Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo

Similar documents
- Windows 7, Enterprise Desktop Administrator

Certify-Me. Number: Passing Score: 700 Time Limit: 120 min File Version: 1.1. Microsoft

Exam Questions

Vendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Administering Windows Server Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Implementing Desktop Application Environments. Version: Demo

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo

Exam Questions

Vendor: Microsoft. Exam Code: Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring. Version: Demo

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

TS: Windows Server 2008 R2, Desktop Virtualization

Vendor: Microsoft. Exam Code: Exam Name: Installing and Configuring Windows Server Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Implementing an Advanced Server Infrastructure. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Managing Citrix XenDesktop 7.6 Solutions. Version: Demo

Q&As. Identity with Windows Server Pass Microsoft Exam with 100% Guarantee

Vendor: Microsoft. Exam Code: Exam Name: Configuring Advanced Windows Server 2012 Services. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Microsoft Pro: Windows 7, Enterprise Desktop Administrator. Download Full Version :

Q&As. Pro. Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. Pass Microsoft Exam with 100% Guarantee

Exam Questions Demo Microsoft. Exam Questions Managing and Maintaining Windows 8.

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Exam Questions Demo Microsoft. Exam Questions

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo

Microsoft MCSE Exam

Microsoft. Exam Questions Managing and Maintaining Windows 8.1. Version:Demo

TS: Windows 7 and Office 2010, Deploying

Windows 8 Deployment

Microsoft Exam Implementing Desktop Application Environments Version: 8.0 [ Total Questions: 85 ]

MOC 20411B: Administering Windows Server Course Overview

Windows 7, Configuring

Microsoft Exam

Advanced Security Measures for Clients and Servers

Q&As. Windows Operating System Fundamentals. Pass Microsoft Exam with 100% Guarantee

Yesuse

TestsDumps. Latest Test Dumps for IT Exam Certification

COPYRIGHTED MATERIAL. Contents. Assessment Test

MCSE- Windows Server 2012

Identity with Windows Server 2016 (742)

Microsoft Designing and Implementing a Server Infrastructure. Download Full Version :

Lead2pass v12.39

Exam : JN Title : Juniper Networks Certified Internet Assoc(JNCIA-SSL) Exam. Version : Demo

Implement_a_Desktop_Infrastructure_v by.VINGADOR_PALADINO_BR

Exam Questions

Vendor: IBM. Exam Code: Exam Name: IBM FileNet P8 V5.1. Version: Demo

This course provides students with the knowledge and skills to administer Windows Server 2012.

JapanCert 専門 IT 認証試験問題集提供者

Q&As Networking with Windows Server 2016

Vendor: VMware. Exam Code: VCP510-DT. Exam Name: VMware Certified Professional 5 - Desktop. Version: Demo

Exam Questions

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Enable the Always Offline Mode to Provide Faster Access to Files

VMware Mirage Getting Started Guide

Copyright and Trademarks

Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0

Managing and Maintaining Windows 8

Implementing Desktop Application Environments

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Exam Identity with Windows Server 2016

Microsoft Certification Exam

Deploying Windows Server 2008 with System Center

Microsoft Recertification for MCSE: Server Infrastructure. Download Full Version :

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee

Course: Windows 7 Enterprise Desktop Support Technician Boot Camp (MCITPWIN7)

Microsoft Pro: Windows Server 2008, Server Administrator. Practice Test. Updated: Jan 19, 2010 Version

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Getting Started with VMware View View 3.1

Exam Name: VMware Certified Professional 6 Data Center Virtualization Delta Beta

Microsoft Exactexams Questions & Answers

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

PASS4TEST 専門 IT 認証試験問題集提供者

Installing and Configuring vcloud Connector

Q&As Administering Visual Studio Team Foundation Server 2012

Exam : ST Title : Altiris Client Management Suite 7.0 (STS) Version : Demo

Windows Server 2003 Network Administration Goals

Exam Questions

Privileged Identity App Launcher and Session Recording

x CH03 2/26/04 1:24 PM Page

Windows Server 2016 MCSA Bootcamp

Designing and Implementing a Server Infrastructure

Exam Name: TS: Upgrading from Windows Server 2003 MCSA to Windows Server 2008,Technology Specializations

Windows Server 2008 Administration

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Microsoft Windows 7, Configuring. Download Full version :

Q&As Managing Office 365 Identities and Requirements

- Windows 7, Enterprise Desktop Administrator

VMware Mirage Web Manager Guide

Exam : Title : PRO: Windows Server 2008, Enterprise Administrator Ver :

Managing Group Policy application and infrastructure

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Managing Citrix XenDesktop 7 Solutions Exam. Version: Demo

Installing and Configuring Windows Server 2012 R2

70-411: Administrating Windows Server 2012

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

Exam : Title : A+ OS TECHNOLOGY(2003 Objectives) Version : DEMO

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics NAV 2013 Installation & Configuration. Version: Demo

Q&As Recertification for MCSE: Server Infrastructure

Transcription:

Vendor: Microsoft Exam Code: 70-686 Exam Name: Pro: Windows 7, Enterprise Desktop Administrator Version: Demo

Question No : 1 You are planning to upgrade Internet Explorer. You have the following requirements: You need to design a deployment method that meets the requirements. What should you do? A. Use Windows Server Update Services (WSUS). B. Use Internet Explorer Administration Kit (IEAK) and Group Policy. C. Use Microsoft System Center Configuration Manager. D. Use Microsoft System Center Essentials. Answer: A Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update. http://en.wikipedia.org/wiki/windows_server_update_services Question No : 2 Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: You need to design a deployment strategy that meets the requirements. Which deployment method should you use? 2

A. Microsoft Application Virtualization (App-V) B. Microsoft System Center Configuration Manager 2007 C. RemoteApp and Desktop Connections D. software installation in Group Policy Answer: C http://blogs.msdn.com/b/rds/archive/2009/06/08/introducing-remoteapp-and-desktopconnections.aspx The RemoteApp and Desktop Connections feature offers several benefits: RemoteApp programs launch from the Start menu just like any other application. Published Remote Desktop connections are included alongside RemoteApp programs on the Start menu. Changes to the published connection (such as newly published RemoteApp programs) are automatically reflected on the user s Start menu, without any effort on the user s part. RemoteApp programs can be easily launched with Windows Search. Users only have to log on once, to create the connection. From that point on, updates happen with no prompt for user credentials. RemoteApp and Desktop Connections does not require domain membership for client computers. RemoteApp and Desktop Connections benefits from new features in Windows Server 2008 R2, such as Personal Desktop assignment or per-user application filtering. RemoteApp and Desktop Connections is built on standard technologies such as XML and HTTPS, making it possible for developers to build solutions around it. It also offers APIs that allow the client software to support other types of resources, in addition to RemoteApp programs and Remote Desktop connections. Question No : 3 Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP. Nine hundred of the computers are on the local area network. One hundred computers are portable computers that connect to the main office only once every few months. You are planning to deploy Windows 7. 3

You need to generate a report of the software that is installed on all client computers. You need this information as soon as possible. What should you use? A. Microsoft System Center Data Protection Manager B. Microsoft Desktop Optimization Pack C. Microsoft System Center Essentials D. Microsoft System Center Operations Manager Answer: B Question No : 4 Your network has client computers that run Windows Vista. What should you do? A. Use the Standard User Analyzer (SUA) Wizard. B. Run a virtual version of the Setup Analysis Tool (SAT). C. Use the Standard User Analyzer (SUA) tool. D. Run a stand-alone version of the Setup Analysis Tool (SAT). Answer: C The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx Question No : 5 Your company s network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers 4

organizational unit (OU). The company wants to deploy a new application. The application is not packaged. You have the following requirements: You need to plan the software deployment process to meet the requirements. Which two actions should you include in the process? (Each correct answer presents part of the solution. Choose two.) A. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department computers, and assign the package to the collection. B. Create a package by using Microsoft System Center Configuration Manager. C. Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container. D. In the Group Policy Management Console, link the software installation policy to the Shipping Computers OU. E. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department users, and assign the package to the collection. Answer: A,B Hints: GPO only support MSI & ZAP file type this application is not packaged = non MSI or ZaP file type Question No : 6 Your network has client computers that run Windows XP. All users access a custom line-ofbusiness application. The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7. You have the following requirements: You need to manage application compatibility to meet the requirements. 5

What should you do? A. Install the application on a Remote Desktop Services server. B. Install a shim for the application on each client computer. C. Virtualize the application by using Microsoft Application Virtualization (App-V). D. Install the Windows Compatibility Evaluator on each client computer. Answer: B Question No : 7 Your company has 1,000 client computers that run Windows XP Professional x64. You are planning to deploy Windows 7 Enterprise x64. The company uses an application that is incompatible with Windows 7 Enterprise x64. You have the following requirements: You need to design a solution that meets the requirements. What should you do? A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab. B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode. C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer. D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V. Answer: C Question No : 8 6

Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7. You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. Which tool should you use? A. Windows Compatibility Evaluator B. Setup Analysis Tool C. Inventory Collector D. Update Compatibility Evaluator Answer: B http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx The Setup Analysis Tool (SAT) automates the running of application installations while monitoring the actions taken by each application s installer. The standalone version of SAT can monitor any MSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-based installers and third-party installers that run unattended. hints: You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. Question No : 9 Your companys network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU). The network design is shown in the following diagram. 7

You are planning to deploy an application. The application is packaged as a Microsoft Windows Installer package (MSI). You need to deploy the application only to computers in the shipping department. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Link the software installation policy to the Workstations OU. B. Link the software installation policy to the Shipping Computers OU. C. Create a new Group Policy object (GPO) and add a software installation policy under the User Configuration container. D. Create a new Group Policy object (GPO) and add a software installation policy under the Computer Configuration container. Answer: B,D To specify how and when computers are updated through Group Policy In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update. In the details pane of Group Policy Object Editor, configure the appropriate policies. See the following table for examples of the policies you might want to set.. 8

refer to http://technet.microsoft.com/en-us/library/cc708536(v=ws.10).aspx Hints: Workstations OU = engineering computer OU + finance computer OU + shipphing computer OU Question No : 10 Your companys network has client computers that run Windows 7. When a user attempts to log on to the domain from a computer named Client1, she receives the following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect. You need to ensure that the user can log on to the domain from Client1. What should you do? A. Disjoin and rejoin Client1 to the domain. B. Reset the account password for Client1 through Active Directory Users and Computers. C. Add the computer account for Client1 to the Domain Computers Active Directory group. D. Reset the account password for the user through Active Directory Users and Computers. Answer: A Re-create the computer account, join a workgroup, and then rejoin the domain. refer to http://support.microsoft.com/kb/810497 Question No : 11 Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains. Users in both domains can log on to client computers in only their own domains. System 9

logs on the domain controllers display the error message Clock skew too great when users in Domain1 attempt to log on to client computers in Domain2. You need to ensure that users can log on to client computers in both domains. What should you do? A. Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object ( GPO ). B. Configure the primary domain controller (PDC) emulatorin each domain to synchronize its clock with the same external time source. C. Run a startup script that includes Net Time /setsntp on all client computers. D. Run a startup script that includes Net Time /querysntp on all client computers. Answer: B Question No : 12 Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in the following diagram. 10

Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO. A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that are in the Kiosk Computers OU. You need to ensure that the user configuration settings are correctly applied. What should you do? A. Enable loopback processing in Merge mode on the Default Domain Policy GPO. B. Disable the user configuration settings on the Default Domain Policy GPO. C. Enable loopback processing in Replace mode on the Kiosk Computers GPO. D. Disable the user configuration settings on the New York Users GPO. Answer: C Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92 Question No : 13 You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom application. You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the custom application. You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive the new GPO. What should you do? A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Allow-Apply Group Policy permission for the GPO. B. Move marketing users to a dedicated organizational unit (OU). Apply the Block 11

Inheritance setting to the OU. C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Deny-Apply Group Policy permission for the GPO. D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain. Answer: C Question No : 14 You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. What should you do? A. Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box. B. Use the Group Policy Update utility to refresh Group Policy. C. Enable Internet Explorer Maintenance Policy Processing in Group Policy. D. Enable User Group Policy loopback processing mode. Answer: C nternet Explorer Maintenance policy processing This policy affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer Maintenance. It overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed. If you enable this policy, you can use the check boxes provided to change the options. Allow processing across a slow network connection updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. Do not apply during periodic background processing prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data. 12

Process even if the Group Policy objects have not changed updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. http://technet.microsoft.com/en-us/library/cc978526.aspx Question No : 15 Your companys network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication ProtocolCTransport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do? A. Install a certificate in the Trusted Root Certification Authorities certificate store. B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport Layer Security (PEAP-TLS). C. Configure client computers to use Protected Extensible Authentication Protocol- Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2). D. Install a certificate in the Third-Party Root Certification Authorities certificate store. Answer: A Question No : 16 Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers. 13

The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security. What should you do? A. Create an Isolation rule and specify Request authentication for inbound and outbound connections. B. Create a Tunnel rule and specify Gateway-to-client as the tunnel type. C. Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address. D. Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list. Answer: C The PDC emulator master also serves as the machine to which all domain controllers in the domain will synchronise their clocks. It, in turn, should be configured to synchronise to an external NTP time source http://en.wikipedia.org/wiki/primary_domain_controller Question No : 17 You deploy Windows 7 to the computers that are used by your companys Web developers. All Web developer user accounts are in a single organizational unit (OU). Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers. You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications. What should you do? A. Enable Compatibility View in Internet Explorer. B. Add each server to the Intranet zone. 14

C. Add each server to the Trusted Sites zone. D. Set the default security setting in Internet Explorer to Medium. Answer: B Pop-up Blocker features Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside the viewable desktop area. For more information, see "Windows Restrictions" in this document. When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual manner. Note that sites in the Trusted Sites and Local Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet Options. http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx hints: internal web, so i choose intranet zones. Local Intranet Zone By default, the Local Intranet zone contains all network connections that were established by using a Universal Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, http://local), as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the Local intranet zone. Trusted Sites Zone This zone contains Web sites that you trust as safe (such as Web sites that are on your organization's intranet or that come from established companies in whom you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low. http://support.microsoft.com/kb/174360 15

Question No : 18 Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available in the Group Policy editing session. You need to ensure that the ADMX files are available to the GPO Editor. What should you do? A. Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restart the GPO Editor. B. Set the network share permissions to grant all Windows 7 users Read access for the share. C. Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and then restart the GPO Editor. D. Copy the ADMX files to the central store, and then restart the GPO Editor. Answer: D http://support.microsoft.com/kb/929841 To take advantage of the benefits of.admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any.admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. Question No : 19 DRAG DROP You are planning to deploy Windows 7 Enterprise to all of your company's client computers. You have the following requirements: Create two custom partitions on each client computer's hard disk, one for the operating 16

system and the other for data. Automatically create the partitions during Windows Setup. You need to design an image that meets the requirements. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order) Answer: Question No : 20 DRAG DROP All client computers in an organization run Windows 7 and are joined to an Active Directory Domain Services (AD DS) domain. All user objects are stored in an Organizational Unit (OU) named Contoso Users. All computer objects are stored in an OU named Contoso Computers. 17

You need to add a proxy server to the Microsoft Internet Explorer 9 configuration on all client computers by using the least administrative effort. Which three actions should you perform? (To answer, move the appropriate action from the list of actions to the answer area and arrange them in the correct order.) Answer: Question No : 21 DRAG DROP You are designing an application deployment strategy. Application deployments must meet the following requirements: They must be able to use Setup.exe. They must not require Active Directory. 18

They must not require a constant network connection. The application installation schedule must be easy to set up and implement. You need to recommend a method that meets the requirements. What should you recommend? (To answer, drag the appropriate deployment method from the list of deployment methods to the correct location or locations in the work area.) Answer: 19

Question No : 22 When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message. You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC. To which group should you add the user? A. Add the user to the Power Users group on Server1. B. Add the user to the Remote Desktop Users group on Server1. C. Add the user to the domain Windows Authorization Access group. D. Add the user to the domain Remote Desktop Users group 20

Answer: B Question No : 23 A company has an Active Directory Domain Services (AD DS) forest with a single domain. Domain controllers are located in the companys offices in New York and Boston. You deploy a group policy at the domain level that includes security filtering. You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office. You suspect there might be replication problems with the policies. What should you do? A. Run a Group Policy Results report against computers in the Boston office. B. Run a Group Policy Modeling report against computers in the Boston office. C. Use the GpoTool.exe command-line tool. D. Use the RepAdmin.exe command-line tool. Answer: A Question No : 24 Your companys network has client computers that run Windows 7. A software vendor releases version 2 of an application that your company uses. Your company currently uses version 1. Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application. You have the following requirements: 21

You need to plan a software deployment process that meets the requirements. What should you do? (Choose all that apply.) A. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B. Deploy version 2 of the application by using Microsoft Enterprise Desktop (MED-V). C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp. D. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package. Answer: A,B Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real-time to any client from a virtual application server. It removes the need for local installation of the applications. Instead, only the App-v client needs to be installed on the client machines. All application data is permanently stored on the virtual application server. Whichever software is needed is either streamed or locally cached from the application server on demand and run locally. The App-V stack sandboxes the execution environment so that the application does not make changes to the client itself (OS File System and/or Registry). App-V applications are also sandboxed from each other, so that different versions of the same application can be run under App-V concurrently. http://en.wikipedia.org/wiki/microsoft_app-v Question No : 25 A company uses Microsoft Deployment Toolkit (MDT) 2010 to deploy Windows 7 Enterprise and Microsoft Office 2010. The company is replacing existing computers with new 64-bit computers. You have the following requirements: You need to create an image that meets these requirements. What should you do? (Choose all that apply.) A. Import the Windows 7 Enterprise x86 source files. B. From the MDT deployment workbench, select the Custom Task Sequence template. 22

C. Use a reference computer and capture a WIM image. D. From the MDT deployment workbench, select the Sysprep and Capture template. E. Import the necessary OEM drivers. F. Import the 32-bit version of Office 2010. G. Import the 64-bit version of Office 2010. H. Import the Windows 7 Enterprise x64 source files. Answer: A,B,E,F hints: The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from the manufacturer. Question No : 26 Your company s network includes a main office and several branch offices. The branch offices are connected to the main office by high-latency links. All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. Servers are located in each of the branch offices. Client computers in the branch offices frequently access a specific group of files on a file server named Server1. These access requests consume significant amounts of bandwidth and reduce the speed of higher-priority traffic. You need to reduce the bandwidth that is consumed by requests for frequently accessed files. What should you do? A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices. B. Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices. C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on a server computer in only the branch offices. D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache mode on a server computer in only the branch offices. 23

Answer: C BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode). Distributed Cache mode If client computers are configured to use Distributed Cache mode, the cached content is distributed among client computers on the branch office network. No infrastructure or services are required in the branch office beyond client computers running Windows 7. Hosted Cache mode In hosted cache mode, cached content is maintained on a computer running Windows Server 2008 R2 on the branch office network. hints: no server are located in the branch office. http://technet.microsoft.com/en-us/library/dd637832(v=ws.10).aspx Question No : 27 A Windows Server 2008 R2 server named SERVER01 has the Windows Deployment Services (WDS) role installed. SERVER02 is running DHCP services. You prestage computer objects in Active Directory. You plan to use WDS to deploy Windows 7 to the prestaged computers. When you try to deploy an image by using PXE, the process fails. You need to ensure that SERVER01 responds to prestaged client computers only. From WDS, what should you do? (Choose all that apply.) A. On the DHCP tab, select Configure DHCP option 60 to indicate that this server is also a PXE server. B. On the Advanced tab, select Authorize this Windows Deployment Services server in DHCP. C. On the PXE Response tab, select Respond to all client computers (known and unknown). D. On the DHCP tab, select Do not listen on Port 67. E. On the PXE Response tab, select Respond only to known client computers. F. On the Advanced tab, select Do not authorize this Windows Deployment Services server in DHCP. 24

Answer: B,E hints: prestaged computers = known client computers Question No : 28 HOTSPOT You are preparing to install a 32-bit legacy application on all client computers in an organization. The application requires specific compatibility settings in order to function in Windows 7. You run the 32-bit version of Compatibility Administrator and create a new application fix. You need to create a shim database that includes a compatibility fix for applications that have known issues with the Desktop Window Manager. Which compatibility modes should you select? To answer, select the appropriate setting in the work area. Answer: 25

Question No : 29 Your company has a custom Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) and uses autoenrollment. When external users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do? A. Install the current certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer. B. Install the current certificate into the computer store on each client computer. C. Purchase and install a commercial certificate on the CA server. Ensure that users trust the issuing CA. D. Issue a root certificate from the internal CA on the external users computers. Answer: B Question No : 30 Your companys network is shown in the following diagram. 26

There is a VPN between Branch Officebranch office B and the Core Networkcore network. The company plans to deploy Windows 7 to all client computers. You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows. What should you do? (Each correct answer presents part of the solution. Choose all that apply.) A. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network. B. Deploy the Key Management Service (KMS) in branch office B. C. Deploy the Key Management Service (KMS) in branch office A. D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network. Answer: A,B 27

Question No : 31 DRAG DROP Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. You deploy a new Group Policy object (GPO) named California Computers GPO as part of the organizational unit (OU) and GPO design shown in the following diagram. The California Computers GPO contains computer configuration settings and user configuration settings. User configuration settings are not being applied to users who log on to client computers in the California Computers OU. Which GPO setting should you select?? (To answer, drag the appropriate setting from the list of settings to the correct location or locations in the work area.) 28

Answer: Question No : 32 You are deploying an App-V client application to the New York office. You need to ensure that the application will be installed at a specific time. What should you use to deploy the application? A. ConfigMgr B. a Group Policy object (GPO) with a software installation policy. C. MED-V D. Microsoft Deployment Toolkit Answer: A 29

To Read the Whole Q&As, please purchase the Complete Version from Our website. Trying our product! 100% Guaranteed Success 100% Money Back Guarantee 365 Days Free Update Instant Download After Purchase 24x7 Customer Support Average 99.9% Success Rate More than 69,000 Satisfied Customers Worldwide Multi-Platform capabilities - Windows, Mac, Android, iphone, ipod, ipad, Kindle Need Help Please provide as much detail as possible so we can best assist you. To update a previously submitted ticket: Guarantee & Policy Privacy & Policy Terms & Conditions Any charges made through this site will appear as Global Simulators Limited. All trademarks are the property of their respective owners. Copyright 2004-2015, All Rights Reserved.