Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rayandlisaj
R
Rayandlisaj
Community Contributor
Quizzes Created: 5 | Total Attempts: 2,418
| Attempts: 377 | Questions: 35
Please wait...
Question 1 / 35
0 %
0/100
Score 0/100
1. Using the USMT (User State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Used to identify what verbose level will be associated with the log file on a scale of 0-13 with 0 being the least verbose.

Explanation

The correct answer is "/v verboselevel". This switch is used to identify what verbose level will be associated with the log file on a scale of 0-13, with 0 being the least verbose. By specifying the verbose level, the user can control the amount of detail that is included in the log file generated by the Scanstate.exe and Loadstate.exe commands.

Submit
Please wait...
About This Quiz
MCTS Windows 7 Config - Quiz

Explore key skills in Windows 7 configuration, focusing on USMT, Windows Aero, data storage units, and advanced features like XP mode and EFS. Ideal for IT professionals preparing for MCTS certification.

Personalize your quiz and earn a certificate with your name on it!
2. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Decrypts the store (Loadstate.exe only)

Explanation

The correct answer is /decrypt. This switch is used with the Loadstate.exe command in the USMT to decrypt the store. It allows the user to restore encrypted files and settings during the migration process.

Submit
3. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Encypts the store (Scanstae.exe only)

Explanation

The correct answer is /encrypt. This switch is used with the Scanstate.exe tool in the USMT (User State Migration Tool) to encrypt the store. It ensures that the data being migrated is securely stored and protected from unauthorized access.

Submit
4.  What Windows 7 feature can be utilized for the Purpose of storing credentials?  

Explanation

The Windows 7 feature that can be utilized for the purpose of storing credentials is Credential Manager. This feature allows users to securely store and manage their usernames and passwords for various applications and websites. It provides a convenient and centralized location for users to store their credentials, making it easier to access and use them when needed. Credential Manager also offers additional security measures, such as encryption, to protect the stored credentials from unauthorized access.

Submit
5. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following:  Specifies the Config.xml file that should be used.

Explanation

The correct answer is "/config". This switch is used to specify the Config.xml file that should be used with the USMT (User State Migration Tool) when running Scanstate.exe and Loadstate.exe commands. This allows the user to customize the migration process by providing a specific configuration file.

Submit
6. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Generates a Config.xml file but does not create a store.

Explanation

The /genconfig switch is used with the Scanstate.exe tool to generate a Config.xml file. This file contains the migration settings and customization options for the migration process. However, it does not actually create a store, which means it does not perform the actual migration of user state data. The purpose of the /genconfig switch is to create a template file that can be edited to specify the desired migration settings before performing the actual migration using the Loadstate.exe tool.

Submit
7. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User exclude: excludes the specified user.

Explanation

The switch "/ue" in the context of the USMT (User State Migration Tool) stands for "User exclude." This switch is used with the Scanstate.exe and Loadstate.exe commands to exclude the specified user during the migration process. By using this switch, the migration tool will skip migrating the data and settings associated with the specified user, allowing for more selective migration.

Submit
8. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Optimizes ScanState for use with Windows XP.

Explanation

The correct answer is /targetxp. This switch is used to optimize ScanState for use with Windows XP. It allows for a more efficient migration of user state data when transferring from a previous version of Windows to Windows XP.

Submit
9. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: User include: includes the specified user.

Explanation

The correct answer is /ui. This switch is used with both Scanstate.exe and Loadstate.exe commands. It allows the migration tool to display the user interface during the migration process, enabling the user to interact with the tool and make any necessary selections or configurations.

Submit
10.  When a user logs into their computer it creates a Token. What is the token called?  

Explanation

When a user logs into their computer, the token that is created is called "Access." This token is used to authenticate the user's identity and determine their level of access and privileges within the system. It acts as a digital representation of the user's rights and permissions, allowing them to interact with various resources and perform specific actions based on their assigned access level.

Submit
11. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: disables data compression?

Explanation

The correct answer is /nocompress. This switch, when used with the Scanstate.exe and Loadstate.exe commands of the USMT, disables data compression. This means that the files and settings being migrated will not be compressed during the migration process.

Submit
12. Your sales manager complains that his Windows 7 computer is unable to boot. You suspect that a missing or corrupt OS file is causing it. You find Safe Mode booting and Last Known Good Configuration don't work. Which steps will resolve the issue with the least administrative burden?

Explanation

Start up repair requires no user intervention

Submit
13. You work as a network administrator. The sales manager works on her laptop that runs Windows 7 Ultimate. Tha hard disk on her lap top is configured as shown.



She wants to make one more partition in Disk 0 and not lose any existing data. Which steps should she take?

Explanation

The sales manager can use the shrink feature in Disk Management to create unallocated space on the hard disk. This can be done without losing any existing data. Once the unallocated space is created, she can then use this space to create the additional partition that she wants.

Submit
14. Using the USMT (USer State Migration Tool) For the switchs related to Scanstate.exe and Loadstate.exe which of the following: Excludes the user based on last login time.

Explanation

The correct answer is /uel. The /uel switch in USMT excludes the user based on the last login time. This means that only users who have logged in after a certain specified date will be included in the migration process. This can be useful in situations where you only want to migrate users who have recently used the system, while excluding users who have not logged in for a long time.

Submit
15.   Which of the following commands are used
to install IPv4?  

Explanation

The command "netsh interface IPv4 install" is used to install IPv4. The "netsh" command is used to configure and manage network settings in Windows. The "interface" parameter specifies that we want to configure network interfaces. The "IPv4" parameter indicates that we want to configure IPv4 settings. Finally, the "install" parameter is used to install IPv4 on the network interface.

Submit
16. This unit is one larger than a Exabyte.

Explanation

This unit is one larger than an Exabyte. The given options are in increasing order of size, starting from Gigabyte (GB) and going up to Zettabyte (ZB). Therefore, the correct answer is 1 ZB (zettabyte), as it is the next unit larger than an Exabyte.

Submit
17. What new Windows 7 feature displays details about a device and tasks you can perform with that device?  

Explanation

Device Stage is a new feature in Windows 7 that displays details about a device and provides a centralized location for managing and performing tasks with that device. It allows users to easily access device-specific information, such as battery life, storage capacity, and available updates. Users can also perform various tasks, such as syncing files, printing documents, or managing settings, directly from the Device Stage interface. This feature enhances the user experience by providing a convenient and intuitive way to interact with devices connected to the computer.

Submit
18.  Which tool can you use to prepare a USB device so that you can boot from it to install Windows 7 on a netbook?  

Explanation

You can use the Diskpart tool to prepare a USB storage device so you can boot from it to install Windows 7. This is actually faster than installing Windows 7 from a DVD.

Submit
19. What is the lowest priced version of Windows 7 that contains Windows Aero?

Explanation

The lowest priced version of Windows 7 that contains Windows Aero is Home Premium.

Submit
20. This unit is one larger than a Zettabyte.

Explanation

The given question states that the unit is one larger than a Zettabyte. The options provided are EB (exabyte), PB (petabyte), TB (terabyte), and YB (yottabyte). Among these options, the Yottabyte is the only unit that is larger than a Zettabyte. Therefore, the correct answer is 1YB (yottabyte).

Submit
21. This unit is one larger than a Terabyte.

Explanation

This unit is one larger than a Terabyte. The correct answer is 1 PB (petabyte). A petabyte is equal to 1,000 terabytes, so it is the next unit of measurement after a terabyte.

Submit
22. You can use ___________ to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, it can also install third-party applications, device drivers, language packs, and other updates

Explanation

Windows SIM (System Image Manager) is a tool included in the Windows Assessment and Deployment Kit (ADK) that allows users to create and modify answer files for Windows installations. Answer files are XML-based files that contain settings and configurations for Windows installations. With Windows SIM, users can create an answer file that partitions and formats a disk, changes the default settings for Internet Explorer, configures Windows to boot to Audit mode, and also install third-party applications, device drivers, language packs, and other updates. Therefore, Windows SIM is the correct tool for creating the mentioned answer file.

Submit
23. By using Sysprep, you may prepare an image to be captured by ImageX. Once you have run Sysprep, you can boot your master computer into the Windows Preinstallation Environment (Windows PE) to capture the image.

Explanation

You can use ImageX ONLYa to capture and to apply a full version of the operating system and software applications

Submit
24. You want to test the performance of one of the Windows 7 clients in the office by using XPerf.exe. You have started a trace with BASE Kernel Group and cswitch Kernel Flag.

xperf -on base+cswitch

You now want to stop the trace and save it in a file called mytrace.etl. Which command should you use?

Explanation

The correct command to stop the trace and save it in a file called mytrace.etl is "xperf -d mytrace.etl". This command will stop the trace and save the collected data in the specified file for further analysis or review.

Submit
25. You are using sysprep to prepare a system for imaging. You want to enable end users to customize their Windows operating system, create user accounts, name the computer, and other tasks. Which sysprep setting should you use?

Explanation

oobe will restart the computer into Windows Welcome mode

Submit
26. Which verdions of windows 7 include XP mode and Encrypting File System (EFS) (Choose all that apply.

Explanation

Windows 7 Enterprise, Windows 7 Professional, and Windows 7 Ultimate include XP mode and Encrypting File System (EFS). These versions of Windows 7 are designed for business and advanced users, providing additional features and capabilities compared to the Home Basic and Home Premium editions. XP mode allows users to run older Windows XP applications on Windows 7, ensuring compatibility with legacy software. Encrypting File System (EFS) provides file-level encryption, allowing users to protect their sensitive data and ensure that it remains secure even if the computer is lost or stolen.

Submit
27. The Windows 7 OS is stored on which two partitions?

Explanation

The Windows 7 OS is stored on the boot partition and the system partition. The boot partition contains the necessary files for the computer to start up and load the operating system. The system partition, on the other hand, contains the core files and drivers required for the operating system to function properly. Both partitions play essential roles in the booting process and overall operation of the Windows 7 OS.

Submit
28. Your company has a Server 2008 based environment. The company has recently purchased 20 computers. You are required to deploy Windows 7 on all of them. You decide to use Windows 7 image for the deployment. Which of the following utilities will you use to create the answer file and network shares for the image?

Explanation

Windows System Image Manager is used to create answer files (unattended.xml) and network shares and is also used to create a configuration set. This answer file is then transfered to the master computer which is used for creating the installation image.

Windows Pre Installation Environment is a 32 bit OS built on Vista Kernel with limited access incorperated.

Sysprep is used to prepair an image of the hard disk of a PC running a Windows OS so it can be deployed to multiple computers.


ImageX is a command line tool that captures, modifies and applies image installations for deployment in a large environment.

Submit
29. You are using sysprep to prepare a system for imaging. You want to reset the security ID (SID) and clear the event logs. Which option should you use?

Explanation

Generalize prepares the Windows installation to be imaged. If this option is specified, all unique system information is removed from the Windows installation. The security ID (SID) resets, any system restore points are cleared, and event logs are deleted. The next time the computer starts, the specialize configuration pass runs. A new security ID (SID) is created, and the clock for Windows activation resets, if the clock has not already been reset three times

Submit
30. By using Sysprep, you may prepare an image to be captured by ImageX. Once you have run Sysprep, you can boot your master computer into the Windows Preinstallation Environment (Windows PE) to capture the image.

Which of the following is FALSE regarding ImageX?

Explanation

The statement "You can use ImageX to capture and to apply upgrades to the operating system or applications" is false. ImageX is a tool used for capturing, modifying, and applying Windows images, but it is not designed specifically for applying upgrades to the operating system or applications. It is primarily used for creating and deploying custom Windows installations.

Submit
31. The company you work for has a Server 2008 environment. Company HQ is in Seattle with a branch in Sydney and Tokyo. Each branch has 200 users.  Configuration shown below:



The server is placed at HQ with a confidential file named report. All users are required to update this file daily. Users are complaining about deteriorated performance of the network when accessing this file. You know the slow WAN is the cause. How do you fix it?

Explanation

To fix the deteriorated network performance when accessing the confidential file, the best solution would be to configure BranchCache in Hosted cache mode. This mode allows the file to be cached on a server located at the branch office, reducing the need to access the file over the slow WAN connection. By caching the file locally, users can access and update it more quickly, improving network performance and reducing the strain on the WAN.

Submit
32. The company you work for has a Server 2008 environment. The servers run Server 08 R1. Company HQ is in Seattle with a branch in Sydney. The network is configured as a Windows Active Directory-Based single domain network. Configuration shown below:



You are configuring offline files for a branch office users. The server is placed at HQ. Both offices connect through a slow WAN link. To reduce the number of times a client computer may have to retrieve the same data from the file server which feature of offline files will help you?

Explanation

Transparent Caching is the feature of offline files that will help reduce the number of times a client computer has to retrieve the same data from the file server. Transparent Caching allows the client computer to cache frequently accessed files locally, so they can be accessed quickly without having to retrieve them over the slow WAN link. This improves performance and reduces network traffic, especially in situations where the same data is accessed repeatedly by multiple users in the branch office.

Submit
33.   Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can't do on a computer system. Which one of these policies requires a reboot?  

Explanation

Most real time antivirus programs require a reboot if any major configuration changes are made. This policy turns off Windows Defender Real-Time Protection, and no more scans are scheduled. If you enable this policy setting, Windows Defender does not run, and computers will not be scanned for spyware or other potentially unwanted software. If you disable or do not configure this policy setting, by default Windows Defender runs and computers are scanned for spyware and other potentially unwanted software.

Submit
34. Which of the following tools is used to ensure that the legacy applications will run on Windows 7?  

Explanation

The Microsoft Shim is used to ensure that legacy applications will run on Windows 7. A shim is a small piece of code that allows an application to work with a newer operating system by intercepting and modifying certain functions or behaviors. In the case of Windows 7, the Microsoft Shim can be used to address compatibility issues that may arise when running legacy applications on the newer operating system. It provides a way to bridge the gap between the application and the operating system, allowing the application to function properly on Windows 7.

Submit
35. Your company has a Windows Domain Based Network. All servers on the domain run Server 2008 R2 and the clint computers run Windows 7 Ultimate. You are implimenting restriction policies for for running applications on domain users. You need to accomplish the following tasks.

Users should be able to run all applications not resticted by any other rules.
All applications digitally signed by Hack-It-Once vendor should be restricted.

Which steps will get this done? (choose all that apply.)

Explanation

To accomplish the given tasks, the correct steps would be to create an AppLocker publisher rule to block all applications digitally signed by the Hack-It-Once vendor and implement a default AppLocker rule to allow all applications that are not subject to any other rules. By creating a publisher rule, any application digitally signed by the Hack-It-Once vendor will be restricted. Additionally, implementing a default rule to allow all applications not subject to any other rules ensures that users can run all other applications that are not restricted by any other rules.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 09, 2010
    Quiz Created by
    Rayandlisaj
Cancel
  • All
    All (35)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Using the USMT (User State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
 What Windows 7 feature can be utilized for the Purpose of...
Using the USMT (USer State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
Using the USMT (USer State Migration Tool) For the switchs related to...
 When a user logs into their computer it creates a Token. What is...
Using the USMT (USer State Migration Tool) For the switchs related to...
Your sales manager complains that his Windows 7 computer is unable to...
You work as a network administrator. The sales manager works on her...
Using the USMT (USer State Migration Tool) For the switchs related to...
  ...
This unit is one larger than a Exabyte.
What new Windows 7 feature displays details about a device and tasks...
 Which tool can you use to prepare a USB device so that you can...
What is the lowest priced version of Windows 7 that contains Windows...
This unit is one larger than a Zettabyte.
This unit is one larger than a Terabyte.
You can use ___________ to create an answer file that partitions and...
By using Sysprep, you may prepare an image to be captured by ImageX....
You want to test the performance of one of the Windows 7 clients in...
You are using sysprep to prepare a system for imaging. You want to...
Which verdions of windows 7 include XP mode and Encrypting File...
The Windows 7 OS is stored on which two partitions?
Your company has a Server 2008 based environment. The company has...
You are using sysprep to prepare a system for imaging. You want to...
By using Sysprep, you may prepare an image to be captured by ImageX....
The company you work for has a Server 2008 environment. Company HQ is...
The company you work for has a Server 2008 environment. The servers...
  ...
Which of the following tools is used to ensure that the legacy...
Your company has a Windows Domain Based Network. All servers on the...
Alert!

Advertisement