Q261. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. 

You need to migrate the configuration and application data for the custom application from Computer1 to Computer2. 

What should you do? 

A. On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe /l:app1.xml. 

B. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml. 

C. On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe /keyfile:app1.xml. 

D. On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml. 

Answer:

Explanation: 

User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. (include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory. 


Q262. - (Topic 1) 

Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two. 

A. File Settings and Transfer Wizard 

B. USMT 

C. Windows Easy Transfer 

D. Robocopy.exe 

Answer: B,C 


Q263. DRAG DROP - (Topic 6) 

Your organization has a Windows Server 2008 R2 server and Windows 7 Professional computers. 

Two groups require access to new applications. Each group uses a different application. You are adding 100 new computers to each group. 

You need to configure Windows Firewall to allow each group to access its application. 

Which four steps should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: 


Q264. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. 

The client computers have a third-party firewall application installed. 

You configure BranchCache on all computers to run in Distributed Cache mode. 

You need to ensure that the client computers can access all cached files. 

What should you do? 

A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. 

B. Check permissions. 

C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443 

D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command. 

F. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

G. Run the netsh branchcache set service mode=DISTRIBUTED command 

H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option. 

I. Create a Group policy that sets Hash Publication for Branchcache as disabled. 

Answer:

Explanation: 

Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic. 

You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode. 

You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache - Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache - Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode. 

You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically. 


Q265. - (Topic 4) 

You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network. 

You run the ipconfig.exe command as shown in the exhibit. (Click the Exhibit button.) 

You need to establish a DirectAccess connection from the computer to a DirectAccess server. 

What should you do first? 

A. Add the computer to a new HomeGroup. 

B. Configure a static IPv4 address. 

C. Create a new VPN connection. 

D. Enable IPv6 on the network adapter. 

Answer:


Q266. - (Topic 3) 

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: The Graphics rating for the system is poor and may be the cause of performance problems. 

You need to increase the graphics performance of the computer without modifying the current hardware or drivers. 

What should you do? 

A. From Personalization, modify the screen saver. 

B. From Indexing Options, modify the Advanced options. 

C. From Performance Options, modify the visual effects. 

D. From Performance Options, modify the processor scheduling. 

Answer:

Explanation: Configuring Performance Options The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services. 


Q267. - (Topic 1) 

Which of the following must you download from Microsoft's Web site to obtain USMT 4.0? 

A. Windows Anytime Upgrade 

B. Windows Upgrade Advisor 

C. WAIK 

D. Microsoft Application Compatibility Toolkit 

Answer:

Explanation: 

User State Migration Tool USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 


Q268. HOTSPOT - (Topic 6) 

A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails. 

Email 1 

From: Company CIO 

Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7. 

Email 2 

From: System Administrator 

Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files. 

Email 3 

From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support 

the inference as stated? (This question is worth three points. ) 

Answer: 


Q269. - (Topic 6) 

You have an answer file named Unattend.xml for a Windows 7 automated installation. 

You need to perform an unattended installation of Windows 7 by using the answer file. 

What should you do? 

A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE). 

B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE). 

C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD. 

D. Name the answer file as autounattend.ini and save it to a floppy disk. Start the computer from the Windows 7 DVD. 

Answer:

Explanation: Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure: 

1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM. 

2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called 

Autounattend.xml. 

3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer. 

4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. 


Q270. - (Topic 4) 

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do? 

A. From the Trusted Platform Module (TPM) snap-in, initialize TPM. 

B. From Control Panel, modify the BitLocker Drive Encryption settings. 

C. From a local Group Policy, modify the BitLocker Drive Encryption settings. 

D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings 

Answer:

Explanation: 

How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker 

When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.