?

A. From a computer that runs Windows 7, change the file system of the USB drive.
B. From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.
C. Log on to Windows XP as member of the Administrators group.
D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

Answer: B
Question 37
Your network contains 100 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. You must achieve this goal by using the minimum amount of administrative effort. What should you install?
A. Microsoft Application Compatibility Toolkit (ACT)
B. Microsoft Assessment and Planning (MAP) Toolkit
C. Microsoft Deployment Toolkit (MDT)
D. Windows Automated Installation Kit (AIK)

Answer: A
Question 38
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) Other users on the network receive an IPv6 address for ISATAP. You need to ensure that your computer receives an IPv6 address for ISATAP. What should you do?


A. Run Ipconfig /renew6.
B. Run Ipconfig /setclassid6.
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.

Answer: D
Question 39
You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C
Question 40
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?


A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.

Answer: D
Question 41
You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.
C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.
Answer: C Question 42

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do?
A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.

Answer: A
Question 43
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. At the branch office, a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers from retrieving cached content from Computer1. What should you do on Computer1?
A. At the command prompt, run Netsh branchcache flush.
B. At the command prompt, run Netsh branchcache dump.
C. Modify the Configure BranchCache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

Answer: A
Question 44
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running . Windows Media Player. All other users must be allowed to run Windows Media Player. You must achieve this goal by using the least amount of administrative effort. What should you do?
A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.
Answer: D
Question 45
You have a computer that runs Windows 7. You log on to the computer by using a user account that is a

member of Administrators group. From Windows Explorer you open \windows\system32\drivers\etc\hosts in Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that you can save changes to C.\windows\system32\drivers\etc\hosts. What should you do?
A. Stop the Windows Search service.
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the User Account Control (UAC) settings to Notify me only when program try to make changes to my computer.

Answer: C
Question 46
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.

Answer: C
Question 47
You have an answer file for a Windows 7 installation. You need to perform an unattended installation of Windows 7 by using the answer file. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.
B. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD.
C. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
D. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
Answer: A Question 48

You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. What should you do?
A. Copy install.wim from the Windows 7 installation media to the VHD.
B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.
C. Start the computer by using the Windows 7 installation media and then select Install now.
D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe.

Answer: B
Question 49
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do?
A. At the command prompt, run Winrs Cr.computer2 query.
B. At the command prompt, run Winrm id Cremote.computer2.
C. From Windows PowerShell, run Get-PSSession Computer2.
D. From Windows PowerShell, run Get-PSSessionConfiguration Computer2.

Answer: B
Question 50
You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.
Answer: C
Question 51
You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file.

What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C
Question 52
You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
A. Msconfig.exe
B. Slui.exe
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter

Answer: C
Question 53
You start a computer by using Windows Preinstallation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?
A. Run Peimg.exe and specify the device driver path.
B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the InitializeNetwork command.

Answer: B
Question 54
You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.

D. From the Remote Desktop Connection options, modify the Display configuration settings.

Answer: C
Question 55
You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?
A. From Credential Manager, add a Windows credential.
B. From Credential Manager, add a certificate-based credential.
C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Answer: C
Question 56
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.

Answer: C
Question 57
You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.
C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.
Answer: C Question 58

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request?
A. A
B. AAAA
C. HINFO
D. NAPTR

Answer: B
Question 59
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do?
A. At the command prompt, run Winrs Cr.computer2 query.
B. At the command prompt, run Winrm id Cremote.computer2.
C. From Windows PowerShell, run Get-PSSession Computer2.
D. From Windows PowerShell, run Get-PSSessionConfiguration Computer2.

Answer: B
Question 60
You have a computer that runs Windows 7. A user installs a third-party media player on the computer. You discover that all media files automatically open by using the third-party media player. You need to ensure that all media files open automatically by using Windows Media Player. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Select a media file. Right-click the file and select Open with.
B. Select a media file. Right-click the file and select Restore previous versions.
C. From Control Panel, modify the Set your default programs settings.
D. From Control Panel, modify the Set program access and computer defaults settings.
Answer: C
Question 61

You have a computer that runs Windows 7. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first?
A. Run Sdbinst.exe.
B. Run Msiexec.exe.
C. Right-click the application executable file and modify the compatibility settings.
D. Right-click the application executable file and modify the advanced security settings.

Answer: A
Question 62
You have an answer file for a Windows 7 installation. You need to perform an unattended installation of Windows 7 by using the answer file. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.
B. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD.
C. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
D. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).

Answer: A
Question 63
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) Other users on the network receive an IPv6 address for ISATAP. You need to ensure that your computer receives an IPv6 address for ISATAP. What should you do?


A. Run Ipconfig /renew6.
B. Run Ipconfig /setclassid6.
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.

Answer: D
Question 64
You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. What should you do?
A. Copy install.wim from the Windows 7 installation media to the VHD.
B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.
C. Start the computer by using the Windows 7 installation media and then select Install now.
D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe.

Answer: B
Question 65
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must achieve this goal by using the least amount of administrative effort. What should you do?

A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.

Answer: D
Question 66
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy?
A. Enable the Prevent redirection of USB devices setting.
B. Enable the Prevent installation of removable devices setting.
C. Disable the WPD Devices. Deny read access setting.
D. Disable the Allow administrators to override Device Installation Restriction policies setting.

Answer: B
Question 67
You have a computer that runs Windows 7. You connect to your companys network by using a VPN connection. You discover that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites. You need to access Internet Web sites while you are connected to the VPN. What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

Answer: D
Question 68
Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do?

A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.

Answer: A
Question 69
You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You need to start the computer from the VHD. What should you do?
A. From Diskpart.exe, run Select vdisk.
B. From Disk Management, modify the active partition.
C. Run Bootcfg.exe and specify the /default parameter.
D. Run Bcdedit.exe and modify the Windows Boot Manager settings.

Answer: D
Question 70
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do?
A. From a computer that runs Windows 7, change the file system of the USB drive.
B. From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.
C. Log on to Windows XP as member of the Administrators group.
D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

Answer: B
Question 71
Your network contains 100 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. You must achieve this goal by using the minimum amount of administrative effort. What should you install?
A. Microsoft Application Compatibility Toolkit (ACT)
B. Microsoft Assessment and Planning (MAP) Toolkit

C. Microsoft Deployment Toolkit (MDT)
D. Windows Automated Installation Kit (AIK)

Answer: A
Question 72
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. At the branch office, a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers from retrieving cached content from Computer1. What should you do on Computer1?
A. At the command prompt, run Netsh branchcache flush.
B. At the command prompt, run Netsh branchcache dump.
C. Modify the Configure BranchCache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

Answer: A
Question 73
You have a computer that runs Windows 7. You log on to the computer by using a user account that is a member of Administrators group. From Windows Explorer you open \windows\system32\drivers\etc\hosts in Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that you can save changes to C.\windows\system32\drivers\etc\hosts. What should you do?
A Stop the Windows Search service.
C. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D Change the User Account Control (UAC) settings to Notify me only when program try to make changes to my computer.

Answer: C
Question 74
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What should you do?
A. Run Winrm quickconfig on Computer1.
B. Run Winrm quickconfig on Computer2.

C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

Answer: B
Question 75
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?

A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.

Answer: D
Question 76
Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table. The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report that they are unable to connect to the wireless network in office 1 from their portable computers. A help desk administrator manually provides the users with access to the wireless network. You need to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless network in office 1. What should you request?


A. Link GPO1 to Office2-Users-OU.
B. Link GPO1 to Office2-Computers-OU.
C. Change the office attribute for the user accounts.
D. Change the location attribute for the computer accounts.

Answer: B
Question 77
Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table. The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN. You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue. What should you recommend?


A. Deploy a Network Policy Server (NPS).
B. Replace the SSTP-based VPN with a PPTP-based VPN.
C. Issue computer certificates from a trusted root certification authority (CA) to all remote users.
D. Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.

Answer: D
Question 78
All client computers on your company network run Windows 7. A computer is unable to connect to network resources. The configuration of the computer is as shown in the following table. You need to ensure that the computer is able to connect to network resources. What should you do?

A. Change the IP address to 131.107.3.254.
B. Change the subnet mask to 255.255.248.0.
C. Change the default gateway to 131.107.0.1.
D. Change the preferred DNS server to 131.107.3.1.


Answer: C
Question 79
All client computers on your company network run Windows 7. The Finance department staff run an application that collects data from 09.30 hours to 15.00 hours everyday. After data collection, the application generates reports that contain data aggregation for the day and the previous week. During report generation, the Finance department staff experience slow performance on their computers. You discover that the usage of the processor on these computers is between 90 and 100 percent. You need to reduce the impact of report generation on the Finance computers. What should you do?
A. Set the priority of the application to Low.
B. Set the priority of the application to Real-time.
C. Configure the processor affinity mask to ensure that the application uses all the available processors.
D. Modify the memory settings of the computers to optimize the performance of the background applications.

Answer: A
Question 80
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?
A. Create Executable Rules by selecting the Create Default Rules option.
B. Create Windows Installer Rules by selecting the Create Default Rules option.
C. Create the following Windows Installer Rule.Deny C Everyone -%OSDRIVE%\Users\\Downloads\*
D. Create the following Executable Rule.Deny -Everyone -%OSDRIVE%\Users\\Documents\*

Answer: A
Question 81
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team.

What should you create?
A. Event Trace Data Collector Set
B. Performance Counter Data Collector Set
C. Performance Counter Alert Data Collector Set
D. System Configuration Information Data Collector Set

Answer: B
Question 82
All client computers on your company network run Windows 7. An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message. "Logon failure. unknown user name or bad password." You need to ensure that the service runs successfully. What should you do?
A. Add the dedicated account to the local Administrators group.
B. Add the employee user account to the local Administrators group.
C. Reset the employee password and configure it to never expire.
D. Reset the service account password and configure it to never expire.

Answer: D
Question 83
Your company has a main office and a branch office. The network contains a single Active Directory domain. All servers and client computers are members of the domain. A print server is located in the branch office. All other servers are located in the main office. All servers run Windows Server 2008 R2. All client computers run Windows 7. Users in the branch office report poor performance when they access an intranet Web site in the main office. You need to recommend changes to the network to improve the performance of intranet access by computers in the branch office. What should you recommend implementing?
A. aVPN
B. BranchCache
C. HTTP redirect
D. WebDav
Answer: B
Question 84
All client computers on your company network run Windows 7. The computers are deployed within an Active Directory Domain Services domain in a Windows Server 2003 environment. When an employee attempts to log on to the domain from his computer, he receives the following error message. "System cannot log you on to the domain because the systems computer account in its primary domain is missing or the password on that account is incorrect." You need to ensure that the employee can log on to the domain from his computer. What should you do?

A. Change the domain password of the employee.
B. Create a roaming profile for the employee on his computer.
C. Add the user account of the employee to the local Administrators group.
D. Add the computer to a workgroup and then add the computer again to the domain.

Answer: D
Question 85
All client computers on your company network run Windows 7. A standard Windows 7 image is loaded on all new computers on the network. A department in your company purchases several tablet computers. Employees report that the pen interface does not work on the tablet computers. You need to ensure that employees can use the pen interface. What should you do?
A. Turn on the Media Features.
B. Turn on the Tablet PC Components.
C. Start the WMI Performance Adapter service and set it to Automatic.
D. Start the Human Interface Device Access service and set it to Automatic.

Answer: B
Question 86
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?
A. Modify the time zone for the computer.
B. Modify the IPv4 settings on the computer.
C. Create an A record for the computer in an internal DNS zone.
D. Request that an administrator create a prestaged computer account in the domain.


Answer: B
Question 87
Your company has a main office and a branch office. The network contains a single Active Directory domain. All computers are members of the domain. Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications. From your computer, you need to identify the application that uses the most processor on the computers. Which tool should you use?
A. Performance Monitor
B. Reliability Monitor
C. Resource Monitor
D. System Information

Answer: A
Question 88
Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise. A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry. The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings. You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1. What should you do?
A. Instruct the help desk to modify the Windows Defender settings.
B. Instruct the help desk to remove all users from the Administrators group on all local computers.
C. Request that a domain administrator create a Group Policy object (GPO) that uses a custom administrative template.
D. Request that an administrator create a Group Policy object (GPO) that configures a software restriction policy.

Answer: C
Question 89
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. All servers run Windows Server 2008 R2 and are located in the main office. A remote office connects to the main office by using a cellular network. Employees at the remote office frequently download a daily report from an IIS Web server at the main office, which causes them to incur excessive pay per bandwidth usage costs. You need to decrease the network bandwidth usage costs incurred by the remote office. What should you do?
A. Implement DirectAccess.

B. Implement VPN with compression.
C. Implement Distributed File System.
D. Configure Branch Cache.

Answer: D
Question 90
All client computers on your company network run Windows 7. Each computer has the following components. Single quad-core processor 8 GB of RAM250-GB hard disk drive The hard disk drive is partitioned into drive C for the operating system and drive D for the user data. Employees run an application that generates large reports. These reports take too long to generate on the computers. You confirm that processor time and memory are acceptable. You need to identify why these reports are generating slowly. You create a User Defined Data Collector Set. What should you include in this set?
A. Memory\Available Mbytes and Memory\% Committed Bytes In Use counters
B. Process\% Privileged Time and Process\% User Time counters for each processor core
C. Physical Disk\ Avg. Disk Queue Length and Physical Disk\% Disk Time counters for Disk0 of the Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). computers
D. Logical Disk\Free Megabytes and Logical Disk\% Free Space counters for the user data drives of the computers

Answer: C
Question 91
You have a development network that you use for testing purposes. The development network contains an Active Directory domain. Users have computers that run Windows 7. The users have several virtual machines that run Windows 7. The virtual machines are joined to Active Directory. Several users report that when they discard changes on the virtual machines, and then attempt to log on to the machines, they sometimes receive the following error message. You need to prevent this error from recurring. What should you do?
A. Create a Password Setting object (PSO) in Active Directory.
B. Modify the security settings by using a Group Policy object (GPO).
C. On the virtual machines, create a password reset disk.
D. On the virtual machines, modify the User Account Control (UAC) settings.
Answer: B
Question 92
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Server ConfigurationAll servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table. All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario The company is deploying a new application. When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it. You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?


A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.

Answer: A
Question 93
Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power

& Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Server ConfigurationAll servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table. All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario Five users from the main office travel to the branch office. The users bring their portable computers. The help desk reports that the users are unable to access any network resources from the branch office. Branch office users can access the network resources. You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines. What should you instruct the help desk to do on the portable computers?

A. Create a new VPN connection.
B. Add the users to the local Administrators group.
C. Add the users to the Network Configuration Operators group.
D. Configure the alternate configuration for the local area connection.

Answer: D
Question 94
Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Server ConfigurationAll servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table. All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario Several mobile users access the Internet by using cellular connections. The help desk reports a high volume of calls from mobile users who report the following connection problems. When their cellular connections fail, their VPN connections also fail.When their cellular connections are reestablished, they must manually connect to the VPN server. You need to recommend a solution to ensure that the VPN connections are automatically reestablished. What should you recommend?


A. Implement an IKEv2 VPN.
B. Implement an SSTP-based VPN.
C. Configure credential roaming.
D. Configure a Kerberos user ticket lifetime.

Answer: A
Question 95
Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Changed with the DEMO VERSION

of CAD-KAS PDF-Editor (http://www.cadkas.com). Server ConfigurationAll servers run Windows Server 2008
R2. The relevant servers in the main office are configured as shown in the following table. All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario Users report that their DirectAccess connections fail. You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter. The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function. You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly. What should you do?

A. Instruct the help desk to enable IPv6 on the users computers.
B. Instruct the help desk to modify the users Windows Firewall settings.
C. Request that the domain administrator configure the Teredo State Group Policy setting.
D. Request that the domain administrator configure the Corporate Website Probe URL Group Policy setting.

Answer: D
Question 96
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Consolidated Messenger. Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Network ConfigurationThe company has three offices named Office1, Office2, and Office3. The offices connect to each other over the Internet by using VPN connections. Each office has an 802.11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory ConfigurationThe network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram. The relevant Group Policy objects (GPOs) in the domain are configured as shown in the following table. Applications The relevant applications on the network are shown in the following table. Server Configuration The relevant servers are configured as shown in the following table. S Client Configuration Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. PrintersThe marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. End of repeated scenario The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1. Users in the Marketing OU report that they can run FinanceApp1. You need to ensure that only users in the Finance OU can run FinanceApp1. What should you do?






A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule. Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com).
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A
Question 98
11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory ConfigurationThe network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram. The relevant Group Policy objects (GPOs) in the domain are configured as shown in the following table. Applications The relevant applications on the network are shown in the following table. Server Configuration The relevant servers are configured as shown in the following table. Client Configuration Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. PrintersThe marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A
shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. End of repeated scenario The Office1 network link is brought offline for emergency maintenance. Users in Office2 and Office3 report that they cannot connect to the wireless network. You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails. What should you recommend?



A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured
Answer: B Question 99

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the technician can view the configurations of the DHCP servers. What should you do?
A. Instruct the technician to customize the Start menu to display the administrative tools.
B. Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.
C. Request that the technician be added to the Server Operators group in Active Directory.
D. Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.

Answer: B
Question 100
Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit. (Click the Exhibit button.) You need to resolve the network connectivity issue. The solution must adhere to the company policy. What should you instruct help desk to do?


A. Modify the network configuration and define the IPv4 default gateway.
B. Modify Windows Firewall and enable File and Printer Sharing in the public profile.
C. Modify Windows Firewall and enable File and Printer Sharing in the domain profile.
D. Modify the network configuration to automatically obtain an IP address and a DNS server address.

Answer: D
Question 101

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?
A. BranchCache
B. DirectAccess
C. Distributed File System Replication (DFSR)
D. Universal Group Membership Caching

Answer: A
Question 102
You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C
Question 103
You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You need to start the computer from the VHD. What should you do?

A. From Diskpart.exe, run Select vdisk.
B. From Disk Management, modify the active partition.
C. Run Bootcfg.exe and specify the /default parameter.
D. Run Bcdedit.exe and modify the Windows Boot Manager settings.

Answer: D
Question 104
You have a computer that runs Windows 7. You connect to your companys network by using a VPN connection. You discover that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites. You need to access Internet Web sites while you are connected to the VPN. What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

Answer: D
Question 105
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.

Answer: C
Question 106
You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. What should you do?

A. Copy install.wim from the Windows 7 installation media to the VHD.
B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.
C. Start the computer by using the Windows 7 installation media and then select Install now.
D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe.

Answer: B
Question 107
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must achieve this goal by using the least amount of administrative effort. What should you do?
A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.

Answer: D
Question 108
Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do?
A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.

Answer: A
Question 109
You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.

C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.

Answer: C
Question 110
Your network contains 100 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. You must achieve this goal by using the minimum amount of administrative effort. What should you install?
A. Microsoft Application Compatibility Toolkit (ACT)
B. Microsoft Assessment and Planning (MAP) Toolkit
C. Microsoft Deployment Toolkit (MDT)
D. Windows Automated Installation Kit (AIK)

Answer: A
Question 111
You have a computer that runs Windows 7. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first?
A. Run Sdbinst.exe.
B. Run Msiexec.exe.
C. Right-click the application executable file and modify the compatibility settings.
D. Right-click the application executable file and modify the advanced security settings.

Answer: A
Question 112
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy?
A. Enable the Prevent redirection of USB devices setting.
B. Enable the Prevent installation of removable devices setting.
C. Disable the WPD Devices. Deny read access setting.
D. Disable the Allow administrators to override Device Installation Restriction policies setting.


Answer: B
Question 113
Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request?
A. A
B. AAAA
C. HINFO
D. NAPTR

Answer: B
Question 114
You have a computer that runs Windows 7. You log on to the computer by using a user account that is a member of Administrators group. From Windows Explorer you open \windows\system32\drivers\etc\hosts in Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that you can save changes to C.\windows\system32\drivers\etc\hosts. What should you do?
A. Stop the Windows Search service.
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the User Account Control (UAC) settings to Notify me only when program try to make changes to my computer.

Answer: C
Question 115
You have a computer that runs Windows 7. A user installs a third-party media player on the computer. You discover that all media files automatically open by using the third-party media player. You need to ensure that all media files open automatically by using Windows Media Player. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Select a media file. Right-click the file and select Open with.
B. Select a media file. Right-click the file and select Restore previous versions.
C. From Control Panel, modify the Set your default programs settings.

D. From Control Panel, modify the Set program access and computer defaults settings.

Answer: C
Question 116
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) Other users on the network receive an IPv6 address for ISATAP. You need to ensure that your computer receives an IPv6 address for ISATAP. What should you do?

A. Run Ipconfig /renew6.
B. Run Ipconfig /setclassid6.
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.

Answer: D
Question 117
You start a computer by using Windows Preinstallation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?
A. Run Peimg.exe and specify the device driver path.

B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the InitializeNetwork command.

Answer: B
Question 118
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?

A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.

Answer: D
Question 119
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do?

A. At the command prompt, run Winrs Cr.computer2 query.
B. At the command prompt, run Winrm id Cremote.computer2.
C. From Windows PowerShell, run Get-PSSession Computer2.
D. From Windows PowerShell, run Get-PSSessionConfiguration Computer2.

Answer: B
Question 120
Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. At the branch office, a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers from retrieving cached content from Computer1. What should you do on Computer1?
A. At the command prompt, run Netsh branchcache flush.
B. At the command prompt, run Netsh branchcache dump.
C. Modify the Configure BranchCache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

Answer: A
Question 121
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do?
A. From a computer that runs Windows 7, change the file system of the USB drive.
B. From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.
C. Log on to Windows XP as member of the Administrators group.
D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

Answer: B
Question 122
You have an answer file for a Windows 7 installation. You need to perform an unattended installation of Windows 7 by using the answer file. You must achieve this goal by using the minimum amount of administrative effort. What should you do?

A. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.
B. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD.
C. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
D. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).

Answer: A
Question 123
You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?
A. From Credential Manager, add a Windows credential.
B. From Credential Manager, add a certificate-based credential.
C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Answer: C
Question 124
You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
A. Msconfig.exe
B. Slui.exe
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter

Answer: C
Question 125
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What should you do?
A. Run Winrm quickconfig on Computer1.

B. Run Winrm quickconfig on Computer2.
C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

Answer: B
Question 126
You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.

Answer: C
Question 127
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table.
All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table. Security Configuration The relevant security settings for the domain are configured as shown in the following table. The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table. All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravel\Wireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario The company hires an additional 100 users. The users are unable to install the custom application. You need to ensure that the users can install the custom application. What should you do?






A. Disable User Account Control (UAC).
B. Add the users to the local Administrators group.
C. Request that the application package be re-signed.
D. Request that the user certificates be issued to the new users.

Answer: C
Question 128
Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table. All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table. Security ConfigurationThe relevant security settings for the domain are configured as shown in the following table. The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table. All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravel\Wireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario At 08.00 on a Tuesday morning, an administrator in Site 3 takes DC3 offline to update the server. Users in Site 3 report that they cannot log on to their computers. The users receive the following error message. Your account has time restrictions that prevent you from logging on at this time. Please try again later. You need to ensure that all users can log on to their computers when DC3 is offline for maintenance. Your solution must adhere to the corporate security policies. What should you do?




A. Modify the logon hours for all users in Site 3.
B. Change the time zone settings for all client computers in Site 3 to UTC-05.00.
C. Request that a second domain controller be deployed in Site 3.
D. Request that the time zone settings for DC1 and DC2 be changed to UTC-08.00.
Answer: C

Question 129
Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table. All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table. Security ConfigurationThe relevant security settings for the domain are configured as shown in the following table. The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table. All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravel\Wireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario You have two external consultants. The consultants use their own personal portable computers. The consultants report that they are unable to connect to your wireless network. You need to give the consultants wireless access to the Internet. The solution must prevent external consultants from accessing internal resources. What should you do?



A. Issue a user certificate to the consultants.
B. Issue a computer certificate to the consultants.
C. Join both portable computers to the domain. Add the computer accounts to the MargiesTravel\Wireless group.
D. Create a domain user account for each consultant. Add the user accounts to the MargiesTravel\Wireless group.
Answer: B

Question 130
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table. Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). previous version of App1. End of repeated scenario The help desk reports that several users use the previous version of App1, which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the previous version of App1. What should you recommend?



A. that a domain administrator create a GPO linked to the domain and configure AppLocker settings in the GPO
B. that a domain administrator create a GPO linked to the domain and configure Software Installation settings in the GPO
C. that the new version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer
D. that the previous version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer

Answer: A
Question 131
Start of repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table. Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1. End of repeated scenario Portable computer users report that they can use Internet Explorer to browse Internet Web sites only when they are connected to the company network. You need to ensure that portable computer users can access Internet Web sites from wherever they connect. What should you do?



A. Instruct the users to configure static IPv4 settings.
B. Instruct the users to configure automatic IPv4 settings.
C. Request that a domain administrator link GPO-IE to Active Directory site objects.
D. Request that a domain administrator create a new GPO that modifies the Internet Explorer Maintenance settings, and then link the new GPO to the Users OUs.

Answer: C
Question 132
Start of repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.

Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1. End of repeated scenario The sales users that were part of the VPN server pilot project report that they can no longer establish VPN connections to the internal network. You need to ensure that all authorized users can establish VPN connections to the internal network. What should you request a domain administrator to do?



A. Enable auto-renewal for certificates.
B. Increase the lifetime of the Kerberos user ticket.
C. Increase the lifetime of the Kerberos service ticket.
D. Increase the certification validity period for the computer certificate template.

Answer: A
Question 133
Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table. The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report that they are unable to connect to the wireless network in office 1 from their portable computers. A help desk administrator manually provides the users with access to the wireless network. You need to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless network in office 1. What should you request?


A. Link GPO1 to Office2-Users-OU.
B. Link GPO1 to Office2-Computers-OU.
C. Change the office attribute for the user accounts.
D. Change the location attribute for the computer accounts.

Answer: B
Question 134
Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table. The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN. You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue. What should you recommend?


A. Deploy a Network Policy Server (NPS).
B. Replace the SSTP-based VPN with a PPTP-based VPN.
C. Issue computer certificates from a trusted root certification authority (CA) to all remote users.
D. Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.

Answer: D
Question 135
All client computers on your company network run Windows 7. Each computer has four 1-GB RAM modules and a single physical disk. When the employees run a three-dimensional (3-D) design application that extensively uses the RAM, they experience slow performance on their computers. You discover that the swap files on the computers are extensively used. You need to improve the performance of the computers. What should you do?
A. Disable the hardware acceleration setting on the computers.
B. Replace the four 1-GB RAM modules on the computers with two 2-GB RAM modules.
C. Move the page file to the same directory that contains the executable file for the 3-D design application.
D. Configure the virtual memory on the computers so that the initial size of the virtual memory is equal to the maximum size of the virtual memory.
Answer: D