1.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Specifies the Config.xml file that should be used.
Correct Answer
A. /config
Explanation
The correct answer is "/config". This switch is used to specify the Config.xml file that should be used with the USMT (User State Migration Tool) when running Scanstate.exe and Loadstate.exe commands. This allows the user to customize the migration process by providing a specific configuration file.
2.
What is the lowest priced version of Windows 7 that contains Windows Aero?
Correct Answer
C. Home Premium
Explanation
The lowest priced version of Windows 7 that contains Windows Aero is Home Premium.
3.
This unit is one larger than a Zettabyte.
Correct Answer
D. 1YB (yottabyte)
Explanation
The given question states that the unit is one larger than a Zettabyte. The options provided are EB (exabyte), PB (petabyte), TB (terabyte), and YB (yottabyte). Among these options, the Yottabyte is the only unit that is larger than a Zettabyte. Therefore, the correct answer is 1YB (yottabyte).
4.
This unit is one larger than a Terabyte.
Correct Answer
B. 1 PB (petabyte)
Explanation
This unit is one larger than a Terabyte. The correct answer is 1 PB (petabyte). A petabyte is equal to 1,000 terabytes, so it is the next unit of measurement after a terabyte.
5.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: disables data compression?
Correct Answer
C. /nocompress
Explanation
The correct answer is /nocompress. This switch, when used with the Scanstate.exe and Loadstate.exe commands of the USMT, disables data compression. This means that the files and settings being migrated will not be compressed during the migration process.
6.
Which verdions of windows 7 include XP mode and Encrypting File System (EFS) (Choose all that apply.
Correct Answer(s)
A. Windows 7 Enterprise
D. Windows 7 Professional
E. Windows 7 Ultimate
Explanation
Windows 7 Enterprise, Windows 7 Professional, and Windows 7 Ultimate include XP mode and Encrypting File System (EFS). These versions of Windows 7 are designed for business and advanced users, providing additional features and capabilities compared to the Home Basic and Home Premium editions. XP mode allows users to run older Windows XP applications on Windows 7, ensuring compatibility with legacy software. Encrypting File System (EFS) provides file-level encryption, allowing users to protect their sensitive data and ensure that it remains secure even if the computer is lost or stolen.
7.
This unit is one larger than a Exabyte.
Correct Answer
D. 1 ZB (zettabyte)
Explanation
This unit is one larger than an Exabyte. The given options are in increasing order of size, starting from Gigabyte (GB) and going up to Zettabyte (ZB). Therefore, the correct answer is 1 ZB (zettabyte), as it is the next unit larger than an Exabyte.
8.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Generates a Config.xml file but does not create a store.
Correct Answer
B. /genconfig
Explanation
The /genconfig switch is used with the Scanstate.exe tool to generate a Config.xml file. This file contains the migration settings and customization options for the migration process. However, it does not actually create a store, which means it does not perform the actual migration of user state data. The purpose of the /genconfig switch is to create a template file that can be edited to specify the desired migration settings before performing the actual migration using the Loadstate.exe tool.
9.
The Windows 7 OS is stored on which two partitions?
Correct Answer(s)
B. Boot Partition
D. System Partition
Explanation
The Windows 7 OS is stored on the boot partition and the system partition. The boot partition contains the necessary files for the computer to start up and load the operating system. The system partition, on the other hand, contains the core files and drivers required for the operating system to function properly. Both partitions play essential roles in the booting process and overall operation of the Windows 7 OS.
10.
Your company has a Server 2008 based environment. The company has recently purchased 20 computers. You are required to deploy Windows 7 on all of them. You decide to use Windows 7 image for the deployment. Which of the following utilities will you use to create the answer file and network shares for the image?
Correct Answer
D. WindowSIM (Windows System Image Manager)
Explanation
Windows System Image Manager is used to create answer files (unattended.xml) and network shares and is also used to create a configuration set. This answer file is then transfered to the master computer which is used for creating the installation image.
Windows Pre Installation Environment is a 32 bit OS built on Vista Kernel with limited access incorperated.
Sysprep is used to prepair an image of the hard disk of a PC running a Windows OS so it can be deployed to multiple computers.
ImageX is a command line tool that captures, modifies and applies image installations for deployment in a large environment.
11.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User include: includes the specified user.
Correct Answer
C. /ui
Explanation
The correct answer is /ui. This switch is used with both Scanstate.exe and Loadstate.exe commands. It allows the migration tool to display the user interface during the migration process, enabling the user to interact with the tool and make any necessary selections or configurations.
12.
The company you work for has a Server 2008 environment. The servers run Server 08 R1. Company HQ is in Seattle with a branch in Sydney. The network is configured as a Windows Active Directory-Based single domain network. Configuration shown below:You are configuring offline files for a branch office users. The server is placed at HQ. Both offices connect through a slow WAN link. To reduce the number of times a client computer may have to retrieve the same data from the file server which feature of offline files will help you?
Correct Answer
D. Transparent Cashing
Explanation
Transparent Caching is the feature of offline files that will help reduce the number of times a client computer has to retrieve the same data from the file server. Transparent Caching allows the client computer to cache frequently accessed files locally, so they can be accessed quickly without having to retrieve them over the slow WAN link. This improves performance and reduces network traffic, especially in situations where the same data is accessed repeatedly by multiple users in the branch office.
13.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Optimizes ScanState for use with Windows XP.
Correct Answer
D. /targetxp
Explanation
The correct answer is /targetxp. This switch is used to optimize ScanState for use with Windows XP. It allows for a more efficient migration of user state data when transferring from a previous version of Windows to Windows XP.
14.
The company you work for has a Server 2008 environment. Company HQ is in Seattle with a branch in Sydney and Tokyo. Each branch has 200 users. Configuration shown below:The server is placed at HQ with a confidential file named report. All users are required to update this file daily. Users are complaining about deteriorated performance of the network when accessing this file. You know the slow WAN is the cause. How do you fix it?
Correct Answer
B. Configure BranchCashe in Hosted cashe mode
Explanation
To fix the deteriorated network performance when accessing the confidential file, the best solution would be to configure BranchCache in Hosted cache mode. This mode allows the file to be cached on a server located at the branch office, reducing the need to access the file over the slow WAN connection. By caching the file locally, users can access and update it more quickly, improving network performance and reducing the strain on the WAN.
15.
Your sales manager complains that his Windows 7 computer is unable to boot. You suspect that a missing or corrupt OS file is causing it. You find Safe Mode booting and Last Known Good Configuration don't work. Which steps will resolve the issue with the least administrative burden?
Correct Answer
A. Run system recovery options
Choose the Startup Repair Option
Explanation
Start up repair requires no user intervention
16.
You work as a network administrator. The sales manager works on her laptop that runs Windows 7 Ultimate. Tha hard disk on her lap top is configured as shown.She wants to make one more partition in Disk 0 and not lose any existing data. Which steps should she take?
Correct Answer
D. Use the shrink feature in to create unallocated space. Create the partition using unallocated space.
Explanation
The sales manager can use the shrink feature in Disk Management to create unallocated space on the hard disk. This can be done without losing any existing data. Once the unallocated space is created, she can then use this space to create the additional partition that she wants.
17.
Your company has a Windows Domain Based Network. All servers on the domain run Server 2008 R2 and the clint computers run Windows 7 Ultimate. You are implimenting restriction policies for for running applications on domain users. You need to accomplish the following tasks.Users should be able to run all applications not resticted by any other rules.All applications digitally signed by Hack-It-Once vendor should be restricted.Which steps will get this done? (choose all that apply.)
Correct Answer(s)
B. Create an AppLocker publisher rule to block all applications digitally signed by the Hack-It-Once vendor
C. Impliment a default AppLocker rule to allow all applications that are not subject to any other rules.
Explanation
To accomplish the given tasks, the correct steps would be to create an AppLocker publisher rule to block all applications digitally signed by the Hack-It-Once vendor and implement a default AppLocker rule to allow all applications that are not subject to any other rules. By creating a publisher rule, any application digitally signed by the Hack-It-Once vendor will be restricted. Additionally, implementing a default rule to allow all applications not subject to any other rules ensures that users can run all other applications that are not restricted by any other rules.
18.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Encypts the store (Scanstae.exe only)
Correct Answer
C. /encrypt
Explanation
The correct answer is /encrypt. This switch is used with the Scanstate.exe tool in the USMT (User State Migration Tool) to encrypt the store. It ensures that the data being migrated is securely stored and protected from unauthorized access.
19.
Which of the following tools is used to ensure that the legacy applications will run on Windows 7?
Correct Answer
D. Microsoft Shim
Explanation
The Microsoft Shim is used to ensure that legacy applications will run on Windows 7. A shim is a small piece of code that allows an application to work with a newer operating system by intercepting and modifying certain functions or behaviors. In the case of Windows 7, the Microsoft Shim can be used to address compatibility issues that may arise when running legacy applications on the newer operating system. It provides a way to bridge the gap between the application and the operating system, allowing the application to function properly on Windows 7.
20.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Excludes the user based on last login time.
Correct Answer
E. /uel
Explanation
The correct answer is /uel. The /uel switch in USMT excludes the user based on the last login time. This means that only users who have logged in after a certain specified date will be included in the migration process. This can be useful in situations where you only want to migrate users who have recently used the system, while excluding users who have not logged in for a long time.
21.
When a user logs into their computer it creates a Token. What is the token called?
Correct Answer
A. Access
Explanation
When a user logs into their computer, the token that is created is called "Access." This token is used to authenticate the user's identity and determine their level of access and privileges within the system. It acts as a digital representation of the user's rights and permissions, allowing them to interact with various resources and perform specific actions based on their assigned access level.
22.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User exclude: excludes the specified user.
Correct Answer
E. /ue
Explanation
The switch "/ue" in the context of the USMT (User State Migration Tool) stands for "User exclude." This switch is used with the Scanstate.exe and Loadstate.exe commands to exclude the specified user during the migration process. By using this switch, the migration tool will skip migrating the data and settings associated with the specified user, allowing for more selective migration.
23.
Which of the following commands are usedto install IPv4?
Correct Answer
C. Netsh interface IPv4 install
Explanation
The command "netsh interface IPv4 install" is used to install IPv4. The "netsh" command is used to configure and manage network settings in Windows. The "interface" parameter specifies that we want to configure network interfaces. The "IPv4" parameter indicates that we want to configure IPv4 settings. Finally, the "install" parameter is used to install IPv4 on the network interface.
24.
What Windows 7 feature can be utilized for the Purpose of storing credentials?
Correct Answer
A. Credential Manager
Explanation
The Windows 7 feature that can be utilized for the purpose of storing credentials is Credential Manager. This feature allows users to securely store and manage their usernames and passwords for various applications and websites. It provides a convenient and centralized location for users to store their credentials, making it easier to access and use them when needed. Credential Manager also offers additional security measures, such as encryption, to protect the stored credentials from unauthorized access.
25.
What new Windows 7 feature displays details about a device and tasks you can perform with that device?
Correct Answer
A. Device Stage
Explanation
Device Stage is a new feature in Windows 7 that displays details about a device and provides a centralized location for managing and performing tasks with that device. It allows users to easily access device-specific information, such as battery life, storage capacity, and available updates. Users can also perform various tasks, such as syncing files, printing documents, or managing settings, directly from the Device Stage interface. This feature enhances the user experience by providing a convenient and intuitive way to interact with devices connected to the computer.
26.
By using Sysprep, you may prepare an image to be captured by ImageX. Once you have run Sysprep, you can boot your master computer into the Windows Preinstallation Environment (Windows PE) to capture the image. Which of the following is FALSE regarding ImageX?
Correct Answer
A. You can use ImageX to capture and to apply upgrades to the operating system or applications.
Explanation
The statement "You can use ImageX to capture and to apply upgrades to the operating system or applications" is false. ImageX is a tool used for capturing, modifying, and applying Windows images, but it is not designed specifically for applying upgrades to the operating system or applications. It is primarily used for creating and deploying custom Windows installations.
27.
You want to test the performance of one of the Windows 7 clients in the office by using XPerf.exe. You have started a trace with BASE Kernel Group and cswitch Kernel Flag. xperf -on base+cswitchYou now want to stop the trace and save it in a file called mytrace.etl. Which command should you use?
Correct Answer
B. Xperf -d mytrace.etl
Explanation
The correct command to stop the trace and save it in a file called mytrace.etl is "xperf -d mytrace.etl". This command will stop the trace and save the collected data in the specified file for further analysis or review.
28.
Using the USMT (User State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Used to identify what verbose level will be associated with the log file on a scale of 0-13 with 0 being the least verbose.
Correct Answer
E. /v verboselevel
Explanation
The correct answer is "/v verboselevel". This switch is used to identify what verbose level will be associated with the log file on a scale of 0-13, with 0 being the least verbose. By specifying the verbose level, the user can control the amount of detail that is included in the log file generated by the Scanstate.exe and Loadstate.exe commands.
29.
You are using sysprep to prepare a system for imaging. You want to reset the security ID (SID) and clear the event logs. Which option should you use?
Correct Answer
A. /generalize
Explanation
Generalize prepares the Windows installation to be imaged. If this option is specified, all unique system information is removed from the Windows installation. The security ID (SID) resets, any system restore points are cleared, and event logs are deleted. The next time the computer starts, the specialize configuration pass runs. A new security ID (SID) is created, and the clock for Windows activation resets, if the clock has not already been reset three times
30.
You can use ___________ to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, it can also install third-party applications, device drivers, language packs, and other updates
Correct Answer
D. Windows SIM
Explanation
Windows SIM (System Image Manager) is a tool included in the Windows Assessment and Deployment Kit (ADK) that allows users to create and modify answer files for Windows installations. Answer files are XML-based files that contain settings and configurations for Windows installations. With Windows SIM, users can create an answer file that partitions and formats a disk, changes the default settings for Internet Explorer, configures Windows to boot to Audit mode, and also install third-party applications, device drivers, language packs, and other updates. Therefore, Windows SIM is the correct tool for creating the mentioned answer file.
31.
By using Sysprep, you may prepare an image to be captured by ImageX. Once you have run Sysprep, you can boot your master computer into the Windows Preinstallation Environment (Windows PE) to capture the image.
Correct Answer
A. You can use ImageX to capture and to apply upgrades to the operating system or applications.
Explanation
You can use ImageX ONLYa to capture and to apply a full version of the operating system and software applications
32.
Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can't do on a computer system. Which one of these policies requires a reboot?
Correct Answer
D. Turn off Windows Defender
Explanation
Most real time antivirus programs require a reboot if any major configuration changes are made. This policy turns off Windows Defender Real-Time Protection, and no more scans are scheduled. If you enable this policy setting, Windows Defender does not run, and computers will not be scanned for spyware or other potentially unwanted software. If you disable or do not configure this policy setting, by default Windows Defender runs and computers are scanned for spyware and other potentially unwanted software.
33.
You are using sysprep to prepare a system for imaging. You want to enable end users to customize their Windows operating system, create user accounts, name the computer, and other tasks. Which sysprep setting should you use?
Correct Answer
C. /oobe
Explanation
oobe will restart the computer into Windows Welcome mode
34.
Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Decrypts the store (Loadstate.exe only)
Correct Answer
B. /decrypt
Explanation
The correct answer is /decrypt. This switch is used with the Loadstate.exe command in the USMT to decrypt the store. It allows the user to restore encrypted files and settings during the migration process.
35.
Which tool can you use to prepare a USB device so that you can boot from it to install Windows 7 on a netbook?
Correct Answer
B. Diskpart
Explanation
You can use the Diskpart tool to prepare a USB storage device so you can boot from it to install Windows 7. This is actually faster than installing Windows 7 from a DVD.