Do You Know About Certkiller.Com?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Wellurs
W
Wellurs
Community Contributor
Quizzes Created: 1 | Total Attempts: 62
| Attempts: 62 | Questions: 169
Please wait...
Question 1 / 169
0 %
0/100
Score 0/100
1. 6
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are in the process of planning the installation of Windows 7 on a client computer named CERTKILLER-WS06. CERTKILLER-WS06 contains a single hard disk drive that is connected to a RAID controller.

Whilst doing the installation you notice that the installation media of Windows 7 does not include the necessary files to install the RAID controller. You need to make sure that you are able to install Windows 7 on the hard disk drive.

What should you do?

Explanation

not-available-via-ai

Submit
Please wait...
About This Quiz
Do You Know About Certkiller.Com? - Quiz

Do you know about the desktop support technician of CertKiller. Com? Let's play this quiz and check yourself now!

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. 38
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client computers at CertKiller.com. You have installed Windows Deployment Service (WDS) on a server named CERTKILLER-SR05. You want to use a client computer named CERTKILLER-WS680 as a reference computer from which you want to create the image for the deployment. You now need to remove hardware-specific information from the Windows installation on CERTKILLER-WS680.
What should you do?

Explanation

Part 2: Prepare a system image for deployment (4 Questions)

Submit
3. 68
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are responsible for managing a desktop workstation named CERTKILLER-WS680.
CERTKILLER-WS680 is configured to run Windows 7. You receive an instruction to ensure that all device drivers installed on CERTKILLER-WS680 are digitally signed.
Which of the following is the easiest way to achieve this?

Explanation

Running Sigverif.exe at a command prompt on CERTKILLER-WS680 is the easiest way to ensure that all device drivers installed on the workstation are digitally signed. Sigverif.exe is a tool provided by Windows that scans all device drivers on the system and checks if they are digitally signed. By running this tool, the technician can easily identify any unsigned drivers and take appropriate actions to resolve the issue. This method is efficient and does not require manual inspection of each device listed in Device Manager or running Windows Update, making it the easiest solution.

Submit
4. 128
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a branch office in Paris. All servers on the CertKiller.com network run Windows

Server 2008 R2 and all client computers run Windows 7. The London office contains a file server named CERTKILLER-SR04 that hosts shared folders that are accessed from both offices. The Paris office contains a DNS server named CERTKILLER-SR12.
You want to reduce network traffic between the Paris office and the London office. You decide to enable BranchCache in Hosted Cache mode on CERTKILLER-SR12. You now need to enable BranchCache on the client computers.

What should you do?

Explanation

not-available-via-ai

Submit
5. 51
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to configure fault tolerance for an operating system on a computer running Microsoft Windows 7 Home Premium to boot in the event of a hard disk failure. CertKiller.com additionally informed you that the computer has two disks with unallocated space on the second disk drive.
What should you do?

Explanation

not-available-via-ai

Submit
6. 167
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a
recent critical update you notice that CERTKILLER-WS680 is unstable. You now want to use
system restore to restore CERTKILLER-WS680 to an earlier point.

What should you do?

Explanation

To restore CERTKILLER-WS680 to an earlier point using System Restore, the network administrator should follow these steps: Start by navigating to Control Panel, then select System and Security. From there, go to Action Center and click on Recovery. On the Recovery page, locate and click on the 'Open System Restore' button. In the 'Restore System Files and Settings' dialog box, click 'Next'. To view more restore points, click on 'Show more restore points'. Finally, select the desired restore point and click 'Finish' on the 'Confirm your restore point' page.

Submit
7. 82
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com currently has an internal Web site that uses HTTPS and has a self-signed certificate.
A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web site. During the course of the day you receive complaints from Rory Allen that he receives the error message when attempting to browse the internal Web site:
"There is a problem with the website's security certificate"
CertKiller.com wants you to prevent the warning message from appearing when Rory Allen or other users access the internal Web site.
What should you do?

Explanation

By importing the website's certificate into the Trusted Root Certification Authorities store using Certificate Manager, the certificate will be trusted by the client computers. This will prevent the warning message from appearing when users access the internal website. Importing the certificate into the Trusted Root Certification Authorities store ensures that the certificate is recognized as valid and trusted by the client's operating system.

Submit
8. 94
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains
several mobile computers that connect to the network via a wireless access point (WAP).
You are working on a mobile computer named CERTKILLER-WS680 that is running Windows 7.
The network administrator has disabled the Service Set Identifier (SSID) broadcasts on the
wireless access point (WAP). When you attempt to connect CERTKILLER-WS680 to the network
you discover that you cannot access the WAP.
How can you configure CERTKILLER-WS680 to access the wireless access point (WAP)?
A. .
B. .
C. .
Answer: A

Explanation

To access the wireless access point (WAP) on CERTKILLER-WS680, you should manually specify the name of the SSID of the WAP in the wireless network connection settings. This is because the network administrator has disabled SSID broadcasts, so the WAP will not appear in the network list. By manually entering the SSID, CERTKILLER-WS680 will be able to connect to the WAP and access the network.

Submit
9. 19
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows XP Professional with Service Pack 1 (SP1).

You have been assigned a client computer named CERTKILLER-WS270. You want to upgrade CERTKILLER-WS270 to Windows 7 Professional without needing to install any of your applications. You verify that CERTKILLER-WS270 meets the system requirements for Windows 7 by installing and running the Windows 7 Upgrade Advisor.

What should you do next?

Explanation

To upgrade from Windows XP Professional to Windows 7 Professional without having to reinstall applications, you would need to upgrade to Windows Vista first.

Submit
10. 120
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

You currently make use of a workstation named CERTKILLER-WS680. When installing new
applications on CERTKILLER-WS680 you are prompted for user account control  permissions. You want to configure CERTKILLER-WS680 to allow you to interact with the Desktop when prompted for user account control permissions.

What should you do?

Explanation

Setting the User Account Control: Switch to secure desktop when prompting for credentials to Disabled will allow the user to interact with the desktop when prompted for user account control permissions. This means that instead of the screen being dimmed and the user being unable to interact with anything on the desktop, they will be able to continue working while the prompt is displayed. This can improve productivity and user experience.

Submit
11. 43
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains two Windows Server 2008 computers named CERTKILLER-SR01 and CERTKILLER-SR02 and 500 Windows Vista Ultimate client computers. CERTKILLER-SR01 functions as a Domain Controller (DC) while CERTKILLER-SR02 functions as a Domain Name System (DNS) server.
CertKiller.com purchases 200 new client computers that have the following resources: 2.33 GHz Dual-Core processor.2 GB of RAM.80 GB hard drive.DirectX 10 video display card.Integrated sound card.10/100/1000 integrated network adapter.
You need to perform a clean installation of Microsoft Windows 7 Ultimate on the new client computers. You use one of the new client computers as a reference computer from which you build a custom image and an answer file. You want to deploy the image to the new client computers over the network using Windows Deployment Services (WDS).
What should you do?

Explanation

The network must have a DHCP server with an active scope as Windows Deployment Services uses PXE, which relies on DHCP for IP addressing.

Submit
12. 53
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are currently working on a workstation named CERTKILLER-WS680. You use the Windows Preinstallation Environment (Windows PE) to boot CERTKILLER-WS680. You now need to load a network adapter device driver on the Windows PE.
What should you do?

Explanation

Drvload.exe is the tool used to load drivers in the PE environment. Manually load the network driver, and then verify that it is the correct driver. Incorrect Answers: B: Sysprep is used to remove computer specific information before creating an image. It is not used to load drivers.
C: Ntloader is a boot file. It is not used to load drivers D: Sigverif is used to verify driver digital signatures; it does not load the driver.

Submit
13. 59
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com network contains a Windows 7 client computer named CERTKILLER-WS680. CERTKILLER-WS680 also runs a third party accounting application named accapp.exe. Accapp.exe is started during the boot process. You have received instructions to ensure that accapp.exe is only started manually and not started during the boot process.
How can you stop accapp.exe starting during the boot process?

Explanation

Using the System Configuration tool (MSConfig.exe), you can select diagnostic booting or configure starting services or applications
Photobucket

Incorrect answers:
A: Changing the permissions on the application will not affect whether it starts during boot-up.
B: The boot tab does not control what applications are run at start-up. You would need the Startup
tab.
C: A software restriction policy is used to determine who can use an application, not when it starts.
D: A path rule is used to determine who can use the application specified in the path, not when it
starts.

Submit
14. 61
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a workstation named CERTKILLER-WS680.
You have upgraded CERTKILLER-WS680 from Windows XP Professional Service Pack 2 (SP2) to Windows 7 Professional. However, when you attempt to run a custom application named CKapp.exe you receive an error message stating: "This application is only designed to run on Windows XP or later." You need to configure the application to run on Windows 7.
What should you do?

Explanation

Installing Windows XP Mode on CERTKILLER-WS680 would allow the custom application, CKapp.exe, to run on Windows 7. Windows XP Mode is a virtual machine that emulates a Windows XP environment, allowing legacy applications to run on newer operating systems. By installing Windows XP Mode, the application can be executed without encountering the compatibility error message. This is the most appropriate solution to ensure the application runs successfully on the upgraded workstation.

Submit
15. 62
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers and mobile computers on the CertKiller.com network run Windows 7 Professional.
CertKiller.com has an Accounts department that needs to run an accounting application named accapp.exe. However, accapp.exe is not Windows 7 compatible and can run only on Windows XP Professional computers. You need to ensure that the Accounts department can run accapp.exe on
their client computers.
What should you do?

Explanation

Installing Windows XP Mode on each client computer in the Accounts department is the correct answer because accapp.exe is not compatible with Windows 7 Professional and can only run on Windows XP Professional computers. Windows XP Mode allows users to run older applications that are not compatible with the current operating system. By installing Windows XP Mode, the Accounts department will be able to run accapp.exe on their client computers without any compatibility issues.

Submit
16. 133
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com and includes a Direct Access infrastructure.

CertKiller.com has purchased a new mobile computer named CERTKILLER-WS680. You install Windows 7 on CERTKILLER-WS680 and join it to the domain.

How should you make sure that CERTKILLER-WS680 is able to establish Direct Access
connections?

Explanation

Part 3: Configure mobility options (4 Questions)

Submit
17. 13
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers are configured to either use Windows XP Professional or Windows Vista.

You receive an instruction from management to identify the statement that is regarding Windows 7.

What should you do?

Explanation

The correct answer is that Windows 7 does not come with a preinstalled mail client. This means that Outlook Express, Microsoft Mail, and Windows Live Mail are not included with Windows 7. It is important to inform management about this to ensure that they are aware of the limitations and can make appropriate decisions regarding email clients for the network client computers.

Submit
18. 22
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows XP Professional.

You have been instructed to upgrade the Windows XP Professional client computers to Windows 7. However, before you proceed you need to determine if the current applications on the Windows XP Professional computers will run on Windows 7.

You want to accomplish this task using the least amount of administrative effort.

What should you do?

Explanation

Application Compatibility Toolkit (ACT) 5.5 collects information about the applications that are installed on the network computers and provides information about the applications that are incompatible with Windows Vista. Windows Vista Upgrade Adviser can also be used for the same purpose but it requires a massive amount of administrative effort because it needs to be run separately on each computer.

Submit
19. 150
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for managing a computer named CERTKILLER-SR05 that is configured to run Windows 7. CERTKILLER-SR05 is configured to host two volumes named C and D. You are in the process of creating a new folder named D:\TESTDATA. During the course of the day you receive notification from management to make sure that files stored in TESTDATA are indexed by Windows search.

What should you do?

Explanation

Part 3: Monitor systems (7 Questions)

Submit
20. 1
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains both desktop and laptop workstations.

You are responsible for managing a desktop workstation named CERTKILLER-WS620. CERTKILLER-WS620 is configured to run Windows Vista. You install Windows 7 on a new partition on CERTKILLER-WS620 but you want Windows Vista to be booted by default on CERTKILLER-WS620 and not Windows 7.

What should you do?

Explanation

To modify the boot parameters in Vista and Windows 7, use the command line tool Bcdedit.exe. Using the /default switch will allow you to set the default system to boot. BCD = Boot Configuration Data You can also change the default boot settings in Control Panel -> System & Security -> System -> Advanced System Settings (on the left hand side), -> Startup & Recovery -> Settings Incorrect answers B: The Boot.ini file is no longer used by Vista or Windows 7.
C: MSCONFIG is not used to specify which operating system to boot. D: Since the boot.ini file is no longer used, the command bootcfg.exe is not applicable.

Submit
21. 139
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains two computers named CERTKILLER-WS680 and CERTKILLER-WS622.

CERTKILLER-WS680 currently runs Microsoft Windows 7 and CERTKILLER-WS622 runs Microsoft Windows XP Professional.

During the course of the day you enable remote desktop on CERTKILLER-WS680 as shown in the exhibit below:



Later, a CertKiller.com user named Rory Allen logs on to CERTKILLER-WS622 and attempts to remotely access CERTKILLER-WS680. However, Rory Allen receives the error as shown in the exhibit below:



What should you do to ensure that Rory Allen can use CERTKILLER-WS622 to remotely connect to CERTKILLER-WS680?

Explanation

To ensure that Rory Allen can remotely connect to CERTKILLER-WS680, you should enable the "Allow connections from computers running any version of Remote Desktop" setting on CERTKILLER-WS680. This will allow remote desktop connections from any computer, including CERTKILLER-WS622 running Windows XP Professional. By enabling this setting, you are allowing remote desktop connections to be established between the two computers regardless of the version of Remote Desktop being used.

Submit
22. 168
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

A network user named Mia Hamm has a client computer which she regularly backs up. Mia Hamm additionally creates system image backups. During the course of the day Mia Hamm's computers disk fails and she replaces the failed disk drive. CertKiller.com wants you to recover Mia Hamm's computer to the previous Windows environment. You started the computer using the Windows 7 installation media.

What should you do?

Explanation

Part 3: Configure file recovery options (1 Question)

Submit
23. 28
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are responsible for managing a workstation named CERTKILLER-WS624. CERTKILLER- WS624 is configured to run Windows Vista and contains an accounting application named accapp.exe.

CertKiller.com purchases a new Windows 7 workstation that will replace CERTKILLER-624. You need to export the user state as well as the settings of the accapp.exe application so that it can be migrated to the Windows 7 workstation.

What should you do?

Explanation

In order to migrate a user from Vista to Windows 7run the User State Migration toolkit (USMT). ScanState collects the files and settings from the source computer. Run LoadState to restore the user state onto the destination computer. Incorrect Answers:
B: USMT is not the correct tool to use. C: /migapp is not a valid switch for Scanstate.exe. D: Migapp.exe is not the correct tool to use.Reference: http://technet.microsoft.com/en- us/library/cc721992(

Submit
24. 56
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows 7. You are assigned a client computer named CERTKILLER-WS25. To ensure your productivity you need to make sure that the physical memory as well as the speed is increased on CERTKILLER-WS25.
What should you do?

Explanation

ReadyBoost is a feature in Windows operating systems that allows you to use a USB flash drive or SD card as additional memory for your computer. By using ReadyBoost on CERTKILLER-WS25, you can increase the physical memory and improve the speed of the computer. This is a suitable solution for increasing productivity in this scenario. EFS (Encrypting File System) is used for encrypting files and folders, SpeedDisk is a defragmentation tool, and Pagefile.sys is a system file used for virtual memory management, but none of these options directly address the need to increase physical memory and speed.

Submit
25. 69
You work as a desktop support technician at a company named CertKiller.com. All CertKiller.com users are divided into groups named CK_ADMIN, CK_SUPRT and CK_STAFF.
The CertKiller.com network contains a stand-alone Windows 7 computer named CERTKILLERWS680.
Several CertKiller.com users make use of CERTKILLER-WS680. You need to prevent the
CertKiller.com users of the CK_STAFF group from running Windows Media Player on
CERTKILLER-WS680. However, all other members must still be able to run Windows Media
Player. You want to accomplish this task by using the least amount of administrative effort.

What should you do?

Explanation

By creating an executable rule from Application Control Policies on CERTKILLER-WS680, you can specifically target and block the Windows Media Player application for the CK_STAFF group while allowing all other users to still run it. This approach requires the least amount of administrative effort as it only involves creating a rule within the existing Application Control Policies, rather than implementing additional policies or restrictions.

Submit
26. 78
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an internal Web site that uses Integrated Windows Authentication.
A CertKiller.com user named Amy Walsh has been assigned a workstation named CERTKILLERWS680 that is running Windows 7. Amy Walsh reports that she is prompted for authentication when she attempts to access the internal Web site. You verify that Amy Walsh's user account has permission to access the internal Web site. You need to make sure that authentication occurs automatically when Amy Walsh attempts to connect the Web site.

What should you do?

Explanation

Adding the Web site's URL to the Local Intranet zone on CERTKILLERWS680 will ensure that authentication occurs automatically when Amy Walsh attempts to access the internal Web site. The Local Intranet zone is a trusted zone in Internet Explorer that allows for automatic authentication for websites within the organization's network. By adding the Web site's URL to this zone, CERTKILLERWS680 will recognize it as a trusted site and automatically authenticate Amy Walsh when she tries to access it.

Submit
27. 81
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7 Professional.
A CertKiller.com user named Andy Reid currently makes use of a computer named CERTKILLERWS680.
You want to configure CERTKILLER-WS680 to make sure that the temporary Internet
files are deleted immediately whenever Andy Reid closes Internet Explorer.
What should you do?

Explanation

The correct answer is to modify the advanced settings from the Internet Options on CERTKILLER-WS680. By modifying the advanced settings, you can configure Internet Explorer to delete temporary internet files immediately when the browser is closed. This ensures that Andy Reid's temporary internet files are always cleared whenever he closes Internet Explorer.

Submit
28. 85
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.
A CertKiller.com user named Dean Austin has been assigned a client computer named
CERTKILLER-WS623. CERTKILLER-WS623 has been configured to use the 192.168.16.35 IP address and the 255.255.255.0 Subnet mask. CERTKILLER-WS623 has also been configured to use 192.168.18.3 as the DNS Server address. The following exhibit shows the CERTKILLERWS623 IP configuration.


You need to ensure that Dean Austin can make use of CERTKILLER-WS623 to connect to
resources on other subnets.

What should you do?

Explanation

To connect to other subnets, you need to configure CERTKILLER-WS623 with a default gateway.
The default gateway is usually the address of the internal interface of the network router. The
question doesn't tell us what address of the internal interface of the network router is but we know
that it needs to be an address in the same subnet as CERTKILLER-WS623. From the answers
given, the only address that would apply is 192.168.16.1.
Incorrect Answers:
B: 192.168.16.35 is the address of CERTKILLER-WS623. Therefore, it cannot the default gateway
address.
C: 192.168.18.1 is not on the same subnet as CERTKILLER-WS623. Therefore, it cannot the
default gateway address.
D: You need to configure the default gateway address, not the preferred DNS server address

Submit
29. 87
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You are working on a client computer named CERTKILLER-WS680. You want to release the
DHCP assigned IP configuration of CERTKILLER-WS680. However, when you run the ipconfig /release command you receive the error message stating that elevated permissions are required.

What should you do?

Explanation

To release the DHCP assigned IP configuration of CERTKILLER-WS680, you need elevated permissions. One way to achieve this is by right-clicking the command prompt and selecting "Run as administrator." By doing so, you will have the necessary privileges to run the ipconfig /release command successfully.

Submit
30. 161
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

What should you do to increase the size of the paging file for a Windows 7 computer named
CERTKILLER-WS680?

Explanation

not-available-via-ai

Submit
31. 30
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 300 Windows XP Professional workstations and 200 Windows Vista Ultimate workstations.
You have been instructed to migrate all Windows XP Professional workstations to Windows 7 Ultimate. You need to ensure that user files and setting are retained. However, several CertKiller.com users have used Encrypting File System (EFS) to encrypt their user files. You therefore need to migrate the Encrypting File System (EFS) encrypted files and certificates. In
Microsoft 70-680: Practice Exam
addition you need to ensure that you are able to encrypt the migration store during the migration.
What should you do?

Explanation

USMT 3.0 or higher should be used on Windows XP to migrate EFS files and certificates and also encrypt the migration store. With USMT 3.0 you can specify the / efs :copyraw switch to automatically migrate the EFS files and certificates to the destination computer that is running Windows Vista. To encrypt the store, you should use the /encrypt switch.

Submit
32. 119
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. The CertKiller.com network users currently make use of a standalone computer for storing encrypted files.

How should you ensure you are able to read the contents of the encrypted files of all users on the standalone computer?

Explanation

Part 3: Configure user account (UAC) (4 Questions)

Submit
33. 127
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has recently installed and configured a file server named CERTKILLER-SR01 on the network.

A network user named Rory Allen makes use of a computer named CERTKILLER-WS01 and tried connecting to CERTKILLER-SR01 using an account named RAllen unsuccessfully. CertKiller.com wants you to ensure that Rory Allen authenticates using the account named KingAdmin when connecting to CERTKILLER-SR01.

What should you do?

Explanation

Part 5: Configure BranchCache (4 Questions)

Submit
34. 130
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a branch office in Athens. All servers on the CertKiller.com network run Windows Server 2008 and all client computers run Windows 7.

The servers are located at the London office and the four client computers at the Athens office.
The servers located at London office have BranchCache enabled. You receive numerous
complaints from users at the Athens office stating that it takes a long time to open large files in the London office.

How could you minimize the time it takes for users in the Athens office to open files in the London office?

Explanation

Enabling the BranchCache Distributed Cache mode on the client computers in the Athens office would be the best option to minimize the time it takes for users to open files in the London office. BranchCache is a feature in Windows Server 2008 that allows client computers to cache files and data from remote servers, reducing the amount of data that needs to be transferred over the network. By enabling BranchCache Distributed Cache mode on the client computers in Athens, they can store a local copy of frequently accessed files from the London office, improving file access speed and reducing network congestion.

Submit
35. 147
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are working on a client computer named CERTKILLER-WS680 that runs Windows 7.

CERTKILLER-WS680 has a Wake-on-LAN compliant network card. You configure Windows
Update to run at night when the computer is shut down. You enable the Wake-on-LAN feature and configure the Enabling Windows Update Power Management settings on CERTKILLER-WS680.
You need to ensure that Windows Update occurs at night.

What should you do?

Explanation

To configure Windows Update installations to run at night when computers are shut down, you need to leave the computers in hibernate mode at night. Hibernate mode saves the contents of memory to a file called hiberfil.sys, therefore you would not lose unsaved data in case of total power failure and therefore can download the Windows updates and perform installations.

Submit
36. 8
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7.

Explanation

In Windows 7, NFS is not a volume type. This means that Windows 7 does not support the Network File System (NFS) as a type of volume. NFS is a protocol commonly used for sharing files and directories over a network, typically used in UNIX and Linux environments. However, Windows 7 does not natively support NFS as a volume type, so it cannot be used for sharing files and directories in a Windows 7 environment.

Submit
37. 15
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

You receive an instruction from the CIO to install Windows 7 on a computer named CERTKILLER-SR01. During a test installation you discover that the Online Compatibility Check has failed. You therefore need to determine the reason this occurred.

What should you identify? (Choose all that apply.)

Explanation

The error occurred due to a display adapter without WDDM Support but with SVIDEO Support because Windows 7 requires a display adapter with WDDM (Windows Display Driver Model) support in order to function properly. The error also occurred due to 512MB of RAM because Windows 7 requires a minimum of 1GB of RAM to run smoothly.

Submit
38. 101
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to run Windows 7.

You are in the process of adding a new computer named CERTKILLER-WS16 with an IP address subnet. After the installation you discover that you are unable to connect to the other computers on the network, however, the other computers are able to make a connection to each other. You run the ipconfig command on CERTKILLER-WS16 and see that the IPv4 address is 169.254.25.32. To ensure productivity you need to make sure that you are able to connect to the other computers on the network.

What should you do?

Explanation

The IP address of CERTKILLER-WS16 is 169.254.25.32, which is an Automatic Private IP Addressing (APIPA) address. APIPA addresses are assigned when a computer is unable to obtain an IP address from a DHCP server. In this case, the computer is not able to connect to the other computers on the network because it does not have a valid IP address. By configuring a static TCP/IP address on CERTKILLER-WS16, the network administrator can ensure that the computer has a valid IP address and can connect to the other computers on the network.

Submit
39. 118
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named Rory Allen is a member of a group named KingAccess and currently uses a shared computer.
Rory Allen recently informed you that the computer has a folder named RAllen. Rory Allen
requested that you configure the permissions on the RAllen folder to meet the requirements below:
The permissions should be modified to allow Rory Allen to delete all files in the RAllen folder.The permissions should have the members of the KingAccess group able to create files in the RAllen folder.

Explanation

not-available-via-ai

Submit
40. 17
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista (x86).

During the course of the day you receive instruction from CertKiller.com to perform a clean installation of Microsoft Windows 7 (64-bit) on a user named Rory Allen's computer.

What should you do?

Explanation

Part 2: Upgrade to Windows 7 from previous versions of Windows (10 Questions)

Submit
41. 20
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
The client computers on the CertKiller.com network run a mix of Windows 2000 Professional with Service Pack 4 (SP4), Windows XP Professional with Service Pack 3 (SP3), Windows Vista Business and Windows Vista Ultimate.

You have received instructions to upgrade some of the client computers to Windows 7 Professional.

What should you do?

Explanation

Only Windows Vista Business can be upgraded to Windows 7 Professional.

Submit
42. 31
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been instructed to perform a clean installation of Microsoft Windows 7 on the CertKiller.com client computers that are currently running Microsoft Windows Vista.
You need to be able to migrate user data and settings to Windows 7. The computers running Windows Vista currently have a single partition of 80 GB with 60 GB of free disk space. You need to use the User State Migration Tool (USMT) to migrate user state data while keeping network traffic to a minimum.
What should you do?

Explanation

Resizing the 80 GB partition with a third-party tool and creating a second partition to store the user state data will keep the network traffic to a minimum. If you want to store user state data on a network share and the computer does not have a secondary partition, you should resize the partition.

Submit
43. 34
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 120 workstations.
CertKiller.com is currently in the process of migrating all of its workstations to Windows 7. In preparation of the migration, you have installed Windows 7 on a computer named CERTKILLER- WS680. You now need to create an image of CERTKILLER-WS680, which will be deployed to all workstations on the CertKiller.com network.
What should you do before creating the image on CERTKILLER-WS680?

Explanation

Sysprep is used to prepare the image to be installed on other machines. Sysprep will remove the SID, Reset the Activation to 30 days, add an answer file if desired and reset the install to an "Out-Of-The-Box" experience.
Any method of moving a Windows image to a new computer, either through imaging, hard disk duplication, or other method, must be prepared with the sysprep /generalize command. Moving or copying a Windows image to a different computer without running the Sysprep /generalize command is not supported.
The following command-line options are available for Sysprep : sysprep.exe [ / oobe | /audit ] [ /generalize ] [ /reboot | /shutdown | /quit ] [ /quiet ] [ / unattend : answerfile ] Incorrect Answers: B: RIS was used in Windows 2000. It is not required here. C: It is not necessary to disable the System Protection settings. D: WDS is a server service. It is not something you run on a workstation prior to taking an image.

Submit
44. 50
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to create a 20-GB native VHD which will be named KingSystem located in a folder KingWindows which resides on an external hard disk assigned the H: drive designation.
What should you do?

Explanation

not-available-via-ai

Submit
45. 57
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory forest containing a single domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com purchases 40 new client computers configured with 32-bit hardware.
You have been asked by CertKiller management to plan the deployment of Windows 7 along with several corporate applications to the client computers using a custom image.
How should you prepare for the deployment whilst ensuring the least amount of administrative effort is used?

Explanation

not-available-via-ai

Submit
46. 63
CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com
network contains 50 client computers that are configured to run Microsoft Windows XP
Professional. During the course of the day you receive an instruction from the CIO to determine which current applications installed on the client computers are compatible with Windows 7. You need to accomplish this task with the least amount of administrative effort.
What should you do?

Explanation

Installing Microsoft Application Compatibility Toolkit (ACT) would be the most efficient way to determine which current applications installed on the client computers are compatible with Windows 7. ACT is a tool that helps identify and resolve application compatibility issues, allowing you to assess which applications will work properly on the new operating system. This tool streamlines the process and minimizes administrative effort by providing a comprehensive report on application compatibility, allowing you to quickly identify any potential issues.

Submit
47. 66
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Rory Allen asked you what he should download from the Microsoft Corporation Web site to obtain USMT 4.0.
What should you do?

Explanation

USMT 4.0 stands for User State Migration Tool 4.0, which is used to migrate user data and settings from one computer to another. In order to obtain USMT 4.0, Rory Allen should download WAIK (Windows Automated Installation Kit) from Microsoft Corporation. WAIK includes USMT 4.0 as one of its components.

Submit
48. 166
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are working on a client computer named CERTKILLER-WS680 that is running Windows 7.
System Protection is enabled on CERTKILLER-WS680.

What would you do to delete all System Protection snapshots on CERTKILLER-WS680 except the most recent snapshot?

Explanation

not-available-via-ai

Submit
49. 148
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications.

During the course of the day you receive an instruction from the CIO to install Federated Search connectors.

What should you do?

Explanation

Part 2: Manage disks (2 Questions)

Submit
50. 27
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista. During the course of the day a network user named Mia Hamm asked you which of the Microsoft tools can be used to determine if your installed applications have known problems with Microsoft Windows 7.

What should you do?

Explanation

Part 3: Migrate user profiles (5 Questions)

Submit
51. 154
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for managing a computer named CERTKILLER-WS25 that is configured to run Windows 7.

What can you do to view the processes that are producing network activity at present?

Explanation

Opening Resource Monitor and clicking the Network tab will allow you to view the processes that are producing network activity at present. Resource Monitor provides detailed information about network activity, including the processes that are using the network and the amount of data they are sending and receiving. By opening Resource Monitor and navigating to the Network tab, you can easily identify the processes responsible for network activity and monitor their performance. This will help you troubleshoot network issues and optimize network usage.

Submit
52. 149
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

CertKiller.com issues a new usage policy that prevents CertKiller.com users from installing
removable disk devices on their computers. You need to ensure that the policy is implemented.

What should you do?

Explanation

To prevent users from installing removable device drivers on their computers, you need to enable group policy setting Prevent installation of removable devices Device Installation Restriction.

Submit
53. 77
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers run Microsoft Windows 7.
You are assigned a client computer named CERTKILLER-WS680.
How would you modify the file extensions on CERTKILLER-WS680 that are linked to Internet Explorer?

Explanation

To modify file extensions linked to Internet Explorer on CERTKILLER-WS680, you should open Default Programs and select Set Associations from the Control Panel. This allows you to associate specific file types with Internet Explorer, determining which program should open those files. By modifying the set associations, you can change the default program for opening specific file types in Internet Explorer.

Submit
54. 86
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
The CertKiller.com network is connected to the Internet through a router with an internal IP
address of 192.168.16.12 and an external IP address of 198.207.16.19. You add a new Windows 7 client computer named CERTKILLER-WS680 to the network. You configure CERTKILLERWS680 with the IP address of 192.168.16.35 and a subnet mask of 255.255.255.0. You need to ensure that CERTKILLER-WS680 is able to access the Internet.

What should you do?

Explanation

To ensure that CERTKILLER-WS680 is able to access the Internet, you need to set the default gateway on CERTKILLER-WS680 to 192.168.16.12. The default gateway is the IP address of the router that connects the internal network to the Internet. By setting the default gateway to 192.168.16.12, CERTKILLER-WS680 will be able to send and receive network traffic to and from the Internet through the router.

Submit
55. 91
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You are working on a client computer named CERTKILLER-WS680. You have been instructed to configure CERTKILLER-WS620 with 2001::e45d:691a:f:4ac2.

What should you do?

Explanation

The format of the address 2001: :e45d:691a:f:4ac2 tells us that this is an IPv6 address and
therefore you need to configure the network connection by entering 2001::e45d:691a:f:4ac2 in the IPv6 address properties.
Incorrect Answers:
A: This is not a MAC address. Furthermore, a MAC address is hard coded into the network card and as such is not something you would manually configure.
B: A DNS suffix search item would be a domain name such as CertKiller.com or Microsoft.com.
C: A WEP key is similar to a password and as such is usually just a string of random letters and numbers.
E: This is not an IPv4 address. An example of an IPv4 address is 192.168.1.23

Submit
56. 99
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
CertKiller.com recently deployed a server named CERTKILLER-SR01 which runs a custom network application. CERTKILLER-SR01 has two IP addresses 192.168.45.23 and 192.168.45.24.

How can you ensure that a client computer named CERTKILLER-WS680 resolves CERTKILLERSR01. CertKiller.com to only the 192.168.45.23 IP address?

Explanation

By editing the Hosts file on the client computer CERTKILLER-WS680, you can manually specify the IP address that should be used when resolving the hostname CERTKILLER-SR01. This will ensure that the client computer only resolves CERTKILLER-SR01 to the specified IP address (192.168.45.23) and not the other IP address (192.168.45.24).

Submit
57. 106
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com wants to prevent all inbound traffic to a Windows 7 computer named CERTKILLER-WS680 without the end user being notified when inbound traffic is blocked.

What should you do?

Explanation

Block all incoming connections, including those in the list of allowed programs.
This setting blocks all unsolicited attempts to connect to your computer. Use this setting when you need maximum protection for your computer, such as when you connect to a public network in a hotel or airport, or when a computer worm is spreading over the Internet. With this setting, you are not notified when Windows Firewall blocks programs, and programs in the list of allowed programs are ignored. When you block all incoming connections, you can still view most webpages , send and receive e-mail, and send and receive instant messages.

Part 5: Configure remote management (4 Questions)

Submit
58. 135
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. The CertKiller.com network contains a file server
named CERTKILLER-SR24 that hosts a shared folder named CKDocs.

A CertKiller.com user Amy Walsh has been assigned a mobile computer named CERTKILLERWS680.

Amy Walsh uses CERTKILLER-WS680 to work on a file named MarketingPlan.doc which
is located in the CKDocs folder on CERTKILLER-SR24.
Amy Walsh needs to make the MarketingPlan.doc file available on CERTKILLER-WS680 so that she can continue working on the document when she is out of the office. You verify that Amy Walsh has permission to make the file available offline. However, when Amy Walsh right-clicks the file, the menu option labeled Make available offline is not visible. You need to ensure that Anne can make the file available offline.

What should you do?

Explanation

Enabling offline files is a two step process. First, it must be enabled on the shared files by allowing the caching of the files. Only when this is done will Anne be able to make the files available to her offline.

Submit
59. 144
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are working on a workstation named CERTKILLER-WS680 that runs Microsoft Windows 7.

How would you configure CERTKILLER-WS680 to download updates from a local Windows
Server Update Services (WSUS) server?

Explanation

To configure CERTKILLER-WS680 to download updates from a local WSUS server, you would need to change the Windows Update settings from the local Group Policy on CERTKILLER-WS680. The Group Policy allows you to centrally manage and configure settings for multiple computers in an Active Directory domain. By changing the Windows Update settings in the local Group Policy, you can specify that CERTKILLER-WS680 should download updates from the WSUS server instead of the default Windows Update server. This ensures that the workstation receives updates from the local server rather than downloading them from the internet.

Submit
60. 41
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a regional office in New York. All client computers on the CertKiller.com network run Windows 7 Ultimate. You are responsible for managing CertKiller.com's operating system deployment images.
CertKiller.com is in the process of opening a European regional office in Rome. You are required to ensure that support for Italian is available for the Windows 7 deployment in the Rome office. However, you need to install the Italian language pack without editing the Windows 7 image.
What should you do?

Explanation

To ensure support for Italian in the Windows 7 deployment in the Rome office without editing the Windows 7 image, it is recommended to copy the Italian language pack to the Windows distribution folder. This will allow the language pack to be installed during the deployment process without modifying the original image. By copying the language pack to the distribution folder, it will be available for installation on the client computers in the Rome office.

Submit
61. 73
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com
network run Windows Server 2008 and all client computers run Windows 7. CertKiller.com has
multiple custom applications that are digitally signed. For security purposes CertKiller wants you to
devise a security policy that will only enable company approved digitally signed applications to run.
Which of the following options would achieve this?

Explanation

AppLocker is a feature in Windows that allows administrators to specify which applications are allowed to run on a computer. By creating an executable rule in AppLocker, CertKiller.com can ensure that only company-approved digitally signed applications are allowed to run on client computers. This provides an effective security measure to prevent unauthorized or malicious software from running on the network.

Submit
62. 141
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7.

A CertKiller.com user named Kara Lang has been assigned a portable client computer named CERTKILLER-WS680. Kara Lang is aware that CERTKILLER-WS680 has a Virtual Private Network (VPN) connection configured to connect to the CertKiller.com network from remote locations. However, Kara Lang reports that she cannot locate the VPN connection on CERTKILLER-WS680.

What should you do?

Explanation

The Network and Sharing Center program is where you would go to view all your network connections including VPN connections. From within the Network and Sharing Center program, you can select the VPN connection and connect to it.

Submit
63. 140
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com

You are working on a computer named CERTKILLER-WS680 that runs Microsoft Windows 7.

During the course of the day you created a VPN connection on CERTKILLER-WS680 for
connecting to the CertKiller.com network. You want to ensure that you are still able to use the Internet while being connected to the CertKiller.com network via the VPN connection. You also want to ensure that Internet traffic is not routed through the CertKiller.com network.

What should you do?

Explanation

To ensure that you are still able to use the Internet while being connected to the CertKiller.com network via the VPN connection, you should configure the advanced TCP/IP settings of the VPN connection on CERTKILLER-WS680. By doing this, you can specify that only CertKiller.com network traffic should go through the VPN connection, while all other Internet traffic should use the default gateway and not be routed through the CertKiller.com network. This allows you to maintain Internet access while connected to the VPN.

Submit
64. 131
You work as a network administrator at CertKiller.com. CertKiller.com currently has its
headquarters located in Miami and a branch office located in Detroit. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

CertKiller.com has the Detroit office configured to use BranchCache. During the course of the day a network user in the Detroit office using a computer named CERTKILLER-WS01 complains about experiencing performance issues.

How would you temporarily have all the computers prevented from retrieving cached content from CERTKILLER-WS01?

Explanation

The Netsh branchcache flush command is used to clear the cache of a computer that is configured to use BranchCache. By running this command on CERTKILLER-WS01, it will temporarily prevent all computers from retrieving cached content from CERTKILLER-WS01. This can help resolve the performance issues reported by the network user in the Detroit office. Stopping the Server service, modifying the File and Printer Sharing setting, or configuring the Windows Firewall to block all incoming connections would not specifically address the issue of cached content retrieval.

Submit
65. 152
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. Several months ago CertKiller.com deployed Microsoft Windows 7 client computers for all users in the Sales department.

You received a report from a CertKiller.com user in the Sales Department user named Rory Allen.

Rory Allen has been assigned a client computer named CERTKILLER-WS680 and reports that he experiences an unusually large amount of system failures. You log on to CERTKILLER-WS680 in an attempt to identify the cause of the failures and also to analyze a historical view of workstation performance and see when the failures first started appearing on CERTKILLER-WS680.

What should you do?

Explanation

The Reliability Monitor will allow you to see a graphical history of software installs and uninstalls,
application failures, hardware failures, Windows failures, and miscellaneous failures

Submit
66. 36
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You have been instructed to deploy Microsoft Windows 7 on all the CertKiller.com client computers. You want to deploy Windows 7 on the client computers in unattended mode. You install Windows 7 on a reference computer named CERTKILLER-WS680 that will be used to build a master image. You then manually create the answer file that will be required for the unattended installation.
What should you do next?

Explanation

When manually creating an answer file, you should always validate the answer file using SIM. Validating will ensure that the values in the answer file are correct. If you neglect to validate after manually creating the answer file, you may encounter errors when deploying Windows 7 and will then have to validate the answer file.
Incorrect answers : A : Sysprep.exe is used to prepare CERTKILLER-WS680 after validating the answer file. B : ImageX is used to capture the image after preparing CERTKILLER-WS680. It is not used after manually creating the answer file. D : Setup Manager Tool or Setupmgr.exe is used in earlier versions of Windows operating systems.

Submit
67. 93
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has recently deployed two client computers to the network configured with the IPv6 addresses shown in the table below:
During the course of the day you receive instruction from CertKiller.com to test the IPv6 address connection from CERTKILLER-WS01 to CERTKILLER-WS02.

What should you do?
 

Explanation

Part3: Configure networking settings (9 Questions)

Submit
68. 105
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

A new 32-bit third-party accounting application named accapp.exe has just been installed on a computer named CERTKILLER-WS680. The 32-bit third-party accounting application uses port 80 to negotiate a listening port. After establishing the listening port, the application uses dynamic ports above port 6000. You need to configure Microsoft Windows Firewall to allow traffic for the accapp.exe application.

What should you do?

Explanation

To allow traffic for the accapp.exe application, you should add a program exception for the application in the Windows Firewall settings. This will allow the application to communicate through the firewall without any restrictions. Disabling the entire Windows Firewall or adding a port exception for port 80 or all ports above 6000 would not specifically allow the accapp.exe application to function properly. Creating an Internet Explorer exception is also unrelated to allowing traffic for the accapp.exe application.

Submit
69. 121
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

CertKiller.com has a written security policy that states that only administrator approved
applications should be installed on the CertKiller.com network. A CertKiller.com user named Amy Wilson has been assigned a client computer named CERTKILLER-WS680. Amy Wilson reports that every time she attempts to make configuration changes to CERTKILLER-WS680, she receives the prompt shown in the following exhibit:



You need to ensure that Amy Wilson can make configuration changes to CERTKILLER-WS680.
You verify that Amy Wilson is a member of the local administrators group. You now want to
prevent this prompt from appearing when Amy Wilson attempts to make configuration changes to CERTKILLER-WS680.

What should you do?

Explanation

UAC prevents unauthorized configuration changes and silent installations. The message that is displayed confirms a user's decision to make configuration changes. This helps prevent viruses from making changes to a user's computer in the security context of the user but without the user's
permission. You should change the behavior of the elevation prompt for administrators in UAC Admin Approval Mode. Change the policy setting from Prompt for consent to No prompt. With this setting, the UAC message will not be displayed whenever Amy Wilson attempts to make configuration changes that require administrative privileges.

Submit
70. 138
You are the newly appointed desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are responsible for managing a workstation named CERTKILLER-WS680 that is configured to run Windows 7. Several CertKiller.com users log onto CERTKILLER-WS680. CERTKILLERWS680 contains a folder named CK_Data. You enable auditing on CK_Data.

What step should you take to ensure all access to CK_Data is logged?

Explanation

To ensure all access to the CK_Data folder is logged, the correct step to take is configuring the Audit object access setting from the local Group Policy. This will enable auditing for object access on CERTKILLER-WS680, allowing all actions performed on the CK_Data folder to be logged and monitored. Modifying the permissions on the folder, configuring the Audit directory service Access setting, modifying the UAC settings, or modifying the Windows Firewall settings will not specifically enable auditing for the CK_Data folder.

Submit
71. 142
You are the newly employed desktop support technician at CertKiller.com. The CertKiller.com
network consists of a single Active Directory domain named CertKiller.com.

You are assigned a workstation named CERTKILLER-WS680. CERTKILLER-WS680 is
configured to run Windows 7. You need to determine the applications that were installed by
another desktop support technician the previous week.

What should you do?

Explanation

Use Reliability Monitor to Troubleshoot
Reliability Monitor shows you your system stability history at a glance and lets you see details on a
day-by-day basis about events that impact reliability. This topic helps you understand the results
and take steps to improve reliability based on what you learn.
System Stability Chart
Reliability Monitor maintains up to a year of history for system stability and reliability events. The
System Stability Chart displays a rolling graph organized by date.
The top half of the System Stability Chart displays a graph of the Stability Index. In the lower half of the chart, five rows track Reliability Events that either contribute to the stability measurement for
the system or provide related information about software installation and removal. When one or more Reliability Events of each type are detected, an icon appears in the column for that date.
For Software Installs and Uninstalls, an Information icon indicates a successful event of that type occurred, or a Warning icon indicates a failure of that type occurred.

For all other Reliability Event types, an Error icon indicates a failure of that type occurred.

Submit
72. 151
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. You are working on a client computer named
CERTKILLER-WS680. You want to identify the hardware and software failures which have
occurred on CERTKILLER-WS680 over the past six months.

What should you do?

Explanation

The System Stability Chart provides information about the hardware and software failures that have occurred on a computer over a specific period of time. By reviewing the results from the System Stability Chart, you can identify any issues that have occurred on CERTKILLER-WS680 over the past six months. This option is more specific to the question compared to the other options, which involve reviewing the System Event log, creating a User Defined Data Collector Set, or reviewing the Application Event log.

Submit
73. 26
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
A CertKiller.com employee named Rory Allen has a computer at home with a cable modem connection.

Rory Allen has recently requested that you guide him by selecting the appropriate method to upgrade from Microsoft Windows 7 Home Premium to Microsoft Windows 7 Ultimate.

What should you do?

Explanation

not-available-via-ai

Submit
74. 35
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been instructed to deploy Microsoft Windows 7 on all of the CertKiller.com client computers.
You have installed Windows Automated Installation Kit (Windows AIK) on a reference computer. You then created an answer file for a Windows 7 unattended installation. You now need to validate the answer file before deploying Windows 7 to the CertKiller.com client computers.
What should you do?

Explanation

The Windows SIM tool is used to create an answer file, as well as to validate the answer file to ensure that the file is working.

Submit
75. 54
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for a workstation named CERTKILLER-WS680 that runs Windows 7.
You have just upgraded the driver for the network adapter on CERTKILLER-WS680. After the upgrade you discover that you are unable to access the network resources. In Device Manager you notice a warning symbol next to the network adapter. You have to make sure that you are able to access the network resources as soon as possible.
What should you do?

Explanation

The easiest way to fix the problem is to roll back the newly installed driver. Click on the device in device manager, select the "Driver" tab and then click on "Roll Back Driver" Incorrect Answers: A: Uninstalling the network adapter might work but it is a lot of effort.
C: If you disable the adapter, the hardware scan won't find it. D: A static IP address won't help.

Submit
76. 60
You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers including mobile
computers on the CertKiller.com network run Windows 7 Professional.
A CertKiller.com user named Kara Lang has been assigned a mobile computer named
CERTKILLER-WS680. Kara Lang is preparing a multimedia presentation on CERTKILLERWS680.
However, Kara Lang informs you that when she plays the multimedia presentation there
is no sound.
You need to enable Kara Lang to do her presentation with audio and video playback.
What should you do?

Explanation

Using "Windows Mobility Center" you can ensure that your laptop stays awake, notifications are
turned off and the screen saver is turned off. You can also adjust the sound. The " Windows
Mobility Center " is only available on Laptops.
Incorrect Answers:
A: Windows Media Player 10 is not required for presentations.
B: Selecting "Always give a presentation ..." will not help sound or presentation interruptions
C: The default sound scheme may prevent your presentation from running correctly.Reference:
Search on "Presentation Settings" in "Help and Support"

Submit
77. 112
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The network contains a file server named CERTKILLER-SR03 that runs Windows Server 2008. CERTKILLER-SR03 contains a shared folder named CK_Data.

You have been assigned a client computer named CERTKILLER-WS680 that runs Windows 7.
You receive an instruction to ensure that CERTKILLER-WS680 is configured to encrypt any
cached files from CK_Data. You also need to ensure that when CERTKILLER-SR03 is
disconnected the files in CK_Data are still available.

What should you do? (Each correct answer presents part on the solution. Choose TWO.)

Explanation

The two requirements are "to ensure that CertKiller-ws680 is configured to encrypt any cached
files from CK_Data " and that the files are available offline. E . Making the CK_Data files available
office on CertKiller-ws680 is required and C. Enabling encryption of the offline files. It is true that if
the files on the server are encrypted, they will also be encrypted in the workstation offline cache.
But therequirement is "to ensure that CERTKILLER-WS680is configured to cache any files from
CK_Data ." Encrypting on the server is also more work than configuring the workstation. Offline
files can be set to be encrypted via GPO or manually on the workstation. Incorrect answers. A:
Copying files from CK_Data to the workstation does not ensure encryption or availability offline.
B: Encrypting files on the server. It is true that if the files on the server are encrypted, they will also
be encrypted in the workstation offline cache. But therequirement is "to ensure that CERTKILLERWS680is
configured to cache any files from CK_Data ."
D: Use of Bitlocker on the workstation would encrypt the entire disk and not just the offline files.
F: Use of Bitlocker on the server would encrypt the entire serverand protect the files on the server
but would do nothing for encryption of the workstation

Submit
78. 143
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You working on a Windows 7 workstation named CERTKILLER-WS680. You have received
instruction to configure Windows Update on CERTKILLER-WS680. You open Windows Update as shown in the following exhibit:



You need to ensure that the Windows Update settings on CERTKILLER-WS680 can be changed manually.

What should you do?

Explanation

To ensure that the Windows Update settings on CERTKILLER-WS680 can be changed manually, the best option is to change the settings from the local Group Policy. This will allow the technician to configure the Windows Update settings according to the organization's requirements. Enabling the Windows Update service or disabling User Account Control (UAC) may not necessarily give the technician the ability to manually change the settings. Logging on to CERTKILLER-WS680 as a member of the Administrators group may provide administrative privileges but does not specifically address the issue of changing the Windows Update settings.

Submit
79. 156
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7.
You receive a complaint from a CertKiller.com user named Mia Hamm stating that the games included with Windows 7 were not installed by default on her computer. You therefore decide to install the games on her computer.

What should you do?

Explanation

To install the games on Mia Hamm's computer, you should go to Control Panel > Programs, then click Turn Windows features on or off. This option allows you to enable or disable various features and programs in Windows, including the games. By accessing this option, you can easily install the games on her computer without the need for additional installations or updates.

Submit
80. 65
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7 or Microsoft Windows XP Professional.
During the course of the day a network user named Dean Austin asked you which of the Microsoft utilities can be used when transferring user encryption certificates from a computer that is configured to run Microsoft Windows XP Professional to a computer configured to run Microsoft Windows 7.
What should you do? (Choose two)

Explanation

The Windows Easy Transfer utility is a Microsoft utility that allows for the easy transfer of files, settings, and user accounts from one computer to another. In this case, it can be used to transfer the user encryption certificates from a computer running Windows XP Professional to a computer running Windows 7. The USMT (User State Migration Tool) utility is another Microsoft utility that is specifically designed for migrating user files and settings, including encryption certificates, from one computer to another. Therefore, both of these utilities can be used to transfer the user encryption certificates in this scenario.

Submit
81. 126
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 R2 and the client computers run Microsoft Windows 7.
CertKiller.com has recently deployed a server named CERTKILLER-SR01 configured as a DHCP server that has Network Access Protection (NAP) enforcement point configured. During the course of the day you receive instruction from CertKiller.com to configure a network user named Rory Allen's client computer as a NAP client.

Which two actions should you perform?

Explanation

The correct answer is to have the Network Access Protection Agent service Startup Type set to Automatic and to have the DHCP Quarantine Enforcement Client enabled. These actions are necessary to configure Rory Allen's client computer as a NAP client. The Network Access Protection Agent service is responsible for enforcing NAP policies on the client computer, and setting its Startup Type to Automatic ensures that it starts automatically when the computer boots up. Enabling the DHCP Quarantine Enforcement Client allows the client computer to communicate with the DHCP server and receive the necessary network policies for NAP enforcement.

Submit
82. 136
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. All CertKiller.com users store their data on a file server named CERTKILLER-SR04. No company or user data is stored locally on client computers.

CertKiller.com users from the Sales department have been issued with portable computers. When these users travel, they must be able to use company data files even when they are not connected to the network. You enable caching of offline files on all shared folders on CERTKILLER-SR04.

You also configure offline files on all portable computers in the Sales department. Before they leave the office users in the Sales department select several folders from CERTKILLER-SR04 to be made available offline.

However, when the users return to the office they report that the offline files were not available to them when they were out of the office. You need to ensure that the offline files are available to the CertKiller.com users in the Sales department even when they are not connected to the network

What should you do?

Explanation

The portable clients must be configured to begin to work offline when they are disconnected from the network. To configure this we must open Control Panel on the client computers and then open Folder Options. On the Offline Files tab, click Advanced and under When a network connection is lost, select Notify me and begin working offline. This is the preferred option for portable notebook systems and it specifies that you can continue working offline if you lose your connection to a computer or the network. Any network files will continue to be available to you.

Submit
83. 160
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
A CertKiller.com user named Clive Wilson has been assigned a Windows 7 client computer
named CERTKILLER-WS680. Clive Wilson reports that applications on CERTKILLER-WS680 are running slowly. You notice that CERTKILLER-WS680 has 2 GB of RAM and 250 MB free disk space. You need to improve performance on CERTKILLER-WS680.

What should you do? (Choose TWO.)

Explanation

The system in this scenario is showing symptoms that Clive Wilson is running out of disk space.
The Disk Cleanup utility can be used to free some disk space. It's also a good idea to defragment the hard drive as a hard drive which is close to its maximum capacity can become fragmented fast.
Incorrect Answers:
A: The minimum recommended setting of the page file is 1.5 times the physical memory, not 50%.
D: Elevated Privileges has no effect on system performance

Submit
84. 137
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

A CertKiller.com user named Amy Walsh has been assigned a mobile computer named
CERTKILLER-WS680. Amy Walsh needs to travel extensively in the execution of her duties and has configured CERTKILLER-WS621 to use the Power saver power plan. However, Amy Walsh reports that CERTKILLER-WS680 does not shut down completely when she clicks the Power button icon on the Start menu as the same programs that were opened when she tried to shut down the computer are still open when she restarts the computer.

You now need to configure CERTKILLER-WS680 to have it turn off completely without saving Amy Wilson's desktop session when she clicks the Power button icon on the Start menu.

What should you do?

Explanation

You should change the Start menu power button setting to Shut down in Advanced Settings. To open Advanced Settings, first open Power Options and click the Change plan settings link associated with the Power saver power plan. Then click the Change advanced power settings link to open the Advanced Settings dialog box. Expand Power buttons and lid, and then expand Start menu power button. Change the On battery setting to Shut down. This causes Windows to completely shut down when the Power button icon on the Start menu is clicked.
Part 4: Configure remote connections (4 Questions)

Submit
85. 11
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7. You receive an instruction from the CIO to ensure that the Active Directory domain can be joined by the Windows 7 Edition.

What should you do? (Choose all that apply).

Explanation

To ensure that the client computers can join the Active Directory domain, the best options would be to install the Windows Professional Edition, Windows Ultimate Edition, and Windows Enterprise Edition. These editions of Windows 7 have the necessary features and capabilities to join an Active Directory domain. The Windows Home Premium Edition, Windows Home Basic Edition, and Windows Starter Edition do not have the required functionality to join an Active Directory domain.

Submit
86. 14
CertKiller.com has hired you as a network Administrator for their network. All servers on the CertKiller.com network run Windows Server 2008. Half the client computers run Windows Vista and the rest Windows XP Professional.

You are in the process of identifying the utilities that cannot be identified as a Windows PE tool.

What should you identify?

Explanation

The correct answer is "You should consider identifying Subinacl". Subinacl is a command-line tool that is used to manage security information on Windows systems. It is not a Windows PE (Preinstallation Environment) tool, which is a lightweight version of Windows that is used for deployment and recovery purposes. Therefore, Subinacl does not belong to the category of utilities that cannot be identified as a Windows PE tool.

Submit
87. 25
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are responsible for a computer named CERTKILLER-WS04. CERTKILLER-WS04 is configured to run Windows Vista Service Pack 2 (SP2).

During the course of the week you receive an instruction from the CIO to have CERTKILLER-WS04 upgraded to Windows 7.

How would you do this?

Explanation

The correct answer explains that to upgrade CERTKILLER-WS04 from Windows Vista to Windows 7, the network administrator needs to run Setup.exe from the Windows 7 installation media on the Windows Vista machine. After running Setup.exe, the administrator should select the Upgrade option to perform the upgrade.

Submit
88. 33
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are busy with a deployment of an image of a computer. You have created an answer file named answer.xml. You want to ensure that the installation applies the answer file after the deployment of the image.
What should you do?

Explanation

The System Preparation ( Sysprep ) tool prepares an installation of Windows 7 for duplication, auditing, and customer delivery. You can use an answer file with Sysprep to configure unattended Setup settings. The /generalize command removes any machine specific attributes such as the Security ID (SID).
The / oobe command tells the image to start with the normal "Out-Of-The-Box" experience. Just as if you bought a retail new copy.
The / unattend : command tells the image to use the answer file
Incorrect Answers:
D: You don't run setup.exe to use an answer file.

Submit
89. 42
You are employed as the network administrator at CertKiller.com. The CertKiller.com network contains 150 client computers currently running Microsoft Windows XP Professional.
CertKiller.com has recently decided to deploy Windows 7 to 80 client computers on the CertKiller.com network. You decide to install Windows 7 on a computer named CERTKILLER- WS06 and prepare it to be imaged. You therefore need to determine what you should be doing prior to creating the image of CERTKILLER-WS06.
What should you do?

Explanation

Part 3: Deploy a system image (4 Questions)

Submit
90. 55
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7 Professional.
You are working on a client computer named CERTKILLER-WS680 that has been assigned to a CertKiller.com user named Amy Walsh. You have been instructed toupdate the printer connected to CERTKILLER-WS680 so that Amy Walsh can print graphics at a higher resolution. You download a new printer driver from the Internet. Before you install the new printer driver you want to ensure that the driver is compatible with Windows 7.
What should you do?

Explanation

When installing new software on your computer, system files and device driver files are sometimes overwritten by unsigned or incompatible versions, causing system instability. The system files and device driver files provided with Windows 7 have a Microsoft digital signature, which indicates that the files are original, unaltered system files or that they have been approved by Microsoft for use with Windows. Using File Signature Verification, you can identify unsigned files on your computer. You should not install the driver if it does not have the signature if you want to prevent the loss of production time due to incompatible driver installation that you are unsure of.
Incorrect Answers:
A: The advanced attributes of the driver file do not tell you if the driver is compatible with Windows 7. C: The Last Known Good Configuration boot option and the Recovery Console will not allow you to recover the original driver. You would need to boot to Safe Mode and use Driver Rollback to recover the original driver.
D: You want to check the driver before you install it. Installing a driver and hoping for the best is not a recommended practice.

Submit
91. 58
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
CertKiller.com has recently deployed a client computer that is used by multiple users in the Sales department. The client computer currently has multiple removable devices attached. During the course of the day you receive instruction from CertKiller.com to ensure that the network users are only able to access removable devices which were previously installed in the computer by modifying the Local Group Policy.
What should you do?

Explanation

Part 2: Configure application compatibility (9 Questions)

Submit
92. 70
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a
computer named CERTKILLER-WS680 which runs Microsoft Windows 7. CERTKILLER-WS680 is
currently used by multiple CertKiller.com network users who log on to the computer. You have
received instruction to deny a CertKiller.com user named Mia Hamm access to removable devices
on CERTKILLER-WS680. However, all other users who log on to CERTKILLER-WS680 must
retain access to removable devices.

What should you do?

Explanation

By altering the removable storage access policy from the local Group Policy on CERTKILLER-WS680, you can specifically deny access to removable devices for the user named Mia Hamm while allowing access for all other users. This can be done by configuring the appropriate settings in the Group Policy Editor, which allows for granular control over device permissions and access restrictions. This method ensures that only the specified user is affected by the policy change, while others can still use removable devices as needed.

Submit
93. 79
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an intranet Web site.
A CertKiller.com user named Robbie Blake has been assigned a workstation named
CERTKILLER-WS680 that is running Windows 7. Robbie Blake reports that he can access the internal web site but he cannot access web sites on the internet when he starts Internet Explorer.
You open Internet Explorer on CERTKILLER-WS680 as shown in the exhibit:


Explanation

The correct answer suggests selecting "Work Offline" from the Tools menu on CERTKILLER-WS680. This is because the user is able to access the internal web site but not external web sites. By selecting "Work Offline," the user will be forced to access cached versions of web pages instead of trying to connect to the internet. This can help troubleshoot any potential connectivity issues and determine if the problem lies with the internet connection or with the browser settings.

Submit
94. 80
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
A CertKiller.com user named Mia Hamm currently makes use of a computer named
CERTKILLER-WS680 which runs Microsoft Windows 7.

How would you configure CERTKILLER-WS680 to prevent Microsoft Internet Explorer from saving any data when Mia Hamm browses the Internet?

Explanation

Opening an InPrivate Browsing session on CERTKILLER-WS680 would prevent Internet Explorer from saving any data while Mia Hamm browses the internet. InPrivate Browsing mode does not store cookies, temporary internet files, or browsing history, ensuring that no data is saved on the computer. This option provides a private and secure browsing experience for the user. Modifying the permissions on the Temporary Internet Files folder or disabling the Client for Microsoft Networks service would not specifically prevent data from being saved by Internet Explorer. Selecting the Work Offline option in Internet Explorer would only prevent the browser from accessing the internet, but it would not prevent data from being saved.

Submit
95. 84
You work as the network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network run Windows Server 2008 and all client computers run Windows 7. All client computers are configured as Dynamic Host Configuration Protocol (DHCP) clients.
CertKiller.com users connect to a file server named CERTKILLER-SR01 that hosts several shared  folders. A fellow network administrator relocates CERTKILLER-SR01 to another network segment.
However, after the CERTKILLER-SR01 is relocated, numerous CertKiller.com users complain that they are unable to access the shared folders on TESTING-SR01. You need to make sure that CertKiller.com users can connect to CERTKILLER-SR01 and access the shared folders on CERTKILLER-SR01.

What should do?

Explanation

The ipconfig / flushdns command is used to flush and reset the contents of the DNS client
resolver cache. The workstations that communicated with CERTKILLER-SR01 prior to the move
cached the server's IP address in their DNS cache. It is therefore a possibility that those
workstations are retrieving their IP address from the cache. It does not query the DNS server for
the IP address. This type of situation will continue until the cached records expire.

Submit
96. 88
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network currently consists of two offices named Detroit and Miami which are on an isolated private wired subnet.
The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

During the course of the day you configure Detroit with an IPv4 address 172.28.34.140 with a subnet mask of 255.255.255.0. CertKiller.com additionally requested you configure the Miami office with an IPv4 address 172.28.34.210 with a subnet mask 255.255.255.0. During your routine maintenance you ping Detroit entering 172.28.34.140 and the command times out. You later try pinging Miami entering 172.28.34.210 and discover that you fail to locate the Miami computer IPv4 address. CertKiller.com wants you to determine what could be causing the problem.

What should you do?

Explanation

Part 2: Configure IPv6 network settings (5 Questions

Submit
97. 89
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network is configured to use IPv6 addressing.
You have installed Windows 7 on a client computer named CERTKILLER-WS680 and have used automatic IPv6 addressing on CERTKILLER-WS680. You want to verify the IPv6 address of CERTKILLER-WS680.

What should you do?

Explanation

By selecting "Details" from the network connection status on CERTKILLER-WS680, you can view the IPv6 address assigned to the computer. This option will provide detailed information about the network connection, including the IPv6 address. Running the other commands mentioned in the options will not provide the specific IPv6 address of CERTKILLER-WS680.

Submit
98. 92
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network is configured to make use of IPv6. You are responsible for managing a computer named CERTKILLER-SR04. You receive a request from the CIO to create a DNS record that will allow users to connect to CERTKILLER-SR04 using dec.CertKiller.com. You therefore need to identify the appropriate record you should request.

What should you do?

Explanation

The correct answer is to request an AAAA record. In IPv6, AAAA records are used to map a hostname to an IPv6 address. Since CERTKILLER-SR04 is configured to use IPv6, creating an AAAA record for dec.CertKiller.com will allow users to connect to CERTKILLER-SR04 using its IPv6 address.

Submit
99. 110
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

A network user named Rory Allen recently complained about receiving error messages whilst using an application. CertKiller.com is aware you do not have remote access to Rory Allen's computer. CertKiller.com recently requested that you instruct Rory Allen how to create screenshots of the actions performed on the computer whilst ensuring the mouse actions performed are tracked too.

What should instruct Rory to do?

Explanation

The Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information. Learn how the recording can be used to quickly identify problems and help reduce time spent with the help desk.

Submit
100. 111
You are employed as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for a workgroup name CK_GROUP that contains seven workstations. All the workstations run Windows 7.

The CK_GROUP workgroup contains a workstation named CERTKILLER-WS680 that hosts video and audio files.

Which two actions should you perform to share the video and audio files on CERTKILLERWS680?

Explanation

To share the video and audio files on CERTKILLER-WS680, you should consider moving the files to the Media Library on CERTKILLER-WS680. This will make the files accessible to other devices on the network. Additionally, you should consider creating a HomeGroup on CERTKILLER-WS680. This will allow other devices in the network to easily join the HomeGroup and access the shared files. Enabling File and Printer Sharing in Windows Firewall is not necessary for sharing files within a workgroup, and disabling User Account Control (UAC) is unrelated to file sharing.

Submit
101. 116
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

A CertKiller.com user named Mia Hamm has been assigned a client computer named
CERTKILLER-WS680. Mia Hamm needs to share an existing folder on CERTKILLER-WS680 with other members in her group. However, Mia Hamm receives an "Access is denied" error whenever she tries to change the permissions on the folder. You need to ensure that Mia Hamm can change the permissions on the folder.

What should you do?

Explanation

To share a folder on her computer, Anna only needs full control on the folder. Therefore, you need to Grant Allow-Full control permission to Anna in the properties of the folder.
Incorrect Answers:
A: Change permission is a share permission that you can set on a shared folder. This won't enable Mia to change the permissions on the folder.
B: Using the command line to create a share won't work if you don't have the relevant permissions.
C: The Allow-Modify permission allows a user to make changes to files and folders. It does not allow them to change the permissions on a file or folder.

Submit
102. 162
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7 Professional.

You install a new application named CKapp.exe on a client computer named CERTKILLERWS680 and run the application. You now want to apply various application patches to CERTKILLER-WS-680 so you decide to perform a backup of CERTKILLER-WS680 first.

You want all user files, application data and application settings, as well as the operating system and system state to be included in the backup so that you can perform a complete restore in the event of a hard disk failure.

What should you?

Explanation

To backup Windows 7 computers that will enable a restore in the event of a hard disk failure, you
need to create a Complete PC Backup using Windows Backup and Restore Center . The
Complete PC Backup and Restore will ensure a comprehensive, image-based backup that will
allow you to recover your entire system.

Submit
103. 3
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

CertKiller.com purchases a new client computer named CERTKILLER-WS680. You have been instructed to perform an automated installation of Microsoft Windows 7 on CERTKILLER-WS680 using the Microsoft Windows 7 DVD.

What should you do?

Explanation

When Windows 7 is booted from the DVD, it automatically searches for an answer file called autounattend.xml. If it finds such a file, it will use that to answer all of the configuration questions. Incorrect Answers: B: Winnt.sif is the Windows XP auto-answer file name.
C: The file should be named autounattend.xml not autounattend.sif.

Submit
104. 115
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com currently makes use of a stand-alone computer named CERTKILLER-WS680 that runs Microsoft Windows 7.
CERTKILLER-WS680 contains a single partition and is used by two CertKiller.com users named Rory Allen and Kara Lang.

Rory Allen makes use of Encrypting File System (EFS) to encrypt files. During the course of the day Rory Allen grants Kara Lang access to the encrypted files. However, Kara Lang is unable to access the encrypted files.

How should you ensure that Kara Lang is able to access the encrypted files of Rory Allen?

Explanation

This is a standalone computer. When Kara logs on and encrypts a file, the system will automatically generate an encryption certificate for her. The owner (Rory) of the encrypted file will
also need to add Lara's certificate to the file.
To add the EFS certificate to the shared file
Right-click the file you want to share, and then click Properties.
Click the General tab, and then click Advanced.
In the Advanced Attributes dialog box, click Details.
In the dialog box that appears, click Add.
In the Select User dialog box, click the certificate, and then click OK.
You can also use the "chiper.exe" command from the command line. You would use the adduser
command along with the cert command.
If Kara already has a certificate and you want to use that certificate, you have to perform two additional steps:
1. Export Kara's Certificate &
2. Import Kara's certificate to Rory's machine

Submit
105. 159
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

You have installed Microsoft Windows 7 on a new computer named CERTKILLER-WS680.
CERTKILLER-WS680 has the following hardware configuration:
2.4-GHz processor2 GB of RAM512-MB video adapter250-GB hard disk

After the installation you are unable to view the Thumbnails, Previews on folders and Transparent glass. You need to ensure that the advanced visual features of Windows 7 are displayed so you can view it.

What should you do?

Explanation

Installing more RAM will not necessarily fix the issue of not being able to view thumbnails, previews, and transparent glass. Configuring the system properties to optimize for best appearance will enable the advanced visual features of Windows 7, which includes the ability to view thumbnails, previews, and transparent glass. Pressing the ALT key and the TAB key simultaneously is not relevant to the issue at hand.

Submit
106. 7
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

You receive an instruction from Management to upgrade a client computer named CERTKILLER-WS25 to Windows 7. You decide to do the installation using the Windows 7 DVD so you log in to CERTKILLER-WS25 and insert the CD.

What should you do next? (Choose all that apply. Each answer is a complete solution)

Explanation

The correct answers are to run setup.exe from the DVD to start a clean Windows 7 installation and to use the autorun feature on the DVD to start a clean installation. Both of these options will allow for a fresh installation of Windows 7, which is necessary when upgrading from Windows XP Professional. This will ensure that any incompatible or outdated settings from the previous operating system are not carried over, resulting in a more stable and optimized installation of Windows 7.

Submit
107. 47
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com network contains a client computer named CERTKILLER-WS679 with a Virtual Hard Disk (VHD). You have installed Windows 7 on the Virtual Hard Disk (VHD). You now want to boot CERTKILLER-WS679 from the Virtual Hard Disk (VHD).
What should you do?

Explanation

If you are deploying the VHD to a computer with an existing Windows7 or Windows Server®2008R2 installation, you can use the BCDedit tool to make the new VHD bootable and add it to the boot menu. Using BCDedit , you obtain the GUID from the VHD boot disk and then using BCDedit , set that GUID to be the default boot device.
Incorrect Answers:
A: Msconfig does not set the boot order. B: The boot.ini file is no longer used in Windows 7.

Submit
108. 72
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists
of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A software restriction policy has been implemented for the Finance department and the default
security level for the policy has been set to Disallow. The Finance department now needs to run a
custom application named FinApp.exe.
You now need to configure the software restriction policy to allow CertKiller.com users in the
Finance department to run FinApp.exe. However, they should not be allowed to run any other
unauthorized applications.
What should you do?

Explanation

To configure the software restriction policy to allow Finance department users to run FinApp.exe and make sure that they are not allowed to run any other unauthorized applications, you need to create a new path rule for FinApp.exe and then set the rule to Unrestricted.
Incorrect Answers:
A: Setting the default security level of the software restriction policy to Unrestricted will remove all the restrictions from the Finance department and they will be allowed to run any application.
B: Adding FinApp.exe to the Designated File Types will not help because FinApp.exe is not a file type but a file itself.
D: You are using software restriction policies to control access to the application. It is therefore unnecessary to modify the permissions on the FinApp.exe program file.
E: Setting the default security level of the software restriction policy to Basic User will allow all basic users to use all the applications and the restrictions will be removed.

Submit
109. 83
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has itsheadquarters in London and a branch office in Paris.
The relevant portion of the CertKiller.com network is shown in the following exhibit:


You have just deployed a Windows 7 workstation named CERTKILLER-WS680 at the Paris office.
You now need to assign an IP address to the worksation.
What should you do?

Explanation

Correct Answer 192.168.5.40. Using an IP address like 192.168.5.52/27 is a shorthand way of indentifying the subnet mask. The /27 means that the first 27 bits of the IP address is the net mask. In this case 255.255.255.224. So the range of the available IP addresses for computers is limited to 192.168.5.33-62. The only IP address listed in that range is 198.158.5.40

The range starts at 33 because in the IP address given (192.168.5.40) the last octet number is 40.
40 includes the number 32 which is 27th bit in the subnet mask. This means that the subnet ends
at 32 and so workstations must begin at 33. Or in other words, the address of the the subnet is
192.168.5.32. This answer is the same regardless of the first three octet values. Even if the IP
address was 192.168.2.62, the results are the same.

Photobucket

Submit
110. 109
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

CertKiller.com has two client computers named CERTKILLER-WS01 and CERTKILLER-WS02 which have Windows Remote Management (WinRM) enabled. During the course of the day you receive instruction from CertKiller.com to have an additional disk volume created remotely on CERTKILLER-WS01 using CERTKILLER-WS02.

What should you do?

Explanation

Windows Remote Management (known as WinRM ) is a handy new remote management service for Windows Server 2003 R2, Windows Vista, and Windows Server 2008. WinRM is the "server" component of this remote management application and WinRS (Windows Remote Shell) is the "client" for WinRM , which runs on the remote computer attempting to remotely manage the WinRM server. However, I should note that BOTH computers must have WinRM installed and enabled on them for WinRS to work and retrieve information from the remote system

Submit
111. 5
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client computers at CertKiller.com. You need to create a Windows 7 image that includes the Office 2007 Microsoft Installer Package (MSI) package for the installation.

What should you do?

Explanation

When deploying Windows 7, you first build a reference computer with all settings, configurations and application required. This includes installing applications. To install Office using an MSI file, you run the windows installer program MSIEXEC.EXE. The /package switch directs the installer to run and install the msi file listed. e.g . msiexec /package Office64MUI.msi. The switch /package can be abbreviated to / i as in " msiexec / i Office64MUI.msi". (Yes, / i not /p)
Incorrect Answers:
A: You should use the msiexec command, not the update command. B: You would not run the /uninstall switch with the install command /package. The /uninstall switch uninstalls applications. D: You should use the msiexec command, not the install command.

Submit
112. 16
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.

During the course of the day you receive instruction from CertKiller.com to create an unattended answer file which will be used to have Microsoft Windows 7 installed automatically. CertKiller.com additionally requested that you select the appropriate utilities that can be used to create the unattended answer file.

What should you do? (Choose two)

Explanation

The Windows SIM tool in Windows AIK (Automated Installation Kit) is used to create unattended answer files for Windows installations. It allows you to customize various settings and configurations that will be applied during the automated installation process. Microsoft Notepad is also a suitable utility for creating and editing the answer file as it is a simple text editor that can be used to modify the XML-based answer file. Both of these utilities are commonly used in the process of creating unattended answer files for automated Windows installations.

Submit
113. 18
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

A CertKiller.com user named Rory Allen uses of a Microsoft Windows 7 Professional client computer named CERTKILLER-WS680. During the course of the day Rory Allen attaches a USB disk to CERTKILLER-WS680. However, Rory Allen cannot enable BitLocker To Go on the USB disk. You need to ensure that Rory Allen can enable BitLocker To Go on the USB disk.

What should you do?

Explanation

Explanation:
BitLocker To Go is a feature ONLY available on Windows 7 Ultimate and Windows 7 Enterprise.
Incorrect Answers:
B: A Trusted Platform Module is required for BitLocker but won't help in this scenario. C: BitLocker uses a single encryption key that is either stored locally in the TLM or on a separate removable drive. Certificates are neither used nor required since Bitlocker does not use Public Key encryption. D: IPSEC is used to encrypt network data, not drives.

Submit
114. 23
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Windows Vista Enterprise (x86).

You are responsible for managing a client computer named CERTKILLER-WS20. During the course of the day you receive instructions from CertKiller.com to identify the Windows 7 version and edition CERTKILLER-WS20 can directly upgrade to.

What should you do?

Explanation

The client computer, CERTKILLER-WS20, is currently running Windows Vista Enterprise (x86). To upgrade to Windows 7, the best option would be to choose a version and edition that is compatible with the current operating system. In this case, Windows 7 Ultimate (x86) is the best option as it matches the current version and edition of Windows Vista.

Submit
115. 67
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a
single Active Directory domain named CertKiller.com. The servers on the network run Microsoft
Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you create an application shim for the third-party accounting
application using Microsoft Application Compatibility Toolkit (ACT).
What should you do first to make sure the application shim is applied the next time the application
Microsoft 70-680: Practice Exam
"Pass Any Exam. Any Time." - www.actualtests.com 42
ActualTests.com
is run?

Explanation

Part 3: Configure application restrictions (9 Questions)

Submit
116. 124
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a Windows 7 computer named CERTKILLER-WS680 that runs a finance application named finapp.exe. You use RunAs with the /savecred parameter to start finapp.exe.

How would you delete the stored passwords?

Explanation

not-available-via-ai

Submit
117. 4
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You need to perform a clean installation of Microsoft Windows 7 Professional on the workstations in the Research department. All workstations in the Research department have identical hardware as listed below: 1.2 GHz Dual-Core processor.1024 MB of RAM.20 GB hard drive.DirectX 10 video display card.Integrated sound card.10/100 integrated network adapter.
You need to ensure that the workstations able to support Windows 7 and are able to support Windows XP mode.

What should you do? (Each correct answer presents part of the solution. Choose two.)

Explanation

Although the workstations meet the system requirements for Windows 7, and additional 1 GB of RAM and an additional 15 GB hard drive space is required to support Windows XP Mode.

Submit
118. 44
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been instructed to deploy Microsoft Windows 7 on all the CertKiller.com client computers.
You use a client computer named CERTKILLER-WS680 as a reference computer to create a custom image and an answer file that will be used to automate the deployment of Windows 7 on the client computers. You want to complete the task with the least amount of administrative effort.
What should you do?

Explanation

WAIK is a set of tools that will aid you in deploying Windows 7 on target computers. You can create an answer file and capture an image of a reference computer by making use of Windows AIK.
Incorrect answers : A : Installing SMS OSD feature pack on CERTKILLER-WS680 will help to prepare the reference computer to capture an image to be deployed on all computers, but this approach will require more administrative time and effort than making use of Windows AIK. C : Windows SIM is used to create answer file to automate Windows 7 deployment and is a part of Windows AIK. Windows SIM does not create a custom image. D : The ImageX command-line utility is used to capture volume images to the Windows Imaging Format (WIM) file and is a part of Windows AIK. ImageX does not create an answer file.

Submit
119. 155
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network run Windows Server 2008 and all mobile computers run Windows 7.

You are assigned a mobile computer named CERTKILLER-WS20.
CERTKILLER-WS20 is configured to enter sleep mode if no activity takes place in 15 minutes.
You leave your office for 20 minutes and discover that CERTKILLER-WS20 has not entered into sleep mode. You are puzzled by the fact that CERTKILLER-WS20 has not entered into sleep mode and therefore want to identify what could have caused this.

What should you do?

Explanation

To identify the reason why CERTKILLER-WS20 did not enter sleep mode, you should consider running Powercfg energy at a command prompt. This command will generate an energy report that provides detailed information about the system's power usage and any issues that may be preventing it from entering sleep mode. By analyzing this report, you can identify any power-related settings or applications that are causing the issue and take appropriate actions to resolve it.

Submit
120. 40
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a regional office in New York. All client computers on the CertKiller.com network run Windows 7 Ultimate. You are responsible for managing CertKiller.com's operating system deployment images.
CertKiller.com is in the process of opening a European regional office in Rome. You are required to ensure that a Windows 7 image with support for Italian is available for deployment in the Rome office.
What should you do?

Explanation

The Deployment Image Servicing and Management (DISM) tool allows you to add or remove packages to or from an offline image or an image that is currently running on a computer. You can also add or remove Windows features, apply unattended installation answer file settings, and perform the offline installation of language packs and out-of-box driver packages specified in an answer file.

Submit
121. 76
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to have a standalone computer configured to prevent the non-administrative users from using Disk Management whilst ensuring that the users are able to access the Device Manager.
Which of the following options would achieve this?

Explanation

Configure Internet Explorer (6 Questions)

Submit
122. 96
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All mobile computers on the CertKiller.com network run Microsoft Windows 7. The CertKiller.com network has a wireless access point (WAP) that all mobile computers use to access the network. Service Set Identifier (SSID) broadcasts on the wireless access point (WAP) have been disabled.

You add a new Windows 7 mobile computer named CERTKILLER-WS680 to the network. You need to configure CERTKILLER-WS680 to connect to the wireless network.

What should you do?

Explanation

A wireless access point can be configured to broadcast its SSID ( it's name) or not to broadcast it.
If the wireless access point is configured to not broadcast, it won't show up in the list of available
networks in your wireless networks box. You can however still connect to the network if you know it's SSID. To do this, you need to click the Manually connect to a wireless network option in the Set up a connection or network window and enter the SSID (name) of the wireless network you wish you connect to.
Incorrect Answers:
A: A network category of Private will enable Network Discovery. However, Network Discovery will not detect a wireless network with SSID broadcasting disabled.
B: The wireless router is configured to not broadcast its SSID. Therefore, it won't show up in the list of available networks to connect to. You have to manually specify the SSID of the wireless network to connect to it.
C: The problem isn't an IP addressing problem. The problem is that the wireless network isn't listed in the list of available networks.

Submit
123. 100
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has recently deployed a client computer named CERTKILLER-WS01 and shared a folder on the disk drive. During the course of the day you receive instruction from CertKiller.com to configure CERTKILLER-WS01 to ensure the requirements below are met:

CERTKILLER-WS01 should be configured to allow computers in the local subnet to access the shared folder.CERTKILLER-WS01 should be configured to stop computers in remote subnets from accessing the shared folder.CERTKILLER-WS01 should be configured to allow all client computers to connect to CERTKILLER-WS01 using Remote Desktop.

What should you do?

Explanation

By modifying the properties of the File and Printer Sharing firewall exceptions, you can control which computers are allowed to access the shared folder. By allowing computers in the local subnet and blocking computers in remote subnets, you can meet the first two requirements. Additionally, by allowing all client computers to connect to CERTKILLER-WS01 using Remote Desktop, you can meet the third requirement.

Submit
124. 104
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

The CertKiller.com network contains a client computer named CERTKILLER-WS680.
CERTKILLER-WS680 is configured to use both wired and wireless network connections. The networks are not connected to each other. All incoming connections on the wireless connection are disallowed in Microsoft Windows Firewall on CERTKILLER-WS680.

You create a shared folder named CKDocs on CERTKILLER-WS680. However, the CertKiller.com users on the wireless network cannot access the shared folder. You need to ensure that all CertKiller.com users are able access to the shared folder from the wireless network while maintaining the security of the wired network

What should you do?

Explanation

You need to enable connections to a shared folder. Therefore, we need to enable inbound connections on the ports used for accessing shared folders. Windows Firewall makes this easy in that you can simply enable the File and Printer Sharing exception in the firewall settings. This will allow inbound connections on the necessary ports.
Incorrect Answers:
A: Bridging the wired and wireless connections would not enable the computer to accept inbound wireless connections through the firewall.
C: Internet Connection Sharing is used to enable other computers to access the internet through your computer. It is not required in this scenario.
D: This would prevent Windows Firewall blocking all ports. However, if the File and Printer Sharing ports have not been configured as an exception, you will still not be able to access the shared folder.
E: Disabling anti-virus software is a security risk and is not required to enable access to a shared folder

Submit
125. 9
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional.

CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You are in the process of informing the newly appointed users in your department when the Aero Shake feature will work.

What should you inform them? (Choose all that apply.)

Explanation

The Aero Shake feature will work if the Windows Experience Index is 3 or greater because this feature requires a certain level of performance from the computer. The Aero Shake feature will also work if the display adapter is compatible with the installed WDDM because the display adapter is responsible for rendering the visual effects of Aero Shake.

Submit
126. 21
You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows Vista Business.

You have been instructed to upgrade a client computer named CERTKILLER-WS620 to Microsoft Windows 7 Professional. CERTKILLER-WS620 has the following specifications: Drive C (system drive) has 12 gigabytes (GB) of free space.Drive D (data drive) has 40 GB of free space. Four memory slots with two occupied by 512 megabyte (MB) memory sticks. One 2.0 gigahertz (GHz) 32-bit processor.

You need to ensure that Windows 7 Professional can be installed on CERTKILLER-WS620.

What should you do?

Explanation

During an upgrade, the Operating Systems must be installed on the system drive. However, the system drive on CERTKILLER-WS620 has only 12 GB of free space. Therefore you should free up space on Drive C because Windows 7 requires 16 GB of free space for installation purposes.

Submit
127. 48
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You have created a Virtual Hard Disk (VHD) with a disk image that you want to add to a client computer named CERTKILLER-WS680. You have copied the VHD to CERTKILLER-WS680 and attached it using the attach vdisk command. You now want to add the Virtual Hard Disk (VHD) to the Windows 7 boot menu.
What should you do?

Explanation

To deploy a VHD image: 1. On the source computer, use the Diskpart tool to create, attach, partition, and format a new virtual hard disk. 2. Use Use ImageX to apply the . wim file to the primary partition of the VHD. 3. Use the DiskPart tool to detach the virtual disk after applying the image. Copy the VHD file to a network share or USB hard drive 4. Boot the target computer with Boot PE and prepare the hard drive using Diskpart 5. Copy the VHD to the drive and attach using Diskpart 6. Use the BCDboot tool, located in the \System32 directory of the Windows7 VHD or in a Windows®7 WindowsPE media, to copy the boot-environment files from the \Windows directory in the VHD to the system partition. The BCDboot tool will create the BCD configuration to boot from the VHD. 7. Use Diskpart to detach the VHD and then restart the computer.
Incorrect Answers:
A: Sysprep is not used to configure boot partitions. B: Disk Manager is used to allocate space and partition drives.

Submit
128. 102
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network are configured to run Windows 7. All users currently make use of a router that the company is connected to. The Default Gateway is set to 192.168.67.1 with a subnet mask of 255.255.255.0. You need to determine the correct IP Address for the network.

What should you do?

Explanation

Part 4: Configure Windows Firewall (4 Questions)

Submit
129. 95
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
You have received instructions to install a new hardware router that provides wireless network connectivity between a mobile computer named CERTKILLER-WS680 and the Internet. You connect CERTKILLER-WS680 to the router by using a wireless network adapter and verify that CERTKILLER-WS680 can connect successfully to the Internet. However, CERTKILLER-WS680 is unable to discover other computers in the local wireless network. You need to ensure that CERTKILLER-WS680 can discover other computers on the local wireless network.

What should you do?

Explanation

If the network category of the wireless connection is set to public, the network discovery feature is
disabled. As the wireless connection is 'inside' the network (behind the router), you can safely
configure the wireless connection network category to private. This will enable the network
discovery feature.
Incorrect Answers:
A: Configuring the wired and wireless network adapters as a network bridge would enable
communications between the wired network and the wireless network through your computer. This
is not what is required in this question and would not enable the network discovery feature.
B: The Network Category setting of the wireless connection should not be set to Public. The
Network Category setting of the wireless connection is likely already set to Public which is the
cause of the problem.
C: It is not necessary to configure a Windows Firewall exception. This would not enable the
network discovery feature.
E: "Open" is not a valid network type.

Submit
130. 125
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a VPN server named CERTKILLER-SR01 that is configured to run Windows Server 2008. You are responsible for a computer named CERTKILLER-WS10 that is configured to run Windows 7. During the course of the day you receive an instruction from the CIO to make use of a smart card in order to authenticate CERTKILLER-SR01.

What should you do?

Explanation

not-available-via-ai

Submit
131. 164
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are working on a Microsoft Windows 7 workstation named CERTKILLER-WS680 that has been infected by a virus. You have previously performed an image backup of CERTKILLER-WS680 that you now want to restore.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

Explanation

To restore the image backup of CERTKILLER-WS680, you need to boot the workstation from the Windows 7 DVD. This will allow you to access the recovery options and select the System Image Recovery tool. By using this tool, you can restore the previously created image backup and remove the virus from the workstation.

Submit
132. 153
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been assigned a workstation named CERTKILLER-WS680 that is configured to run Windows 7.

You want to compile the performance data for a period of three weeks on CERTKILLER-WS680.
The performance data should encompass CPU usage, memory usage as well as disk usage.

What should you do?

Explanation

To compile performance data for three weeks on CERTKILLER-WS680, the best option is to create a User Defined Data Collector Set. This allows you to customize the data collection to include CPU usage, memory usage, and disk usage. The User Defined Data Collector Set can be scheduled to run for the desired duration and will gather the necessary performance data for analysis. Other options, such as using the Resource Monitor tool or adding counters to the Performance Monitor, may provide real-time data but may not be suitable for long-term data collection. Reviewing the Hardware Events log in Event Viewer is unrelated to collecting performance data.

Submit
133. 12
You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7.

You decide to check whether the current workstations comply with the minimum hardware requirements. You therefore need to identify the minimum requirement necessary to install Windows 7.
Which of the following are minimum requirements? (Choose all that apply)

Explanation

The minimum requirements to install Windows 7 are a 16 GB available disk space (32-bit)/20 GB (64-bit), a 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor, and a DirectX 9 graphics processor with WDDM 1.0 or higher driver. These requirements ensure that the computer has enough storage space, processing power, and graphics capabilities to run Windows 7 smoothly.

Submit
134. 49
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has acquired a new computer named CERTKILLER-WS25 that has no operating system (OS) installed.
There is a virtual hard disk (VHD) in your department that contains an installation of Windows 7. You therefore decide to start CERTKILLER-WS25 from the Windows Preinstallation Environment (Windows PE). You then create a partition on CERTKILLER-WS25 and copy the VHD to it. Your next step is to configure CERTKILLER-WS25 to start from the virtual hard disk.
What should you do?

Explanation

not-available-via-ai

Submit
135. 71
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
CertKiller.com issues a new usage policy that states that no CertKiller.com user should be allowed to play video clips using Windows Media Player. You need ensure that this policy is applied.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

Explanation

To prevent users from running Windows Media Player, you need to first create a software
restriction policy and then create a path rule to restrict the use of wmplayer.exe. Software
Restriction Policies can be used to protect computers against unauthorized software.
Incorrect Answers:
B: Deleting wmplayer.exe would cause an error to occur every time someone tried to run Windows
Media Player.
C: Uninstalling media player through logon script leaves the scope of reinstalling the software and
using it.

Submit
136. 90
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.
A CertKiller.com user named Amy Wilson has been assigned a client computer named
CERTKILLER-WS680. CERTKILLER-WS680 is connected directly to the Internet. You have
received instruction to configure CERTKILLER-WS680 with an Internet Protocol version 6 (IPv6) address similar to a public IPv4 address. You need to determine the unicast address that needs to be configured on CERTKILLER-WS680.

What should you do?

Explanation

Global Unicast IPv6 addresses are globally routable and reachable on the IPv6 portion of the
Internet. Global addresses are equivalent to public IPv4 addresses and are used on the IPv6
Internet.

Submit
137. 97
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.

You have just installed a wireless network adapter on a client computer named CERTKILLERWS680.

However, CERTKILLER-WS680 is unable to connect to the local wireless network. You
need to ensure that CERTKILLER-WS680 is able to connect to the local wireless network.
What should you do?

Explanation

To connect to a wireless network, you need to configure a connection to the wireless network.
You can do this by configuring the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list. The Connect to a network list will list the available networks you can connect to. Select the network and click Connect.
Incorrect Answers:
A: The network category setting determines the security settings of your network connection.
Setting it to public disables network features such as network discovery therefore making the connection more secure. It is not the solution to this question.
C: You don't need to rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network. This is not how you connect to a wireless network.
D: It is not necessary to disable existing network adapters on the computer. A computer can connect to a wired network and a wireless network simultaneously.
E: You don't need to configure an IP address before connecting to the wireless network. It may be necessary to configure an IP address after you've connected or your computer may be automatically assigned an IP address depending on the settings of the wireless access point.

Submit
138. 107
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains two client computers named CERTKILLER-WS680 and CERTKILLER-WS682. Both CERTKILLER-WS680 and CERTKILLER-WS682 run Microsoft Windows 7.

How would you ensure that you can use CERTKILLER-WS680 to remotely execute commands on CERTKILLER-WS682?

Explanation

To ensure that you can use CERTKILLER-WS680 to remotely execute commands on CERTKILLER-WS682, you should run the Winrm quickconfig command on CERTKILLER-WS682. This command will configure the Windows Remote Management service on CERTKILLER-WS682, allowing it to accept remote commands. By running this command on CERTKILLER-WS682, you are enabling the necessary settings for remote command execution, which will allow CERTKILLER-WS680 to connect and execute commands on CERTKILLER-WS682.

Submit
139. 108
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

You have been assigned a client computer named CERTKILLER-WS680. To manage the
computers on the corporate network effectively, you want to view the security events logged on all client computers on the network. You decided to collect the copies of events from multiple remote computers and store them on CERTKILLER-WS680. You also want to ensure that the events are encrypted when they are forwarded to CERTKILLER-WS680.

Which three steps should you take?

Explanation

To enable forwarding of events from the client computers and collecting them to your computer, you need to ensure that the Windows Remote Management ( WinRM ) service and the Windows Event Collector service are running on computers participating in the forwarding and collecting
process and ensure that the computer account of the collector computer is added to the local Administrators group on each of the source computers.
To ensure that the events must be encrypted when they are forwarded, you need to use the HTTPS protocol by using the HTTPS option in Advanced Subscription Settings and ensure that all computers have a computers certificate and port 443 is open on the Windows firewall

Submit
140. 114
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

You install a new printer named PRINTER1 on a client computer named CERTKILLER-WS680.
You share PRINTER1 with several users in the Sales department. However, when members of the Sales department attempt to print to PRINTER1, the output is unreadable. You need to ensure that members of the Sales department can successfully print to PRINTER1.

What should you do?

Explanation

Unreadable text usually indicates an incorrect printer driver. We need to install the correct driver.
The users will need to disconnect and reconnect to download the new driver.
Part 2: Configure file and folder access (5 Questions

Submit
141. 122
CertKiller.com has hired you as a network Administrator for their network. A CertKiller.com user
named Rory Allen is a senior manager in the Marketing department. You receive a request from Rory Allen to ensure that his children are only able to login to Windows 7 at certain times.

How would you do this?

Explanation

The best option for ensuring that Rory Allen's children can only login to Windows 7 at certain times is to go to the Start menu, then Control Panel. From there, navigate to User Accounts and Family Safety and select Setup Parental Controls. This will allow you to set time restrictions for the children's login.

Submit
142. 123
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All servers on the CertKiller.com network run Windows 7. Half the client computers run Windows Vista and the rest run Windows XP Professional.

A CertKiller.com employee named Kara Lang works in the Research and Development department. She informs you that the security pop-up notifications appear constantly on her monitor whilst she is working. You therefore decide implement a solution that will control when the notifications pop-up.

What should you do this?

Explanation

Part 4: Configure authentication and authorization (4 Questions)

Submit
143. 134
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are assigned a mobile computer named CERTKILLER-WS680 that runs Windows 7.

You are currently using Windows Internet Explorer 8 to browse a Web site that displays Really Simple Syndication (RSS) feeds. You want to be able to view the headlines of the site when CERTKILLER-WS680 is offline.

What should you do?

Explanation

To be able to view the headlines of the website when the computer is offline, you should add the RSS page of the site to the feeds list in Internet Explorer 8. This will allow Internet Explorer to download and save the RSS feed so that it can be accessed even without an internet connection.

Submit
144. 129
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a branch office in Paris. All servers on the CertKiller.com network run Windows Server 2008 and all client computers run Windows 7.

The London office contains a file server named CERTKILLER-SR04 that hosts shared folders that are accessed from both offices. The Paris office also contains a file server named CERTKILLERSR12 that is only accessed from the Paris office. You want to reduce network traffic between the Paris office and the London office.

What should you do?

Explanation

BranchCache in Distributed mode on the client computers in the Paris Office will cache files from
CERTKILLER-SR04 on the local computers and will reduce network traffic between the two offices.
Incorrect Answers:
A: Configuring BranchCache at the London office will not help as users at the London office do not access files on the file server in the Paris office. In addition, CERTKILLER-SR04 must be upgraded to Windows Server 2008 R2 before it can support BranchCache in Hosted mode.
B: CERTKILLER-SR12 must be upgraded to Windows Server 2008 R2 before it can support BranchCache in Hosted mode.
C: Configuring BranchCache at the London office will not help as users at the London office do not access files on the file server in the Paris office. In addition, CERTKILLER-SR04 must be upgraded to Windows Server 2008 R2 before it can support BranchCache in Hosted mode.
E: A VPN will provide a secure connection between the two offices but will not reduce network traffic

Submit
145. 2
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for maintaining CertKiller.com's Windows 7 workstations.

You want to configure all Windows 7 workstations to produce a new Security ID (SID) as well as a Welcome screen when the workstation is booted.

What should you do?

Explanation

The utility Sysprep is used to prepare systems before imaging and deployment. The switch/ oobe means "Out Of the Box Experience" which will cause the new image to start up fresh just as if in came out of the shrink-wrap. The /generalize command is required in order for the install to create a new SID.
Incorrect Answers:
A: Msconfig is a utility that is used to change the behavior of the boot sequence for diagnostic purposes. This utility is not used in the Windows 7 deployment process. B: Audit mode enables OEMs and corporations to customize a Windows installation before shipping the computer to an end-user. In audit mode, you can install applications, add device drivers, run scripts, and test the validity of a Windows installation. Audit mode is a networked- enabled environment that does not require settings in Windows Welcome to be applied.
C: Bootcfg is not to rebuild a boot.ini file. Boot.ini files are no longer used in Windows 7.

Submit
146. 39
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 5 Windows Server 2008 servers, 200 Windows Vista Business client computers and 300 Windows 7 Professional client computers.
You have been instructed to deploy Microsoft Windows 7 on the 200 Windows Vista Business client computers. There is an existing offline Windows 7 image on a client computer named CERTKILLER-WS680. However, you need to add updated device drivers to this image.
What should you do?

Explanation

The Deployment Image Servicing and Management (DISM) tool replaces the Pkgmgr.exe utility and is used to update images by adding or removing device drivers and language packs, enabling or disabling Windows features, and adding and configuring Windows updates. Incorrect Answers:
D: Windows SIM is used to create answer files. It is not used to update existing images.

Submit
147. 145
You are employed as a network administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7. All client computers are configured for automatic updates.

The CertKiller.com network contains a client computer named CERTKILLER-WS680. After a
recent update you notice that some of the applications on CERTKILLER-WS680 do not work. You reboot CERTKILLER-WS680 but the applications still do not work. You need to remove the latest update.

What should you do?

Explanation

To uninstall a Windows Update, you can use the Installed updates list on the Windows Update window. When you display the list of updates, you'll see an 'Uninstall' button in the toolbar.
Simply select the update you wish to uninstall then click the Uninstall button.
Incorrect Answers:
A: In previous versions of Windows, you would use the Add or Remove Programs utility to uninstall Windows Updates. However, this was changed with Windows Vista. You should now use the Installed updates list on the Windows Update window.
B: Restoring hidden updates will not uninstall an update.
C: The Last Known Good Configuration will restore the registry to the state of the last logon. It does not uninstall Windows Updates.
D: Windows Explorer is used to explore the contents of your hard disk. It is not used to uninstall updates.

Submit
148. 165
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a client computer named CERTKILLER-WS680 that is running Windows 7. CERTKILLER-WS680 contains two volumes named Volume C and Volume D.

You have created a document named CKdoc.docx on Volume D and you have manually created a restore point for the document before editing the document. You want to be able to restore the document to its current version if the document is edited any further.

What should you do?

Explanation

not-available-via-ai

Submit
149. 29
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are assigned two workstations named CERTKILLER-WS625 and CERTKILLER-WS680.

CERTKILLER-WS625 is configured to run Windows Vista and CERTKILLER-WS680 is configured to run Windows 7.

You receive an instruction to migrate the user files and profiles from CERTKILLER-WS625 to CERTKILLER-WS680. To accomplish this you want to determine the amount space needed to accomplish the migration.

What should you do?

Explanation

You should use the Scanstate command. /p Generates a space-estimate file called Usmtsize.txt that is saved to StorePath . This option does not collect the user state. You must also specify / nocompress . The command must be run locally on CERTKILLER625 (The source computer). The storage location may be on the network or local.
Incorrect Answers:
A: USMT is not the correct command. C: migapp is not the correct command. D: Sysprep is not the correct command.

Submit
150. 37
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have received instructions to deploy Windows 7 on all the CertKiller.com client computers that have CD-ROM drives.
You decide to create a custom Windows 7 image on spanned media using the Createspannedshares.cmd script. However, you are unable run the Createspannedshares.cmd script.
What should you do?

Explanation

To be able to create the spanned media to install Windows 7 on the CD-ROM client computers you need to install Windows AIK on a computer from where you plan to create the spanned media. Only after the installation of Windows AIK will you be able to run the Createspannedshares.cdm script to create the spanned media.

Submit
151. 45
You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been instructed to deploy Microsoft Windows 7 on CertKiller.com client computers that do not support PXE.
You install Windows Deployment Service (WDS) on a server named CERTKILLER-SR05 and create a discover image for the deployment. You now need to identify the best method for creating bootable media that will be used to deploy Windows 7 on the non-PXE supporting client computers.
What should you do?

Explanation

Bootable media that will be used to deploy Windows 7 to client computers must be created after a discover image is created. WAIK will provide the tools that are required to create the bootable media.

Submit
152. 52
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named Rory Allen has recently requested that you copy files to a virtual hard disk (VHD) file on his client computer.
Which two steps should you take first?

Explanation

not-available-via-ai

Submit
153. 117
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7. The user accounts in the CertKiller.com network are divided into four groups named ADMIN, SALES, MARKETING and OTHER.

A CertKiller.com user named Mia Hamm has been assigned a client computer named
CERTKILLER-WS680. Mia Hamm is a member of the SALES group. Mia Hamm shares a folder on CERTKILLER-WS680 named CertKillerFiles1. Mia Hamm wants members of the MARKETING group to be able to add files to the CertKillerFiles1 shared folder. Currently members of the SALES group have Allow - Read permission for the CertKillerFiles1 shared folder while members of the MARKETING group have Allow - Modify permissions.

You need to ensure that members of both the SALES group and the MARKETING group can add files to the CertKillerFiles1 shared folder.
What should you do? (Each correct answer presents part of the solution. Choose TWO.)

Explanation

In order for a group to be able to create files in a shared folder, the group must have the NTFS permissions of "Allow - Modify" on the folder and the sharing permission of "Allow - Change" on the share. Since the SALES group has neither, these two permissions must be added.
The Marketing group would also need to have "Change" permissions on the share but this is not one of the possible answers.
Incorrect Answers:
A: EVERYONE Full Control permissions would grant the Groups ADMIN and OTHERS permissions. The question requires only SALES and Marketing to have access.
B: Marketing Group "Allow Read". The Marketing group would need permissions greater than "Read" to be able to add files. (With either the NTFS permissions on the folder or the shared access permission of "Read")
D: Marketing Group "Allow Read". The Marketing group would need permissions greater than "Read" to be able to add files. (With either the NTFS permissions on the folder or the shared access permission of "Read")
F: Marketing group "Allow - Write" permissions. This is only applicable to folders' NTFS
permissions. The Marketing group already has "Modify" Permissions which include "Write"
permissions.See http://technet.microsoft.com/en-us/library/bb457104.aspx#EDAA

Submit
154. 169
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7.

You are working on a client computer named CERTKILLER-WS680. CERTKILLER-WS680 is configured with two hard disk drives named Drive C and Drive D. Both hard disks drives are formatted with the NTFS file system. You need to disable previous versions on the Drive D.

What should you do?

Explanation

By modifying the System protection setting from System Properties, you can disable previous versions on Drive D. System protection is responsible for creating and managing restore points, which allows users to restore previous versions of files and folders. By disabling this feature, you prevent the creation of restore points and therefore disable previous versions on Drive D.

Submit
155. 158
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on
theCertKiller.com network run Windows 7.

A CertKiller.com user named Clive Wilson is the company's sales representative. When Clive Wilson is out in the field, he takes a mobile computer named CERTKILLER-WS680 with him. Clive Wilson wants you to configure the power settings on CERTKILLER-WS680 so that the display turns off when the computer is inactive and running on battery power. However, the power settings of the hard disk remain unaffected.

What should you do?

Explanation

To configure the power settings on CERTKILLER-WS680 so that the display turns off when the computer is inactive and running on battery power, but the power settings of the hard disk remain unaffected, you should change the advanced power settings of the 'Balanced' power plan. By modifying the advanced power settings, you can customize the behavior of the display and set it to turn off after a certain period of inactivity. This will allow Clive Wilson to conserve battery power while keeping the hard disk active.

Submit
156. 132
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7.

The Research and Development department is working on a confidential project. To protect their computers from data theft they encrypted the hard disk of their client computers with BitLocker. A USB drive is used to store the BitLocker password. All the computers that were encrypted were using Trusted Platform Model (TPM) chips on their motherboards.

A member of the Research and Development department named Amy Wilson has been assigned a client computer named CERTKILLER-WS680. Amy Wilson reports that she was not able to start CERTKILLER-WS680 because the TPM chip on CERTKILLER-WS680 was faulty. You need to recover the encrypted data from CERTKILLER-WS680.

What should you do?

Explanation

When the BitLocker is used in TPM only mode, it uses TPM hardware to validate the integrity of the computer and the Operating System. If the TPM is missing or changed, then to recover data, you need to enter the BitLocker Drive Encryption Recovery console on the computer by using the 40 digit recovery key or password stored on the USB drive to recover the data.
Part 2: Configure Direct Access (1 Question)

Submit
157. 32
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Dean Austin asked you which of the Microsoft operating systems supports offline migration using USMT.
What should you do? (Choose all that apply)

Explanation

The correct answer is that Microsoft Windows Vista, Microsoft Windows XP Professional with SP2 or later, Microsoft Windows XP Professional, and Microsoft Windows 7 all support offline migration using USMT.

Submit
158. 98
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7.

The CertKiller.com network contains a wireless access point (WAP) that is configured to use
Advanced Encryption Standard (AES) security. However, you do not have a pre-shared key
configured on the wireless access point.

How should you connect a mobile computer named CERTKILLER-WS680 to the wireless access point?

Explanation

The question states that the wireless access point is configured to use Advanced Encryption Standard (AES) security. WPA2-Enterprise is the recommended security protocol for AES encryption. WEP, WPA-PSK, and WPA2-PSK are all older and less secure encryption methods, while WPA-Personal is not compatible with AES encryption. Therefore, the best option is to use WPA2-Enterprise for the wireless connection.

Submit
159. 10
CertKiller.com has hired you as a network Administrator for their network. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. You receive an instruction from one of the senior managers to upgrade his workstation to Windows 7. The senior manager also informs you that he wants the Windows 7 games as well as Titan Chess installed on his workstation. You therefore need to identify the Windows 7 versions that will comply with the senior mangers request.

What should you do? (Choose all that apply.)

Explanation

The correct answer is to install Windows Ultimate Edition and Windows Enterprise Edition. Both of these editions of Windows 7 include the Windows 7 games and Titan Chess, which complies with the senior manager's request. The other editions listed do not include these games, so they would not meet the manager's requirements.

Submit
160. 64
You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network
consists of a single Active Directory domain named CertKiller.com. All computers on the
CertKiller.com network are configured to run Windows 7. You are in the process of identifying the
various ratings for games in Windows 7.
What will you find?

Explanation

In Windows 7, you will find three different rating settings for games: Teen (T), Everyone (E), and Adults Only (AO). These ratings are used to determine the appropriate age group for playing certain games. The Teen (T) rating indicates that the game is suitable for players aged 13 and above. The Everyone (E) rating indicates that the game is suitable for players of all ages. The Adults Only (AO) rating indicates that the game is only suitable for players aged 18 and above.

Submit
161. 74
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers are configured to run Windows 7. You are assigned a computer named CERTKILLERSR05.
During the course of the day you receive an instruction from the CIO to identify the
applications that were installed on CERTKILLER-SR05 the previous week. You need to gather this information as soon as possible.

What should you do? (Choose all that apply.)

Explanation

To gather information about the applications installed on CERTKILLER-SR05 the previous week, you can review the informational events from the Reliability Monitor. The Reliability Monitor tracks system events, including software installations, and provides detailed information about them. Additionally, you can view all events in the Applications Log in Event Viewer to gather this information. Checking the Programs and Features section in the Control Panel may also provide information about installed applications, but it may not specifically show the installations from the previous week. Checking the process list in Task Manager does not provide information about installed applications.

Submit
162. 163
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are working on a Windows 7 workstation named CERTKILLER-WS680. You want to backup data on CERTKILLER-WS680. You open the Configure Backup wizard as shown in the exhibit below:



You need to be able to backup the data to a local disk drive.

What should you do?

Explanation

Part 2: Configure system recovery options (5 Questions)

Submit
163. 157
CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications.

You are in the process of notifying all CertKiller.com users how they will be made aware with
information systems and configuration alerts.

What should you do?

Explanation

Part 4: Configure performance settings (4 Questions)

Submit
164. 146
You are employed as a desktop technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.
You are working on a client computer named CERTKILLER-WS680 that runs Windows 7. You want to determine whether recent Windows Updates have been applied to CERTKILLER-WS680.
What should you do? (Each correct answer presents a complete solution. Choose TWO.)

Explanation

To find out whether the updates have been installed on your computer or not, you need to check the ReportingEvents.log file because the WSUS client records update activities and results in this file. You need to check the update history in the Windows Update applet to see which updates Windows has installed, click the View Update History link in the left panel in the Windows Update window to view the updates.

Submit
165. 24
You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.

You are in the process of determining when you need to execute a migration rather that an upgrade.

Select all answers that apply.

Explanation

The correct answers for this question are based on the compatibility and upgrade paths between different versions of Windows. In this case, the best option for migration is to upgrade from Windows Vista Business (x86) to Windows 7 Professional (x64) because both versions are the same edition (Professional) and the migration is from a 32-bit to a 64-bit architecture. Additionally, migrating from Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86) is also a valid option because it is the same edition and the migration is from a 64-bit to a 32-bit architecture. Finally, migrating from Windows XP Professional (x64) to Windows 7 Professional (x64) is another valid option because it is the same edition and the migration is within the same 64-bit architecture.

Submit
166. 46
You work as a Desktop support technician at CertKiller.com. You have been assigned the task of installing Windows 7 on 10 network computers using custom WIM image.
You have the Windows Automated Installation Kit (Windows AIK) installed on one of the computers. You now want to create a WinPE CD to capture or apply the custom WIM image of Windows 7 from the master computer.
What should you do? (Each correct answer presents part of the solution. Choose three.)

Explanation

To create a WinPE CD and to initiate Windows 7 installation using a custom WIM image of Windows 7, you need to first run Copype.cmd to install Windows PE to a directory and then copy the imagex.exe file to ISO folder under WinPE_x86 directory, then create wimscript.ini configuration file in notepad and save the file in the same directory as imagex.exe, and then finally run Oscdimg.exe to create an ISO image of WinPE and then burn the image on a CD.
Part 4: Configure a VHD (6 Questions)

Submit
167. 75
You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.
During the course of the day you receive instruction from CertKiller.com to deny the network users execute, write and read access to all types of external storage devices for security reasons.

Which of the following is the easiest way to achieve this?

Explanation

Creating a Software Restriction policy is the easiest way to achieve the goal of denying network users execute, write, and read access to all types of external storage devices. A Software Restriction policy allows administrators to control which software can be run on a computer, including external storage devices. By creating a policy that restricts the execution of software from external storage devices, the network administrator can effectively prevent users from accessing or using these devices. This provides a simple and centralized solution to enforce the desired security restrictions across the network.

Submit
168. 103
You work as a desktop support technician at CertKiller.com. The CertKiller.com network contains several File Transfer Protocol (FTP) servers. You are working on a Windows 7 client computer named CERTKILLER-WS680.

You have received instruction to ensure that CERTKILLER-WS680 can only connect to the File Transfer Protocol (FTP) servers when it is connected to a private network.

What should you do?

Explanation

not-available-via-ai

Submit
169. 113
You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a client computer named CERTKILLER-WS680 that is running Windows 7.
You attach a printer named PRINTER01 to CERTKILLER-WS680 and install the printer drivers.

You then remove the Everyone group from the access control list (ACL) for the PRINTER01 and share the printer. You need to ensure that members of a group named CK_STAFF can only make changes to the print jobs that they submit. Members of the CK_STAFF group must not be able to change the print jobs of other users.

What should you do?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 10, 2011
    Quiz Created by
    Wellurs
Cancel
  • All
    All (169)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
6CertKiller.com has employed you as a network Administrator. The...
38You work as the Desktop support technician at CertKiller.com. The...
68You work as a desktop support technician at CertKiller.com. The...
128You work as a desktop support technician at CertKiller.com. The...
51You work as a network administrator at CertKiller.com. The...
167You are employed as a network administrator at CertKiller.com. The...
82You work as a network administrator at CertKiller.com. The...
94You work as a desktop support technician at CertKiller.com. The...
19You work as a desktop support technician at CertKiller.com. The...
120You work as a desktop support technician at CertKiller.com. The...
43You work as the desktop support technician at CertKiller.com. The...
53You work as a desktop support technician at CertKiller.com. The...
59You work as a desktop support technician at CertKiller.com. The...
61You work as a Desktop Technician at CertKiller.com. The...
62You work as a Desktop Technician at CertKiller.com. The...
133You work as a desktop support technician at CertKiller.com. The...
13You are employed as the network Administrator at CertKiller.com. The...
22You work as the desktop support technician at CertKiller.com. The...
150You work as the network Administrator at CertKiller.com. The...
1You work as a desktop support technician at CertKiller.com. The ...
139You work as a desktop support technician at CertKiller.com. The...
168You work as a network administrator at CertKiller.com. The...
28You work as a desktop support technician at CertKiller.com. The...
56CertKiller.com has employed you as a network Administrator. The...
69You work as a desktop support technician at a company named...
78You work as a desktop support technician at CertKiller.com. The...
81You work as a desktop support technician at CertKiller.com. The...
85You are employed as a network administrator at CertKiller.com. The...
87You work as a desktop support technician at CertKiller.com. The...
161You work as a network administrator at CertKiller.com. The...
30You work as the Desktop support technician at CertKiller.com. The...
119You work as a network administrator at CertKiller.com. The...
127You work as a network administrator at CertKiller.com. The...
130You work as the network Administrator at CertKiller.com. The...
147You work as a desktop support technician at CertKiller.com. The...
8You are employed as the network Administrator at CertKiller.com. The...
15You are the newly appointed network Administrator at CertKiller.com....
101You are the newly appointed network Administrator at...
118You work as a network administrator at CertKiller.com. The...
17You work as a network administrator at CertKiller.com. The...
20You work as a desktop support technician at CertKiller.com. The...
31You work as the Desktop support technician at CertKiller.com. The...
34You work as a desktop support technician at CertKiller.com. The...
50You work as a network administrator at CertKiller.com. The...
57You work as a network administrator at CertKiller.com. The...
63CertKiller.com has hired you as a network Administrator for their...
66You work as a network administrator at CertKiller.com. The...
166You work as a desktop support technician at CertKiller.com. The...
148You work as the network Administrator at CertKiller.com. The...
27You work as a network administrator at CertKiller.com. The...
154You are employed as the network Administrator at CertKiller.com....
149You work as a desktop support technician at CertKiller.com. The...
77You work as a desktop support technician at CertKiller.com. The...
86You work as a desktop support technician at CertKiller.com. The...
91You work as a desktop support technician at CertKiller.com. The...
99You work as a network administrator at CertKiller.com. The...
106You work as a network administrator at CertKiller.com. The...
135You work as a desktop support technician at CertKiller.com. The...
144You work as a desktop support technician at CertKiller.com. The...
41You work as the Desktop support technician at CertKiller.com. The...
73CertKiller.com has employed you as a network Administrator. The...
141You work as a desktop support technician at CertKiller.com. The...
140You work as a desktop support technician at CertKiller.com. The...
131You work as a network administrator at CertKiller.com....
152You work as a desktop support technician at CertKiller.com. The...
36You work as the Desktop support technician at CertKiller.com. The...
93You work as a network administrator at CertKiller.com. The...
105You work as a desktop support technician at CertKiller.com. The...
121You work as a desktop support technician at CertKiller.com. The...
138You are the newly appointed desktop support technician at...
142You are the newly employed desktop support technician at...
151You work as a desktop support technician at CertKiller.com. The...
26You work as a network administrator at CertKiller.com. The...
35You work as the Desktop support technician at CertKiller.com. The...
54You work as a desktop support technician at CertKiller.com. The...
60You work as a Desktop Technician at CertKiller.com. The...
112You work as a desktop support technician at CertKiller.com. The...
143You work as a desktop support technician at CertKiller.com. The...
156You are employed as the network Administrator at CertKiller.com....
65You work as a network administrator at CertKiller.com. The...
126 You work as a network administrator at CertKiller.com. The...
136You work as a desktop support technician at CertKiller.com. The...
160 ...
137You work as a desktop support technician at CertKiller.com. The...
11You work as the network Administrator at CertKiller.com. The...
14CertKiller.com has hired you as a network Administrator for their...
25You are the newly appointed network Administrator at CertKiller.com....
33You work as a desktop support technician at CertKiller.com. The...
42You are employed as the network administrator at CertKiller.com. The...
55You work as a desktop support technician at CertKiller.com. The...
58You work as a network administrator at CertKiller.com. The...
70You work as a desktop support technician at CertKiller.com. The...
79You work as a desktop support technician at CertKiller.com. The...
80You work as a desktop support technician at CertKiller.com. The...
84You work as the network administrator at CertKiller.com. The...
88You work as a network administrator at CertKiller.com. The...
89You work as a desktop support technician at CertKiller.com. The...
92You are employed as the network Administrator at CertKiller.com. The...
110You work as a network administrator at CertKiller.com. The...
111You are employed as the desktop support technician at...
116You work as a desktop support technician at CertKiller.com. The...
162You work as a desktop support technician at CertKiller.com. The...
3You work as a desktop support technician at CertKiller.com. The...
115You work as a desktop support technician at CertKiller.com. The...
159You work as a desktop support technician at CertKiller.com. The...
7You work as the network Administrator at CertKiller.com. The...
47You work as a desktop support technician at CertKiller.com. The...
72You work as a desktop support technician at CertKiller.com. The...
83You work as a desktop support technician at CertKiller.com. The...
109You work as a network administrator at CertKiller.com. The...
5You work as the Desktop support technician at CertKiller.com. The...
16You work as a network administrator at CertKiller.com. The...
18You work as a desktop support technician at CertKiller.com. The...
23You are employed as the network Administrator at CertKiller.com. The...
67You work as a network administrator at CertKiller.com. The...
124You work as a desktop support technician at CertKiller.com. The...
4You work as the desktop support technician at CertKiller.com. The...
44You work as the Desktop support technician at CertKiller.com. The...
155CertKiller.com has employed you as a network Administrator. The...
40You work as the Desktop support technician at CertKiller.com. The...
76You work as a network administrator at CertKiller.com. The...
96You are employed as a network administrator at CertKiller.com. The...
100You work as a network administrator at CertKiller.com. The...
104You work as a network administrator at CertKiller.com. The...
9You are the newly appointed network Administrator at CertKiller.com....
21You work as the desktop support technician at CertKiller.com. The...
48You work as a desktop support technician at CertKiller.com. The...
102You are the newly appointed network Administrator at...
95You work as a desktop support technician at CertKiller.com. The...
125You are the newly appointed network Administrator at...
164You work as a desktop support technician at CertKiller.com. The...
153You work as a desktop support technician at CertKiller.com. The...
12You are employed as the network Administrator at CertKiller.com. The...
49You work as the network Administrator at CertKiller.com. The...
71You work as a desktop support technician at CertKiller.com. The...
90You work as a desktop support technician at CertKiller.com. The...
97You are employed as a network administrator at CertKiller.com. The...
107You work as a desktop support technician at CertKiller.com. The...
108You work as a desktop support technician at CertKiller.com. The...
114You work as a desktop support technician at CertKiller.com. The...
122CertKiller.com has hired you as a network Administrator for their...
123You work as the network Administrator at CertKiller.com. The...
134You work as a desktop support technician at CertKiller.com. The...
129You work as a desktop support technician at CertKiller.com. The...
2You work as a desktop support technician at CertKiller.com. The...
39You work as the Desktop support technician at CertKiller.com. The...
145You are employed as a network administrator at CertKiller.com. The...
165You work as a desktop support technician at CertKiller.com. The...
29You work as a desktop support technician at CertKiller.com. The...
37You work as the Desktop support technician at CertKiller.com. The...
45You work as the Desktop support technician at CertKiller.com. The...
52You work as a network administrator at CertKiller.com. The...
117You work as a desktop support technician at CertKiller.com. The...
169You work as a desktop support technician at CertKiller.com. The...
158You work as a desktop support technician at CertKiller.com. The...
132You work as a desktop support technician at CertKiller.com. The...
32You work as a network administrator at CertKiller.com. The...
98You work as a desktop support technician at CertKiller.com. The...
10CertKiller.com has hired you as a network Administrator for their...
64You are the newly appointed network Administrator at CertKiller.com....
74CertKiller.com has employed you as a network Administrator. The...
163You work as a desktop support technician at CertKiller.com. The...
157CertKiller.com has employed you as a network Administrator. The...
146You are employed as a desktop technician at CertKiller.com. The...
24You work as the network Administrator at CertKiller.com. The...
46You work as a Desktop support technician at CertKiller.com. You have...
75You work as a network administrator at CertKiller.com. The...
103You work as a desktop support technician at CertKiller.com. The...
113You work as a desktop support technician at CertKiller.com. The...
Alert!

Advertisement