Q201. - (Topic 1) 

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. 

What should you do? 

A. Install a computer certificate. 

B. Create a new network connection. 

C. Enable the Network Discovery firewall exception. 

D. Add the computer account to the Network Configuration Operators group. 

Answer:

Explanation: 

Certificates The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication.DirectAccess Client Configuration Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer's client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates. 


Q202. - (Topic 3) 

You need to prevent a custom application from connecting to the Internet. 

What should you do? 

A. From Windows Firewall, add a program. 

B. From Windows Defender, modify the Allowed items list. 

C. From Windows Firewall with Advanced Security, create an inbound rule. 

D. From Windows Firewall with Advanced Security, create an outbound rule. 

Answer:

Explanation: 

Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1. 

What should you do? 

A. From Windows Firewall with Advanced Security, create a predefined rule. 

B. From Windows Firewall with Advanced Security, create a custom rule. 

C. From Network and Sharing Center, modify the network location settings. 

D. From Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 


Q203. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 


Q204. - (Topic 4) 

You have a computer that runs Windows 7. 

You mark a folder as Always available offline. 

You need to verify that an offline copy of the folder has been created on the computer. 

What should you do? 

A. Open Sync Center and review the status. 

B. Open Action Center and review any messages or issues. 

C. Open Windows Mobile Device Center and review the status. 

D. Open Network and Sharing Center and review the status for the local area connection. 

Answer:

Explanation: 

What is Sync Center?Sync Center allows you to check the results of your recent sync activity if you've set up your computer to sync files with a network server. This allows you to access copies of your network files even when your computer isn't connected to the network. Sync Center can tell you if the files synced successfully or if there are any sync errors or warnings. NoteSync Center is designed to help you sync with files in network locations. If you want to sync a mobile device with your computer, such as a mobile phone or portable music player, Windows gives you several other options. You can install the sync software that some manufacturers include with their device, or you can use the new Device Stage feature in this version of Windows if your device supports this feature. For more information, see Sync music, pictures, contacts, and calendars with a mobile device. 


Q205. - (Topic 3) 

You download a Windows PowerShell snap-in. 

You need to ensure that the snap-in is automatically imported when you open a new PowerShell session. 

What should you do? 

A. Modify the PowerShell execution policy. 

B. Create a new PowerShell manifest file. Update the PowerShell shortcut and specify the file option. 

C. Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option. 

D. Create a new PowerShell formatting and type file. Copy the file to the %SystemRoot%\system32 \WindowsPowerShell\v1.0 folder. 

Answer:

Explanation: 

PSConsoleFile Loads the specified Windows PowerShell console file. To create a console file, use the Export-Console cmdlet in Windows PowerShell. 

Export-Console The Export-Console cmdlet exports the names of the Windows PowerShell snap-ins in the current session to a Windows PowerShell console file (.psc1). You can use this cmdlet to save the snap-ins for use in future sessions. To add the snap-ins in the .psc1 console file to a session, start Windows PowerShell (Powershell.exe) at the command line by using Cmd.exe or another Windows PowerShell session, and then use the PSConsoleFile parameter of Powershell.exe to specify the console file. 


Q206. - (Topic 3) 

Your network contains computers that run Windows 7 and Windows Vista. All computers are members of the same domain. You have a computer named Computer1 that runs Windows 7. 

You need to ensure that users can remotely log on to Computer1 from any computer on the network. 

What should you do on Computer1? 

A. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Power Users group. 

B. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Administrators group. 

C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box. Add the Domain Computers group to the Remote Desktop Users group. 

D. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box. Add the Domain Users group to the Remote Desktop Users group. 

Answer:


Q207. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform? 

A. The System Performance Data Collector Set should be run from Performance Monitor. 

B. The informational events should be reviewed from Reliability Monitor. 

C. The Software Environment should be reviewed from System Information. 

D. The System Diagnostics Report should be reviewed from Performance Monitor. 

Answer:


Q208. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data. The active network connection of the computer is configured as Public. 

You use Advanced Sharing to share a folder as shown in the exhibit. (Click the Exhibit button.) 

A user attempts to access the shared folder across the network and receives the following error message: "Access is Denied." 

You need to ensure that the user can download files from the shared folder. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. From the Security settings of the folder, assign the Full Control NTFS permission to the user. 

B. From the Advanced Sharing settings of the folder, assign the Read share permission to the user. 

C. From the Security settings of the folder, assign the Read NTFS permission to the user. 

D. Change the network location of the computer from a Public network to a Home or Work network. 

Answer:

Explanation: Assuming the user has appropriate Share permissions, he would still need NTFS permissions. 


Q209. - (Topic 6) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers. 

B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

C. Run the cscript List-ACEs.vbs script on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.Idf -c script on a domain controller. 

Answer:


Q210. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

The Disk Management console (Click the Exhibit button.) 

The System Properties window (Click the Exhibit button.) 

The System protection for Local Disk C window (Click the Exhibit button.) 

You create a password for several Microsoft Office files from your Documents library. 

You share the Documents library over a network. 

You need to ensure that network users are unable to access the unprotected versions of the files. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to Only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt. 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt. 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer: