TS: Windows 7, Configuring
Question No: 261 – (Topic 3)
Your company uses Windows Deployment Services (WDS) to deploy Windows 7. You create a new image of Windows 7.
You need to ensure that you can deploy the image by using WDS. What should you do?
From the Windows Deployment Services snap-in, add a new install image.
From the Windows Deployment Services snap-in, add a new boot image.
Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot.
Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images.
Answer: A Explanation:
Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step
involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image.
Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a
command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice.
Question No: 262 – (Topic 3)
You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.
The network configuration for Computer1 is shown in the exhibit. (Click the Exhibit button.)
You attempt to connect to \\Server1\Share1 and receive the following error message: Windows cannot access \\Server1\Share1. From Computer1, you successfully ping Server1.
You need to connect to \\Server1\Share1. What should you enable on Computer1?
Client for Microsoft Networks
File and Printer Sharing for Microsoft Networks
Link-Layer Topology Discovery Mapper I/O Driver
Link-Layer Topology Discovery Responder
Answer: A Explanation:
Client for Microsoft Networks Allows the computer to access resources on a Microsoft network.File and Printer Sharing for Microsoft NetworksEnables other computers to access resources on your computer in a Microsoft network (and other networks).Link-layer Topology Discovery Mapper I/O DriverDiscovers and locates other computers, devices, and network infrastructure features on the network, and determines network bandwidth.
Link-layer Topology Discovery ResponderAllows a computer to be discovered and located on the network.
Question No: 263 – (Topic 3)
You have a computer that runs Windows 7. You install a third-party Web browser.
You discover that HTML files are no longer associated with Windows Internet Explorer. You need to ensure that Internet Explorer starts whenever a HTML file is opened.
What should you do from Internet Options?
Open the Connections tab and click Setup.
Open the General tab and click Use default.
Open the Programs tab and click Make default.
Open the Programs tab and click Manage add-ons.
Answer: C Explanation:
Change your default web browser
This information applies to Internet Explorer 8 or Internet Explorer 7 running on Windows 7, Windows Vista, Windows Server 2008, Windows XP Service Pack 2 and Service Pack 3, and Windows Server 2003.
To make Internet Explorer your default web browser
Click to open Internet Options.
Click the Programs tab, and then click Make default.
Click OK, and then close Internet Explorer.
Question No: 264 – (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe
You need to ensure that User1 and User2 can log on to Computer2. What should you do on Computer2?
Enable all user accounts
Modify the default password policy
Modify the Allow log on locally user right
Add User1 and User2 to the local Administrators group
Answer: A Explanation:
LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate
\\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:quot;mykeyquot;
(local account create) /lac:[Password] Specifies that if a user account is a local (non- domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default.
Question No: 265 – (Topic 3)
A user named User1 uses a shared computer that runs Windows 7.
User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials.
You need to ensure that User1 can use the USB device without requiring administrative credentials.
What should you do first?
Add User1 to the Power Users group.
Run Pnputil.exe and specify the – i- a parameters.
Run Driverquery.exe and specify the /SI parameter.
Copy the driver files to the C:\windows\system32 folder.
Answer: B Explanation:
When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter.
pnputil.exe -i -a a:\usbcam\USBCAM.INF Adds and installs the specified driver
Question No: 266 – (Topic 3)
You install Windows 7 on a new computer.
Every time you start the computer, you receive a STOP error message. You suspect that the RAM on the computer has a problem.
You need verify the RAM on the computer. What should you do first?
Start the computer, press F8, and then select Repair Your Computer.
Start the computer, press F8, and then select Last Known Good Configuration.
From a computer that runs Windows 7, copy the %systemroot%\system32\recover.exe to a bootable USB disk. Start the computer from the USB disk.
From a computer that runs Windows 7, copy the %systemroot%\system32\repair- bde.exe to a bootable USB disk. Start the computer from the USB disk.
Answer: A Explanation:
Using Recovery Tools If Windows RE is included in your installation DVD-ROM, you can boot from the Windows 7 installation media, select Repair Your Computer, and then select
the option to use recovery tools to access the System Recovery Options. However, you can use the method described previously (pressing F8) whether the Windows RE files are present on your DVD-ROM or not and whether you boot from your installation DVD-ROM or from hard disk.
Then use the following System Recovery Option:
Windows Memory Diagnostic Analyzes the computer memory (RAM) for hardware problems.
Question No: 267 – (Topic 3)
You have a computer that runs Windows 7. You plan to create an image of the computer. You need to prevent files with the ISO file extension from being included in the image.
What should you do?
Run Dism.exe and use the /image parameter
Run Dism.exe and use the /scratchdir parameter
Run Imagex.exe and use the /config parameter
Run Imagex.exe and use the /norpfix parameter
Answer: C Explanation:
ImageX is a command-line tool that enables the creation of image files for deployment in a manufacturing or corporate IT environment. You can create a configuration file (configuration_list.ini) to determine:
->Which files and folders must be excluded from the capture process when using the
->Which folders, files, and file types must be excluded from the compression process when using the /compress option.
->Whether the .wim file aligns on a 64K boundary or the default 32K boundary.
Question No: 268 – (Topic 3)
Your network contains a Network Policy and Access Services server named Server1.
All certificates in the organization are issued by an enterprise certification authority (CA) named Server2.
You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP.
You attempt to establish the VPN connection to Server1 and receive the following error message: “A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.”
You need to ensure that you can successfully establish the VPN connection to Server1. What should you do on Computer1?
Import the root certificate to the user’s Trusted Publishers store.
Import the root certificate to the computer’s Trusted Root Certification Authorities store.
Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store.
Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.
Explanation: A certificate chain establishes a quot;chain of trustquot; from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA.
Question No: 269 – (Topic 3)
You administer 80 computers that run Windows 7. The computers have static IP addresses.
You need to change the static IP addresses on all the computers by using a startup script. Which command should you include in the startup script?
Answer: D Explanation: Netsh.exe
Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks:
Configure routing protocols.
Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service.
Display the configuration of a currently running router on any computer.
Use the scripting feature to run a collection of commands in batch mode against a specified router.
The syntax for the Netsh.exe tool is:
netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netshgt; command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netshgt; command prompt, and then press ENTER.
Question No: 270 – (Topic 3)
You have a computer that runs Windows 7.
Your network has a SSTP VPN server that uses a self-signed certificate.
When you connect to the VPN server, you receive the following error message: “Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers
You need to prevent the error message from appearing when you connect to the VPN server.
What should you do?
From the properties of the VPN connection, modify the dialing options.
From the properties of the VPN connection, modify the data encryption settings.
From Certificate Manager, import the servers certificate into the Personal store.
From Certificate Manager, import the server’s certificate into the Trusted Root Certification
Answer: D Explanation: Certificate Manager
A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.
Right-click the certificate store you want to import, and click Install PFX on the context menu.
The Certificate Import Wizard launches. Click Next.
In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.
Click Next. If the file specified is a Personal Information Exchange-PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.
On the next page, select where you#39;d like to store the certificate. Click Next.
The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.
Dumps4cert ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No