- Windows 7, Enterprise Desktop Administrator

Size: px
Start display at page:

Download "- Windows 7, Enterprise Desktop Administrator"

Transcription

1 - Windows 7, Enterprise Desktop Administrator Number: Passing Score: 700 Time Limit: 120 min File Version: Sections Planning and Managing a Client Life Cycle Strategy Designing a Standard Image Designing Client Configurations Designing a Windows 7 Client Deployment Designing Application Packages for Deployment Identifying and Resolving Deployment and Client Configuration Issues

2 Mixed Questions QUESTION 1 You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do? A. Use Windows Server Update Services (WSUS). B. Use Internet Explorer Administration Kit (IEAK) and Group Policy. C. Use Microsoft System Center Configuration Manager. D. Use Microsoft System Center Essentials. Correct Answer: A Section: 5. Designing Application Packages for Deployment /Reference: Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update. GB 001 QUESTION 2 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use? A. Microsoft Application Virtualization (App-V) B. Microsoft System Center Configuration Manager 2007 C. RemoteApp and Desktop Connections D. Software installation in Group Policy Correct Answer: C Section: 5. Designing Application Packages for Deployment

3 /Reference: The RemoteApp and Desktop Connections feature offers several benefits: RemoteApp programs launch from the Start menu just like any other application. Published Remote Desktop connections are included alongside RemoteApp programs on the Start menu. Changes to the published connection (such as newly published RemoteApp programs) are user's Start menu, without any effort on the user's part. RemoteApp programs can be easily launched with Windows Search. Users only have to log on once, to create the connection. From that point on, updates happen with no prompt for user credentials. RemoteApp and Desktop Connections does not require domain membership for client computers. RemoteApp and Desktop Connections benefits from new features in Windows Server 2008 R2, such as Personal Desktop assignment or per-user application filtering. RemoteApp and Desktop Connections is built on standard technologies such as XML and HTTPS, making it possible for developers to build solutions around it. It also offers APIs that allow the client software to support other types of resources, in addition to RemoteApp programs and Remote Desktop connections. GB 002 QUESTION 3 Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP. 900 of the computers are on the local area network. 100 computers are portable computers that connect to the main office only once every few months. You are planning to deploy Windows 7. You need to generate a report of the software that is installed on all client computers. You need this information as soon as possible. What should you use? A. Microsoft System Center Data Protection Manager B. Microsoft Desktop Optimization Pack C. Microsoft System Center Essentials D. Microsoft System Center Operations Manager Correct Answer: B Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 003 QUESTION 4 Your network has client computers that run Windows Vista. You are planning to deploy Windows 7. You need to detect and analyze the compatibility of an application that requires elevated privileges. What should you do? A. Use the Standard User Analyzer (SUA) Wizard. B. Run a virtual version of the Setup Analysis Tool (SAT). C. Use the Standard User Analyzer (SUA) tool. D. Run a stand-alone version of the Setup Analysis Tool (SAT). Correct Answer: C Section: 1. Planning and Managing a Client Life Cycle Strategy

4 /Reference: The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. GB 004 QUESTION 5 Your company's network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU). The company wants to deploy a new application. The application is not packaged. You have the following requirements: Deploy the application to all computers in the shipping department. Perform the deployment from a central location. You need to plan the software deployment process to meet the requirements. Which two actions should you include in the process? (Each correct answer presents part of the solution. Choose two.) A. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department computers, and assign the package to the collection. B. Create a package by using Microsoft System Center Configuration Manager. C. Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container. D. In the Group Policy Management Console, link the software installation policy to the Shipping Computers OU. E. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department users, and assign the package to the collection. Correct Answer: AB Section: 5. Designing Application Packages for Deployment /Reference: GB 005 QUESTION 6 Your network has client computers that run Windows XP. All users access a custom line-of- business application. The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7. You have the following requirements: The application must run on all client computers. The application executable must reside on each client computer. You need to manage application compatibility to meet the requirements. What should you do?

5 A. Install the application on a Remote Desktop Services server. B. Install a shim for the application on each client computer. C. Virtualize the application by using Microsoft Application Virtualization (App-V). D. Install the Windows Compatibility Evaluator on each client computer. Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 006 QUESTION 7 Your company has 1,000 client computers that run Windows XP Professional x64. You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64. You have the following requirements: Provide all users with access to the application. Deploy and manage the application by using a centralized solution. You need to design a solution that meets the requirements. What should you do? A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab. B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode. C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer. D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V. Correct Answer: C Section: 5. Designing Application Packages for Deployment /Reference: GB 007 QUESTION 8 Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7. You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. Which tool should you use?

6 A. Windows Compatibility Evaluator B. Setup Analysis Tool C. Inventory Collector D. Update Compatibility Evaluator Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: The Setup Analysis Tool (SAT) automates the running of application installations while monitoring application's installer. The standalone version of SAT can monitor any the actions taken by each MSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-based installers and third-party installers that run unattended. GB 008 QUESTION 9 Your company's network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU). The network design is shown in the exhibit. (Click the Exhibit button.) You are planning to deploy an application. The application is packaged as a Microsoft Windows Installer package (MSI). You need to deploy the application only to computers in the shipping department. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Exhibit:

7 A. Link the software installation policy to the Workstations OU. B. Link the software installation policy to the Shipping Computers OU. C. Create a new Group Policy object (GPO) and add a software installation policy under the User Configuration container. D. Create a new Group Policy object (GPO) and add a software installation policy under the Computer Configuration container. Correct Answer: BD Section: 5. Designing Application Packages for Deployment /Reference: To specify how and when computers are updated through Group Policy In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update. In the details pane of Group Policy Object Editor, configure the appropriate policies. See the following table for examples of the policies you might want to set. GB 009 QUESTION 10 Your company's network has client computers that run Windows 7. When a user attempts to log on to the domain from a computer named Client1, she receives the following message: "The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect." You need to ensure that the user can log on to the domain from Client1. What should you do? A. Remove Client1 from the domain and rejoin Client1 to the domain. B. Reset the account password for Client1 through Active Directory Users and Computers. C. Add the computer account for Client1 to the Domain Computers Active Directory group. D. Reset the account password for the user through Active Directory Users and Computers. Correct Answer: A Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 010 QUESTION 11 Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains. Users in both domains can log on to client computers in only their own domains. System logs on the domain controllers display the error message: "Clock skew too great." when users in Domain1 attempt to log on to client computers in Domain2.

8 You need to ensure that users can log on to client computers in both domains. What should you do? A. Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object ( GPO ). B. Configure the primary domain controller (PDC) emulator in each domain to synchronize its clock with the same external time source. C. Run a startup script that includes Net Time /setsntp on all client computers. D. Run a startup script that includes Net Time /querysntp on all client computers. Correct Answer: B Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 011 QUESTION 12 Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in the exhibit. (Click the Exhibit button.) Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO. A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that are in the Kiosk Computers OU. You need to ensure that the user configuration settings are correctly applied. What should you do? Exhibit: A. Enable loopback processing in Merge mode on the Default Domain Policy GPO. B. Disable the user configuration settings on the Default Domain Policy GPO.

9 C. Enable loopback processing in Replace mode on the Kiosk Computers GPO. D. Disable the user configuration settings on the New York Users GPO. Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 012 QUESTION 13 You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom application. You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the custom application. You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive the new GPO. What should you do? A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Allow-Apply Group Policy permission for the GPO. B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the OU. C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Deny-Apply Group Policy permission for the GPO. D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain. Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 013 QUESTION 14 You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. The company wants to maintain a standard Internet Explorer configuration on all client computers. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. What should you do? A. Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box. B. Use the Group Policy Update utility to refresh Group Policy. C. Enable Internet Explorer Maintenance Policy Processing in Group Policy. D. Enable User Group Policy loopback processing mode. Correct Answer: C Section: 3. Designing Client Configurations

10 /Reference: Internet Explorer Maintenance policy processing This policy affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer Maintenance. It overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed. If you enable this policy, you can use the check boxes provided to change the options. Allow processing across a slow network connection updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. Do not apply during periodic background processing prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data. Process even if the Group Policy objects have not changed updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. GB 014 QUESTION 15 Your company's network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication ProtocolCTransport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do? A. Install a certificate in the Trusted Root Certification Authorities certificate store. B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport Layer Security (PEAP-TLS). C. Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2). D. Install a certificate in the Third-Party Root Certification Authorities certificate store. Correct Answer: A Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 015 QUESTION 16 Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers. The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security. What should you do?

11 A. Create an Isolation rule and specify Request authentication for inbound and outbound connections. B. Create a Tunnel rule and specify Gateway-to-client as the tunnel type. C. Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address. D. Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list. Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 016 QUESTION 17 You deploy Windows 7 to the computers that are used by your company's Web developers. All Web developer user accounts are in a single organizational unit (OU). Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers. You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications. What should you do? A. Enable Compatibility View in Internet Explorer. B. Add each server to the Intranet zone. C. Add each server to the Trusted Sites zone. D. Set the default security setting in Internet Explorer to Medium. Correct Answer: B Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: Pop-up Blocker features Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside the viewable desktop area. For more information, see "Windows Restrictions" in this document. When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual manner. Note that sites in the Trusted Sites and Local Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet Options. hints: internal web, so I choose intranet zones. Local Intranet Zone By default, the Local Intranet zone contains all network connections that were established by using a Universal Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the Local intranet zone. Trusted Sites Zone This zone contains Web sites that you trust as safe (such as Web sites that are on your organization's intranet

12 or that come from established companies in whom you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low. GB 017 QUESTION 18 Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available in the Group Policy editing session. You need to ensure that the ADMX files are available to the GPO Editor. What should you do? A. Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restart the GPO Editor. B. Set the network share permissions to grant all Windows 7 users Read access for the share. C. Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and then restart the GPO Editor. D. Copy the ADMX files to the central store, and then restart the GPO Editor. Correct Answer: D Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: To take advantage of the benefits of.admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any.admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. GB 018 QUESTION 19 Drag and Drop (Build List and Reorder) You are planning to deploy Windows 7 Enterprise to all of your company's client computers. You have the following requirements: Create two custom partitions on each client computer's hard disk, one for the operating system and the other for data. Automatically create the partitions during Windows Setup. You need to design an image that meets the requirements. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

13 Correct Answer: Section: 2. Designing a Standard Image /Reference: GB 019 QUESTION 20 Drag and Drop (Build List and Reorder) All client computers in an organization run Windows 7 and are joined to an Active Directory Domain Services (AD DS) domain. All user objects are stored in an Organizational Unit (OU) named Contoso Users. All computer objects are stored in an OU named Contoso Computers. You need to add a proxy server to the Microsoft Internet Explorer 9 configuration on all client computers by using the least administrative effort. Which three actions should you perform? (To answer, move the appropriate action from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

14 Correct Answer: Section: 3. Designing Client Configurations /Reference: GB 020 QUESTION 21 Drag and Drop (Select and Place) You are designing an application deployment strategy. Application deployments must meet the following requirements: They must be able to use Setup.exe. They must not require Active Directory. They must not require a constant network connection. The application installation schedule must be easy to set up and implement. You need to recommend a method that meets the requirements. What should you recommend? (To answer, drag the appropriate deployment method from the list of deployment methods to the correct location or locations in the answer area.) Select and Place:

15 Correct Answer:

16 Section: 5. Designing Application Packages for Deployment /Reference: GB 021 QUESTION 22 When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message: "The connection was denied because the user account is not authorized for remote login." You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC. To which group should you add the user? A. Add the user to the Power Users group on Server1. B. Add the user to the Remote Desktop Users group on Server1. C. Add the user to the domain Windows Authorization Access group. D. Add the user to the domain Remote Desktop Users group

17 Correct Answer: B Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 022 QUESTION 23 A company has an Active Directory Domain Services (AD DS) forest with a single domain. Domain controllers are located in the company's offices in New York and Boston. You deploy a group policy at the domain level that includes security filtering. You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office. You suspect there might be replication problems with the policies. What should you do? A. Run a Group Policy Results report against computers in the Boston office. B. Run a Group Policy Modeling report against computers in the Boston office. C. Use the GpoTool.exe command-line tool. D. Use the RepAdmin.exe command-line tool. Correct Answer: D Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 023 QUESTION 24 Your company's network has client computers that run Windows 7. A software vendor releases version 2 of an application that your company uses. Your company currently uses version 1. Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application. You have the following requirements: Users must be able to run both versions of the application on their computers. Version 2 must be available when a client computer is not connected to the network. You need to plan a software deployment process that meets the requirements. What should you do? (Choose all that apply.) A. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B. Deploy version 2 of the application by using Microsoft Enterprise Desktop (MED-V). C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp. D. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package. Correct Answer: AB

18 Section: 5. Designing Application Packages for Deployment /Reference: Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real- time to any client from a virtual application server. It removes the need for local installation of the applications. Instead, only the App-v client needs to be installed on the client machines. All application data is permanently stored on the virtual application server. Whichever software is needed is either streamed or locally cached from the application server on demand and run locally. The App-V stack sandboxes the execution environment so that the application does not make changes to the client itself (OS File System and/or Registry). App-V applications are also sandboxed from each other, so that different versions of the same application can be run under App-V concurrently. GB 024 QUESTION 25 A company uses Microsoft Deployment Toolkit (MDT) 2010 to deploy Windows 7 Enterprise and Microsoft Office The company is replacing existing computers with new 64-bit computers. You have the following requirements: You need to include Office 2010 with the deployment. You need to automate the deployment where possible. Some employees have accessibility requirements that require specialized hardware. The hardware must continue to be used after the deployment. The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from the manufacturer. You need to create an image that meets these requirements. What should you do? (Choose all that apply.) A. Import the Windows 7 Enterprise x86 source files. B. From the MDT deployment workbench, select the Custom Task Sequence template. C. Use a reference computer and capture a WIM image. D. From the MDT deployment workbench, select the Sysprep and Capture template. E. Import the necessary OEM drivers. F. Import the 32-bit version of Office G. Import the 64-bit version of Office H. Import the Windows 7 Enterprise x64 source files. Correct Answer: ABEF Section: 2. Designing a Standard Image /Reference: GB 025 QUESTION 26 Your company's network includes a main office and several branch offices. The branch offices are connected to the main office by high-latency links.

19 All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. Servers are located in each of the branch offices. Client computers in the branch offices frequently access a specific group of files on a file server named Server1. These access requests consume significant amounts of bandwidth and reduce the speed of higherpriority traffic. You need to reduce the bandwidth that is consumed by requests for frequently accessed files. What should you do? A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices. B. Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices. C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on a server computer in only the branch offices. D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache mode on a server computer in only the branch offices. Correct Answer: C Section: 3. Designing Client Configurations /Reference: BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be hosted on a server in the branch (Hosted Cache mode). Distributed Cache mode If client computers are configured to use Distributed Cache mode, the cached content is distributed among client computers on the branch office network. No infrastructure or services are required in the branch office beyond client computers running Windows 7. Hosted Cache mode In hosted cache mode, cached content is maintained on a computer running Windows Server 2008 R2 on the branch office network. GB 026 QUESTION 27 A Windows Server 2008 R2 server named Server1 has the Windows Deployment Services (WDS) role installed. Server2 is running DHCP services. You prestage computer objects in Active Directory. You plan to use WDS to deploy Windows 7 to the prestaged computers. When you try to deploy an image by using PXE, the process fails. You need to ensure that Server1 responds to prestaged client computers only. From WDS, what should you do? (Choose all that apply.) A. On the DHCP tab, select Configure DHCP option 60 to indicate that this server is also a PXE server.

20 B. On the Advanced tab, select Authorize this Windows Deployment Services server in DHCP. C. On the PXE Response tab, select Respond to all client computers (known and unknown). D. On the DHCP tab, select Do not listen on Port 67. E. On the PXE Response tab, select Respond only to known client computers. F. On the Advanced tab, select Do not authorize this Windows Deployment Services server in DHCP. Correct Answer: BE Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 027 QUESTION 28 HotSpot (Hot Area) You are preparing to install a 32-bit legacy application on all client computers in an organization. The application requires specific compatibility settings in order to function in Windows 7. You run the 32-bit version of Compatibility Administrator and create a new application fix. You need to create a shim database that includes a compatibility fix for applications that have known issues with the Desktop Window Manager. Which compatibility modes should you select? (To answer, select the appropriate setting in the work area.) Hot Area:

21 Correct Answer:

22 Section: 5. Designing Application Packages for Deployment /Reference: GB 028 QUESTION 29 Your company has a custom Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) and uses auto enrollment. When external users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?

23 A. Install the current certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer. B. Install the current certificate into the computer store on each client computer. C. Purchase and install a commercial certificate on the CA server. Ensure that users trust the issuing CA. D. Issue a root certificate from the internal CA on the external users' computers. Correct Answer: C Section: 3. Designing Client Configurations /Reference: GB 029 QUESTION 30 Your company's network is shown in the exhibit. (Click the Exhibit button.) There is a VPN between Branch Office B and the Core Network. The company plans to deploy Windows 7 to all client computers. You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows. What should you do? (Each correct answer presents part of the solution. Choose all that apply.) Exhibit: A. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network. B. Deploy the Key Management Service (KMS) in branch office B.

24 C. Deploy the Key Management Service (KMS) in branch office A. D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network. Correct Answer: AB Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 030 QUESTION 31 Drag and Drop (Select & Place) Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. You deploy a new Group Policy object (GPO) named California Computers GPO as part of the organizational unit (OU) and GPO design shown in the exhibit. (Click the Exhibit button.) The California Computers GPO contains computer configuration settings and user configuration settings. User configuration settings are not being applied to users who log on to client computers in the California Computers OU. Which GPO setting should you select?? (To answer, drag the appropriate setting from the list of settings to the correct location or locations in the answer area.) Exhibit: Select and Place:

25 Correct Answer: Section: 3. Designing Client Configurations /Reference: GB 031 QUESTION 32 You are deploying an App-V client application to the New York office. You need to ensure that the application will be installed at a specific time.

26 What should you use to deploy the application? A. ConfigMgr B. a Group Policy object (GPO) with a software installation policy. C. MED-V D. Microsoft Deployment Toolkit Correct Answer: A Section: 5. Designing Application Packages for Deployment /Reference: GB 032 QUESTION 33 Your company has client computers that run Windows 7 Enterprise. Each computer in the company is required to boot into a different Windows 7 application environment without compromising the main Windows 7 Enterprise installation. You need to create a new Native Boot VHD that will host the alternate Windows 7 environments. Which command should you use? A. BCDEdit.exe B. Bootcfg.exe C. DiskPart.exe D. BCDboot.exe Correct Answer: C Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: Walkthrough: Deploy a Virtual Hard Disk for Native Boot GB 033 QUESTION 34 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.) A. Create a collection with the required computers and assign the software to the collection. B. Create a software installation Group Policy object (GPO). C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain. D. Create a software deployment package by using System Center Configuration Manager E. Create an unattend.xml file. F. Create a silent install MSI file. Correct Answer: ADF

27 Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 034 QUESTION 35 A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network. You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. You need to plan the most efficient method for activating all of the computers. What should you do? A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers. B. Use the Key Management Service (KMS) for all the computers. C. Use Multiple Activation Key (MAK) Independent for all the computers. D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers. Correct Answer: A Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: MAK If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internet one time. If the users install a MAK using the Slmgr.vbs script, the MAK client does not try to activate itself automatically. GB 035 QUESTION 36 Your company's network is shown in the exhibit. (Click the Exhibit button.) Each office is connected to the Internet through a high-bandwidth connection. The branch offices are connected to the core network through low-bandwidth connections. Microsoft Windows Server Update Services (WSUS) must provide software updates for all offices. You need to design the WSUS infrastructure to minimize traffic over the low-bandwidth connections. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Exhibit:

28 A. Deploy BranchCache on the WSUS server and client computers. B. Configure WSUS to use updates that are stored locally. C. Configure WSUS to use updates that are stored on Microsoft Update. D. Deploy Quality of Service (QoS) on the WSUS server and client computers. E. Deploy WSUS servers in the branch offices. Correct Answer: CE Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 036 QUESTION 37 Your network is configured as shown in the exhibit. (Click the Exhibit button.) You are planning to deploy Windows 7. You have the following requirements: Use BitLocker on all computers in the isolated network. Provide DirectAccess on all portable computers. Use the Key Management Service (KMS) to activate all client computers. You need to plan a client computer licensing strategy that meets the requirements. What should you do? Exhibit:

29 A. License 500 copies of Windows 7 Ultimate. B. License 500 copies of Windows 7 Enterprise. C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses. D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate. Correct Answer: B Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 037 QUESTION 38 Your company has 1,000 client computers that run Windows 7. The company uses several custom line-ofbusiness applications that are not compatible with Windows 7. You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) image that includes the custom applications to all Windows 7 client computers. What should you do? A. Mount the VM image from the MED-V workspace. B. Deploy the VM image from the MED-V server. C. Deploy the VM image by using Windows Deployment Services (WDS). D. Deploy the VM image by using Windows Server Update Services (WSUS). Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 038 QUESTION 39 Your company plans to upgrade all client computers to Windows 7. The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7 You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application. You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the

30 user is connected to the MED-V server. What should you do? A. Using MED-V TrimTransfer technology, deploy the VM image over the network B. In the MED-V console, configure the MED-V workspace to prevent offline operation C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 039 QUESTION 40 The client computers in your network run either Windows XP or Windows 7. All client computers are in a single Active Directory Domain Services (AD DS) organizational unit (OU) named MyClients. You install Windows Software Update Services (WSUS). You create a Group Policy object (GPO) that enables automatic updates from the WSUS server, and you link the GPO to the MyClients OU. You place all client computers in a targeting group named MyClients. Testing reveals that a security update that is applicable to both Windows XP and Windows 7 causes a line-ofbusiness application to fail on the Windows XP client computers. You need to ensure that the application runs on the Windows XP client computers and that the Windows 7 client computers receive the security update. What should you do? A. Remove the Windows XP client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group. B. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group. C. Create a targeting group named MyXPClients beneath the MyClients targeting group. Move the Windows XP client computers to the MyXpClients targeting group. Approve the update for installation to the MyClients targeting group. D. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the Unassigned Computers targeting group. Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 040 QUESTION 41 Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates and service packs. Microsoft releases a security update for Windows 7. You have the following requirements: The security update must be deployed by 5:00 P.M. on Friday. Computers that are off when the security update is deployed must install the security update as soon as

31 they are turned on. You need to manage the software update process to meet the requirements. What should you do? A. Approve the security update for installation through the WSUS console with no deadline. B. Approve the security update for download through the WSUS console with a deadline of Friday at 5:00 P.M.. C. Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00 P.M.. D. Approve the security update for download through the WSUS console with no deadline. Correct Answer: C Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 041 QUESTION 42 Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active Directory integrated DNS. You deploy the Key Management Service (KMS) on a Windows 7 computer. You need to ensure that Windows 7 client computers can locate the KMS host and perform activation. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers. B. Deploy a Windows Server 2008 KMS host. C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record. D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone. Correct Answer: AC Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7 days. Listening on Port Communication with KMS is via anonymous RPC is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host. GB 042 QUESTION 43 Your network contains 5 servers that have the Remote Desktop Session Host role service installed. The servers host a Remote Desktop RemoteApp named App1. You need to recommend a solution for App1 that meets the following requirements: Must ensure that users can connect to any Remote Desktop Session Host server.

32 Must ensure that users are automatically reconnected to disconnected sessions. What should you include in the recommendations? A. Windows Virtual PC and Windows XP Mode B. Remote Desktop Web Access C. Remote Desktop Gateway D. Windows Deployment Services E. Remote Desktop Connection Broker Correct Answer: E Section: 5. Designing Application Packages for Deployment /Reference: Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. GB 043 QUESTION 44 Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments. These network segments are shown in the exhibit. (Click the Exhibit button.) Your company plans to deploy Windows 7 to all client computers. You need to manage activation for client computers that are located in the high-security network segment. What should you do? Exhibit: A. Deploy the Key Management Service (KMS) in the core network segment. B. Deploy the Key Management Service (KMS) in the high-security network segment.

33 C. Install the Volume Activation Management Tool (VAMT) in the core network segment. D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment. Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself. There is a firewall blocking, (VAMT) should setup at high-security network. GB 044 QUESTION 45 Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You need to ensure that the user state can be viewed after it has been collected and saved. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Perform an offline migration by using Windows PE. B. Use an uncompressed migration store. C. Perform an offline migration by using Windows.old. D. Use a hard-link migration store. Correct Answer: BD Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 045 QUESTION 46 You plan to deploy Windows 7 to client computers. You have the following requirements: Deploy Windows 7 over the network. Do not affect the performance of existing network applications. You need to design a zero-touch deployment strategy that supports the requirements. What should you do? A. Deploy images from a Microsoft System Center Configuration Manager server that runs Windows Server B. Deploy images from a dedicated share on a Windows Server 2008 server. C. Ensure that all computers have the Internet Protocol version 6 (IPv6) protocol disabled prior to deployment. D. Ensure that all computers have the Internet Protocol version 4 (IPv4) protocol disabled prior to deployment. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment

34 /Reference: GB 046 QUESTION 47 Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. What should you do? A. Create a multicast transmission for the Windows 7 image. B. Use an Auto-Add policy on the WDS server. C. Create a unicast transmission for the Windows 7 image. D. Use DHCP rogue detection on the WDS server. Correct Answer: B Section: 4. Designing a Windows 7 Client Deployment /Reference:

35 GB 047 QUESTION 48 Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7. You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image. You have the following requirements: Migrate 20 computers at a time. Ensure that you conserve network bandwidth. You need to design a deployment strategy that meets the requirements. What should you do?

36 A. Configure multicast transmission on the deployment point. B. Configure unicast transmission on the deployment point. C. Distribute the image by using Background Intelligent Transfer Service (BITS). D. Compress the contents of the distribution folder. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: Performing Multicast Deployments In order to deploy an image using multicasting instead of unicasting, you must first create a multicast transmission. Multicast transmissions make the image available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used. GB 048 QUESTION 49 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 by using a zero-touch installation process. You need to test the deployment methodology. What should you do first? A. Create a computer collection with test computers as members. B. Create a security group with test computers as members. C. Create an organizational unit and move test computer accounts into it. D. Create a distribution group with test computers as members. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 049 QUESTION 50 You are planning a Windows 7 deployment infrastructure. You have the following requirements: Enable network deployments of WIM images or VHDs. Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally, and use dynamic driver provisioning. You need to design an infrastructure that meets the requirements. Which deployment method should you recommend? A. Microsoft Deployment Toolkit (MDT) 2010 B. Microsoft Deployment Toolkit (MDT) 2008

37 C. Windows Deployment Services in Windows Server 2008 R2 D. Deployment Image Servicing and Management (DISM) Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 050 QUESTION 51 Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements: Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend? A. Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers. B. Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers. C. Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers. D. Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 051 QUESTION 52 You are planning a zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network. Each client computer has three available boot methods: Boot from the network by using PXE Boot from USB media Boot from the local hard disk You have the following requirements: Set the boot method for a zero-touch deployment. Ensure that client computers that fail on deployment can be manually configured.

38 You need to design a zero-touch deployment strategy that supports the requirements. What should you do? A. Remove USB media and local hard disk from the available boot methods. B. Remove USB media and network from the available boot methods. C. Set network as the first boot method, USB media as the second boot method, and local hard disk as the third boot method. D. Set USB media as the first boot method and local hard disk as the second boot method. Remove network from the available boot methods. Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 052 QUESTION 53 Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated. What should you do? A. Use the Refresh Computer method and a hard-link migration store. B. Use the Refresh Computer method and a compressed migration store. C. Use the Replace Computer method and a hard-link migration store. D. Use the Replace Computer method and a compressed migration store. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: A hard-link migration store enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario. Refresh Scenario Similar to a new installation, the refresh scenario performs a clean setup. The difference is that the target computer already contains Windows, for which files and settings will be preserved (installed applications are not taken into consideration). This scenario is especially useful in the event that preserving the user state is a priority. It still leverages the consistency benefits that come through a new installation. You can automate this scenario with the latest version of the User State Migration Tool (USMT 4.0), which will collect pertinent data for each user state found in the system, and restore it after the clean installation is performed. Replace Scenario This is similar to the refresh scenario, except the target system is a new computer that does not yet contain any files or settings. The scenario consists of conducting a new installation on the target computer, and then using the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario side-by-side with an older system running Windows XP or Windows Vista.

39 GB 053 QUESTION 54 Your company has 1,000 client computers that run Windows 7 Enterprise. You need to ensure that users cannot bypass or disable Internet Explorer logging. What should you do? A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state to Enabled. B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state to Enabled. C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state to Enabled. D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state to Enabled. Correct Answer: C Section: 3. Designing Client Configurations /Reference: InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, form data, cookies, and usernames and passwords from being retained by the browser, leaving no easily accessible evidence of browsing or search history. GB 054 QUESTION 55 All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do? A. Create inbound program rules. B. Create inbound port rules. C. Create Windows service hardening rules. D. Create connection security rules. Correct Answer: B Section: 3. Designing Client Configurations /Reference:

40 GB 055 QUESTION 56 All client computers in your network run Windows 7 Enterprise. You need to prevent all standard user accounts from running programs that are signed by a specific publisher. What should you do? A. Use AppLocker application control policies. Create an Executable rule. B. Use software restriction policies. Create a hash rule. C. Use AppLocker application control policies. Create a Windows Installer rule. D. Use software restriction policies. Create a path rule. Correct Answer: A Section: 3. Designing Client Configurations /Reference: The AppLocker Microsoft Management Console (MMC) snap-in is organized into four areas called rule collections. The four rule collections are executable files, scripts, Windows Installer files, and DLL files. These collections give the administrator an easy way to differentiate the rules for different types of applications. Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash. Publisher This condition identifies an application based on its digital signature and extended attributes. The digital signature contains information about the company that created the application (the publisher). The extended attributes, which are obtained from the binary resource, contain the name of the product that the application is part of and the version number of the application. The publisher may be a software development company, such as Microsoft, or the information technology department of your organization. PathThis condition identifies an application by its location in the file system of the computer or on the network. AppLocker uses path variables for directories in Windows. File hash When the file hash condition is chosen, the system computes a cryptographic hash of the identified file. GB 056 QUESTION 57 Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy. What should you do? A. Configure the User Account Control: Behavior of the elevation prompt for standard users setting to be Prompt for credentials.

41 B. Configure the User Account Control: Only elevate executables that are signed and validated setting to be Enabled. C. Configure the User Account Control: Detect application installations and prompt for elevation setting to be Disabled. D. Configure the User Account Control: Detect application installations and prompt for elevation setting to be Enabled. Correct Answer: C Section: 5. Designing Application Packages for Deployment /Reference: Maybe this question type is not Multiple Choice but HotSpot (Hot Area). Compare question D15. GB 057 QUESTION 58 Your network has 1,000 client computers that run Windows 7. You need to install an application, in the Local System account context, on the client computers. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Configure a logon script. B. Configure a startup script. C. Configure a shutdown script. D. Configure a logoff script. Correct Answer: BC Section: 5. Designing Application Packages for Deployment /Reference: GB 058 QUESTION 59 You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators? A. Local Group Policy Editor B. GPOAccelerator Tool C. Remote Server Administration Tools D. Administration Tools Pack Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: Group Polices were modified using the Group Policy Edit tool that was integrated with Active Directory Users

42 and Computers Microsoft Management Console (MMC) snap-in, but it was later split into a separate MMC snap-in called the Group Policy Management Console (GPMC). The GPMC is now a user component in Windows Server 2008 and Windows Server 2008 R2 and is provided as a download as part of the Remote Server Administration Tools for Windows Vista and Windows 7. GB 059 QUESTION 60 Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copy data from their computers to removable drives. You need to ensure that data that is copied to removable drives is protected. What should you do? A. Use Encrypting File System (EFS). B. Enable Trusted Platform Module (TPM) hardware on all client computers. C. Use Active Directory Rights Management Services. D. Configure a Group Policy to enforce the use of BitLocker To Go. Correct Answer: D Section: 3. Designing Client Configurations /Reference: BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restricted with a passphrase. In addition to having control over passphrase length and complexity, IT administrators can set a policy that requires users to apply BitLocker protection to removable drives before being able to write to them. 7/ features.aspx#bitlocker GB 060 QUESTION 61 Your network has a single domain with 1,000 client computers that run Windows 7. A large number of software installation scripts are configured to run on the client computers. You need to recommend a Group Policy setting to allow users to log on to their computers as soon as possible at first boot. What should you recommend? A. Configure the Run logon scripts synchronously setting to be Enabled. B. Configure the Run logon scripts synchronously setting to be Disabled. C. Configure the Run startup scripts asynchronously setting to be Enabled. D. Configure the Run startup scripts asynchronously setting to be Disabled. Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: Run logon scripts synchronously

43 directs the system to wait for logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop. If you enable this policy, Windows Explorer does not start until the logon scripts have finished running. This setting assures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop. If you disable this policy or do not configure it, the logon scripts and Windows Explorer are not synchronized and can run simultaneously. Run startup scripts asynchronously lets the system run startup scripts simultaneously. Startup scripts are batch files that run before the user is invited to log on. By default, the system waits for each startup script to complete before it runs the next startup script. If you enable this policy, the system does not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously. If you disable this policy or do not configure it, a startup script cannot run until the previous script is complete. GB 061 QUESTION 62 Your company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers run Windows 7 Enterprise. The kiosk computers do not have network connections. The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar. The company changes its logo. You have the following requirements: Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers. Modify the search providers that are available to main office computers. You need to define Internet Explorer settings to support the requirements. What should you do? A. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a deployment CD for the kiosk computers. B. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers. C. Save the logo as Logo.png and copy the file to the C:\Windows\Branding\ directory on each kiosk computer. Create and distribute a new OpenSearch description file for the main office computers. D. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive, and distribute the file to all computers. Correct Answer: A Section: 3. Designing Client Configurations /Reference: Maybe this question type is not Multiple Choice but Drag and Drop (Build List and Reorder). Compare question C02. GB 062 QUESTION 63 Your company has an Active Directory domain. You are planning the deployment of Windows 7 to client computers that are located in a main office and in satellite offices. All client computers use the same hardware. Your company's security policy has the following requirements:

44 All client computers in the main office must run Windows 7 Enterprise. All client computers in the satellite offices must use BitLocker. All client computers in the main office must apply a custom security template. The template must not apply to client computers in the satellite offices. You need to recommend an image-creation strategy that meets the requirements of the security policy. The solution must minimize administrative effort. What should you include in your recommendations? A. One image for all client computers and a Group Policy object. B. One image for the main office computers and one image for the satellite office computers. A Data Recovery Agent and a Security database (secedit.sdb) C. One image for the main office computers and one image for the satellite office computers. A Group Policy object D. One image for all client computers and a Data Recovery Agent. A Security database (secedit.sdb). Correct Answer: A Section: 5. Designing Application Packages for Deployment /Reference: GB 063 QUESTION 64 B15 You have an image that is used to deploy Windows 7 on client computers. You need to add drivers to the Windows 7 image. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use the Deployment Image Servicing and Management (DISM) tool offline. B. Use INF files for driver packages. C. Use executable files for driver packages. D. Use Windows Installer files for driver packages. E. Use the Deployment Image Servicing and Management (DISM) tool online. Correct Answer: AB Section: 2. Designing a Standard Image /Reference: GB 064 QUESTION 65 Your company is planning to deploy Windows 7. You have an image that is used to deploy Windows 7 on client computers. You need to add a volume image to the existing Windows image. What should you do? A. Service the image online.

45 B. Use ImageX to append the volume image. C. Use the Deployment Image Servicing and Management (DISM) tool to mount the image. D. Use DiskPart to attach a new volume. Correct Answer: B Section: 2. Designing a Standard Image /Reference: ImageX is a command-line tool that enables the creation of Windows image (.wim) files for deployment in a manufacturing or corporate IT environment. The /append option appends a volume image to an existing.wim file. It creates a single instance of the file, comparing it against the resources that already exist in the.wim file, so you do not capture the same file twice. GB 065 QUESTION 66 Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image. You have the following requirements: Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements. Provide language-pack support based on the geographic location of the user. You need to ensure that your image-creation strategy meets the requirements. What should you do? A. Create a single thin image for all computers. B. Create one thin image for the mobile computers. Create one thick image for all other computers. C. Create one thick image for the mobile computers. Create one thin image for all other computers. D. Create a single hybrid image for all computers. Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: Thick images contain core applications, language packs, and other files in addition to the operating system. When you create a disk image that contains core applications and language packs, you need only a single step to deploy the disk image and core applications to the target computer, with language support for all target locales. Also, thick images can be less costly to develop, because they frequently do not require advanced scripting technique. You can use MDT 2010 to build thick images with little or no scripting. If you use thick images, core applications and language packs are available on first start. A thin image carries a much lower cost to maintain and store. It contains few (if any) core applications or language packs. Applications and language packs are installed separately from the disk image. If you need to mitigate the network transfer time, you can use trickle-down technology such as Background Intelligent Transfer Service (BITS). Many software distribution infrastructures provide this facility. GB 066 QUESTION 67

46 Your network includes the client computer hardware configurations shown in the exhibit. (Click the Exhibit button.) You need to deploy Windows 7 by using the fewest images. How many images are needed? Exhibit: A. 2 B. 3 C. 4 D. 8 Correct Answer: A Section: 2. Designing a Standard Image /Reference: GB 067 QUESTION 68 Your company has 1,000 client computers. You are planning to deploy Windows 7 and a new line-of-business application. You have the following requirements: Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment. The application must be available for use on client computers that are not connected to the network. You need to ensure that the application is installed on all new client computers. What should you do? A. Deploy the application by using Windows Server Update Services (WSUS). B. Publish the application by using Group Policy Software Installation. C. Service an offline image of Windows 7 to add the new application. D. Service an online image of Windows 7 to add the new application. Correct Answer: D Section: 2. Designing a Standard Image /Reference: GB 068 QUESTION 69 You deploy Windows 7 Enterprise to 1,000 client computers by using an image file.

47 You need to define an image update strategy to incorporate software updates. What should you do? A. Install the deployment image on a client computer. Run the update package on the client computer, run Sysprep, and then recapture the image. B. Append a disk volume that contains the update to the deployment image. C. Mount the deployment image on a client computer that runs Windows 7. Run the update package on the client computer. D. Install the deployment image on a client computer. Run the update package on the client computer, run BCDedit, and then recapture the image. Correct Answer: A Section: 2. Designing a Standard Image /Reference: GB 069 QUESTION 70 You are designing a Windows 7 deployment image. You plan to partition the hard disk of each client computer during deployment. You need to modify the unattended answer file by using a text editor. Where should you add the disk information? A. To the Generalize configuration pass B. To the AuditSystem configuration pass C. To the WindowsPE configuration pass D. To the Specialize configuration pass Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: The Windows PE configuration pass also enables you to specify Windows Setup-related settings, including: Partition and format a hard disk. Select a specific Windows image to install, the path of that image, and any credentials required to access that image. Select a partition on the destination computer where you install Windows. Apply a product key and administrator password. Run specific commands during Windows Setup. GB 070 QUESTION 71 You are planning to deploy Windows 7 Enterprise and several custom applications. You create a custom Windows 7 Enterprise image. You need to validate that the custom applications will run after the deployment.

48 What should you do? A. Use ImageX with the check option to mount the image. B. Mount the custom image by using the Deployment Image Servicing and Management (DISM) tool. C. Deploy the custom image, and then run the sigverif.exe command. D. Deploy the custom image to a Virtual Hard Disk (VHD), and then boot from the VHD. Correct Answer: D Section: 2. Designing a Standard Image /Reference: GB 071 QUESTION 72 Your company has a main office and 5 branch offices. Each office contains 200 client computer. Each office has a direct connection to the Internet. The branch offices are connected to the main office through dedicated connections. You plan to deploy an update solution for all client computers by using Windows Server Update Services (WSUS). You need to recommend a WSUS deployment solution. The solution must minimize traffic over the dedicated connections. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Configure WSUS to download updates from an upstream server. B. Deploy BranchCache in distributed cache mode in each office. C. Deploy a WSUS server in each office. D. Configure WSUS to download updates from Microsoft Update. E. Deploy a WSUS server in the main office only. Correct Answer: CD Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 072 QUESTION 73 Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain, organizational unit (OU), and Group Policy object (GPO) design is shown in the exhibit. (Click the Exhibit button.) You deploy a Microsoft Windows Server Update Services (WSUS) server. You need to ensure that only client computers that are members of the NY Computers OU use the WSUS server for updates. Where should you define Windows Update settings? Exhibit:

49 A. In the User Configuration settings of the New York Computers GPO B. In the Computer Configuration settings of the New York Baseline GPO C. In the User Configuration settings of the New York Baseline GPO D. In the Computer Configuration settings of the New York Computers GPO Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 073 QUESTION 74 Your company's network is shown in the exhibit. (Click the Exhibit button.) All client computers are members of the contoso.com Active Directory Domain Services (AD DS) domain. Each network segment is represented by an AD DS site object that is named to match the network segment. Your company plans to deploy Windows 7 to all client computers. You need to manage the deployment to ensure that client computers in branch office C can activate Windows. What should you do? Exhibit:

50 A. Create a DNS service (SRV) resource record named _vlmcs._udp.branchofficec._sites.contoso.com. B. Deploy the Multiple Activation Key (MAK) in branch office C. C. Deploy the Key Management Service (KMS) in branch office C. D. Create a DNS service (SRV) resource record named _vlmcs._tcp.branchofficec._sites.contoso.com. Correct Answer: B Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 074 QUESTION 75 Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates. Microsoft releases a security update for Windows 7. You have the following requirements: Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. Use the least amount of administrative effort. You need to manage the software update process to meet the requirements. What should you do? A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation,

51 and force a detection cycle on the client computers. B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers. C. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers. D. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA to use the Microsoft Update site catalog. Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. GB 075 QUESTION 76 Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you do? A. Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD). B. Use Bcdedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu. C. Use Bootcfg to modify the boot parameters. D. Use Bcdboot to modify the system partition. Correct Answer: B Section: 2. Designing a Standard Image /Reference: Bcdedit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder. GB 076 QUESTION 77 Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain. You are planning to deploy Windows 7. You need to create a report that shows hardware and device compatibility on all client computers. You need to perform this action without installing any additional software on the client computers. Which tool should you use?

52 A. System Center Configuration Manager (SCCM) B. System Center Capacity Planner (SCCP) C. Windows Performance Monitor Data Collector Sets D. Microsoft Assessment and Planning Toolkit (MAP) Correct Answer: D Section: 2. Designing a Standard Image /Reference: Microsoft Assessment and Planning Toolkit performs a detailed analysis of hardware and device compatibility for migration to Windows 7, Windows Server 2008 R2, SQL Server 2008 R2, Microsoft Office 2010, and Office 365. The hardware assessment looks at the installed hardware and determines if migration is recommended. If it is not recommended, then reports provide information about why it is not. GB 077 QUESTION 78 You are designing a Windows 7 virtual desktop infrastructure. You have the following requirements: Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers. Support network load balancing. Support reconnection to existing sessions on virtual desktops. You need to specify a design that meets the requirements. What should you include in your design? A. Remote Desktop Gateway B. Windows Deployment Services C. Remote Desktop Connection Broker D. Windows Virtual PC and Windows XP Mode Correct Answer: C Section: 5. Designing Application Packages for Deployment /Reference: Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. GB 078 QUESTION 79 Your company plans to deploy Windows 7 Enterprise. The current client computers run either Windows XP Professional or Windows Vista Enterprise.

53 The company uses 20 custom applications that were written for Windows XP. You need to create a log of compatibility issues for the custom applications. What should you do? A. Install each application on a Windows XP client computer, and then run the Application Compatibility Toolkit (ACT). B. Install each application on a Windows 7 client computer, and then run the Application Compatibility Toolkit (ACT). C. Install each application on a Windows XP client computer. Sequence each application by using Microsoft Application Virtualization (App-V). D. Install each application on a Windows Vista client computer. Sequence each application by using Microsoft Application Virtualization (App-V). Correct Answer: A Section: 5. Designing Application Packages for Deployment /Reference: GB 079 QUESTION 80 You are planning to deploy Windows 7. You have a custom line-of-business application that is not compatible with Windows 7. You need to design a solution that allows the application to run. What should you do? A. Use the Windows Compatibility Evaluator. B. Use the Setup Analysis Tool. C. Use the Compatibility Administrator. D. Use the Update Compatibility Evaluator. Correct Answer: C Section: 5. Designing Application Packages for Deployment /Reference: The Compatibility Administrator tool can help you to resolve many of your compatibility issues by enabling the creation and the installation of application mitigation packages (shims), which can include individual compatibility fixes, compatibility modes, and AppHelp messages. GB 080 QUESTION 81 Your company is planning to deploy Windows 7 to all client computers. You have the following requirements: Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use. You need to select the appropriate method to detect application compatibility issues.

54 What should you do? A. Use the Setup Analysis Tool in a virtual environment. B. Use the standalone Setup Analysis Tool. C. Use the Standard User Analyzer Wizard. D. Use the Standard User Analyzer tool. Correct Answer: D Section: 5. Designing Application Packages for Deployment /Reference: The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. GB 081 QUESTION 82 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. Which deployment method should you choose? A. Lite Touch Installation B. Software deployment with Microsoft System Center Configuration Manager 2007 C. Software installation with Group Policy D. Microsoft Application Virtualization (App-V) Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 082 QUESTION 83 Your network has 1,000 client computers that run Windows 7. You plan to deploy a new application. You need to ensure that the application deploys only during non-business hours. What should you do? A. Use Group Policy. B. Use Microsoft System Center Configuration Manager. C. Use Windows Deployment Services with a schedule cast. D. Use a logon script. Correct Answer: B

55 Section: 5. Designing Application Packages for Deployment /Reference: GB 083 QUESTION 84 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design? A. Software installation in Group Policy B. Microsoft Application Virtualization (App-V) C. Baseline Windows 7 image that includes the custom application D. Startup scripts in Group Policy Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: MS App-V thus allows centralized installation and management of deployed applications. It supports policy based access control; administrators can define and restrict access to the applications by certain users by defining policies governing the usage. App-V can require that applications not be run 'cached' from workstations, or require that 'cached' App-V applications routinely update license information from the App-V server, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and fault tolerance, and also features a tracking interface to track the usage of the virtualized application. GB 084 QUESTION 85 Your company's network has client computers that run Windows 7. A software vendor releases version 2 of an application that your company uses. Your company currently uses version 1. Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application. You have the following requirements: Users must be able to run both versions of the application on their computers. Version 2 must be available when a client computer is not connected to the network. You need to plan a software deployment process that meets the requirements. What should you do?

56 A. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package. B. Deploy version 2 of the application by using a Group Policy Software Installation policy. C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp. D. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). Correct Answer: D Section: 5. Designing Application Packages for Deployment /Reference: Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real- time to any client from a virtual application server. It removes the need for local installation of the applications. Instead, only the App-v client needs to be installed on the client machines. All application data is permanently stored on the virtual application server. Whichever software is needed is either streamed or locally cached from the application server on demand and run locally. The App-V stack sandboxes the execution environment so that the application does not make changes to the client itself (OS File System and/or Registry). App-V applications are also sandboxed from each other, so that different versions of the same application can be run under App-V concurrently. GB 085 QUESTION 86 Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows 7. You need to ensure that all users are able to run the custom application. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Install and register a shim on the WSUS server. B. Install and register a shim on the client computers by using Group Policy. C. Deploy and register the compatibility-fix database file to the client computers by using a computer startup script. D. Deploy and register the compatibility-fix database file to the client computers by using a user startup script. Correct Answer: BC Section: 5. Designing Application Packages for Deployment /Reference: GB 086 QUESTION 87 Your company's client computers run Windows 7. Your company's network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP. You need to display information about client connectivity to the WAP. What should you do?

57 A. Use Event Viewer to view events from a source of WlanConn. B. Use auditpol.exe to enable successful attempts in the Object Access category. C. Use Event Viewer to view events from a source of WLAN AutoConfig. D. Use auditpol.exe to enable failed attempts in the Object Access category. Correct Answer: C Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 087 QUESTION 88 Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the domain and Group Policy object (GPO) is shown in the exhibit. (Click the Exhibit button.) You configure Group Policy preferences to define mapped drives in the Boston staff GPO. Users in the Boston organizational unit (OU) then report that the mapped drives are not available. You need to identify and resolve Group Policy issues to ensure that the mapped drives are available. What should you do? Exhibit: A. Enable loopback processing in Replace mode. B. Enable loopback processing in Merge mode. C. Enable the computer configuration settings. D. Enable the user configuration settings.

58 Correct Answer: D Section: 3. Designing Client Configurations /Reference: GB 088 QUESTION 89 You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application. You need to find out whether an add-on is the cause of the problem. What should you do? A. Use Group Policy to disable the Programs tab in Internet Explorer for all client computers. B. Use Group Policy to turn on Internet Explorer 7 Standards mode. C. Start Internet Explorer in No Add-ons mode. D. Reset all Internet Explorer security zones to the default levels. Correct Answer: C Section: 3. Designing Client Configurations /Reference: GB 089 QUESTION 90 Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain. You discover that multiple client computers were automatically shut down because the security log was full. You need to ensure that client computers are not shut down when the security log becomes full. What should you do? A. Increase the maximum log size. B. Configure an Event Viewer subscription. C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO). D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO). Correct Answer: D Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 090 QUESTION 91 Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. You deploy a new Group Policy object (GPO) named NY Computers GPO as part of the organizational unit

59 (OU) and GPO design shown in the exhibit. (Click the Exhibit button.) The NY Computers GPO contains computer configuration settings and user configuration settings. User configuration settings are not being applied to users who log on to client computers in the NY Computers OU. You need to ensure that user configuration settings are being applied. What should you do? Exhibit: A. Enable user configuration settings in the Default Domain Policy GPO. B. Enable loopback processing in the NY Computers GPO. C. Enable user configuration settings in the NY Computers GPO. D. Enable loopback processing in the Default Domain Policy GPO. Correct Answer: B Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 091 QUESTION 92 Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with auto enrollment. When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?

60 A. Install the Web applications certificate into the computer store on each client computer. B. Purchase a commercial certificate and install it on the internal CA. C. Issue a certificate from the internal CA and install it on the application server. D. Install the Web applications certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer. Correct Answer: C Section: 3. Designing Client Configurations /Reference: GB 092 QUESTION 93 Drag and Drop (Select and Place) You create a shim database and distribute it to each of a company's client computers through a script. You name the database Shim_Database and give it a filename of shimdatabase.sdb. The database GUID is ecb-43af-945a-56810da33fb4. The database must be registered on all client computers. The registration process must be invisible to the user. You need to construct a command to register the shim database. Which command should you use? To answer, drag the appropriate component from the list of command components to the correct location or locations in the answer area.) Select and Place: Correct Answer:

61 Section: 5. Designing Application Packages for Deployment /Reference: GB 093 QUESTION 94 HotSpot (Hot Area) You upgrade all of a company's client computers from Microsoft Internet Explorer 8 to Internet Explorer 9. After the upgrade, users are unable to download attachments from Microsoft Outlook Web App (OWA) or any other secure website. You verify the Group Policy settings for Internet Explorer 9. You need to ensure that all users can download attachments from OWA and other secure websites. Which setting should you select? (To answer, select the appropriate item in the work area.) Hot Area:

62 Correct Answer:

63 Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 094 QUESTION 95 Drag and Drop (Build List and Reorder) Your company has 1,000 client computers that run Windows 7. The company uses several custom line-ofbusiness applications that are not compatible with Windows 7. You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) image that includes the custom applications to all Windows 7 client computers. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

64 Build List and Reorder: Correct Answer: Section: 5. Designing Application Packages for Deployment /Reference: GB 095 QUESTION 96 HotSpot (Hot Area) You are the desktop architect for an enterprise organization with client computers that run Windows 7. You need to create a new Windows Firewall rule that will allow you to access the Disk Management snap-in of remote client computers. Which predefined rule should you select? (To answer, select the appropriate setting in the work area.) Hot Area:

65 Correct Answer:

66 Section: 3. Designing Client Configurations /Reference: GB 096 QUESTION 97 You are planning to upgrade Microsoft Internet Explorer. You must create a report that identifies which computers are successfully upgraded. You need to design a deployment method that meets this requirement. What should you use? (Choose all that apply.)

67 A. Microsoft System Center Essentials B. Windows Intune C. Microsoft System Center Configuration Manager D. Internet Explorer Administration Kit (IEAK) and Group Policy E. Windows Server Update Services (WSUS) Correct Answer: ABDE Section: 5. Designing Application Packages for Deployment /Reference: GB 097 QUESTION 98 HotSpot (Hot Area) Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy. Which setting should you select? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

68 Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 098 QUESTION 99 You are creating a Windows 7 image. You need to prevent users from sharing their desktop sessions with remote users. You also need to allow administrators who are using Windows XP to administer the Windows 7 image remotely. Which settings should you configure? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

69 Correct Answer:

70 Section: 3. Designing Client Configurations /Reference: GB 099 QUESTION 100 Drag and Drop (Build List and Reorder) A company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers run Windows 7 Enterprise. The kiosk computers do not have network connections. The company brands the Microsoft Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar. The company changes its logo. You have the following requirements: Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers. Modify the search providers that are available to main office computers.

71 You need to define Internet Explorer settings to support the requirements. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: Section: 3. Designing Client Configurations /Reference: GB 100 QUESTION 101 Drag and Drop (Select and Place) You use a computer named Client02 to manage the BitLocker configuration on a remote computer named Client01.

72 A new company policy states that when BitLocker is used, you must be able to access the data in case of a system failure. You need to comply with the company policy. Using manage-bde, how should you achieve this goal? (To answer, drag the appropriate parameter from the list of options to the correct location or locations in the answer area.) Select and Place: Correct Answer:

73 Section: 3. Designing Client Configurations /Reference: GB 101 QUESTION 102 HotSpot (Hot Area) A network has a single domain with 1,000 client computers that run Windows 7. A large number of software installation scripts are configured to run on the client computers. You need to recommend a Group Policy setting that allows users to log on to their computers as soon as possible at first boot. What should you recommend? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

74 Correct Answer: Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 102 QUESTION 103 Drag and Drop (Select and Place) A company network includes Windows 7 client computers and DirectAccess. When using DirectAccess, users cannot connect to the company's internal resources. You need to create a batch file that users can execute to trace all network traffic for DirectAccess from their home computers. Which command should you use? (To answer, drag the appropriate terms from the list of terms to the correct location or locations in the answer area.) Select and Place: Correct Answer:

75 Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 103 QUESTION 104 HotSpot (Hot Area) A user is unable to log on to a client computer that runs Windows 7. The user receives an error message that says: "The local policy of this system does not permit you to logon interactively." The user belongs only to the Users group. You need to ascertain which policy in the local security policy must be modified. Which security policy should you select? (To answer, select the appropriate policy in the work area.) Hot Area:

76 Correct Answer:

77 Section: 3. Designing Client Configurations /Reference: GB 104 QUESTION 105 Drag and Drop (Build List and Reorder) You upgrade all of an organization's client computers to Windows 7. After the upgrade, a specific legacy application does not function correctly. You need to generate a list of all the computers that have the legacy application installed. Which two actions should you perform? (To answer, move the appropriate action from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

78 Correct Answer: Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 105 QUESTION 106 You are using Windows Deployment Services (WDS) to deploy new images of Windows 7 to 64- bit computers. When technicians attempt to boot by using PXE they receive the error message shown in the exhibit. (Click the Exhibit button.) You need to ensure that the technicians can boot the client computers by using PXE. What should you do? (Choose all that apply.) Exhibit:

79 A. Run the bcdedit /set {ntldr} description "Windows 7 32-bit" command. B. Add a 64-bit boot image to the WDS server. C. Add a 64-bit install image to the WDS server. D. Add a 32-bit boot image to the WDS server. E. Run the bcdedit /set {ntldr} description "Windows 7 64-bit" command. F. Add a 32-bit install image to the WDS server. Correct Answer: BD Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 106 QUESTION 107 HotSpot (Hot Area) A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. Windows 7 is installed on all the company's client computers. You add a domain user account named User1 to the local Administrators group on a client computer named PC01. When User1 returns to the office, User1 does not have administrative access on PC01. When you inspect PC01, you find that the local Administrators group does not contain the user account. You need to ensure that User1 is a member of the local Administrators group. Which Group Policy setting should you select? (To answer, select the appropriate Group Policy setting in the work area.)

80 Hot Area: Correct Answer: Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 107 QUESTION 108 You are planning a deployment of Windows 7 on multiple client computers. You need to recommend a Windows 7 deployment solution that meets the following requirements:

81 Must support the deployment of WIM or VHD. Must support deployment by using multicast. What should you include in the recommendations? A. System Center Configuration Manager 2010 B. Microsoft Deployment Toolkit (MDT) C. Deployment Image Servicing and Management (DISM) D. Windows Deployment Services Correct Answer: D Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 108 QUESTION 109 You are planning a Windows 7 deployment infrastructure for a new company. You have the following requirements: Three domains 10,000 client computers No user interaction You need to recommend a deployment infrastructure. What should you recommend? A. Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation. B. Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation. C. Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. D. Deploy Microsoft Deployment Toolkit (MDT) Design a zero-touch installation. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 109 QUESTION 110 Your network contains an Active Directory domain. You plan to deploy Windows 7 by using a zero-touch installation. You need to test the zero-touch installation on a computer named Computer1. You create a computer account for Computer1. What should you do next? A. Create a computer collection that contains the computer account for Computer1. B. Create a distribution group that contains the computer account for Computer1. C. Create a child domain and move the computer account for Computer1 to the child domain.

82 D. Create a security group that contains the computer account for Computer1. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 110 QUESTION 111 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a zero-touch installation strategy. What should you use in your design? A. Custom Windows 7 image on DVD B. Unattended installation C. Windows Deployment Services (WDS) D. Microsoft System Center Configuration Manager 2007 R2 Correct Answer: D Section: 4. Designing a Windows 7 Client Deployment /Reference: Microsoft Deployment Toolkit (MDT) 2010 is a Microsoft solution accelerator available at no cost for deploying Windows operating systems. Based on the experience of Microsoft employees, partners, and customers, MDT 2010 contains many thousands of lines of code provides a deployment framework so that customers can focus on their business, not on programming. Integrating MDT 2010 with Configuration Manager 2007 R2 helps large organizations use this framework to more easily implement the Zero-Touch, High-Volume Deployment strategy. Benefits of integrating MDT 2010 with Configuration Manager 2007 R2 in the Zero-Touch, High-Volume Deployment strategy include: Streamlined deployment, because installation is fully automated without interaction. Lower support costs, because configurations are consistent across all client computers. Streamlined maintenance, because Configuration Manager 2007 R2 handles applications, device drivers, and updates. GB 111 QUESTION 112 Your company has client computers that run Windows Vista. The company plans to upgrade the Windows Vista computers to Windows 7. The current configuration of all client computers in your company is based on a common Windows Vista image. Some branch offices use WAN connections to connect to the main office. You have the following requirements: Transfer all user data from the original Windows Vista installation to the new Windows 7 installation. Use the least amount of bandwidth while transferring the user data. Support the same migration strategy for all offices.

83 You need to design a user state migration strategy that supports the requirements. What should you do? A. Use the Deployment Image Servicing and Management (DISM) tool. B. Use the User State Migration Tool (USMT) and a hard-link migration store. C. Use Windows PE to perform an offline migration. D. Use the multicast feature of Windows Deployment Services (WDS). Correct Answer: B Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 112 QUESTION 113 You are designing a Windows 7 deployment image. You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK). You need to add the MAK to the configuration pass by using an answer file. To which configuration pass should you add the MAK? A. To the WindowsPE configuration pass B. To the Generalize configuration pass C. To the AuditSystem configuration pass D. To the Specialize configuration pass Correct Answer: D Section: 4. Designing a Windows 7 Client Deployment /Reference: As a single key is used, you can add MAK keys images when deploying them centrally. When using the Sysprep utility to prepare an image, you add a MAK key to an image during the Specialize configuration pass. When performing a traditional installation, you can enter MAK keys in the same way that you would enter a retail key. The main issue that requires consideration when using a MAK key is how you will perform activation. kit-exam windows enterprise-desktop-administrator.aspx GB 113 QUESTION 114 All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). You are planning to deploy Windows 7. You have the following requirements: Use a dedicated server for deployment. Use a single operating system image for deployment. Ensure that you can use removable media to deploy the image.

84 Ensure that you can select which applications are installed onto a client computer at the time of deployment. You need to design a deployment strategy that meets the requirements. What should you do? A. Use the Microsoft Deployment Toolkit to perform a lite-touch installation. B. Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image. C. Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers. D. Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 114 QUESTION 115 You have a single Active Directory domain. All domain controllers run Windows Server 2003 with Service Pack 1 (SP1). You plan to store Windows BitLocker Drive Encryption recovery passwords in Active Directory. You need to recommend the solution that uses the least amount of administrative effort. What should you recommend? A. Upgrade the domain controller that has the role of operations master to Windows Server 2008 R2. B. Upgrade all domain controllers to Windows Server 2008 R2. C. Upgrade all domain controllers to Windows Server 2003 SP2. D. Extend the Active Directory schema. Correct Answer: D Section: 3. Designing Client Configurations /Reference: BitLocker Drive Encryption Configuration Guide: Backing Up BitLocker and TPM Recovery Information to Active Directory This section provides information about how BitLocker and TPM recovery information can be backed up in Active Directory. By default, no recovery information is backed up. Administrators can configure Group Policy settings to enable backup of BitLocker or TPM recovery information. Before configuring these settings, as a domain administrator you must ensure that the Active Directory schema has been extended with the necessary storage locations and that access permissions have been granted to perform the backup. GB 115 QUESTION 116 You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers. Your company decides to deploy all custom settings by using Group Policy. You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings.

85 Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deployment image. B. Update the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers. C. Update the Internet Explorer Manage Add-ons settings for all computers. D. Use the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image. Correct Answer: AD Section: 2. Designing a Standard Image /Reference: Reset Internet Explorer settings Deletes all temporary files, disables browser add-ons, and resets all the changed settings to factory settings. It can be used if the browser is in an unusable state. GB 116 QUESTION 117 Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain, organizational unit (OU), and Group Policy object (GPO) design is shown in the exhibit. (Click the Exhibit button.) The NY Computers OU contains client computers that run either Windows Vista Enterprise or Windows 7 Enterprise. The New York Computers GPO defines software restriction policies (SRPs). You have the following requirements: SRPs must be used for only Windows Vista Enterprise client computers. AppLocker policies must be used for only Windows 7 Enterprise client computers. AppLocker policies must be defined by using Group Policy. You need to design an AppLocker deployment that meets these requirements. What should you do? Exhibit:

86 A. Create a new GPO that has the AppLocker settings, and link it to the NY Users OU. B. Define the AppLocker settings in the New York Baseline GPO. C. Define the AppLocker settings in the New York Users GPO. D. Create a new GPO that has the AppLocker settings, and link it to the NY Computers OU. Correct Answer: D Section: 3. Designing Client Configurations /Reference: GB 117 QUESTION 118 Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browsers security settings. What should you do? A. Reset the Internet Explorer settings B. Restore the advanced settings in Internet Explorer C. Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode D. Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode Correct Answer: D Section: 6. Identifying and Resolving Deployment and Client Configuration Issues

87 /Reference: Normal mode, you can configure IEM settings so that they are refreshed on users' computers on a periodic basis (or each time the users log in). However, users can temporarily change these settings between the times scheduled for their setting refresh. For this reason, these settings in Normal mode behave as "pseudo-policies." In Preference mode, you can configure IEM settings, but allow users to change these settings later by using the Internet Explorer 9 user interface. GB 118 QUESTION 119 You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7. You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup. What should you do? (Choose all that apply.) A. Use Group Policy preferences. B. Create a custom task sequence. C. Create a Group Policy object (GPO). D. Run the script as a standard user account. E. Set the script execution policy to AllSigned. F. Set the script execution policy to RemoteSigned. Correct Answer: BF Section: 3. Designing Client Configurations /Reference: As part of PowerShell's "secure by default" initial setup, scripts are not allowed to be ran by the command interpreter. This behavior can be modified by changing the PowerShell execution policy. There are four execution polices to choose from: Restricted - the default, allows no scripts to run AllSigned - all scripts must be Authenticode-signed to run RemoteSigned - Scripts downloaded from a remote location must be signed Unrestricted - PowerShell will run any script, works like what you are probably used to now GB 119 QUESTION 120 Your company has offices in several countries. You must test and validate all operating system images before you deploy them. You create a Windows 7 Enterprise master image that has all language packs installed. You test and validate the master image. You are planning to create regional images based on the master image. Each regional image will contain only the language pack that is necessary for a specific geographic region. You have the following requirements: Remove the language packs that are unnecessary for each region. Minimize the necessary testing and validation.

88 You need to create the regional images. What should you do? A. Run lpksetup.exe /u in unattended mode on the master image. B. Deploy the master image to a target computer. Remove the unnecessary language packs, and then capture each regional image. C. Service the master image online by using the Deployment Image Servicing and Management (DISM) tool. D. Service the master image offline by using the Deployment Image Servicing and Management (DISM) tool. Correct Answer: D Section: 2. Designing a Standard Image /Reference: Deployment Image Servicing and Management (DISM) tool Image servicing and management solutions fall into two main categories: Managing the data or information included in the Windows image, such as enumerating or taking an inventory of the components, updates, drivers, or applications contained in an image. Servicing the image itself, including adding or removing driver packages and drivers, modifying language settings, enabling or disabling Windows features, and upgrading to a higher edition of Windows. GB 120 QUESTION 121 You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk. Computers in all three types of location use the same hardware. Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security. Branch office computers must use BitLocker Drive Encryption. You have the following requirements: Create deployment images. Minimize image maintenance. You need to define an image-creation strategy that meets the requirements. What should you do? A. Create a single image to use for the branch office computers and the kiosk computers. Create a separate image to use for the main office computers. B. Create a single image to use for all location types. Create a custom Windows security template for each location type. C. Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image. D. Create a single image to use for the main office computers and the branch office computers, and apply the required settings through Group Policy. Create a separate image to use for the kiosk computers. Correct Answer: D Section: 3. Designing Client Configurations

89 /Reference: GB 121 QUESTION 122 You have an image that is used to deploy Windows 7 on client computers. You need to modify the image to change the edition of Windows 7. What should you do? A. Use Windows Setup to service the image. B. Service the image online. C. Service the image offline. D. Use audit mode to service the image. Correct Answer: C Section: 2. Designing a Standard Image /Reference: Change the Windows Image to a Higher Edition You can change your Windows image to a higher edition while it is offline by using the DISM commands in the following procedure. You should not use this procedure on an image that has already been changed to a higher edition. GB 122 QUESTION 123 Your company has more than 1,000 client computers. You deploy Windows 7 by using six different images. A driver that is included in the images needs to be replaced. You have the following requirements: Update the Windows 7 images with the new driver. Ensure that the old driver is no longer available. You need to define an image-update strategy that meets the requirements. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Deploy each image to a reference computer, and then uninstall the old driver and install the new driver. Capture the new image. B. Mount each image by using ImageX, and then install the new driver. C. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and then delete the old driver and inject the new driver. D. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and then copy the new driver into a new folder in the image. Correct Answer: AC Section: 2. Designing a Standard Image

90 /Reference: GB 123 QUESTION 124 You are planning to deploy Windows 7 Enterprise to all of your company's client computers. You have the following requirements: Create two custom partitions on each client computers hard disk, one for the operating system and the other for data. Automatically create the partitions during Windows Setup. You need to design an image that meets the requirements. What should you do? A. Use SysPrep to create the two partitions during Windows Setup. B. Use Windows PE to create the partitions. Install Windows 7 on the first partition. C. Use Windows System Image Manager (Windows SIM) to specify the partition configuration. D. Use Disk Management to create the two partitions on the hard disk. Correct Answer: C Section: 2. Designing a Standard Image /Reference: Windows System Image Manager (Windows SIM) creates and manages unattended Windows Setup answer files in a graphical user interface (GUI). Answer files are XML-based files that are used during Windows Setup to configure and to customize the default Windows installation. For example, you can use Windows SIM to create an answer file that partitions and formats a disk before installing Windows, changes the default setting for the Internet Explorer home page, and configures Windows to boot to Audit mode after installation. By modifying settings in the answer file, Windows SIM can also install third-party applications, device drivers, language packs, and other updates. GB 124 QUESTION 125 You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do? A. Create a Network Connection before capturing the image. B. Turn on the Telnet Server feature in the image. C. Create a Certificate-Based credential before capturing the image. D. Turn on the Telnet Client feature in the image. Correct Answer: D Section: 2. Designing a Standard Image /Reference: GB 125 QUESTION 126

91 HotSpot (Hot Area) You are designing a Windows 7 deployment image. You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK). You need to add the MAK to the configuration pass by using an answer file. To which configuration pass should you add the MAK? Hot Area: Correct Answer: Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 126 QUESTION 127 You are planning a migration to Windows 7. You need to recommend applications that obtain a list of software installed on client computers.

92 Which applications should you recommend? (Choose all that apply.) A. Microsoft Deployment Toolkit (MDT) B. Sysprep C. Microsoft Assessment and Planning Toolkit (MAP) D. Microsoft Application Compatibility Toolkit (ACT) E. windows User State Migration Tool (USMT) F. Windows System Image Manager (Windows SIM) Correct Answer: CD Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 127 QUESTION 128 You are designing a Windows 7 deployment image. You receive a baseline image over the network, from a different geographic location. You need to verify that the baseline image is valid. Which tool should you use? A. ImageX B. Deployment Image Servicing and Management (DISM) tool C. Windows Compatibility Evaluator D. windows System Image Manager (Windows SIM) Correct Answer: A Section: 2. Designing a Standard Image /Reference: GB 128 QUESTION 129 You are installing a new third-party application to all the Windows 7 client workstations that your company has deployed. You need to monitor all of the actions taken by the application installer. Which application should you use? A. Update Compatibility Evaluator B. Setup Analysis Tool C. Windows Compatibility Evaluator D. Compatibility Administrator Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference:

93 GB 129 QUESTION 130 Drag and Drop (Build List and Reorder) You are the desktop architect for an enterprise organization with computers that run Windows 7 Enterprise. You need to create a customized WinPE image. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: Section: 2. Designing a Standard Image /Reference: Walkthrough: Create a Custom Windows PE Image GB 130

94 QUESTION 131 Drag and Drop (Build List and Reorder) A company has client computers in an Active Directory Domain Services (AD DS) environment. You deploy a new wireless access point (WAP). Third-party security software controls access to the wireless network. Users are able to connect to the wireless network and access the Internet but are unable to access the company's file servers. You need to enable users to connect to the file servers by using the wireless network. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer: Section: 3. Designing Client Configurations /Reference: GB 131 QUESTION 132

95 Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You have the following requirements: Migrate user data and operating system components. Encrypt and password-protect the migration store. You need to design a user state migration strategy that supports the requirements. What should you do? A. Use a hard-link migration store. B. Perform an offline migration by using Windows.old. C. Use a compressed migration store. D. Perform an offline migration by using Windows PE. Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: Compressed Migration The compressed migration store is a single image file that contains all files being migrated and a catalog file. This image file is often encrypted and protected with a password, and cannot be navigated with Windows Explorer. GB 132 QUESTION 133 HotSpot (Hot Area) You use Microsoft Application Compatibility Manager to produce a report that lists a company's applications and their compatibility status with Windows 7. You need to add your ratings of the compatibility of the applications to the report. Which Microsoft Application Compatibility Manager action should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

96 Correct Answer: Section: 5. Designing Application Packages for Deployment /Reference: GB 133 QUESTION 134 Drag and Drop (Select and Place) All client computers in a company run Windows 7 Enterprise. The company creates Windows PowerShell scripts to collect statistical data from client computers. A logon script is configured to run the PowerShell scripts during logon. An error occurs when the scripts are run on client computers. You need to ensure that all PowerShell scripts run correctly. Which command should you use? (To answer, drag the appropriate component from the list of components to the correct location or locations in the answer area.) Select and Place: Correct Answer:

97 Section: 3. Designing Client Configurations /Reference: GB 134 QUESTION 135 HotSpot (Hot Area) A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. Windows 7 is installed on all client computers. Users discover that they cannot delete files that they have created and placed in their local folders. You need to enable users to modify file permissions. Which setting should you configure? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

98 Correct Answer:

99 Section: 3. Designing Client Configurations /Reference: GB 135 QUESTION 136 Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements: Establish which client computers require the security update. Identify what changes will occur as a result of the security update. Identify which applications might be affected by the security update. You need to select the appropriate tool to detect application-compatibility issues. What should you do? A. Use the Inventory Collector. B. Use the Setup Analysis Tool. C. Use the Update Compatibility Evaluator. D. Use the Windows Compatibility Evaluator. Correct Answer: C Section: 5. Designing Application Packages for Deployment /Reference: The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows update, and looks for potential conflicts due to changes in the registry, application files, or application file properties. You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager. GB 136 QUESTION 137 HotSpot (Hot Area) A company's server runs Windows 2008 R2 with Active Directory Domain Services (AD DS) and Windows Server Update Services (WSUS). All client computers run Windows 7 Enterprise. You need to automate the distribution of Windows security updates to all client computers by meeting the following requirements: Point all client computers to the WSUS server. Schedule updates to install at a specific time. Run the updates immediately after Windows starts if the computer missed the originally scheduled updates. You need to configure Group Policy to meet the requirements. Which settings should you configure? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

100 Correct Answer:

101 Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 137 QUESTION 138 HotSpot (Hot Area) You use Group Policy to configure Windows 7 Enterprise client computers. You need to modify a Group Policy object (GPO) to specify a custom location for the temp folder. Which setting should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

102 Section: 3. Designing Client Configurations /Reference: GB 138 QUESTION 139 HotSpot (Hot Area) A company has client computers that run Windows 7. A new corporate security policy states that all client computers in the legal department should allow only inbound and outbound network connections for which there is an existing firewall rule. You need to ensure that all client computers in the legal department are configured to follow the new security policy. Which settings should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

103 Correct Answer:

104 Section: 3. Designing Client Configurations /Reference: GB 139 QUESTION 140 HotSpot (Hot Area) You are the desktop architect for an enterprise organization with computers that run Windows 7. You need to create a Group Policy object (GPO) to prevent Windows Explorer from starting until all logon scripts have finished. Which setting should you select? (To answer, select the appropriate setting in the work area.) Hot Area:

105 Correct Answer: Section: 3. Designing Client Configurations /Reference: GB 140 QUESTION 141 Select & PlaceDrag and Drop (Build List and Reorder) You are designing a Windows 7 image creation strategy for a multilingual deployment. You currently have an English language image of Windows 7. The deployment must meet the following requirements: The image must include the German, French, and English languages. Users must be able to change the display languages. You need to recommend an action plan that meets the deployment requirements. Which two actions should be performed in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder:

106 Correct Answer: Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 141 QUESTION 142 You are designing a Windows 7 Enterprise image creation strategy. The strategy must meet the following requirements: Support 32-bit and 64-bit hardware. Support 64-bit applications. Minimize the total number of images. Reduce the bandwidth required to deploy an image. Use System Center Configuration Manager (ConfigMgr) for application deployment. You need to recommend the images that meet the requirements. Which images should you recommend? (Choose all that apply.) A. A thin image for the 32-bit version of Windows 7

107 B. A thick image for the 32-bit version of Windows 7 C. A thick image for the 64-bit version of Windows 7 D. A thin image for the 64-bit version of Windows 7 Correct Answer: AD Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 142 QUESTION 143 HotSpot (Hot Area) Active Directory Domain Services (AD OS) is running on windows Server 2008 R2. All user objects are located in the Boston Users Organizational Unit (OU) or the San Diego Users OU. All client computer objects are in the Boston Computers OU or in the San Diego Computers OU. All domain controller computer objects are in their default location. You decide to audit changes to AD DS. Administrative users in San Diego add new users to the domain without approval. You configure the audit policy settings in the San Diego Policy Group Policy object (GPO) and set up auditing in object System Access Control Lists, you verify that the GPO is being applied to the resources in the San Diego OUs, but auditing still does not work. You need to select the GPO to ensure that users added by the San Diego administrative users are audited. Which GPO should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

108 Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 143 QUESTION 144 Drag and Drop (Select and Place) A company has a main office and two branch offices named Branch Site 1 and Branch Site 2. The main office has a server that runs Windows Server 2008 R2. Branch Site 2 also has a server that runs Windows Server 2008 R2. The branch offices do not have direct access to the Internet. Windows 7 Enterprise is installed on all client computers. A diagram of the network is shown in the exhibit. Corporate policy dictates that all updates must be approved by the IT department before being deployed. Using the hardware configuration shown in the exhibit, you need to design a Windows Update strategy to meet the following goals: Minimize traffic to the Internet. Minimize network traffic between the branch locations and the main office. What should you recommend? (To answer, drag the appropriate answer to the correct location or locations in the answer area.) Select and Place:

109 Correct Answer:

110 Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 144 QUESTION 145 HotSpot (Hot Area) A server runs Windows Server 2008 SP2 with Remote Desktop Services (RDS). You add an application to Remote Desktop RemoteApp. You need to ensure that the application can be published by using Group Policy. Which setting should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

111 Correct Answer: Section: 5. Designing Application Packages for Deployment

112 /Reference: GB 145 QUESTION 146 HotSpot (Hot Area) You are designing a Windows 7 Enterprise custom image. You create an autounattend.xml file by using Windows System Image Manager (SIM). This file will be used when the image is deployed. You are planning to install Windows 7 on a second hard disk in a computer. You configure the DiskID setting. You need to select the configuration pass where you will add the DiskID setting. Which option should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer: Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 146

113 QUESTION 147 HotSpot (Hot Area) A company has a server that runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. The domain controllers were recently upgraded from Windows Server You are using Group Policy to deploy applications to the client computers remotely. The computers reboot each night as part of routine maintenance. You need to ensure that the application installs when the computer starts up. Which Group Policy setting should you configure? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

114 Section: 5. Designing Application Packages for Deployment /Reference: GB 147 QUESTION 148 HotSpot (Hot Area) All portable computers on a company's wireless network run windows 7 Enterprise. You need to ensure that users can connect only to the predefined SSID shown in the work area. Which Group Policy object (GPO) settings should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

115 Correct Answer:

116 Section: 3. Designing Client Configurations /Reference: GB 148 QUESTION 149 Drag and Drop (Select and Place) You are managing data migration from an existing Windows 7 computer to a new Windows 7 computer. You need to migrate user and application data from the existing computer to the new computer. Which command should you run on the existing and new computers? (To answer, drag the appropriate commands to the correct location in the answer area.) Select and Place:

117 Correct Answer: Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 149 QUESTION 150 Drag and Drop (Select and Place) An enterprise organization has computers that run Windows 7. Users log on to the Contoso.com domain from their client computers. A user is unable to log on to the domain. The user changed his password the previous night and was unable to log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors. You need to ensure that the user can log on to the domain.

118 Which command should you run? (To answer, drag the appropriate command and parameter from the list of commands and parameters to the correct location or locations in the answer area.) Select and Place: Correct Answer: Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 150 QUESTION 151 You plan to upgrade Windows Vista to Windows 7 on a computer named Computer1. You run ScanState and store the results on a remote computer at \\Server1\migstore. After the ScanState command completes, a user customizes a profile and adds mission-critical data. You attempt to run ScanState again but it fails. You need to overwrite Computer1's existing information on Server1. Which command line options should you use to execute the ScanState command? (Choose all that apply.)

119 A. /efsxopyraw B. /v:13 C. \\Server1\migstore D. /o Correct Answer: CD Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 151 QUESTION 152 Your company plans to upgrade 1,000 client computers to Windows 7. The company uses a custom line-of-business application that is frequently updated. The application is not compatible with Windows 7. You need to ensure that the company can use the application. You also need to ensure that the application can be updated with the least amount of administrative effort. What should you do? A. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, and distribute the virtual machine image and updates through MED-V TrimTransfer. B. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, and distribute the virtual machine image and updates through Microsoft System Center Configuration Manager. C. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machine image and updates through a file share resource. D. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machine image and updates through Microsoft System Center Configuration Manager. Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 152 QUESTION 153 Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise. You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time. What should you do? A. Increase the amount of RAM on the client computers. B. Change from unicast to multicast deployment of images. C. Change from multicast to unicast deployment of images. D. Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server. Correct Answer: B

120 Section: 4. Designing a Windows 7 Client Deployment /Reference: Performing Multicast Deployments In order to deploy an image using multicasting instead of unicasting, you must first create a multicast transmission. Multicast transmissions make the image available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used. GB 153 QUESTION 154 HotSpot (Hot Area) Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy. Which setting should you select? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

121 Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: Maybe this question is not Hot Area but simply Multiple Choice with four answers. GB 154 QUESTION 155 Your company's network includes a main office and several branch offices. The branch offices are connected to the main office by high-latency links. All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. No servers are located in the branch offices. Client computers in the branch offices frequently access a specific group of files on a file server named Server1. These access requests consume significant amounts of bandwidth and reduce the speed of higherpriority traffic. You need to reduce the bandwidth that is consumed by requests for frequently accessed files. What should you do? A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices. B. Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices. C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache mode on client computers in only the branch offices. D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on client computers in only the branch offices. Correct Answer: D Section: 3. Designing Client Configurations /Reference: GB 155 QUESTION 156 New question from the exam

122 You are planning a Zero Touch Installation of Windows 7. You need to design a deployment strategy that enables the company computers to sleep and hibernate without creating a security risk. Which tool should you use? A. System Center Capacity Planner (SCCP) B. Windows Performance Monitor Data Collector Sets C. Microsoft Assessment and Planning Toolkit (MAP) D. System Center Configuration Manager (SCCM) Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 156 QUESTION 157 New question from the exam You need to deploy Windows 7 Enterprise in VDI. You need to select the appropriate license type for the VDI operating system deployment. Choose two. A. Windows Enterprise Centralized Desktop B. Microsoft Desktop Optimization Pack C. Windows 7 Software Assurance D. Windows Virtual Desktop Access Correct Answer: BC Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 157 QUESTION 158 New question from the exam HotSpot (Hot Area) You need to create an unattended.xml file. You need to specify the computer name. Which option should you select? (To answer, select the appropriate setting or settings in the work area.) Hot Area:

123 Correct Answer: Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 158

124 Company One QUESTION 1 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You have deployed a ConfigMgr site server at each site. You are planning to use PXE boot to deploy a new Windows 7 image. You need to deploy the image to all office locations. When you attempt to perform a PXE boot, it fails at each office location. You need to prepare the infrastructure. What should you do? (Choose all that apply.) Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

125 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

126 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

127 A. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in each office. B. Install a single PXE service point in the Los Angeles office. C. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in the Los Angeles office. D. Install a PXE service point in each office. E. Create a single IP helper for PXE that points to the DHCP server in the Los Angeles office. F. Create a single IP helper for PXE that points to the DHCP server in each office. Correct Answer: AD Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 159 QUESTION 2 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You create a Windows 7 image. You plan to test the image on 10 percent of the computers in each office. You need to recommend a deployment strategy to minimize the amount of time spent deploying the image. What should you recommend? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

128 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

129 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

130 A. Distribute one USB flash drive containing a Windows 7 installation to Madrid, Carlsbad, and New Orleans. Create a new deployment share in Munich. B. Send one USB flash drive containing a Windows 7 installation to each site. C. Send one DVD installation disk to each site. D. Distribute one USB flash drive containing a Windows 7 installation to Carlsbad and New Orleans. Create a new deployment share in Los Angeles. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 160 QUESTION 3 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You are deploying Windows 7 Enterprise and Microsoft Office to client computers. The deployment must meet the following requirements: Deploy Windows 7 Enterprise to all client computers. Deploy Office 2007 Professional to client computers in the Munich office. Deploy Office 2010 Professional to client computers in the Madrid office. Automate the deployment to minimize administrative effort. You need to recommend a deployment solution that meets the requirements. What should you recommend? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the

131 Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

132 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

133 A. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the account used for deployment. B. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a Group Policy object based on the user who is logged in. C. Create a Windows 7 Enterprise Edition image with Office 2007 installed. Create a second Windows 7 Enterprise Edition image with Office 2010 installed. D. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the Organizational Unit of the client computer. Correct Answer: D Section: 4. Designing a Windows 7 Client Deployment /Reference: AppLocker (a set of Group Policy settings that evolved from Software Restriction Policies, to restrict which applications can run on a corporate network, including the ability to restrict based on the application's version number or publisher) GB 161 QUESTION 4 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You are planning to deploy a computer in the lobby of each office. You need to control which programs can run on the computer. What should you do? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs.

134 You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

135 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

136 A. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure AppLocker. B. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable and configure BitLocker. C. Create a GPO that enables and configures AppLocker and link it to the Carlsbad OU. D. Create a GPO that enables and configures BitLocker and link it to the root of the AD DS domain. Correct Answer: A Section: 3. Designing Client Configurations /Reference: GB 162 QUESTION 5 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Your company's computers experience malware infections as a result of using unsafe ActiveX controls. You need to update the client computer settings to follow the company policy. What should you do? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

137 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

138 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

139 A. Upgrade all users to Internet Explorer 9. Use a GPO to change the default setting of the Internet security zone to high. Add all internal web addresses to the Trusted Sites list. B. Use a GPO to change the default setting of the local intranet security zone to medium-low. Add all internal web addresses to the Trusted Sites list. C. Upgrade all users to Internet Explorer 9. Use a GPO to change the default setting of the Trusted Sites security zone to block ActiveX controls for all websites. Add all internal web addresses to the Trusted Sites list. D. Create a GPO that enables the Disable add-on performance notifications setting. Link it to the OU for each site. Correct Answer: A Section: 3. Designing Client Configurations /Reference: GB 163 QUESTION 6 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You create a deployment image that must be tested in each office. You need to complete testing within a week to finalize the image for production. You need to recommend a deployment strategy to test the image with at least two users from each of the following departments: Finance Research Accounting Sales What should you recommend? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is

140 Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

141 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

142 A. Create a deployment share at each site. Direct the desktop technicians at each site to create Windows PE DVDs that install Windows 7 from the deployment share at each site. B. Create a deployment share in Los Angeles. Enable network boot at each site and have desktop technicians support users from each department. C. Create a deployment share in Los Angeles. Create a DVD installation disk and send one to each user from the Sales department. Have the desktop technicians at each site create DVD-based installations for users at each site. D. Create a deployment share at each site. Direct the desktop technicians at each site to create Windows PE USB flash drives that install Windows 7 from the deployment share at each site. Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 164 QUESTION 7 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Users with newly deployed Windows 7 computers see a security prompt when they attempt to upload documents to the company's intranet site. You need to suppress the prompt without creating a security risk for the company. What should you do? (Choose all that apply). Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

143 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

144 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

145 A. Modify the GPO to set with a value of 1 in the Site to Zone Assignment List. B. Modify the default Windows 7 image to add the Internet Explorer Enhanced Security Configuration component. C. Modify the default Windows 7 image to change the default Internet Explorer security level to Medium Low. D. Modify the default Windows 7 image to disable the Internet Explorer Automatically Detect Intranet Network setting. E. Create a GPO and link it to the root of the domain. F. Modify the GPO to set the web server's NEtBIOS name with a value of 2 in the Site to Zone Assignment List. Correct Answer: AE Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 165 QUESTION 8 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You are designing an implementation of BitLocker. You create a GPO with BitLocker settings that conform to company requirements. You need to design an implementation strategy that supports the company requirements. What should you do? (Choose all that apply.) Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

146 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

147 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

148 A. Link the GPO to the Munich-Computers OU. Use a security filter to apply the GPO to all Munich desktop computers. B. Block the Munich-Computers OU from inheriting policies. C. Link the GPO to the Madrid-Computers OU. Use a security filter to apply the GPO to all Madrid desktop computers. D. Link the GPO to the Munich-Users OU. E. Create and use a WMI filter that targets all portable computers with the GPO. Link the WMI filter to the GPO. F. Link the GPO to the root of the AD DS domain. Correct Answer: BCEF Section: 3. Designing Client Configurations /Reference: GB 166 QUESTION 9 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You use the Microsoft Deployment Toolkit (MDT) 2010 to create a Windows 7 test image. You deploy the image by using a USB flash drive. The Windows 7 deployment includes a custom task sequence to install a new finance application from the deployment share. You need to deploy the image in the Munich office by using zero-touch installation. What should you do? Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs.

149 You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

150 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

151 A. Install System Center Configuration Manager (ConfigMgr) 2007 in the Munich office. Configure a deployment point and configure the network for PXE. Recapture the MDT image and create a task sequence for the finance application. B. Install System Center Configuration Manager (ConfigMgr) 2007 in the Carlsbad office. Configure a deployment point and configure the network for PXE. Recapture the MDT image with the finance application installed. C. Install a new deployment share in the Munich office. Create a Windows PE boot disk with network drivers. Recapture the MDT image and create a task sequence for the finance application. Create a custom script that can map a drive to the deployment share and start Setup. D. Install a new deployment share in the Munich office. Configure a deployment point and configure the network for PXE. Recapture the MDT image and create a task sequence for the finance application. Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 167 QUESTION 10 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You need to prevent users from accessing USB flash drives on portable computers. What should you do? (Choose all that apply) Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

152 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

153 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

154 A. Create a security group in AD DS and place all user objects for users with portable computers in the group. B. Create a security group in AD DS and place all portable computer objects in the group. C. Create a GPO that blocks the use of specific GUIDs used by USB flash drives and link it to the root of the domain. D. Create a WMI filter that applies only to Model A and B computers and link it to a GPO. E. Create an AppLocker policy that applies to the AD DS computer group you created. F. Create an AppLocker policy that applies to the AD DS user group you created. Correct Answer: CD Section: 3. Designing Client Configurations /Reference: GB 168 QUESTION 11 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. A user from the Finance department is testing applications in Windows 7 with Internet Explorer 9. The company's finance application accesses a vendor web page that does not function correctly in Windows 7. When the user enables Internet Explorer Compatibility Mode for the vendor web page, it works correctly. You need to support the company's future software deployments. What should you recommend? (Choose all that apply.) Company, Inc. (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

155 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

156 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

157 A. Package the new purchasing application and publish it by using a Group Policy object (GPO) that deploys to users of the new application. B. Package the new purchasing application and assign it by using a Group Policy object (GPO) that deploys to all Windows XP computers in the Finance department. C. Use a Group Policy object (GPO) to add the vendor website to the Trusted Sites list on all computers in the Finance department. D. Use a Group Policy object (GPO) to add the vendor website to the local intranet zone for all Windows 7 computers. E. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows XP computers in offices that use the old purchasing application. F. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows 7 computers. Correct Answer: AF Section: 6. Identifying and Resolving Deployment and Client Configuration Issues /Reference: GB 169 QUESTION 12 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. The scenario cannot be shown in this question, since VCE Designer does not (yet) have this Question Type combined with Case Study. Drag and Drop (Build List and Reorder) You are updating the corporate image to add drivers to support a new device. You need to meet company requirements for updating images. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Build List and Reorder: Correct Answer:

158 Section: 2. Designing a Standard Image /Reference: GB 170 QUESTION 13 Topic 1, Company One This question is one in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. (Click the Case Study button.) Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. You create and test a Windows 7 image that supports all existing client computer hardware in the company. User settings must be preserved during migrations to Windows 7. You need to deploy the new image to all office locations by using the zero-touch installation methodology. What should you recommend? (Choose all that apply.) Case Study Title (Case Study): Background You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. The address for the SharePoint site is Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

159 Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table.

160 You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. Business Requirements The deployment of Windows 7 must meet the following business requirements: Deployment requirements The deployment must maximize the use of existing client computers. The deployment must reduce the amount of time spent updating client computers after deployment. Technical Requirements The application must meet the following technical requirements: Infrastructure requirements The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. Application compatibility All current applications must be supported on Windows 7. All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. Migration requirements The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. Image maintenance You need to minimize the re-arm passes. Security Each location has a security group made up of the desktop computer objects in that location. Users must not be able to change their web browser or client computer security settings. Your requirements are as follows: A startup PIN and TPM are required for all BitLocker users. Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. All laptops within the company must have BitLocker enabled. All Madrid desktops must have BitLocker enabled. No other desktops besides Madrid should have Bitlocker enabled. Computers in office lobbies are not permitted to join the domain. You need to block the use of ActiveX controls for all external websites.

161 A. Enable a DHCP helper address on the routers for each remote office. B. Enable network boot functionality on all client computers at the remote locations. C. Deploy and configure Microsoft System Center Configuration Manager (ConfigMgr). D. Deploy and configure Microsoft System Center Operations Manager (OppMgr). E. Create a task sequence that enables local administrators to select their local office. F. Create a User State Migration Tool configuration file and include it in the deployment. Correct Answer: BCF Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 171

162 Company Two QUESTION 1 Topic 2, Company Two You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that the virtualization strategy meets the company's OSE requirements. Which GPO setting should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft

163 Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. B. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. D. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. Correct Answer: D Section: 3. Designing Client Configurations /Reference: GB 172 QUESTION 2 Topic 2, Company Two You are planning the delivery of the ERP add-on to the remote users. You need to ensure that the ERP add-on meets company requirements and functions for all remote users. Which product should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network

164 consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments.

165 Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. MED-V B. Remote Desktop RemoteApp C. System Center Virtual Machine Manager Self Service Portal 2.0 D. Windows XP Mode Correct Answer: A Section: 4. Designing a Windows 7 Client Deployment /Reference: GB 173 QUESTION 3 Topic 2, Company Two You need to manage Windows 7 and Microsoft Office 2010 license keys for the VDI pool automatically. What should you do? (Choose all that apply.) Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only.

166 The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Install the Remote Desktop Licensing role service. B. Install a ConfigMgr primary site server. C. Install a MAK proxy server. D. Install the Office 2010 KMS Host License Pack. E. Activate the KMS host with the Office 2010 KMS key. F. Install Volume Activation Management Tool 2.0.

167 G. Install a server core installation of Windows Server 2008 R2 Standard and add the AD DS role. H. Activate the server with a MAK key. I. Activate the server with a KMS key. Correct Answer: DEGI Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 174 QUESTION 4 Topic 2, Company Two You are planning the deployment of a new engineering application in the Chicago office. You need to meet company requirements for application deployment. What should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors.

168 Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. MED-V B. App-V C. Remote Desktop Session Host D. Remote Desktop RemoteApp Correct Answer: B Section: 5. Designing Application Packages for Deployment /Reference: GB 175 QUESTION 5 Topic 2, Company Two You run Sysprep on a base image for the company's VDI pool. You plan to use Windows Deployment Services (WDS) for the deployment. You need to recommend the Sysprep parameters to ensure that the base image is ready for deployment while meeting the company requirements.

169 Which parameters should you recommend? (Choose all that apply.) Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements

170 The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. quiet B. shutdown C. oobe D. generalize E. quit F. audit G. unattend Correct Answer: BDG Section: 2. Designing a Standard Image /Reference: GB 176 QUESTION 6 Topic 2, Company Two You are planning to deliver VDI by using the company's virtualization infrastructure. You need to ensure that VDI users are always reconnected to the same VDI session. What should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds.

171 Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers.

172 Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Deploy the App-V desktop client. B. Add the VmHostAgent role service. C. Deploy the App-V Sequencer. D. Install Windows Server 2008 R2 Datacenter with the Hyper-V role. Correct Answer: B Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 177 QUESTION 7 Topic 2, Company Two You are planning the deployment of the CRM application to the New York office. You need to recommend a deployment method to maximize the performance of the application. What should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management

173 The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. MED-V B. Unified Access Gateway C. Remote Desktop Connection Broker D. App-V Correct Answer: A Section: 5. Designing Application Packages for Deployment /Reference: GB 178 QUESTION 8 Topic 2, Company Two

174 You are replacing the desktop computers in the Chicago office. You need to automate the migration of user profile data to the new computers. What should you recommend? (Choose all that apply.) Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version

175 of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. State migration point B. Windows Client Operating System Management Pack C. Background Intelligent Transfer Server D. Windows Easy Transfer E. ConfigMgr custom task sequence Correct Answer: AE Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 179 QUESTION 9 Topic 2, Company Two You have an AD DS security group named Toronto Users and another named Toronto Computers. You are planning the deployment of a new browser by using Group Policy. You need to ensure that the computers in each office comply with company requirements. What should you recommend? (Choose all that apply.) Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office.

176 All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto

177 office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Download the Internet Explorer 9 Administrative Kit. B. Deploy the Internet Explorer 9 Blocker to the Toronto Users group. C. Add all Toronto computers to the Toronto Computers security group. D. Deploy the Internet Explorer 9 Admin Kit to the Toronto Users group. E. Add all Toronto users to the Toronto Users security group. F. Download the Internet Explorer 9 Blocker Toolkit. G. Deploy the Internet Explorer 9 Admin Kit to the Toronto Computers group. H. Deploy the Internet Explorer 9 Blocker to the Toronto Computers group. Correct Answer: CFH Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 180 QUESTION 10 Topic 2, Company Two You need to recommend a Microsoft Enterprise Desktop Virtualization (MED-V) image update strategy to meet company requirements. What should you recommend? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only.

178 The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Windows Update B. Windows Intune C. ConfigMgr D. Windows Deployment Services (WDS) Correct Answer: C Section: 4. Designing a Windows 7 Client Deployment

179 /Reference: GB 181 QUESTION 11 Topic 2, Company Two You need to ensure that the company's remote computers receive Windows updates at the same time as the internal computers. What should you do? Company, Ltd. (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7.

180 Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. Application Compatibility All current applications must be supported on Windows 7. You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). Operating System Environment (OSE) Requirements You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. Security All remote access must be logged and audit able. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. A. Implement System Center Operations Manager (OpsMgr) B. Install the Windows Deployment Services (WDS) role. C. Install BranchCache in distributed mode. D. Deploy DirectAccess. Correct Answer: D Section: 1. Planning and Managing a Client Life Cycle Strategy /Reference: GB 182 QUESTION 12 Topic 2, Company Two You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computers in Toronto by using ConfigMgr. The deployed image fails to activate. You need to ensure that the image meets company activation requirements. What should you do? Case Study Title (Case Study): Background You are the desktop architect for a company with 10,000 client computers. Client computers are either portable

181 or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. All servers run Windows Servers 2008 R2. The regional offices are listed in the following table with users and WAN connection speeds. Users in the New York office will have a Customer Relationship Management (CRM) application that is CPUintensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. Business Requirements The following business requirements must be maintained or exceeded: Software Asset Management The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. Technology Requirements You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. Virtualization infrastructure You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. New Functionality The fewest number of servers should be added to the environment to meet the technical goals. A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. Technical Requirements The following technical requirements must be maintained or exceeded: Infrastructure Requirements All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments.

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo Vendor: Microsoft Exam Code: 70-686 Exam Name: Pro: Windows 7, Enterprise Desktop Administrator Version: Demo Question No : 1 You are planning to upgrade Internet Explorer. You have the following requirements:

More information

Certify-Me. Number: Passing Score: 700 Time Limit: 120 min File Version: 1.1. Microsoft

Certify-Me.   Number: Passing Score: 700 Time Limit: 120 min File Version: 1.1. Microsoft Certify-Me Number: 070-686 Passing Score: 700 Time Limit: 120 min File Version: 1.1 http://www.gratisexam.com/ Microsoft 70-686 We only provide the real exam with quality. Your effort is just practice

More information

Exam Questions

Exam Questions Exam Questions 70-686 Pro: Windows https://www.2passeasy.com/dumps/70-686/ 1.u are designing a Windows 7 virtual desktop infrastructure. You have the following requirements:. Provide access to Remote Desktop

More information

TS: Windows Server 2008 R2, Desktop Virtualization

TS: Windows Server 2008 R2, Desktop Virtualization TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 120 min File Version: 1.2 http://www.gratisexam.com/ Microsoft EXAM 70-669 TS:Windows Server 2008 R2,Desktop

More information

Vendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo Vendor: Microsoft Exam Code: 70-415 Exam Name: Implementing a Desktop Infrastructure Version: Demo Testlet 1 Proseware Inc Overview Proseware, Inc. is an independent software vendor. The company has a

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Vendor: Microsoft Exam Code: 70-682 Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Version: DEMO QUESTION 1 Scenario 1 For your convenience, the scenario is repeated

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

TS: Windows 7 and Office 2010, Deploying

TS: Windows 7 and Office 2010, Deploying 70-681 TS: Windows 7 and Office 2010, Deploying Version 3.1 QUESTION NO: 1 Windows Server 2008 R2. You install Microsoft Deployment Toolkit (MDT) 2010 on a server named Server1. You install Microsoft SQL

More information

Vendor: Microsoft. Exam Code: Exam Name: Administering Windows Server Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Administering Windows Server Version: Demo Vendor: Microsoft Exam Code: 70-411 Exam Name: Administering Windows Server 2012 Version: Demo DEMO QUESTION 1 You have a server named Server1 that runs Windows Server 2012 R2. You need to configure Server1

More information

Windows 7, Configuring

Windows 7, Configuring Windows 7, Configuring Microsoft 70-680 Dumps Available Here at: /microsoft-exam/70-680-dumps.html Enrolling now you will get access to 493 questions in a unique set of 70-680 dumps Question 1 Your company

More information

Windows 8 Deployment

Windows 8 Deployment Windows 8 Deployment Agenda Hardware/Software Compatibility and Toolsets Image Engineering and Deployment Volume Activation Security Management Application Lifecycle User Settings System Center 2012 Configuration

More information

Implement_a_Desktop_Infrastructure_v by.VINGADOR_PALADINO_BR

Implement_a_Desktop_Infrastructure_v by.VINGADOR_PALADINO_BR Implement_a_Desktop_Infrastructure_v2012-12-08.by.VINGADOR_PALADINO_BR Number: 70-415 Passing Score: 700 Time Limit: 140 min File Version: 2.1 http://www.gratisexam.com/ Exam 70-415 - Implementing a Desktop

More information

- Windows 7, Enterprise Desktop Administrator

- Windows 7, Enterprise Desktop Administrator - Windows 7, Enterprise Desktop Administrator Number: 70-686 Passing Score: 700 Time Limit: 120 min File Version: 2013-02-26 Sections 1. 1. Planning and Managing a Client Life Cycle Strategy 2. 2. Designing

More information

Managing and Maintaining Windows 8

Managing and Maintaining Windows 8 Managing and Maintaining Windows 8 Number: 070-688 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ All questions are taken from demo PDF files at: - Test4Actual - PassFine

More information

Lead2pass v12.39

Lead2pass v12.39 Lead2pass.70-681.v12.39 Number: 70-681 Passing Score: 800 Time Limit: 120 min File Version: 12.39 http://www.gratisexam.com/ Copyright @2006-2011 Lead2pass.com, All Rights Reserved. Vendor: Microsoft Exam

More information

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX KillTest Q&A Exam : 70-401 Title : MS System Center Configuration Manager2007, Configuring Version : Demo 1 / 7 1.You have a System Center Configuration Manager 2007 environment. A new branch office needs

More information

Microsoft Pro: Windows 7, Enterprise Desktop Administrator. Download Full Version :

Microsoft Pro: Windows 7, Enterprise Desktop Administrator. Download Full Version : Microsoft Pro: Windows 7, Enterprise Desktop Administrator Download Full Version : https://killexams.com/pass4sure/exam-detail/ Answer: A, F Section 2: Sec Two (178 to 188) Details:A. Background You are

More information

Exam Questions Demo Microsoft. Exam Questions

Exam Questions Demo   Microsoft. Exam Questions Microsoft Exam Questions 70-413 Designing and Implementing a Server Infrastructure Version:Demo 1. Your network contains an Active Directory domain. All servers run Windows Server 2012 R2. The domain contains

More information

Microsoft Windows 7, Configuring. Download Full version :

Microsoft Windows 7, Configuring. Download Full version : Microsoft 70-680 Windows 7, Configuring Download Full version : http://killexams.com/pass4sure/exam-detail/70-680 QUESTION: 151 You are deploying a number of Windows 7 laptops. You create a custom power

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

Microsoft Certification Exam

Microsoft Certification Exam Microsoft 70-680 Certification Exam Number: 70-680 Passing Score: 800 Time Limit: 120 min File Version: 72.4 http://www.gratisexam.com/ Microsoft 70-680 Certification Exam Exam Name: TS: Windows 7, Configuring

More information

Exam Questions

Exam Questions Exam Questions 70-642 TS: Windows Server 2008 Network Infrastructure - Configuring https://www.2passeasy.com/dumps/70-642/ 1. Your network contains an Active Directory forest. The forest contains a member

More information

Microsoft MCSE Exam

Microsoft MCSE Exam Microsoft MCSE 70-414 Exam Vendor:Microsoft Exam Code: 70-414 Exam Name: Implementing an Advanced Server Infrastructure www.ensurepass.com/70-414.html QUESTION 1 Your network contains an Active Directory

More information

Q&As. Pro. Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. Pass Microsoft Exam with 100% Guarantee

Q&As. Pro. Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. Pass Microsoft Exam with 100% Guarantee 70-682 Q&As Pro. Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Pass Microsoft 70-682 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing

More information

TS:Windows Server 2008 R2, Desktop Virtualiazation

TS:Windows Server 2008 R2, Desktop Virtualiazation TS:Windows Server 2008 R2, Desktop Virtualiazation Number: 070-669 Passing Score: 700 Time Limit: 165 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 All client computers in your company

More information

Microsoft Exam Implementing Desktop Application Environments Version: 8.0 [ Total Questions: 85 ]

Microsoft Exam Implementing Desktop Application Environments Version: 8.0 [ Total Questions: 85 ] s@lm@n Microsoft Exam 70-416 Implementing Desktop Application Environments Version: 8.0 [ Total Questions: 85 ] Topic 1, Litware, Inc Overview Litware, Inc., is a manufacturing company. A. Datum Corporation

More information

JapanCert 専門 IT 認証試験問題集提供者

JapanCert 専門 IT 認証試験問題集提供者 JapanCert 専門 IT 認証試験問題集提供者 http://www.japancert.com 1 年で無料進級することに提供する Exam : 70-646 Title : Windows Server 2008, Server Administrator Vendors : Microsoft Version : DEMO Get Latest & Valid 70-646 Exam's

More information

Yesuse

Yesuse Yesuse 70-169 Number: 70-169 Passing Score: 700 Time Limit: 120 min ht t p:/ / w w w.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 You create an email-enabled security group named Accounting. You add

More information

Exam by Mohd Ebrahim

Exam by Mohd Ebrahim 70-680 Exam by Mohd Ebrahim Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 You administer desktop that have 32-bit and 64-bit versions

More information

MOC 20411B: Administering Windows Server Course Overview

MOC 20411B: Administering Windows Server Course Overview MOC 20411B: Administering Windows Server 2012 Course Overview This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.   Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 70-350 Title : Implementing Microsoft Internet Security and Acceleration (ISA) Server 2004 Vendors : Microsoft Version

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Exam Questions

Exam Questions Exam Questions 70-695 Deploying Windows Devices and Enterprise Apps https://www.2passeasy.com/dumps/70-695/ NEW QUESTION 1 DRAG DROP You need to identify which issue prevents App1 from running. Which four

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Course: Windows 7 Enterprise Desktop Support Technician Boot Camp (MCITPWIN7)

Course: Windows 7 Enterprise Desktop Support Technician Boot Camp (MCITPWIN7) Course: Enterprise Desktop Support Technician Boot Camp (MCITPWIN7) Course Length: Duration 5 days Course Code: MCITPWIN7 Course Description Having reviewed course MS-50331 - Enterprise Support Technician

More information

Microsoft Exam

Microsoft Exam Volume: 60 Questions Testlet 1 Overview Fabrikam, Inc. is an advertising company that has 100 employees. The company has managers and has users in the sales department, the telemarketing department, and

More information

MCSE- Windows Server 2012

MCSE- Windows Server 2012 COURSE CONTENT MCSE- Windows Server 2012 Course 20413C: Designing and Implementing a Server Infrastructure 1. Planning Server Upgrade and Migration Considerations for Upgrades and Migrations Creating a

More information

Exam

Exam Exam 70-697 Number: 70-697 Passing Score: 800 Time Limit: 120 min File Version: 8.0 Exam Microsoft Exam 70-697 Configuring Windows Devices Exam A QUESTION 1 You are setting up a Windows 10 Enterprise computer.

More information

Exam Questions Demo Microsoft. Exam Questions Managing and Maintaining Windows 8.

Exam Questions Demo   Microsoft. Exam Questions Managing and Maintaining Windows 8. Microsoft Exam Questions 70-688 Managing and Maintaining Windows 8.1 Version:Demo 1. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Microsoft. Exam Questions Managing and Maintaining Windows 8.1. Version:Demo

Microsoft. Exam Questions Managing and Maintaining Windows 8.1. Version:Demo Microsoft Exam Questions 70-688 Managing and Maintaining Windows 8.1 Version:Demo 1. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private

More information

PASS4TEST 専門 IT 認証試験問題集提供者

PASS4TEST 専門 IT 認証試験問題集提供者 PASS4TEST 専門 IT 認証試験問題集提供者 http://www.pass4test.jp 1 年で無料進級することに提供する Exam : 70-697 Title : Configuring Windows Devices Vendor : Microsoft Version : DEMO Get Latest & Valid 70-697 Exam's Question and Answers

More information

Vendor: Microsoft. Exam Code: Exam Name: Implementing Desktop Application Environments. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Implementing Desktop Application Environments. Version: Demo Vendor: Microsoft Exam Code: 70-416 Exam Name: Implementing Desktop Application Environments Version: Demo Testlet 1 Litware, Inc Overview Litware, Inc., is a manufacturing company. A. Datum Corporation

More information

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver :

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver : Exam : 070-647 Title : PRO: Windows Server 2008, Enterprise Administrator Ver : 06-26-2008 QUESTION 1 You are an enterprise administrator for Certkiller. The company has a head office in San Diego and

More information

Microsoft MCITP Exam

Microsoft MCITP Exam Microsoft MCITP 70-685 Exam Vendor:Microsoft Exam Code: 70-685 Exam Name: Pro: Windows 7, Enterprise Desktop Support Technician QUESTION 1 Users are prompted for authentication credentials when they browse

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Microsoft Windows Server

More information

Identity with Windows Server 2016 (742)

Identity with Windows Server 2016 (742) Identity with Windows Server 2016 (742) Install and Configure Active Directory Domain Services (AD DS) Install and configure domain controllers This objective may include but is not limited to: Install

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan Administering Windows Server 2012 R2 Exam 70-411 Patrick Regan Wiley Contents j Lesson 1: Deploying and Managing Server Images 1 Using Windows Deployment Services 2 Installing the Windows Deployment Services

More information

This course provides students with the knowledge and skills to administer Windows Server 2012.

This course provides students with the knowledge and skills to administer Windows Server 2012. MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module

More information

Microsoft Now with Questions & Answers

Microsoft Now with Questions & Answers Microsoft 70-646 Now with Questions & Answers Number: 70-646 Passing Score: 700 Time Limit: 240 min File Version: 33.4 http://www.gratisexam.com/ Microsoft 70-646 Now with Questions & Answers Exam Name:

More information

Windows Server 2008 Administration

Windows Server 2008 Administration Hands-On Course Description This course provides hands on experience installing and configuring Windows Server 2008 to work with clients including Windows Vista. Students will perform full and core CD-based

More information

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise

70-643: Windows Server 2008 Applications Infrastructure. Course 01 - Deploying Windows in the Enterprise 70-643: Windows Server 2008 Applications Infrastructure Course 01 - Deploying Windows in the Enterprise Slide 1 Deploying Windows in the Enterprise How to deploy Windows in the 2008 Server Environment

More information

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Page 1 of 10 Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Course 6416D: 4 days; Instructor-Led

More information

Exam Questions

Exam Questions Exam Questions 70-980 Recertification for MCSE: Server Infrastructure https://www.2passeasy.com/dumps/70-980/ 1. You need to recommend which type of clustered file server and which type of file share must

More information

Correct Answer: C. Correct Answer: B

Correct Answer: C. Correct Answer: B QUESTION 1 Your company has a main office. The main office is located in a building that has 10 floors. A datacenter on the ground floor contains a Windows Server 2012 failover cluster. The failover cluster

More information

exam.67q. Deploying Windows Devices and Enterprise Apps

exam.67q.   Deploying Windows Devices and Enterprise Apps 70-695.exam.67q Number: 70-695 Passing Score: 800 Time Limit: 120 min File Version: 1 VCE to PDF Converter : https://vceplus.com/vce-to-pdf/ Facebook: https://www.facebook.com/vce.for.all.vn/ Twitter :

More information

Configuring Windows 8 Course 20687A - Five days - Instructor-led - Hands-on

Configuring Windows 8 Course 20687A - Five days - Instructor-led - Hands-on Configuring Windows 8 Course 20687A - Five days - Instructor-led - Hands-on Introduction This course provides students hands-on experience with Windows 8. It provides guidance on installing, upgrading,

More information

Microsoft Pro: Windows Server 2008, Server Administrator. Practice Test. Updated: Jan 19, 2010 Version

Microsoft Pro: Windows Server 2008, Server Administrator. Practice Test. Updated: Jan 19, 2010 Version Microsoft 70-646 70-646 Pro: Windows Server 2008, Server Administrator Practice Test Updated: Jan 19, 2010 Version QUESTION NO: 1 Microsoft 70-646: Practice Exam consists of 200 Windows Server 2008 servers.

More information

Getting Started with VMware View View 3.1

Getting Started with VMware View View 3.1 Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation

More information

Exam Name: TS: Upgrading from Windows Server 2003 MCSA to Windows Server 2008,Technology Specializations

Exam Name: TS: Upgrading from Windows Server 2003 MCSA to Windows Server 2008,Technology Specializations Vendor: Microsoft Exam Code: 70-648 Exam Name: TS: Upgrading from Windows Server 2003 MCSA to Windows Server 2008,Technology Specializations Version: DEMO QUESTION 1 Your company has an Active Directory

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Microsoft Designing and Implementing a Server Infrastructure. Download Full Version :

Microsoft Designing and Implementing a Server Infrastructure. Download Full Version : Microsoft 70-413 Designing and Implementing a Server Infrastructure Download Full Version : http://killexams.com/pass4sure/exam-detail/70-413 Explanation: Invoke-IpamGpoProvisioning Creates and links group

More information

TS: Windows Server 2008 R2, Desktop Virtualization

TS: Windows Server 2008 R2, Desktop Virtualization 70-669 - TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 100 min File Version: 1.0 http://www.gratisexam.com/ Microsoft EXAM 70-669 - TS:Windows Server

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

6293A Troubleshooting and Supporting Windows 7 in the Enterprise

6293A Troubleshooting and Supporting Windows 7 in the Enterprise 6293A Troubleshooting and Supporting Windows 7 in the Enterprise Course Number: 6293A Course Length: 3 Days Course Overview This course is designed for Information Technology (IT) professionals who have

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 70-620 Passing Score: 700 Time Limit: 120 min File Version: 9.5 http://www.gratisexam.com/ PrepKing 70-620 Exam A QUESTION 1 128 megabytes (MB) of dedicated video memory You want to install

More information

Microsoft Exactexams Questions & Answers

Microsoft Exactexams Questions & Answers Microsoft Exactexams 70-410 Questions & Answers Number: 70-410 Passing Score: 800 Time Limit: 120 min File Version: 32.7 http://www.gratisexam.com/ Microsoft 70-410 Questions & Answers Exam Name: Installing

More information

70-414: Implementing an Advanced Server Infrastructure - Microsoft

70-414: Implementing an Advanced Server Infrastructure - Microsoft 70-414: Implementing an Advanced Server Infrastructure - Microsoft Number: 000-001 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ 70-414: Implementing an Advanced Server

More information

Windows Server 2008, Server Administrator. This practice exam has explanations for all questions so that you can understand all concepts.

Windows Server 2008, Server Administrator. This practice exam has explanations for all questions so that you can understand all concepts. 70-646 - Windows Server 2008, Server Administrator Passing Score: 700 Time Limit: 210 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Exams - Just Another All in One TestKing Sites This practice

More information

Implementing a Desktop Infrastructure

Implementing a Desktop Infrastructure 20415 - Implementing a Desktop Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5-day instructor-led training course provides you

More information

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016 indows Server 2016 MCSA 2016 MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA 2016 70-740: Installation, Storage, and Compute with Windows Server 2016 70-741: Networking with Windows

More information

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Number: 1Y0-200 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Exam Name: Managing

More information

70-410: Installing and Configuring Windows Server 2012

70-410: Installing and Configuring Windows Server 2012 70-410: Installing and Configuring Windows Server 2012 The following tables itemize changes to Exam 70-410. These changes will be made in January to include updates that relate to Windows Server 2012 R2

More information

"Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary

Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary Course Summary Description This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance

More information

Deploying Windows Server 2008 with System Center

Deploying Windows Server 2008 with System Center Windows Server 2008 At a glance: Configuration Manager deployment features Creating and customising a server task sequence Adding server roles Setting computer-specific variables Deploying Windows Server

More information

Vendor: Microsoft. Exam Code: Exam Name: Installing and Configuring Windows Server Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Installing and Configuring Windows Server Version: Demo Vendor: Microsoft Exam Code: 70-410 Exam Name: Installing and Configuring Windows Server 2012 Version: Demo DEMO QUESTION 1 You have a server named Core1 that has a Server Core Installation of Windows

More information

microsoft. Number: Passing Score: 800 Time Limit: 120 min.

microsoft. Number: Passing Score: 800 Time Limit: 120 min. 70-743 microsoft Number: 70-743 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 QUESTION 1 Note: This question is part of a series of a questions that present the same scenario. Each question

More information

MCSA Windows Server 2012

MCSA Windows Server 2012 MCSA Windows Server 2012 This Training Program prepares and enables learners to Pass Microsoft MCSA: Windows Server 2012 exams 1. MCSA: Windows Server 2012 / 70-410 Exam (Installing and Configuring Windows

More information

Implementing a Desktop Infrastructure

Implementing a Desktop Infrastructure Course 20415: Implementing a Desktop Infrastructure Page 1 of 7 Implementing a Desktop Infrastructure Course 20415: 4 days; Instructor-Led Introduction This 4-day instructor-led course provides you with

More information

Windows Server 2016 MCSA Bootcamp

Windows Server 2016 MCSA Bootcamp Course Overview This course will provide experienced IT professionals who wish to either upgrade their skills for the purpose of certifying on Microsoft Windows Server 2016 or who wish to gain information

More information

Microsoft Exam Recertification for MCSE: Desktop Infrastructure Version: 5.0 [ Total Questions: 180 ]

Microsoft Exam Recertification for MCSE: Desktop Infrastructure Version: 5.0 [ Total Questions: 180 ] s@lm@n Microsoft Exam 70-982 Recertification for MCSE: Desktop Infrastructure Version: 5.0 [ Total Questions: 180 ] Topic 1, Proseware Inc Microsoft 70-982 : Practice Test Overview Proseware, Inc. is an

More information

Deploying Windows 7 Using MDT UDI

Deploying Windows 7 Using MDT UDI The Microsoft Deployment Toolkit (MDT) supports three types of deployments Zero Touch Installation (ZTI), Lite Touch Installation (LTI), and User Driven Installation (UDI). However each deployment type

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Exam Blueprint (Updated 2/18/14)

Exam Blueprint (Updated 2/18/14) This study sheet is for Exam 70-410 Installing and Configuring Windows Server 2012. Checking the below check boxes indicates that GUI and PowerShell have been done. Section 1 Install and configure servers

More information

Microsoft Exam Implementing an Advanced Server Infrastructure Version: 19.0 [ Total Questions: 243 ]

Microsoft Exam Implementing an Advanced Server Infrastructure Version: 19.0 [ Total Questions: 243 ] s@lm@n Microsoft Exam 70-414 Implementing an Advanced Server Infrastructure Version: 19.0 [ Total Questions: 243 ] Microsoft 70-414 : Practice Test Topic break down Topic No. of Questions Topic 1: Contoso,

More information

EXAM Buy Full Product.

EXAM Buy Full Product. Microsoft EXAM - 70-649 TS: Upgrading MCSE on Windows Server 2003 to Windows Server 2008, Technology Specialist Buy Full Product http://www.examskey.com/70-649.html Examskey Microsoft 70-649 exam demo

More information

70-669_. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Microsoft

70-669_.   Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Microsoft 70-669_ Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Microsoft 70-669 TS: Windows Server 2008

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

MCSA Windows 10. A Success Guide to Prepare- Microsoft Configuring Windows Devices. edusum.com

MCSA Windows 10. A Success Guide to Prepare- Microsoft Configuring Windows Devices. edusum.com 70-697 MCSA Windows 10 A Success Guide to Prepare- Microsoft Configuring Windows Devices edusum.com Table of Contents Introduction to 70-697 Exam on Microsoft Configuring Windows Devices... 2 Microsoft

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

Designing Windows Server 2008 Network and Applications Infrastructure

Designing Windows Server 2008 Network and Applications Infrastructure Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of

More information

Installing and Configuring Windows Server 2012 R2

Installing and Configuring Windows Server 2012 R2 Installing and Configuring Windows Server 2012 R2 Exam 70-410 Craig Zacker Wiley Lesson 1: Installing Servers 1 Selecting a Windows Server 2012 R2 Edition 2 Supporting Server Roles 3 Supporting Server

More information

MS Exam Objectives Installing and Configuring Windows Server 2012 R2

MS Exam Objectives Installing and Configuring Windows Server 2012 R2 MS 70-410 Exam Objectives Installing and Configuring Windows Server 2012 R2 Click here for the CertBlaster Practice Tests for 70-410 Below are the exam objectives for Installing and Configuring Windows

More information

Exam Identity with Windows Server 2016

Exam Identity with Windows Server 2016 MCSA / MCSE for Windows Server 2016 Exam 70-742 Identity with Windows Server 2016 Version 15.35 (198 Questions) (70-742) Identify with Windows Server 2016 QUESTION 1 You have a server named Server1 that

More information

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led

IMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IMPLEMENTING A DESKTOP INFRASTRUCTURE Course: 20415A Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This 5-day instructor-led course provides you with

More information

Implementing Desktop Application Environments

Implementing Desktop Application Environments Implementing Desktop Application Environments Course # Exam: Prerequisites Technology: Delivery Method: Length: 20416 70-416 20415 Windows Server Instructor-led (classroom) 5 Days Overview About this Course

More information

20413B: Designing and Implementing a Server Infrastructure

20413B: Designing and Implementing a Server Infrastructure 20413B: Designing and Implementing a Server Infrastructure Course Outline Course Introduction Course Introduction Module 01 - Planning a Server Upgrade and Migration Lesson 1: Upgrade and Migration Considerations

More information