Do You Know About Certkiller.Com?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Wellurs
W
Wellurs
Community Contributor
Quizzes Created: 1 | Total Attempts: 62
| Attempts: 62
SettingsSettings
Please wait...
  • 1/169 Questions

    6CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are in the process of planning the installation of Windows 7 on a client computer named CERTKILLER-WS06. CERTKILLER-WS06 contains a single hard disk drive that is connected to a RAID controller.Whilst doing the installation you notice that the installation media of Windows 7 does not include the necessary files to install the RAID controller. You need to make sure that you are able to install Windows 7 on the hard disk drive.What should you do?

    • You should consider having CERTKILLER-WS04 started from the Windows installation media. Then Load Driver should be clicked from the Install Windows dialog box.
    • You should consider inserting the Windows installation media. Thereafter F8 should be pressed during the power-on self test (POST) of CERTKILLER-WS04.
    • You should consider inserting the RAID driver installation media. After the RAID driver is installed, insert the Windows installation media.
    • You should consider inserting the Windows installation media. Thereafter F6 should be pressed when prompted by the Install Windows dialog box.
Please wait...
Do You Know About Certkiller.Com? - Quiz
About This Quiz

Do you know about the desktop support technician of CertKiller. Com? Let's play this quiz and check yourself now!


Quiz Preview

  • 2. 

    38You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.The CertKiller.com management has instructed you to install Microsoft Windows 7 on all the client computers at CertKiller.com. You have installed Windows Deployment Service (WDS) on a server named CERTKILLER-SR05. You want to use a client computer named CERTKILLER-WS680 as a reference computer from which you want to create the image for the deployment. You now need to remove hardware-specific information from the Windows installation on CERTKILLER-WS680.What should you do?

    • You should consider running the Sysprep.exe utility with the /oobe and /generalize switches on CERTKILLER-WS680.

    • You should consider running the Pkgmgr.exe utility with the /oobe and /generalize switches on CERTKILLER-WS680.

    • You should consider running the Setupmgr utility with the /oobe and /generalize switches on CERTKILLER-WS680.

    • You should consider running the ImageX command-line utility with the /oobe and /generalize switches on CERTKILLER-WS680.

    Correct Answer
    A. You should consider running the Sysprep.exe utility with the /oobe and /generalize switches on CERTKILLER-WS680.
    Explanation
    Part 2: Prepare a system image for deployment (4 Questions)

    Rate this question:

  • 3. 

    68You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.You are responsible for managing a desktop workstation named CERTKILLER-WS680.CERTKILLER-WS680 is configured to run Windows 7. You receive an instruction to ensure that all device drivers installed on CERTKILLER-WS680 are digitally signed.Which of the following is the easiest way to achieve this?

    • You should consider running Sigverif.exe at a command prompt on CERTKILLER-WS680

    • You should consider running sfc /scannow at a command prompt on CERTKILLER-WS680

    • You should consider viewing the properties of each device listed in Device Manager on CERTKILLER-WS680

    • You should consider running Windows Update on CERTKILLER-WS680

    Correct Answer
    A. You should consider running Sigverif.exe at a command prompt on CERTKILLER-WS680
    Explanation
    Running Sigverif.exe at a command prompt on CERTKILLER-WS680 is the easiest way to ensure that all device drivers installed on the workstation are digitally signed. Sigverif.exe is a tool provided by Windows that scans all device drivers on the system and checks if they are digitally signed. By running this tool, the technician can easily identify any unsigned drivers and take appropriate actions to resolve the issue. This method is efficient and does not require manual inspection of each device listed in Device Manager or running Windows Update, making it the easiest solution.

    Rate this question:

  • 4. 

    51You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.During the course of the day you receive instruction from CertKiller.com to configure fault tolerance for an operating system on a computer running Microsoft Windows 7 Home Premium to boot in the event of a hard disk failure. CertKiller.com additionally informed you that the computer has two disks with unallocated space on the second disk drive.What should you do?

    • You should consider having a RAID-1 volume created.

    • You should consider having a RAID-5 volume created.

    • You should consider having a RAID-6 volume created.

    • You should consider having a RAID-0 volume created.

    Correct Answer
    A. You should consider having a RAID-1 volume created.
  • 5. 

    128You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a branch office in Paris. All servers on the CertKiller.com network run WindowsServer 2008 R2 and all client computers run Windows 7. The London office contains a file server named CERTKILLER-SR04 that hosts shared folders that are accessed from both offices. The Paris office contains a DNS server named CERTKILLER-SR12.You want to reduce network traffic between the Paris office and the London office. You decide to enable BranchCache in Hosted Cache mode on CERTKILLER-SR12. You now need to enable BranchCache on the client computers.What should you do?

    • Locate the ' BranchCache ' service, start the service and set it to start automatically

    • Do nothing

    Correct Answer
    A. Locate the ' BranchCache ' service, start the service and set it to start automatically
  • 6. 

    82You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com currently has an internal Web site that uses HTTPS and has a self-signed certificate.A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web site. During the course of the day you receive complaints from Rory Allen that he receives the error message when attempting to browse the internal Web site:"There is a problem with the website's security certificate"CertKiller.com wants you to prevent the warning message from appearing when Rory Allen or other users access the internal Web site.What should you do?

    • You should consider having the Web sites certificate imported into the Trusted Root Certification Authorities store using Certificate Manager.

    • You should consider having the Web sites certificate imported into the Trusted Root Certification Authorities store using Windows Explorer.

    • You should consider changing the security level for the Internet zone to Medium-Low from the Internet Options.

    • You should consider having Web site added to the Internet zone from Internet Explorer.

    Correct Answer
    A. You should consider having the Web sites certificate imported into the Trusted Root Certification Authorities store using Certificate Manager.
    Explanation
    By importing the website's certificate into the Trusted Root Certification Authorities store using Certificate Manager, the certificate will be trusted by the client computers. This will prevent the warning message from appearing when users access the internal website. Importing the certificate into the Trusted Root Certification Authorities store ensures that the certificate is recognized as valid and trusted by the client's operating system.

    Rate this question:

  • 7. 

    94You work as a desktop support technician at CertKiller.com. The CertKiller.com network consistsof a single Active Directory domain named CertKiller.com. The CertKiller.com network containsseveral mobile computers that connect to the network via a wireless access point (WAP).You are working on a mobile computer named CERTKILLER-WS680 that is running Windows 7.The network administrator has disabled the Service Set Identifier (SSID) broadcasts on thewireless access point (WAP). When you attempt to connect CERTKILLER-WS680 to the networkyou discover that you cannot access the WAP.How can you configure CERTKILLER-WS680 to access the wireless access point (WAP)?A. .B. .C. .Answer: A

    • You should consider manually specifying the name of SSID of the Wireless Access Point in the wireless network connection setting on CERTKILLER-WS680

    • You should consider changing the encryption setting to WPA2

    • You should consider refreshing the network list on CERTKILLER-WS680

    • You should consider changing the network setting to Public on CERTKILLER-WS680

    Correct Answer
    A. You should consider manually specifying the name of SSID of the Wireless Access Point in the wireless network connection setting on CERTKILLER-WS680
    Explanation
    To access the wireless access point (WAP) on CERTKILLER-WS680, you should manually specify the name of the SSID of the WAP in the wireless network connection settings. This is because the network administrator has disabled SSID broadcasts, so the WAP will not appear in the network list. By manually entering the SSID, CERTKILLER-WS680 will be able to connect to the WAP and access the network.

    Rate this question:

  • 8. 

    167You are employed as a network administrator at CertKiller.com. The CertKiller.com networkconsists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.The CertKiller.com network contains a client computer named CERTKILLER-WS680. After arecent critical update you notice that CERTKILLER-WS680 is unstable. You now want to usesystem restore to restore CERTKILLER-WS680 to an earlier point.What should you do?

    • Start - Control Panel - System and Security - Action Center - Recovery - 'Open System Restore button' - 'Next' on the 'Restore System Files and Settings' dialog box - 'Show more restore points' - Select 'Finish' on the Confirm your restore point' page.

    • No answer

    Correct Answer
    A. Start - Control Panel - System and Security - Action Center - Recovery - 'Open System Restore button' - 'Next' on the 'Restore System Files and Settings' dialog box - 'Show more restore points' - Select 'Finish' on the Confirm your restore point' page.
    Explanation
    To restore CERTKILLER-WS680 to an earlier point using System Restore, the network administrator should follow these steps: Start by navigating to Control Panel, then select System and Security. From there, go to Action Center and click on Recovery. On the Recovery page, locate and click on the 'Open System Restore' button. In the 'Restore System Files and Settings' dialog box, click 'Next'. To view more restore points, click on 'Show more restore points'. Finally, select the desired restore point and click 'Finish' on the 'Confirm your restore point' page.

    Rate this question:

  • 9. 

    19You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows XP Professional with Service Pack 1 (SP1).You have been assigned a client computer named CERTKILLER-WS270. You want to upgrade CERTKILLER-WS270 to Windows 7 Professional without needing to install any of your applications. You verify that CERTKILLER-WS270 meets the system requirements for Windows 7 by installing and running the Windows 7 Upgrade Advisor.What should you do next?

    • You should consider upgrading CERTKILLER-WS270 to Microsoft Windows Vista Business, and then upgrade it to Windows 7 Professional.

    • You should consider installing Service Pack 3 (SP3) on CERTKILLER-WS270, and then upgrade it to Windows 7 Professional.

    • You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270, and then perform a clean installation of Windows 7 Professional.

    • You should consider installing and running Windows Easy Transfer on CERTKILLER-WS270, and then upgrade it to Windows 7 Professional.

    Correct Answer
    A. You should consider upgrading CERTKILLER-WS270 to Microsoft Windows Vista Business, and then upgrade it to Windows 7 Professional.
    Explanation
    To upgrade from Windows XP Professional to Windows 7 Professional without having to reinstall applications, you would need to upgrade to Windows Vista first.

    Rate this question:

  • 10. 

    120You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers ontheCertKiller.com network run Windows 7.You currently make use of a workstation named CERTKILLER-WS680. When installing newapplications on CERTKILLER-WS680 you are prompted for user account control  permissions. You want to configure CERTKILLER-WS680 to allow you to interact with the Desktop when prompted for user account control permissions.What should you do?

    • You should consider setting the User Account Control: Switch to secure desktop when prompting for credentials to Disabled

    • You should consider adding your user account to the local administrators group on CERTKILLER-WS-680

    • You should consider adding your user account to the local Power Users group on CERTKILLER-WS-680

    • You should consider setting the User Account Control to disabled

    Correct Answer
    A. You should consider setting the User Account Control: Switch to secure desktop when prompting for credentials to Disabled
    Explanation
    Setting the User Account Control: Switch to secure desktop when prompting for credentials to Disabled will allow the user to interact with the desktop when prompted for user account control permissions. This means that instead of the screen being dimmed and the user being unable to interact with anything on the desktop, they will be able to continue working while the prompt is displayed. This can improve productivity and user experience.

    Rate this question:

  • 11. 

    43You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains two Windows Server 2008 computers named CERTKILLER-SR01 and CERTKILLER-SR02 and 500 Windows Vista Ultimate client computers. CERTKILLER-SR01 functions as a Domain Controller (DC) while CERTKILLER-SR02 functions as a Domain Name System (DNS) server.CertKiller.com purchases 200 new client computers that have the following resources: 2.33 GHz Dual-Core processor.2 GB of RAM.80 GB hard drive.DirectX 10 video display card.Integrated sound card.10/100/1000 integrated network adapter.You need to perform a clean installation of Microsoft Windows 7 Ultimate on the new client computers. You use one of the new client computers as a reference computer from which you build a custom image and an answer file. You want to deploy the image to the new client computers over the network using Windows Deployment Services (WDS).What should you do?

    • You should install a Remote Installation Services (RIS) server on the network.

    • You should install a Dynamic Host Configuration Protocol (DHCP) server on the network

    • You should upgrade the Domain Controller to Windows Server 2008 R2

    • You should install a Windows Internet Name Service (WINS) server on the network

    Correct Answer
    A. You should install a Dynamic Host Configuration Protocol (DHCP) server on the network
    Explanation
    The network must have a DHCP server with an active scope as Windows Deployment Services uses PXE, which relies on DHCP for IP addressing.

    Rate this question:

  • 12. 

    53You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.You are currently working on a workstation named CERTKILLER-WS680. You use the Windows Preinstallation Environment (Windows PE) to boot CERTKILLER-WS680. You now need to load a network adapter device driver on the Windows PE.What should you do?

    • You should consider running Drvload.exe and then specify the device driver path.

    • You should consider running Sysprep.exe.

    • Ou should consider using the ntloader command after you run Wpeutil.exe.

    • You should consider running sigverif.exe and then specify the device driver path.

    Correct Answer
    A. You should consider running Drvload.exe and then specify the device driver path.
    Explanation
    Drvload.exe is the tool used to load drivers in the PE environment. Manually load the network driver, and then verify that it is the correct driver. Incorrect Answers: B: Sysprep is used to remove computer specific information before creating an image. It is not used to load drivers.
    C: Ntloader is a boot file. It is not used to load drivers D: Sigverif is used to verify driver digital signatures; it does not load the driver.

    Rate this question:

  • 13. 

    59You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.The CertKiller.com network contains a Windows 7 client computer named CERTKILLER-WS680. CERTKILLER-WS680 also runs a third party accounting application named accapp.exe. Accapp.exe is started during the boot process. You have received instructions to ensure that accapp.exe is only started manually and not started during the boot process.How can you stop accapp.exe starting during the boot process?

    • You should consider modifying the permissions on accapp.exe

    • You should consider using the System Configuration tool and using the Boot tab

    • You should consider setting a software restriction policy

    • You should create a path rule to accapp.exe

    • You should consider using the System Configuration tool and set the Startup applications.

    Correct Answer
    A. You should consider using the System Configuration tool and set the Startup applications.
    Explanation
    Using the System Configuration tool (MSConfig.exe), you can select diagnostic booting or configure starting services or applications


    Incorrect answers:
    A: Changing the permissions on the application will not affect whether it starts during boot-up.
    B: The boot tab does not control what applications are run at start-up. You would need the Startup
    tab.
    C: A software restriction policy is used to determine who can use an application, not when it starts.
    D: A path rule is used to determine who can use the application specified in the path, not when it
    starts.

    Rate this question:

  • 14. 

    61You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains a workstation named CERTKILLER-WS680.You have upgraded CERTKILLER-WS680 from Windows XP Professional Service Pack 2 (SP2) to Windows 7 Professional. However, when you attempt to run a custom application named CKapp.exe you receive an error message stating: "This application is only designed to run on Windows XP or later." You need to configure the application to run on Windows 7.What should you do?

    • You should consider installing Windows XP Mode on CERTKILLER-WS680.

    • You should consider having the CKapp.exe application configured to run with elevated privileges.

    • You should consider reinstalling the application

    • You should consider modifying the CKapp.exe application properties to run in Silent Mode

    Correct Answer
    A. You should consider installing Windows XP Mode on CERTKILLER-WS680.
    Explanation
    Installing Windows XP Mode on CERTKILLER-WS680 would allow the custom application, CKapp.exe, to run on Windows 7. Windows XP Mode is a virtual machine that emulates a Windows XP environment, allowing legacy applications to run on newer operating systems. By installing Windows XP Mode, the application can be executed without encountering the compatibility error message. This is the most appropriate solution to ensure the application runs successfully on the upgraded workstation.

    Rate this question:

  • 15. 

    62You work as a Desktop Technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers and mobile computers on the CertKiller.com network run Windows 7 Professional.CertKiller.com has an Accounts department that needs to run an accounting application named accapp.exe. However, accapp.exe is not Windows 7 compatible and can run only on Windows XP Professional computers. You need to ensure that the Accounts department can run accapp.exe ontheir client computers.What should you do?

    • You should configure accapp.exe to run with elevated privileges.

    • You should install Windows XP Mode on each client computer in the Accounts department

    • You should enable User Account Control on the client computers in the Accounts department.

    • You should disable User Account Control on the client computers in the Accounts department

    Correct Answer
    A. You should install Windows XP Mode on each client computer in the Accounts department
    Explanation
    Installing Windows XP Mode on each client computer in the Accounts department is the correct answer because accapp.exe is not compatible with Windows 7 Professional and can only run on Windows XP Professional computers. Windows XP Mode allows users to run older applications that are not compatible with the current operating system. By installing Windows XP Mode, the Accounts department will be able to run accapp.exe on their client computers without any compatibility issues.

    Rate this question:

  • 16. 

    13You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers are configured to either use Windows XP Professional or Windows Vista. You receive an instruction from management to identify the statement that is regarding Windows 7.What should you do?

    • You should inform management that Outlook Express comes with Windows 7.

    • You should inform management that Microsoft Mail is included with Windows 7.

    • You should inform management that Windows 7 does not come with a preinstalled mail client.

    • You should inform management that Windows Live Mail is the new default mail client with Windows 7.

    Correct Answer
    A. You should inform management that Windows 7 does not come with a preinstalled mail client.
    Explanation
    The correct answer is that Windows 7 does not come with a preinstalled mail client. This means that Outlook Express, Microsoft Mail, and Windows Live Mail are not included with Windows 7. It is important to inform management about this to ensure that they are aware of the limitations and can make appropriate decisions regarding email clients for the network client computers.

    Rate this question:

  • 17. 

    22You work as the desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows XP Professional.You have been instructed to upgrade the Windows XP Professional client computers to Windows 7. However, before you proceed you need to determine if the current applications on the Windows XP Professional computers will run on Windows 7. You want to accomplish this task using the least amount of administrative effort.What should you do?

    • You should run the Application Compatibility Toolkit (ACT) 5.5.

    • You should run Windows Update.

    • You should run the Windows 7 Upgrade Advisor.

    • All of the above

    Correct Answer
    A. You should run the Application Compatibility Toolkit (ACT) 5.5.
    Explanation
    Application Compatibility Toolkit (ACT) 5.5 collects information about the applications that are installed on the network computers and provides information about the applications that are incompatible with Windows Vista. Windows Vista Upgrade Adviser can also be used for the same purpose but it requires a massive amount of administrative effort because it needs to be run separately on each computer.

    Rate this question:

  • 18. 

    133You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com and includes a Direct Access infrastructure.CertKiller.com has purchased a new mobile computer named CERTKILLER-WS680. You install Windows 7 on CERTKILLER-WS680 and join it to the domain.How should you make sure that CERTKILLER-WS680 is able to establish Direct Accessconnections?

    • You should consider installing a computer certificate on CERTKILLER-WS680

    • You should consider disabling User Account Control (UAC) on CERTKILLER-WS680

    • You should consider modifying the network connection properties on CERTKILLER-WS680

    • You should consider adding the computer account for CERTKILLER-WS680 to the RAS and IAS Servers group in the domain

    Correct Answer
    A. You should consider installing a computer certificate on CERTKILLER-WS680
    Explanation
    Part 3: Configure mobility options (4 Questions)

    Rate this question:

  • 19. 

    1You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains both desktop and laptop workstations. You are responsible for managing a desktop workstation named CERTKILLER-WS620. CERTKILLER-WS620 is configured to run Windows Vista. You install Windows 7 on a new partition on CERTKILLER-WS620 but you want Windows Vista to be booted by default on CERTKILLER-WS620 and not Windows 7. What should you do?

    • You should consider running Bcdedit.exe and specifying the /default parameter.

    • You should consider creating a boot.ini file in the root of the Windows 7 partition.

    • You should consider running MSCONFIG and specifying the /bootOS parameter.

    • You should consider running bootcfg.exe and specifying the /default parameter.

    Correct Answer
    A. You should consider running Bcdedit.exe and specifying the /default parameter.
    Explanation
    To modify the boot parameters in Vista and Windows 7, use the command line tool Bcdedit.exe. Using the /default switch will allow you to set the default system to boot. BCD = Boot Configuration Data You can also change the default boot settings in Control Panel -> System & Security -> System -> Advanced System Settings (on the left hand side), -> Startup & Recovery -> Settings Incorrect answers B: The Boot.ini file is no longer used by Vista or Windows 7.
    C: MSCONFIG is not used to specify which operating system to boot. D: Since the boot.ini file is no longer used, the command bootcfg.exe is not applicable.

    Rate this question:

  • 20. 

    150You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You are responsible for managing a computer named CERTKILLER-SR05 that is configured to run Windows 7. CERTKILLER-SR05 is configured to host two volumes named C and D. You are in the process of creating a new folder named D:\TESTDATA. During the course of the day you receive notification from management to make sure that files stored in TESTDATA are indexed by Windows search.What should you do?

    • You should consider enabling EFS on the folder

    • You should consider enabling the archive attribute on the folder

    • You should consider creating a new library and adding TESTDATA to it.

    • You should consider modifying the permissions on the folder

    • You should consider changing the properties of the Windows Search service.

    Correct Answer
    A. You should consider creating a new library and adding TESTDATA to it.
    Explanation
    Part 3: Monitor systems (7 Questions)

    Rate this question:

  • 21. 

    28You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.You are responsible for managing a workstation named CERTKILLER-WS624. CERTKILLER- WS624 is configured to run Windows Vista and contains an accounting application named accapp.exe. CertKiller.com purchases a new Windows 7 workstation that will replace CERTKILLER-624. You need to export the user state as well as the settings of the accapp.exe application so that it can be migrated to the Windows 7 workstation.What should you do?

    • You should consider modifying the migapp.xml file on CERTKILLER-WS624 and then run Scanstate.exe with the /i parameter.

    • You should consider running USMT on CERTKILLER-WS624 and then running Loadstate.exe with the /ui parameter.

    • You should consider running Scanstate.exe with the /migapp parameter on CERTKILLER- WS624

    • You should consider running migapp.exe with the /loadstate parameter on CERTKILLER- WS624.

    Correct Answer
    A. You should consider modifying the migapp.xml file on CERTKILLER-WS624 and then run Scanstate.exe with the /i parameter.
    Explanation
    In order to migrate a user from Vista to Windows 7run the User State Migration toolkit (USMT). ScanState collects the files and settings from the source computer. Run LoadState to restore the user state onto the destination computer. Incorrect Answers:
    B: USMT is not the correct tool to use. C: /migapp is not a valid switch for Scanstate.exe. D: Migapp.exe is not the correct tool to use.Reference: http://technet.microsoft.com/en- us/library/cc721992(

    Rate this question:

  • 22. 

    56CertKiller.com has employed you as a network Administrator. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows 7. You are assigned a client computer named CERTKILLER-WS25. To ensure your productivity you need to make sure that the physical memory as well as the speed is increased on CERTKILLER-WS25.What should you do?

    • You should consider making use of ReadyBoost.

    • You should consider making use of EFS

    • You should consider making use of SpeedDisk.

    • You should consider making use of Pagefile.sys.

    Correct Answer
    A. You should consider making use of ReadyBoost.
    Explanation
    ReadyBoost is a feature in Windows operating systems that allows you to use a USB flash drive or SD card as additional memory for your computer. By using ReadyBoost on CERTKILLER-WS25, you can increase the physical memory and improve the speed of the computer. This is a suitable solution for increasing productivity in this scenario. EFS (Encrypting File System) is used for encrypting files and folders, SpeedDisk is a defragmentation tool, and Pagefile.sys is a system file used for virtual memory management, but none of these options directly address the need to increase physical memory and speed.

    Rate this question:

  • 23. 

    69You work as a desktop support technician at a company named CertKiller.com. All CertKiller.com users are divided into groups named CK_ADMIN, CK_SUPRT and CK_STAFF.The CertKiller.com network contains a stand-alone Windows 7 computer named CERTKILLERWS680.Several CertKiller.com users make use of CERTKILLER-WS680. You need to prevent theCertKiller.com users of the CK_STAFF group from running Windows Media Player onCERTKILLER-WS680. However, all other members must still be able to run Windows MediaPlayer. You want to accomplish this task by using the least amount of administrative effort.What should you do?

    • You should consider creating an executable rule from Application Control Policies on CERTKILLER-WS680

    • You should consider creating a path rule from Application Control Policies on CERTKILLERWS680

    • You should consider creating an executable rule from Software Restriction Policies on CERTKILLER-WS680

    • You should consider creating a certificate rule from Software Restriction Policies on CERTKILLER-WS680

    Correct Answer
    A. You should consider creating an executable rule from Application Control Policies on CERTKILLER-WS680
    Explanation
    By creating an executable rule from Application Control Policies on CERTKILLER-WS680, you can specifically target and block the Windows Media Player application for the CK_STAFF group while allowing all other users to still run it. This approach requires the least amount of administrative effort as it only involves creating a rule within the existing Application Control Policies, rather than implementing additional policies or restrictions.

    Rate this question:

  • 24. 

    78You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains an internal Web site that uses Integrated Windows Authentication.A CertKiller.com user named Amy Walsh has been assigned a workstation named CERTKILLERWS680 that is running Windows 7. Amy Walsh reports that she is prompted for authentication when she attempts to access the internal Web site. You verify that Amy Walsh's user account has permission to access the internal Web site. You need to make sure that authentication occurs automatically when Amy Walsh attempts to connect the Web site.What should you do?

    • You should consider adding the Web site's URL to the Local Intranet zone on CERTKILLERWS680

    • You should consider changing the password for Amy Walsh's user account.

    • You should consider changing the access control for the internal Web site to allow Anonymous Access.

    • You should consider changing the security level for Internet Explorer to Medium-Low on CERTKILLER-WS680

    • You should consider adding the Web site's URL to the Trusted sites zone on CERTKILLERWS680

    Correct Answer
    A. You should consider adding the Web site's URL to the Local Intranet zone on CERTKILLERWS680
    Explanation
    Adding the Web site's URL to the Local Intranet zone on CERTKILLERWS680 will ensure that authentication occurs automatically when Amy Walsh attempts to access the internal Web site. The Local Intranet zone is a trusted zone in Internet Explorer that allows for automatic authentication for websites within the organization's network. By adding the Web site's URL to this zone, CERTKILLERWS680 will recognize it as a trusted site and automatically authenticate Amy Walsh when she tries to access it.

    Rate this question:

  • 25. 

    81You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Windows 7 Professional.A CertKiller.com user named Andy Reid currently makes use of a computer named CERTKILLERWS680.You want to configure CERTKILLER-WS680 to make sure that the temporary Internetfiles are deleted immediately whenever Andy Reid closes Internet Explorer.What should you do?

    • You should consider modifying the offline files settings on CERTKILLER-WS680

    • You should consider modifying the advanced settings from the Internet Options on CERTKILLER-WS680

    • You should consider changing the security level for the Internet zone to Low from the Internet Options on CERTKILLER-WS680

    • You should consider modifying the permissions of the %systemroot%\temp\history folder on CERTKILLER-WS680

    Correct Answer
    A. You should consider modifying the advanced settings from the Internet Options on CERTKILLER-WS680
    Explanation
    The correct answer is to modify the advanced settings from the Internet Options on CERTKILLER-WS680. By modifying the advanced settings, you can configure Internet Explorer to delete temporary internet files immediately when the browser is closed. This ensures that Andy Reid's temporary internet files are always cleared whenever he closes Internet Explorer.

    Rate this question:

  • 26. 

    85You are employed as a network administrator at CertKiller.com. The CertKiller.com networkconsists of a single Active Directory domain named CertKiller.com. All client computers on the CertKiller.com network run Microsoft Windows 7.A CertKiller.com user named Dean Austin has been assigned a client computer namedCERTKILLER-WS623. CERTKILLER-WS623 has been configured to use the 192.168.16.35 IP address and the 255.255.255.0 Subnet mask. CERTKILLER-WS623 has also been configured to use 192.168.18.3 as the DNS Server address. The following exhibit shows the CERTKILLERWS623 IP configuration.You need to ensure that Dean Austin can make use of CERTKILLER-WS623 to connect toresources on other subnets.What should you do?

    • You need to configure the default gateway as 192.168.16.1

    • You need to configure the default gateway as 192.168.16.35

    • You need to configure the default gateway as 192.168.18.1

    • You need to configure the preferred DNS server as 192.168.16.35

    Correct Answer
    A. You need to configure the default gateway as 192.168.16.1
    Explanation
    To connect to other subnets, you need to configure CERTKILLER-WS623 with a default gateway.
    The default gateway is usually the address of the internal interface of the network router. The
    question doesn't tell us what address of the internal interface of the network router is but we know
    that it needs to be an address in the same subnet as CERTKILLER-WS623. From the answers
    given, the only address that would apply is 192.168.16.1.
    Incorrect Answers:
    B: 192.168.16.35 is the address of CERTKILLER-WS623. Therefore, it cannot the default gateway
    address.
    C: 192.168.18.1 is not on the same subnet as CERTKILLER-WS623. Therefore, it cannot the
    default gateway address.
    D: You need to configure the default gateway address, not the preferred DNS server address

    Rate this question:

  • 27. 

    87You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. All client computers ontheCertKiller.com network run Windows 7.You are working on a client computer named CERTKILLER-WS680. You want to release theDHCP assigned IP configuration of CERTKILLER-WS680. However, when you run the ipconfig /release command you receive the error message stating that elevated permissions are required.What should you do?

    • You should consider right-clicking the command prompt and select Run as administrator and using the ipconfig /release command

    • You should consider logging on as an administrator and open the command prompt to run the ipconfig /all command

    • You should consider opening the Command Prompt and run the ipconfig /release /high command

    • You should consider disabling the network adapter and enabling it then run ipconfig /release

    Correct Answer
    A. You should consider right-clicking the command prompt and select Run as administrator and using the ipconfig /release command
    Explanation
    To release the DHCP assigned IP configuration of CERTKILLER-WS680, you need elevated permissions. One way to achieve this is by right-clicking the command prompt and selecting "Run as administrator." By doing so, you will have the necessary privileges to run the ipconfig /release command successfully.

    Rate this question:

  • 28. 

    139You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains two computers named CERTKILLER-WS680 and CERTKILLER-WS622. CERTKILLER-WS680 currently runs Microsoft Windows 7 and CERTKILLER-WS622 runs Microsoft Windows XP Professional.During the course of the day you enable remote desktop on CERTKILLER-WS680 as shown in the exhibit below:Later, a CertKiller.com user named Rory Allen logs on to CERTKILLER-WS622 and attempts to remotely access CERTKILLER-WS680. However, Rory Allen receives the error as shown in the exhibit below:What should you do to ensure that Rory Allen can use CERTKILLER-WS622 to remotely connect to CERTKILLER-WS680?

    • You should consider enabling Remote Assistance on CERTKILLER-WS622

    • You should consider changing the network location to PUBLIC on CERTKILLER-WS680

    • You should consider enabling the Allow connections from computers running any version of Remote Desktop setting on CERTKILLER-WS680

    • You should consider installing a computer certificate on CERTKILLER-WS622

    Correct Answer
    A. You should consider enabling the Allow connections from computers running any version of Remote Desktop setting on CERTKILLER-WS680
    Explanation
    To ensure that Rory Allen can remotely connect to CERTKILLER-WS680, you should enable the "Allow connections from computers running any version of Remote Desktop" setting on CERTKILLER-WS680. This will allow remote desktop connections from any computer, including CERTKILLER-WS622 running Windows XP Professional. By enabling this setting, you are allowing remote desktop connections to be established between the two computers regardless of the version of Remote Desktop being used.

    Rate this question:

  • 29. 

    168You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.A network user named Mia Hamm has a client computer which she regularly backs up. Mia Hamm additionally creates system image backups. During the course of the day Mia Hamm's computers disk fails and she replaces the failed disk drive. CertKiller.com wants you to recover Mia Hamm's computer to the previous Windows environment. You started the computer using the Windows 7 installation media.What should you do?

    • You should consider having the System Image Recovery option selected

    • You should consider having the Upgrade option selected

    • You should consider having the System Restore option selected

    • You should consider having the Command Prompt option selected

    • You should consider having the Last Known Good Configuration selected

    Correct Answer
    A. You should consider having the System Image Recovery option selected
    Explanation
    Part 3: Configure file recovery options (1 Question)

    Rate this question:

  • 30. 

    30You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 300 Windows XP Professional workstations and 200 Windows Vista Ultimate workstations.You have been instructed to migrate all Windows XP Professional workstations to Windows 7 Ultimate. You need to ensure that user files and setting are retained. However, several CertKiller.com users have used Encrypting File System (EFS) to encrypt their user files. You therefore need to migrate the Encrypting File System (EFS) encrypted files and certificates. InMicrosoft 70-680: Practice Examaddition you need to ensure that you are able to encrypt the migration store during the migration.What should you do?

    • On Windows XP make use of the User State Migration Tool (USMT) 3.0.

    • On Windows XP make use of the User State Migration Tool (USMT) 2.6.

    • On Windows 7 make use of the User State Migration Tool (USMT) 4.0.

    • On Windows 7 make use of the User State Migration Tool (USMT) 3.0.

    Correct Answer
    A. On Windows XP make use of the User State Migration Tool (USMT) 3.0.
    Explanation
    USMT 3.0 or higher should be used on Windows XP to migrate EFS files and certificates and also encrypt the migration store. With USMT 3.0 you can specify the / efs :copyraw switch to automatically migrate the EFS files and certificates to the destination computer that is running Windows Vista. To encrypt the store, you should use the /encrypt switch.

    Rate this question:

  • 31. 

    119You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. The CertKiller.com network users currently make use of a standalone computer for storing encrypted files.How should you ensure you are able to read the contents of the encrypted files of all users on the standalone computer?

    • You should consider having the Cipher.exe /r command run and have a data recovery agent added from the local security policy

    • You should consider having User Account Control (UAC) disabled

    • You should consider assigning your user account the Full Control permission to all encrypted files

    • You should consider installing a Certificate Authority and enrolling for an EFS certificate

    Correct Answer
    A. You should consider having the Cipher.exe /r command run and have a data recovery agent added from the local security policy
    Explanation
    Part 3: Configure user account (UAC) (4 Questions)

    Rate this question:

  • 32. 

    161You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.What should you do to increase the size of the paging file for a Windows 7 computer namedCERTKILLER-WS680?

    • You should consider having the Advanced system settings modified from System

    • You should consider having the System protection setting modified from System

    • You should consider adding more RAM

    • You should consider modifying the permissions on pagefile.sys

    Correct Answer
    A. You should consider having the Advanced system settings modified from System
  • 33. 

    8You are employed as the network Administrator at CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. CertKiller.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7.

    • In Windows 7 exFAT is not a volume type

    • In Windows 7 NTFS is not a volume type.

    • In Windows 7 FAT is not a volume type.

    • In Windows 7 NFS is not a volume type

    • All of the above are volume types in Windows 7.

    Correct Answer
    A. In Windows 7 NFS is not a volume type
    Explanation
    In Windows 7, NFS is not a volume type. This means that Windows 7 does not support the Network File System (NFS) as a type of volume. NFS is a protocol commonly used for sharing files and directories over a network, typically used in UNIX and Linux environments. However, Windows 7 does not natively support NFS as a volume type, so it cannot be used for sharing files and directories in a Windows 7 environment.

    Rate this question:

  • 34. 

    15You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network client computers currently make use of Microsoft Windows XP Professional. You receive an instruction from the CIO to install Windows 7 on a computer named CERTKILLER-SR01. During a test installation you discover that the Online Compatibility Check has failed. You therefore need to determine the reason this occurred.What should you identify? (Choose all that apply.)

    • The error occurred due to a display adapter with two SVGA ports.

    • The error occurred due to a display adapter without WDDM Support but with SVIDEO Support.

    • The error occurred due to 512MB of RAM.

    • The error occurred due to a 60 GB Hard Disk.

    Correct Answer(s)
    A. The error occurred due to a display adapter without WDDM Support but with SVIDEO Support.
    A. The error occurred due to 512MB of RAM.
    Explanation
    The error occurred due to a display adapter without WDDM Support but with SVIDEO Support because Windows 7 requires a display adapter with WDDM (Windows Display Driver Model) support in order to function properly. The error also occurred due to 512MB of RAM because Windows 7 requires a minimum of 1GB of RAM to run smoothly.

    Rate this question:

  • 35. 

    101You are the newly appointed network Administrator at CertKiller.com. The CertKiller.com network consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to run Windows 7.You are in the process of adding a new computer named CERTKILLER-WS16 with an IP address subnet. After the installation you discover that you are unable to connect to the other computers on the network, however, the other computers are able to make a connection to each other. You run the ipconfig command on CERTKILLER-WS16 and see that the IPv4 address is 169.254.25.32. To ensure productivity you need to make sure that you are able to connect to the other computers on the network.What should you do?

    • This can be accomplished by having a static TCP/IP address configured

    • This can be accomplished by disabling IPv6

    • This can be accomplished by configuring an exception for File and Printer Sharing in Windows Firewall

    • This can be accomplished by running disabling DHCP

    • This can be accomplished by clearing the Block All Incoming Connections setting on the Windows Firewall

    Correct Answer
    A. This can be accomplished by having a static TCP/IP address configured
    Explanation
    The IP address of CERTKILLER-WS16 is 169.254.25.32, which is an Automatic Private IP Addressing (APIPA) address. APIPA addresses are assigned when a computer is unable to obtain an IP address from a DHCP server. In this case, the computer is not able to connect to the other computers on the network because it does not have a valid IP address. By configuring a static TCP/IP address on CERTKILLER-WS16, the network administrator can ensure that the computer has a valid IP address and can connect to the other computers on the network.

    Rate this question:

  • 36. 

    118You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named Rory Allen is a member of a group named KingAccess and currently uses a shared computer.Rory Allen recently informed you that the computer has a folder named RAllen. Rory Allenrequested that you configure the permissions on the RAllen folder to meet the requirements below:The permissions should be modified to allow Rory Allen to delete all files in the RAllen folder.The permissions should have the members of the KingAccess group able to create files in the RAllen folder.

    • You should consider having Rory Allen assigned the Modify permission whilst having the KingAccess group denied read permission assigned

    • You should consider having Rory Allen assigned the Write permission and having the Write permission assigned to the KingAccess group

    • You should consider having Rory Allen assigned the Modify permission whilst assigning the Write permission to KingAccess group

    • You should consider having Rory Allen assigned the Change permission whilst assigning the Write permission to KingAccess group

    • You should consider having Rory Allen assigned the Full Control permission whilst assigning the Write permission to the KingAccess group

    Correct Answer
    A. You should consider having Rory Allen assigned the Modify permission whilst assigning the Write permission to KingAccess group
  • 37. 

    127You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com has recently installed and configured a file server named CERTKILLER-SR01 on the network.A network user named Rory Allen makes use of a computer named CERTKILLER-WS01 and tried connecting to CERTKILLER-SR01 using an account named RAllen unsuccessfully. CertKiller.com wants you to ensure that Rory Allen authenticates using the account named KingAdmin when connecting to CERTKILLER-SR01.What should you do?

    • You should consider using the Add a Windows credential from Credential Manager on CERTKILLER-WS01

    • You should consider having the File and Printer Sharing settings modified on CERTKILLERWS01

    • You should consider having the network location set to Public on CERTKILLER-WS01

    • You should consider having the network location set to Private on CERTKILLER-WS01

    Correct Answer
    A. You should consider using the Add a Windows credential from Credential Manager on CERTKILLER-WS01
    Explanation
    Part 5: Configure BranchCache (4 Questions)

    Rate this question:

  • 38. 

    130You work as the network Administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. CertKiller.com has its headquarters in London and a branch office in Athens. All servers on the CertKiller.com network run Windows Server 2008 and all client computers run Windows 7.The servers are located at the London office and the four client computers at the Athens office.The servers located at London office have BranchCache enabled. You receive numerouscomplaints from users at the Athens office stating that it takes a long time to open large files in the London office.How could you minimize the time it takes for users in the Athens office to open files in the London office?

    • Your best option would be to enable Universal Group Caching in the Athens office

    • Your best option would be to configure the client computers to make use of the BranchCache Distributed Cache mode at the Athens office

    • Your best option would be to configure DFS to replicate the data from the London office to the Athens office

    • Your best option would be to configure a VPN between the London office and the Athens office

    Correct Answer
    A. Your best option would be to configure the client computers to make use of the BranchCache Distributed Cache mode at the Athens office
    Explanation
    Enabling the BranchCache Distributed Cache mode on the client computers in the Athens office would be the best option to minimize the time it takes for users to open files in the London office. BranchCache is a feature in Windows Server 2008 that allows client computers to cache files and data from remote servers, reducing the amount of data that needs to be transferred over the network. By enabling BranchCache Distributed Cache mode on the client computers in Athens, they can store a local copy of frequently accessed files from the London office, improving file access speed and reducing network congestion.

    Rate this question:

  • 39. 

    147You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.You are working on a client computer named CERTKILLER-WS680 that runs Windows 7.CERTKILLER-WS680 has a Wake-on-LAN compliant network card. You configure WindowsUpdate to run at night when the computer is shut down. You enable the Wake-on-LAN feature and configure the Enabling Windows Update Power Management settings on CERTKILLER-WS680.You need to ensure that Windows Update occurs at night.What should you do?

    • You should leave CERTKILLER-WS680 in hibernate mode at night.

    • You should leave CERTKILLER-WS680 in sleep mode at night.

    • You should leave CERTKILLER-WS680 switched on and logged in at night

    • You should shutdown CERTKILLER-WS680 at night.

    • You should leave CERTKILLER-WS680 switched on but logged out at night

    Correct Answer
    A. You should leave CERTKILLER-WS680 in hibernate mode at night.
    Explanation
    To configure Windows Update installations to run at night when computers are shut down, you need to leave the computers in hibernate mode at night. Hibernate mode saves the contents of memory to a file called hiberfil.sys, therefore you would not lose unsaved data in case of total power failure and therefore can download the Windows updates and perform installations.

    Rate this question:

  • 40. 

    17You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista (x86).During the course of the day you receive instruction from CertKiller.com to perform a clean installation of Microsoft Windows 7 (64-bit) on a user named Rory Allen's computer.What should you do?

    • You should consider having the computer started using the Windows 7 installation media. You should then have the sysprep option selected from the Install Windows dialog box.

    • You should consider having the computer started using the Windows 7 installation media. You should then select the Custom (advanced) option from the Install Windows dialog box.

    • You should consider having the uninstall.exe command used from the Windows 7 installation media.

    • You should consider having the format.exe /C command run from the Windows 7 installation media.

    Correct Answer
    A. You should consider having the computer started using the Windows 7 installation media. You should then select the Custom (advanced) option from the Install Windows dialog box.
    Explanation
    Part 2: Upgrade to Windows 7 from previous versions of Windows (10 Questions)

    Rate this question:

  • 41. 

    20You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The client computers on the CertKiller.com network run a mix of Windows 2000 Professional with Service Pack 4 (SP4), Windows XP Professional with Service Pack 3 (SP3), Windows Vista Business and Windows Vista Ultimate.You have received instructions to upgrade some of the client computers to Windows 7 Professional.What should you do?

    • Ou should consider upgrading the Microsoft Windows 2000 Professional computers to Windows 7 Professional.

    • You should consider upgrading the Microsoft Windows XP Professional computers to Windows 7 Professional.

    • You should consider upgrading the Microsoft Windows Vista Business computers to Windows 7 Professional

    • You should consider upgrading the Microsoft Windows XP Professional computers to Windows 7 Professional.

    • You should consider upgrading the Microsoft Windows Vista Business and Microsoft Windows Vista Ultimate computers to Windows 7 Professional.

    Correct Answer
    A. You should consider upgrading the Microsoft Windows Vista Business computers to Windows 7 Professional
    Explanation
    Only Windows Vista Business can be upgraded to Windows 7 Professional.

    Rate this question:

  • 42. 

    31You work as the Desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. You have been instructed to perform a clean installation of Microsoft Windows 7 on the CertKiller.com client computers that are currently running Microsoft Windows Vista.You need to be able to migrate user data and settings to Windows 7. The computers running Windows Vista currently have a single partition of 80 GB with 60 GB of free disk space. You need to use the User State Migration Tool (USMT) to migrate user state data while keeping network traffic to a minimum.What should you do?

    • You should create a network share and store the user data in the shared folder.

    • You should format the hard disks on the Windows Vista computers and create a primary and a secondary partition.

    • You should use third-party tools to resize the 80 GB partition and create a second partition to store the user data.

    • You should use the Windows Easy Transfer tool to store the user data on the system partition.

    Correct Answer
    A. You should use third-party tools to resize the 80 GB partition and create a second partition to store the user data.
    Explanation
    Resizing the 80 GB partition with a third-party tool and creating a second partition to store the user state data will keep the network traffic to a minimum. If you want to store user state data on a network share and the computer does not have a secondary partition, you should resize the partition.

    Rate this question:

  • 43. 

    34You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The CertKiller.com network contains 120 workstations.CertKiller.com is currently in the process of migrating all of its workstations to Windows 7. In preparation of the migration, you have installed Windows 7 on a computer named CERTKILLER- WS680. You now need to create an image of CERTKILLER-WS680, which will be deployed to all workstations on the CertKiller.com network.What should you do before creating the image on CERTKILLER-WS680?

    • You should consider running the System Preparation tool (Sysprep)

    • You should consider installing the Remote Installation Services (RIS).

    • You should consider disabling the System Protection settings

    • You should consider running the Windows Deployment Services (WDS).

    Correct Answer
    A. You should consider running the System Preparation tool (Sysprep)
    Explanation
    Sysprep is used to prepare the image to be installed on other machines. Sysprep will remove the SID, Reset the Activation to 30 days, add an answer file if desired and reset the install to an "Out-Of-The-Box" experience.
    Any method of moving a Windows image to a new computer, either through imaging, hard disk duplication, or other method, must be prepared with the sysprep /generalize command. Moving or copying a Windows image to a different computer without running the Sysprep /generalize command is not supported.
    The following command-line options are available for Sysprep : sysprep.exe [ / oobe | /audit ] [ /generalize ] [ /reboot | /shutdown | /quit ] [ /quiet ] [ / unattend : answerfile ] Incorrect Answers: B: RIS was used in Windows 2000. It is not required here. C: It is not necessary to disable the System Protection settings. D: WDS is a server service. It is not something you run on a workstation prior to taking an image.

    Rate this question:

  • 44. 

    50You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7.During the course of the day you receive instruction from CertKiller.com to create a 20-GB native VHD which will be named KingSystem located in a folder KingWindows which resides on an external hard disk assigned the H: drive designation.What should you do?

    • You should consider making use of the diskpart file=h:\kingwindows\kingsystem.vhd maximum=20 command

    • You should consider making use of the diskpart file=h:\kingwindows\kingsystem maximum=20 command.

    • You should consider making use of the create vhd file= h:\kingwindows\kingsystem.vhd maximum=20000 command.

    • You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd maximum=20000 command.

    Correct Answer
    A. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd maximum=20000 command.
  • 45. 

    57You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory forest containing a single domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. CertKiller.com purchases 40 new client computers configured with 32-bit hardware.You have been asked by CertKiller management to plan the deployment of Windows 7 along with several corporate applications to the client computers using a custom image.How should you prepare for the deployment whilst ensuring the least amount of administrative effort is used?

    • You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and run on a server.

    • You should consider having Windows 7 installed on each computer ready for the deployment of the corporate applications.

    • You should consider having Microsoft Windows 7 and the corporate applications installed on one client computer.

    • You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and run on a client computer.

    • You should consider having WSUS installed on a server.

    Correct Answer
    A. You should consider having Microsoft Windows 7 and the corporate applications installed on one client computer.
  • 46. 

    63CertKiller.com has hired you as a network Administrator for their network. The CertKiller.comnetwork contains 50 client computers that are configured to run Microsoft Windows XPProfessional. During the course of the day you receive an instruction from the CIO to determine which current applications installed on the client computers are compatible with Windows 7. You need to accomplish this task with the least amount of administrative effort.What should you do?

    • You should consider running Package Manager

    • You should consider running ImageX

    • You should consider running Windows Deployment Services (WDS)

    • You should consider installing Microsoft Application Compatibility Toolkit (ACT

    Correct Answer
    A. You should consider installing Microsoft Application Compatibility Toolkit (ACT
    Explanation
    Installing Microsoft Application Compatibility Toolkit (ACT) would be the most efficient way to determine which current applications installed on the client computers are compatible with Windows 7. ACT is a tool that helps identify and resolve application compatibility issues, allowing you to assess which applications will work properly on the new operating system. This tool streamlines the process and minimizes administrative effort by providing a comprehensive report on application compatibility, allowing you to quickly identify any potential issues.

    Rate this question:

  • 47. 

    66You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Rory Allen asked you what he should download from the Microsoft Corporation Web site to obtain USMT 4.0.What should you do?

    • You should consider instructing Rory Allen that WAIK should be downloaded from Microsoft Corporation to obtain USMT 4.0

    • You should consider instructing Rory Allen that Windows Deployment Services should be downloaded from Microsoft Corporation to obtain USMT 4.0

    • You should consider instructing Rory Allen that the Windows 7 Resource Kit Tools should be downloaded from Microsoft Corporation to obtain USMT 4.0

    • You should consider instructing Rory Allen that Windows Easy Transfer should be downloaded from Microsoft Corporation to obtain USMT 4.0

    Correct Answer
    A. You should consider instructing Rory Allen that WAIK should be downloaded from Microsoft Corporation to obtain USMT 4.0
    Explanation
    USMT 4.0 stands for User State Migration Tool 4.0, which is used to migrate user data and settings from one computer to another. In order to obtain USMT 4.0, Rory Allen should download WAIK (Windows Automated Installation Kit) from Microsoft Corporation. WAIK includes USMT 4.0 as one of its components.

    Rate this question:

  • 48. 

    27You work as a network administrator at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista. During the course of the day a network user named Mia Hamm asked you which of the Microsoft tools can be used to determine if your installed applications have known problems with Microsoft Windows 7.What should you do?

    • You should consider instructing Mia Hamm that the winnt /checkupgradeonly command can be used.

    • You should consider instructing Mia Hamm setup.exe can be used from the Windows 7 installation media.

    • You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool can be used.

    • You should consider instructing Mia Hamm that Windows Update can be used.

    Correct Answer
    A. You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool can be used.
    Explanation
    Part 3: Migrate user profiles (5 Questions)

    Rate this question:

  • 49. 

    166You work as a desktop support technician at CertKiller.com. The CertKiller.com network consists of a single Active Directory domain named CertKiller.com.You are working on a client computer named CERTKILLER-WS680 that is running Windows 7.System Protection is enabled on CERTKILLER-WS680.What would you do to delete all System Protection snapshots on CERTKILLER-WS680 except the most recent snapshot?

    • You should consider compressing the disk drive

    • You should consider enabling disk quotas.

    • You should consider disabling the System Restore from the System Protection Restore settings

    • You should consider deleting the contents of the %systemroot%\Temp folder

    • You should consider running Disk Cleanup for System Restore and Shadow Copies

    Correct Answer
    A. You should consider running Disk Cleanup for System Restore and Shadow Copies

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 10, 2011
    Quiz Created by
    Wellurs
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.