Which command-line command displays the IP configuration of a...
What is the minimum number of volumes that a computer running Windows...
You want to deploy a new computer for software compatibility testing....
Which of the following tools can you use to determine if the...
You want to use WDS to perform a network installation of Windows 7....
A user has a home computer with a cable Internet connection and no...
You want to prohibit read, write, and execute access to all types of...
Which utility can you use to prepare a USB storage device so that you...
Which XML file is used with ScanState to specify information about...
Which Windows Setup configuration pass applies settings to Windows 7...
You want to ensure that users of stand-alone clients running Windows 7...
To which of the following editions and versions of Windows 7 can you...
You are planning to migrate all the computers in your organization to...
What type of AppLocker rule should you create to block all...
You are examining a DNS forward lookup zone to investigate problems...
You want to create a 20-GB native VHD called Systemvhd in a folder...
Kim Akers has set the file Brisbane.doc (which is hosted on an office...
Which of the following types of USMT migration store types minimizes...
You want to ensure that offline VHD files that contain installations...
Which Diskpart command converts an MBR disk to a GPT disk?
Which of the following must you download from Microsoft’s Web site...
You administer a network in which all the client computers run Windows...
Don Hall has set up a wireless network at home. He is pleased with the...
Your computer is configured to dual-boot between Windows Vista...
Which of the following DISM options can you run against an online,...
An application used by the administrators in your organization is not...
You are troubleshooting instability problems on a computer running...
You need to find out the amount of writeable space available on a...
Which of the following compatibility modes would you configure for an...
Which of the following file types does the Windows 7 Program...
Which of the following policy settings should you configure to ensure...
What command-line utility can you use in Windows 7 to edit boot...
You want to ensure that only certain designated wireless laptops can...
You have used Runas with the /savecred option to save the credentials...
You have upgraded the hardware on a computer so that it can run an...
A user has forgotten the password to the stand-alone desktop computer...
Your client running Windows 7 is connected to a hotel network, has an...
You are creating a WIM system image of a Windows 7 installation on a...
You have used the ImageX tool to install a WIM system image on a VHD...
What does the command netsh advfirewall firewall add rule...
You want to have a record of which user accounts are used to access...
Which policy setting should you configure to ensure that the Windows 7...
Which of the following versions and editions of Windows 7 can you...
You are configuring static IPv4 addresses for two computers, Perth and...
You are responsible for managing student laptops that have Windows 7...
You are spending several weeks working as a contractor at Contoso. You...
You require fault tolerance for your operating system so that your...
You are examining transition technologies on a network and want to...
You are logged on to a computer running Windows 7 Enterprise that you...
A client running Windows 7 is experiencing intermittent performance...
Which of the following tools can you use to migrate a custom power...
You have four devices connected to a USB hub and none of them are...
Your organization’s internal Web site was designed several years...
Jeff_Phillips’s user account is a member of four separate security...
Which of the following policies should you configure if you want a...
What WIM tool do you use to view Windows Management–generated events...
To which of the following versions and editions of Windows 7 can you...
Sam Abolrous hot-desks at the A. Datum Corporation. When he is working...
Which of the following BitLocker policies should you configure to...
A user telephones your help desk. She has just accidentally deleted a...
Which of the following operating systems support an offline migration...
You want to obtain detailed information about all the Windows...
You have configured AppLocker policies to allow the execution of...
One of the users whom you support uses a wireless laptop in the office...
You have created a local group on a client running Windows 7 named...
A client running Windows 7 is connecting to a hotel network. Clients...
You want add an install image to the image store on a WDS server. You...
You are moving a dynamic volume from the Canberra computer running...
You do consulting work for a small business. This small business has a...
You are using the Diskpart tool to create a RAID-0 volume from...
You are logged on to a client running Windows 7 named Canberra. You...
Which of the following computers can you configure as a DirectAccess...
Which of the following commands can you use to generate a list of...
Your company’s chief accountant consults you with a question about a...
Which of the following policies should you enable to ensure that...
You want to ensure that Internet Explorer does not display any pop-up...
You want to centralize backups by backing up all client computers in...
You want to configure clients running Windows 7 Enterprise in a branch...
When Windows 7 is configured according to its default settings, which...
You suspect that a device listed under Non-Plug And Play Drivers in...
What type of unicast IPv6 address would you typically use on the...
Your organization has 50 computers running Windows Vista Enterprise...
You want to user Windows PowerShell on a client running Windows 7...
A user on your company network creates a new file and works on it...
You have created an answer file called Unattend.xml in the C:\Textfi...
You are configuring firewall rules on a client running Windows 7. You...
You need to manage a computer running Windows 7 from a computer...
Which of the following VPN types support the VPN Reconnect feature of...
Clients running Windows 7 Enterprise on your employer’s production...
WDS creates install, boot, discover, and capture images. Which of...
Which of the following are required if WDS is to be installed and to...
You are using Network Monitor to analyze traffi c on an IPv6 network....
You want to use BranchCache’s hosted cache mode in your...
You have 10 stand-alone laptop computers running Windows 7...
Which of the following tools can you use to determine the...
You have created a bootable DVD-ROM containing a Windows PE image, the...
You are analyzing the configuration of an IPv6 network. Which of the...
Which of the following policies should you configure to allow a...
You want to ensure that third-party Web sites that provide content to...
Which tool provided by Windows 7 helps you determine which...
Which of the following utilities can you use to transfer user...
You want to prevent Windows 7 from searching Windows Update for a...
You want to configure clients running Windows 7 Enterprise in a branch...
A number of processor-intensive applications have been performing...
You have created the statically configured wired subnet...
Kim Akers, who uses the Kim_Akers user account, has been using a...
Which Windows Performance Analysis tool captures user and kernel...
You are creating an unattend answer file for automatic Windows 7...
Your organization has a mix of computers running Windows 7 Ultimate...
Even though you have configured scheduled updates to occur during the...
Your organization has recently acquired several subsidiaries. Each...
You want Windows 7 to send you a message when the firewall blocks a...
You are configuring a client running Windows 7 named Canberra to...
You want to use Performance Monitor to display performance data...
In which of the following scenarios must you perform a migration...
You have copied the system image Install.wim file from your Windows 7...
Which of the following reasons might explain why a helper is unable to...
Which of the following Advanced Sharing Settings options should you...
You are investigating instability and boot problems on a computer...
An employee who works from home telephones your help desk. A virus...
A user telephones your help desk. Her Favorites list is corrupt and...
You want to examine the contents of both the IPv4 and the IPv6 route...
You want users that are members of the local Administrators group to...
You have connected to a free Wi-Fi access point at the local library...
You are deciding on which storage devices you want to configure system...
A user without administrator privileges attaches a device to a...
You want ordinary users to install a device. The device driver has a...
You work as a consultant for a small business that has a Windows...
Developers at your organization have come up with a custom blogging...
You want to deploy a WIM image file captured from a reference computer...
Which of the following methods can you use to display the properties...
Which of the following Windows PowerShell commands can you issue on a...
You want to ensure that users are forcibly logged off from their...
You manage 30 separate clients running Windows 7 in an organization...
You have just discovered that an update rated as Important and...
Which of the following tools can you use to configure a group of...
You are in the process of phasing out older applications at your...
You are responsible for maintaining a computer running Windows 7...
You have recently installed Windows 7 Ultimate on a laptop computer,...
You want to create a firewall rule that allows inbound communications...
You are testing unsigned device drivers on a computer on an isolated...
You are having problems with a connection and want to run the Windows...
Which of the following permissions are also set when you apply the...
Your computer running Windows 7 Enterprise has two internal hard...
The contents of the directory C:\Source are encrypted using EFS. The...
You have two computers running Windows 7 Ultimate at one of your...
You want to configure a set of AppLocker rules to block the execution...
You are responsible for managing a student lab that has 30 stand-alone...
Which of the following tools can you use to determine which shared...
Sam Abolrous has a user account on a client running Windows 7. This...
Your organization’s Routing and Remote Access server has Windows...
You want to block users from writing data to removable drives if those...
Which of the following types of information are stored in Reliability...
Which of the following authentication protocols can you use to connect...
Which of the following tools can users use to back up EFS certificates...
Kim Akers has an administrator account on a computer running Windows 7...
Which of the following policies must you configure when setting up a...