Sie sind auf Seite 1von 222

Question 1: Which of the following tools do not require you to install the Windows AIK?

This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it.

3. Sysprep Correct Answer: 3.

Question 2: What is compatibility view in Windows Internet Explorer 8?

2. It makes the websites look as they would have looked in older version of browser Correct Answer: 2.

Question 3: Why is subnetting used for different segments of a large network? 3. It prevents packet collisions Correct Answer: 3.

Question 4: You are trying to use the built-in Windows Program Compatibility Troubleshooter to check the compatibility of the application. In which of the following formats (extensions) the program file must be in order to be checked for compatibility? 3. .EXE Correct Answer: 3.

Question 5: You want to install Windows 7 on your laptop. You also want all your data to be encrypted on your hard-disk. Which of the following editions will you purchase from a retail shop? Which Windows Edition comes with Bitlocker and is available on the retail stores? 3. Windows 7 Ultimate x64 Correct Answer: 3.

Question 6: What is the time after which VPN Reconnect will not work and will ask for the corporate password again? 4. 8 Hours Correct Answer: 4.

Question 7: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning? 3. By restoring the User Profile Correct Answer: 3.

Question 8: Computers on a network are already running on Windows Vista. You have been asked to install Windows 7 on all of them in a dual-boot configuration with the already installed Windows Vista. How many volumes, in minimum, will you need on each of the system? 1. 2 volumes Correct Answer: 1.

Question 9: Which of the following is not the part of "Minimum requirements" set for installing 64-bit version of Windows 7 Ultimate? 3. 4 GB RAM Correct Answer: 3.

Question 10: What is VPN Reconnect in Windows 7 Ultimate?

4. It is a feature to re-establish a VPN connection if the internet connection is disrupted. Correct Answer: 4.

Question 11: Which of the following File Systems are valid for installing Windows 7? 2. NTFS Correct Answer: 2.

Question 12: You want the system to send an email to you everytime a person tries to login and fails. What will you do?

2. Attach a task to the event which you want to be taken action on Correct Answer: 2.

Question 13: What is the maximum number of back up schedules that can be created in Windows 7 at one time? 1. 1 Correct Answer: 1.

Question 14: A Windows 7 computer has a lot of network credentials saved on it. You want this data to be available on another computer. What will you do? 2. Backup the Windows Vault on the present computer and restore it on the target computer. Correct Answer: 2.

Question 15: How many built-in DCS (Data Collector Sets) does Windows 7 Ultimate come with? They save you from creating your custom DCS for some monitoring which any administrator would want to see.

2. 2 Correct Answer: 2.

Question 16: Which of the following settings is the best way to keep your computer updated with latest software updates for Windows 7 Operating System? 1. Install Updates automatically

Correct Answer: 1.

Question 17: Which of the following methods cannot be used to activate a installed copy of Windows 7?

3. Local activation server Correct Answer: 3.

Question 18: You wanted to set the DNS server for your computer's Local Area Connection interface to 10.0.0.1. Which of the following commands will you type in an elevated command prompt? 2. netsh interface ipv4 set dnsservers "local area connection" static 10.0.0.1

Correct Answer: 2.

Question 19: Which of the following tools will you use to add an application to your offline Windows 7 install image mounted on a local directory?

5. None of the above Correct Answer: 5.

Question 20: You have been asked to install Windows 7 Professional x64 edition on 20 computers connected to a network, all of which have the same hardware as below: 1.5 GHz Dual Core Processor 1 GB RAM 18 GB HDD 10/100 Ethernet Port DirectX 10 Video Card with 512 MB video memory Which of the following will you suggest your boss for an upgrade? 1. Upgrade RAM and Hard Disk Correct Answer: 1.

Question 21: You can use device manager to perform a few device management functions. Which of the following cannot be done by device manager? 2. Search the internet for appropriate device driver

Correct Answer: 2.

Question 22: On which of the following file systems Windows 7 will not be able read or write?

4. HPFS Correct Answer: 4.

Question 23: You have to install Windows 7 on a machine, which has Intel Core i7 processor and 16 GB of RAM. Which of the following editions of Windows 7 will you install to make sure that none of the resources are under-utilized? 1. Windows 7 Ultimate x64

Correct Answer: 1.

Question 24: Which of the following is not a part of Windows AIK?

4. BCDEdit

Correct Answer: 4.

Question 25: Which command can be used to add or remove drivers from the Driver Store? 2. pnputil.exe Correct Answer: 2.

Question 26: On which of the following file systems Windows 7 will not be able read or write?

4. HPFS
Correct Answer: 4. Question 27: One of your clients created a WAP in his home. However, he reports that others around him able to access his network without his permission. What would you suggest him to do?

2. Change the settings of his WAP and enable security using either WEP or WAP security algorithms
Correct Answer: 2.

Question 28: What steps will you take to create a Windows image with a application installed in it? You have to create a Windows installation image and then distribute it for installation on 225 computers. It is required that an application must be installed on each of the computers after deployment. You do not have access to the MDT package. 3. Install the application on a reference computer and then image the computer for mass deployment Correct Answer: 3. Question 29: You are trying to use the built-in Windows Program Compatibility Troubleshooter to check the compatibility of the application. In which of the following formats (extensions) the program file must be in order to be checked for compatibility?

3. .EXE
Correct Answer: 3. Question 30: On which of the following device's advanced tab of device properties window will you find the "Bandwidth" property? 3. USB Universal host controller Correct Answer: 3.

Question 31: You installed a new driver for your Audio device. However, it is giving you problems. How will you roll back to the old driver?

4. Use the Device Manager, select the Audio Device and click on the "Roll Back Driver" button on the "Driver" tab of the device properties window
Correct Answer: 4. Question 32: How many options does Windows 7 provide you for recovering Windows, if you have not been able to bring it to a healthy state using System Restore? 2. 2 Correct Answer: 2. Question 33: How many built-in DCS (Data Collector Sets) does Windows 7 Ultimate come with? They save you from creating your custom DCS for some monitoring which any administrator would want to see.

2. 2
correct Answer: 2.

Question 34: You are a system administrator in a company and have to install a customized copy of Windows 7 to all computers. You are using "sysprep" command to capture the disk image. Which of the following switches is necessary to be used when running sysprep Remember that all the computers on which Windows 7 has to be installed have the same hardware configuration.

3. /generalize
Correct Answer: 3. Question 35: You are upgrading from Windows Vista Enterprise to Windows 7 Enterprise. Will the current Windows Vista License cover your new installation? 4. No, the old license will not cover the new installation Correct Answer: 4. Question 36: You are migrating from Windows XP to to Windows 7 Ultimate. Which of the following tools is available as a free download to help you transfer your files and settings from Windows XP to Windows 7?

2. Windows Easy Transfer Correct Answer: 2. Question 37: Read the description and choose the right answer. The network of computers you manage performs extremely well compared to the other networks in the office. The branch head is very happy with you. Being a technical guy himself, he has asked all the IT administrators to use Xperfview.exe to show a visual trace analysis of the systems on their network. You try to run this tool but you do not find it anywhere on the system. All computers managed by you use Windows 7 Enterprise. Which tool do you need to install? 4. It comes in the WPT package Correct Answer: 4. Question 38: You want to roll back to the previous version of a driver for one of your devices. Which tool will you use for the purpose?

1. Device Manager
Correct Answer: 1. Question 39: The Setup Analysis Tool analyses the setup program without actually installing the application. Select the correct name of the process used to do this. 3. Profiling Correct Answer: 3.

Question 40: You are analyzing IPv6 traffic on Windows 7. You want to find out the pattern of the ICMPv6 packets which were exchanged by your computer and the neighboring computers to resolve the IPv6 address to MAC addresses. Which protocol will you want to examine? We assume that you have already allowed the ICMPv6 protocol in the Windows firewall. 4. ND Correct Answer: 4. Question 41: What is UAC or User Account Control?

4. All of the above.


Correct Answer: 4. Question 42: You have been asked to install Windows 7 Professional x64 edition on 20 computers connected to a network, all of which have the same hardware as below: 1.5 GHz Dual Core Processor 1 GB RAM 18 GB HDD 10/100 Ethernet Port DirectX 10 Video Card with 512 MB video memory Which of the following will you suggest your boss for an upgrade?

1. Upgrade RAM and Hard Disk


Correct Answer: 1. Question 43: You are trying to detect the proxy settings using WPAD for configuring Windows Automatic Updates. WPAD tool has failed to determine the proxy settings. You want to import the proxy settings from Internet Explorer. Which of the following tools can you use for this purpose? 3. netsh Correct Answer: 3. Question 44: In what format are the Windows language packs stored?

3. .CAB Correct Answer: 3. Question 45: There are three applications of which two are intensive on the CPU and third one is intensive for the hard disk of the computer. Both the applications which require more CPU time are single threaded. Your computer contains only one processor with two processing cores. What would you do to get better performance from the system?

3. Use Task Manager to set the processor affinity for both CPU intensive applications to the separate processing cores.
Correct Answer: 3.

Question 46: Which of the image formats are valid for DISM.exe to work with?

2. WIM
Correct Answer: 2. Question 47: Which of the following packages will get you the Windows SIM tool? Windows SIM is not a standalone tool. Select the package, of which it is a part. 1. Windows Automated Installation Kit Correct Answer: 1.

Question 48: You want to change the amount of space the pagefile consumes to increase the system performance for an application which over-utilizes the system memory. Where can you change this setting?

1. Advanced System Settings in Control Panel\System and Security\System


Correct Answer: 1. Question 49: Where will you find the policies to configure the setting for offline files? 4. Computer Configuration | Administrative Templates | Network | Offline Files Correct Answer: 4. Question 50: You have enforced a Software Restriction Policy to disallow the execution of some DLL files on a system. Now you find that Windows is behaving erratically. What is the fastest way to resolve this issue? You are operating in an environment where security for application execution is one of the demands. 4. Implement the rule of only locking the executables, but not the DLLs. Correct Answer: 4. Question 51: What file controls the behavior of Windows 7 on its first boot (Windows Welcome)?

2. oobe.xml Correct Answer: 2.

Question 52: Which of the following can violate the licensing terms and conditions? You have to think about mass deployment scenarios where one image is used to install Operating System on hundreds of computers. In this question, the term image means "installation image". This image will be used to install Windows 7 on multiple computers. 3. Installing additional applications on the reference computer and then imaging it Correct Answer: 3. Question 53: Read the following description and answer the question. Your computer runs on Windows 7 Enterprise. You have a folder on D: drive named "XDat". It contains some data which is used excessively by other computers on the network. This drops down the performance of your own system. You want to restrict the number of users able to access this folder simultaneously to 5. So you open the folder properties and click the share button the Sharing tab of the properties window. But you do not see the setting to control the number of simultaneous users accessing the folder. What is the problem?

3. This window cannot be used to control the setting. Correct Answer: 3. Question 54: A user forgets his account password on Windows 7. The user wishes to change his password somehow but is not willing to tell you the password. You are given an administrator account on the same machine but you are able to access only the command prompt. Assuming the username is TOM, Which of the following commands on command prompt (running with admin privileges) will get your job done? You have to use only the command prompt, and no GUI actions are allowed. You must also not use any third party tools.

2. net user TOM *


Correct Answer: 2. Question 55: Which of the following factors cannot be used to restrict a computer's connection to the corporate intranet? 3. Whether or not the computer uses TLS to access the webpages using Internet Explorer Correct Answer: 3.

Question 56: Which of the following is not the part of "Minimum requirements" set for installing 64-bit version of Windows 7 Ultimate?

3. 4 GB RAM
Correct Answer: 3.

Question 57: An error occurred during the Windows install process. The error occurred after Disk configuration was done. You have decided to check the log files to find what went wrong. Assuming that Windows was being installed on the Volume 'E:', where will you look for the log files? 1. E:\Windows\Panther Correct Answer: 1. Question 58: You want to install a Windows update manually from a MSU file. Which command will you use to avoid system restart after the install? The update file is: d:\kb123456.msu. 5. Wusa.exe d:\kb123456.msu /quiet /norestart Correct Answer: 5.

Question 59: You can add the Microsoft-Windows-PnpCustomizationsNonWinPE component to your answer file using the Windows SIM (System Image Manager). In which configuration pass will it be processed? This component can be used to add extra drivers to your Windows 7 Installation. 3. offlineServicing configuration pass Correct Answer: 3.

Question 60: Your computer is running on Windows 7 Professional edition, 64-bit edition. The computer is also a part of AD Domain on the network. You are trying to configure DirectAccess but you find that the Policies are missing from the GPE. What would you do now? 3. Upgrade to Windows 7 Ultimate. Correct Answer: 3.

Question 61: You want to install Windows 7 on your laptop. You also want all your data to be encrypted on your hard-disk. Which of the following editions will you purchase from a retail shop? Which Windows Edition comes with Bitlocker and is available on the retail stores?

3. Windows 7 Ultimate x64


Correct Answer: 3. Question 62: How many built-in DCS (Data Collector Sets) does Windows 7 Ultimate come with? They save you from creating your custom DCS for some monitoring which any administrator would want to see.

2. 2
Correct Answer: 2.

Question 63: Can you restore multiple previous versions of the same file? 1. Yes Correct Answer: 1. Question 64: You are trying to merge two subnets into one subnet. What would you call this procedure? It is important to be familiar with the terms used in the networking field in order to understand your work more properly. 2. Supernetting Correct Answer: 2. Question 65: You want to turn off the UAC. What command will you type at the command prompt for this?

4. useraccountcontrolsettings.exe
Correct Answer: 4.

Question 66: You have to add the driver file C:\drivers\Gfx\nvdm.inf to an offline Windows 7 image directory whose root is C:\Winroot. Which command will get the work done?

3. dism /image:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf


Correct Answer: 3.

Question 67: Which of the following commands will create a recovery agent?

1. Cipher.exe /r:recoveryagent
Correct Answer: 1. Question 68: Why is subnetting used for different segments of a large network?

3. It prevents packet collisions


Correct Answer: 3.

Question 69: You do not have a separate Windows RE disk with you. You must run system restore to accomplish your task. There is no other way other than system restore. What would you use in this case?

3. Windows 7 installation disk


Correct Answer: 3. Question 70: You are asked to prevent the execution of a custom appliaction over the network. Which rule will you choose among the following to implement the restriction?

3. Hash rule
Correct Answer: 3.

Question 71: What is the main difference between EFS and BitLocker from a user's perspective? 4. BitLocker always applies to complete volume, EFS does not. Correct Answer: 4. Question 72: A computer network has 72 computers running on Windows 7 professional. It has been observed that many employees working on the computer play the Solitaire game during work hours. You have been asked to block this game. Being an IT administrator, what will you do?

2. Create a path rule in Software Restriction Policies to block the game Correct Answer: 2. Question 73: Some updates have failed to install in the last update session. Which tool will you use to see the list? 2. Control.exe Correct Answer: 2.

Question 74: Which of the following tools can be used to configure the power options from the command prompt?

3. powercfg.exe
Correct Answer: 3. Question 75: Which of the following tools contains the settings for enforcing password settings on a Windows 7 computer?

3. Local GPE
Correct Answer: 3.

Question 76: You want a standard user to be able to connect to a machine running Windows 7. The user already has an account on the machine. To which group will you add the user so that he is able to connect to the computer remotely?

1. Remote Desktop Users group


Correct Answer: 1.

Question 77: Which of the following Editions of Windows 7 includes Windows Touch? Touch is available in Windows 7. All the programs of Windows are ready to work on touch from your finger. But not all of the editions come with the support for the technology. Identify the edition(s) which do. 4. Home Premium, Professional, Enterprise and Ultimate Correct Answer: 4. Question 78: You want to schedule a file and folder backup but do not want to use the wbadmin command line tool. Which of the following GUI tools will allow you to do this? 3. Windows Backup wizard Correct Answer: 3.

Question 79: Where are the policies for controlling UAC located?

4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options
Correct Answer: 4.

Question 80: What does MDT stand for?

1. Microsoft Deployment Toolkit


Correct Answer: 1. Question 81: Read the following description and answer the given quesiton. You are running Windows 7 on an older hard disk of 40 GB capacity. The hard disk contains two volumes of 30 Gb and 10 GB. You have an external hard disk which is also of 40 Gb and is similarly divided into two volumes of 31 GB and 9 GB. Both the volumes are empty. Both are detected by Windows and shown empty but when you try to use the 30 GB volume on external Hard disk, you are not able to do so. What may be the reason?

3. It may be formatted with FAT32


Correct Answer: 3.

Question 82: Your computer running Windows 7 has stopped connecting to the network. You suspect that the IPv4 network protocol is not working on the computer. What will you do to check whether it has stopped?

3. open cmd and run the command: ping 127.0.0.1


Correct Answer: 3. Question 83: You are in process of encrypting a large volume with BitLocker on a server. Suddenly the demand for the files from the server rise and the users start complaining about the speed of data transfer. What command will you pass to pause the encryption process? The drive letter of the disk under the encryption process is F:

2. manage-bde.exe -pause F:
Correct Answer: 2.

Question 84: Which of the following tools will you use to change the rules for new device driver installations? 1. Group Policy Editor Correct Answer: 1. Question 85: Which one of the following sequence of actions will you take to upgrade from Windows Vista Home Premium to Windows 7 Ultimate? 1. Run setup.exe from the Windows 7 installation DVD and select "Upgrade" for the "Type of installation" Correct Answer: 1.

Question 86: You installed an update and it created problems. You have already uninstalled the update. What would you do to make sure Windows does not install that update again? 4. Hide the update Correct Answer: 4.

Question 87: Which of the following devices will show a "Power Management" tab when you open its properties from the device manager? 3. Keyboard Correct Answer: 3.

Question 88: Which tool will you use to change the boot order of your Windows 7 Professional computer, which is currently dual booting with Windows Vista Ultimate?

3. System Configuration Tool


Correct Answer: 3.

Question 89: Your company has recently migrated from Windows XP to Windows 7. You notice that some of the sites, which displayed well in Internet Explorer in Windows XP are not displaying well in the Internet Explorer in Windows 7. You enable the compatibility view; but the problem remains. What may be the problem?

4. The web site is not ready for Internet Explorer 7 either.


Correct Answer: 4. Question 90: What does the standard user analyzer tool do?

1. It checks whether an application will have problems with UAC


Correct Answer: 1. Question 91: You want to test the AppLocker policies but you do not want to implement them right away. What will you do? Applocker needs to be tuned well before deploying it. Mistakes can make Windows non functional. Hence, it is required that the policies be tested and then implemented.

1. Policies should be made in audit mode


Correct Answer: 1.

Question 92: You have to add the driver file C:\drivers\Gfx\nvdm.inf to an offline Windows 7 image directory whose root is C:\Winroot. Which command will get the work done?

3. dism /image:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf


Correct Answer: 3. Question 93: What is the feature called which assigns an IP address to your computer when the DHCP service is not available on the network? 1. Automatic Private IP Addressing (APIPA) Correct Answer: 1.

Question 94: Your computer has suddenly stopped connecting to the network. What is the first step you will take in the direction of troubleshooting?

4. Check if the network cables are connected to the computer


Correct Answer: 4.

Question 95: You have only one network available to you which is configured using IPv6 protocol. You want to access your company network using DirectAccess. What will you do? The network you are trying to use will utilize the Ethernet interface on your computer. 2. It can connect without any problems. Correct Answer: 2.

Question 96: You have to customize the Windows 7 installation from the disk you have been given. You know the commands required to do your work. How will you get the command prompt before the actual setup starts?

2. Press Shift + F10


Correct Answer: 2.

Question 97: Which one of the following upgrades are not possible? 3. Windows XP Professional to Windows 7 Professional Correct Answer: 3.

Question 98: Which of the following is true?

3. Windows 7 is a langage neutral Operating System Correct Answer: 3.

Question 99: Which command will you use to update the configuration of a volume to support a newly installed DRA? 2. manage-bde.exe Correct Answer: 2.

Question 100: You run the command "netsh wlan connect name=default ssid=MyWinNet" on an elevated command prompt from a laptop running Windows 7 Ultimate. What does the word 'default' in that command signify? 5. It is the name of the profile to be used when connecting to the network MyWinNet Correct Answer: 5. Question 101: You have to select the least costly edition of Windows for a company that could be volume licensed and can join their ActiveDirectory domain. Which of the following editions would you select? Some editions of Windows cannot be volume licensed and some cannot join an ActiveDirectory domain. You have to select the one which does not have any of these restrictions.

3. Windows 7 Professional
Correct Answer: 3.

Question 102: You are upgrading from Windows Vista Enterprise to Windows 7 Ultimate. Which of the following statements are false in the given condition?

1. All of the following options are false for the given condition
Correct Answer: 1.

Question 103: Read the following description and answer the given quesiton. You are running Windows 7 on an older hard disk of 40 GB capacity. The hard disk contains two volumes of 30 Gb and 10 GB. You have an external hard disk which is also of 40 Gb and is similarly divided into two volumes of 31 GB and 9 GB. Both the volumes are empty. Both are detected by Windows and shown empty but when you try to use the 30 GB volume on external Hard disk, you are not able to do so. What may be the reason?

3. It may be formatted with FAT32


Correct Answer: 3.

Question 104: You want to find out, which user accounts are allowed to access data in a folder containing sensitive commercial documents. Your machine runs on Windows 7 Enterprise. What will you configure? 3. Auditing Correct Answer: 3.

Question 105: Read the description and select the best answer. One of your business critical applications uses a service installed by the application. The application needs it every 10 minutes to send some report data to a central server. You have just installed a Windows update which makes this service crash every 37 minutes exactly. There is a strict instruction not to roll back this update under any circumstances. What will you do to make this service available when the application needs it?

3. Both of the above.


Correct Answer: 3. Question 106: Select the first command from the list below, which you can use to backup EFS file certificate(s).

2. Cipher.exe /x
Correct Answer: 2.

Question 107: A Windows 7 computer has a lot of network credentials saved on it. You want this data to be available on another computer. What will you do?

2. Backup the Windows Vault on the present computer and restore it on the target computer.
Correct Answer: 2. Question 108: You are using Windows Easy Transfer while migrating from Windows XP to Windows 7. Which of the following will not be available after migration? In this case, the word 'migration' means to save your settings on the Windows XP computer and restoring them back on the Windows 7 computer after installation. 5. Both Programs and Drivers Correct Answer: 5.

Question 109: You want Windows 7 to search for drivers in C:\MyDriverStore folder, in addition to its default Driver Store folder. What is the easiest way to accomplish this task? 4. Edit the registry key which controls the list of the folders where Windows 7 will search for the drivers Correct Answer: 4.

Question 110: You want to find out the compatibility of an application installer for your computer running on Windows 7. You use the Setup Analysis Tool for the purpose. What happens after the analysis is complete and the application has passed the test? It is a well known fact that a setup will dump a lot of files on the system, most of which will be program executables and binaries. It is to be decided by the reader or the examinee to determine whether the files contained in the package are actually installed on the system or not?

2. The application is not installed at all


Correct Answer: 2.

Question 111: You want to create a HomeGroup on a Windows 7 computer. Which of the following is a mandatory condition for doing this? 5. A network with Home location network type Correct Answer: 5. Question 112: You have an application, which was made for Windows 2000 but worked with Windows NT 4.0 with service pack 5. It worked on Windows XP but crashed at times. You are trying to use this application under Windows 7. Which compatibility mode will you choose for this application? 3. Windows 2000 Correct Answer: 3. Question 113: You have to customize the Windows 7 installation from the disk you have been given. You know the commands required to do your work. How will you get the command prompt before the actual setup starts?

2. Press Shift + F10


Correct Answer: 2.

Question 114: Read the following description and select the correct answer. Your company has two different networks. Employees on one network are developers who write software code and upload it to a server, which allows only FTP connection. Employees on this network (Developer Network). There is another network, which has software testers (Tester Network) on it. They are allowed to download the code uploaded to the server but not allowed to upload anything on it. They use the company's SMTP server to send mails to each other. You have implemented correct security settings on the FTP server. However, you want additional security and hence want that the employees on tester network to be able to perform only two actions on the network: download files from FTP server and send email via SMTP. Which of the following type of rules will you create to achieve your goal?

2. Outbound
Correct Answer: 2.

Question 115: Read the description and answer the given question. One of your clients have been using a network location as a backup destination for your scheduled backups. Suddenly he reports that Windows has stopped taking backups. You see that all settings are correct and nothing has been altered. All other network shares are working well. Also the web server being hosted on the machine which was used as a backup destination is working well. What may be the problem? 2. A user on the remote Windows computer changed his password. Correct Answer: 2. Question 116: Which command will generate a new system Diagnostic report?

3. perfmon /report
Correct Answer: 3. Question 117: What problem do you suspect if only your computer is not able to resolve the address of a single computer on network by its name? (Read the details for understanding the situation) You try to ping a computer on the network by its name. The DNS in that moment is not working well and fails to resolve the name. You then notice that other computers are able to ping the same target computer by its name and the DNS is working well. In addition, your computer is not having any connectivity issues in any other operation, but the name resolution of that same computer is failing again and again. You computer is running Windows 7 Enterprise. What might be the problem in this case? 4. Your computer is suffering from negative caching Correct Answer: 4.

Question 118: There is a network of computer with 11 computers. One of these computers is connected to a printer which is shared among all the other computers on the network. You have to make sure that the person sitting on the computer physically connected to the printer is able to manage the print queues but is not able to change the printer permissions. What permission should he be assigned?

2. Manage Documents
Correct Answer: 2.

Question 119: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose?

4. Both verifier.exe and Driver Verifier Monitor


Correct Answer: 4.

Question 120: Which of the following statements is correct?

2. A single .WIM file can contain more than one install image.
Correct Answer: 2. Question 121: Your computer runs on Windows 7 professional. It gets its IP address from a DHCP server and is a member of a domain. Your computer has stopped connecting to the network. Which of the following will be your first step to check for the problem behind the scene? In this case, we assume that the hardware checks for wires and devices have already been completed. 1. Run ipconfig /all Correct Answer: 1. Question 122: You have deleted a file permanently by mistake. Can you restore a pervious version of the file from the shadow copy (assuming one is available)? 1. Yes Correct Answer: 1.

Question 123: A program designed for Windows XP crashes on Windows 7 when it is run with UAC enabled. Which of the following would you do first to resolve the issue? It is to be understood that the application is already installed. 3. Run the application with the compatibility option "Run this program as an administrator" turned on Correct Answer: 3. Question 124: Which of the following is not a valid switch for BCDEdit?

2. /tooldisplayorder
Correct Answer: 2. Question 125: You hold the keys and passwords to unlock all the drives on the company network in the campus where you work. Security requirements of the company do not allow any remote access except using MS Excel (using remoteapp) or Command Prompt remotely. What will you do help a user who has forgotten the password of one of his drives encrypted with BitLocker?

3. Unlock the drive using manage-bde.exe


Correct Answer: 3. Question 126: You have to customize the Windows 7 installation from the disk you have been given. You know the commands required to do your work. How will you get the command prompt before the actual setup starts?

2. Press Shift + F10


Correct Answer: 2. Question 127: Which of the following is not a security feature in Windows Internet Explorer 8? 4. Incognito Window Correct Answer: 4. Question 128: How many options does Windows 7 provide you for recovering Windows, if you have not been able to bring it to a healthy state using System Restore?

2. 2 Correct Answer: 2.

Question 129: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose?

4. Both verifier.exe and Driver Verifier Monitor


Correct Answer: 4. Question 130: You have just installed an update but after doing that, one of your business critical applications is crashing. What will you do to find what is the problem? 4. Read the knowledge base article Correct Answer: 4.

Question 131: You are using Windows 7 ultimate. You want to lock an account in case a user enters wrong password 27 times continuously when trying to log into his system. Can this be done? 1. Yes Correct Answer: 1. Question 132: In which category will the IPv6 address fec0:0:0:eadf::1ff fall? 4. Unicast site-local Correct Answer: 4.

Question 133: You are sure that your computer has a negative caching for one single computer on the network. What command will you run to remove the negative caching? 1. ipconfig /flushdns Correct Answer: 1. Question 134: You want to test the AppLocker policies but you do not want to implement them right away. What will you do? Applocker needs to be tuned well before deploying it. Mistakes can make Windows non functional. Hence, it is required that the policies be tested and then implemented. 1. Policies should be made in audit mode Correct Answer: 1. Question 135: You want to turn off the UAC. What command will you type at the command prompt for this?

4. useraccountcontrolsettings.exe
Correct Answer: 4.

Question 136: You are configuring WFAS (Windows Firewall with Advanced Security) to configure a custom port rule for port 87. You have selected the protocol as UDP. At this point of time, when you click next, you will be presented with options to allow or disallow the traffic. How many options will you have to choose from? 2. 3 Correct Answer: 2. Question 137: You tried to instal Windows 7 on a computer and make it dual boot with Windows XP which was already installed on the system. However, the installation failed and corrupted the boot sector of the Volume where Windows XP was installed. Which of the following commands will you run from the Windows 7 DVD to ensure that the boot code on the Windows XP volume becomes usable again. Assume that Windows XP was installed on a volume with drive letter D:. Also, note that the volume is using NTFS as the file system. 3. bootsect.exe /nt52 D: Correct Answer: 3. Question 138: You want to find out the details on which remote users are currently accessing one of your shared folders. What will you do? 2. Open the Computer management console and navigate to the Shared Folders | Sessions node Correct Answer: 2.

Question 139: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually.

2. Ctrl + Shift + F3
Correct Answer: 2.

Question 140: You have to capture a VHD image to boot it on another machine. Which of the following commands will you type in the command prompt to start the tool which will let you make a VHD image? 2. compmgmt.msc Correct Answer: 2.

Question 141: Which of the following methods cannot be used to activate a installed copy of Windows 7? 3. Local activation server Correct Answer: 3. Question 142: You want to use a network location as a backup destination for file backups. You already know password of an administrative account on the machine. What else do you require on the destination computer? Select the first option which seems right to you. There may be more than one correct answers. 1. NTFS permissions Correct Answer: 1. Question 143: You want to know more about the network configuration on your computer. Which of the following commands will not work under Windows 7 professional? Remember that we are talking about Microsoft tools only. 5. nmap Correct Answer: 5. Question 144: Which command can be used to add or remove drivers from the Driver Store? 2. pnputil.exe Correct Answer: 2.

Question 145: In which folder does Windows 7 search for the drivers when a new PNP device is plugged in? We assume here that Windows has been installed on C: drive. 5. C:\Windows\inf Correct Answer: 5. Question 146: Some updates have failed to install in the last update session. Which tool will you use to see the list? 2. Control.exe Correct Answer: 2.

Question 147: One of the services suddenly stopped working on your computer. You want the details and open the Event Viewer. In what category will you find this event?

3. System Correct Answer: 3. Question 148: Read the following description and choose the right answer from the list. Your computer connects to your company's computer network in two ways - Ethernet and Wireless. While the Ethernet network is dedicated for file sharing inside the network, the wireless network is used to connect to the internet. Your computer runs a program, which is updated very often by its vendor. This program is very essential to be run on every computer on the network. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. You have already blocked the program in the Windows firewall, but it still connects to the internet. What mistake you have done? 1. You have blocked the program on wrong network type. Correct Answer: 1.

Question 149: Where will you find the policies to configure the setting for offline files?

4. Computer Configuration | Administrative Templates | Network | Offline Files


Correct Answer: 4. Question 150: From the following list, select the first backup format which Windows Backup will support. 5. VHD Correct Answer: 5. Question 151: What is the final setting you need to do after having set the policies in Computer Configuration | Administrative Templates | Network | TCPIP Settings | IPv6 Transition Technologies?

3. Set the name resolution policies.


Correct Answer: 3.

Question 152: A computer network consists of computers running 5 different editions of Windows 7 namely "Home Premium","Home Basic", "Professional", "Enterprise" and "Home Starter". Which of the following OS edition(s) can be used as a network backup location? A few editions of Windows 7 cannot backup to network locations. You need to judge your answer based on the knowledge of which ones cannot backup to the network.

3. Enterprise edition only Correct Answer: 3. Question 153: You want to run a command on a remote computer using WinRS. Which service needs to be running to support this function?

4. Windows Remote Management Service


Correct Answer: 4. Question 154: You want to see contents of both IPv4 and IPv6 route table. What command would you use? Choose the first command, which will do the job. There is more than one correct answer in the list. 1. Route print Correct Answer: 1.

Question 155: You are sure that your computer has a negative caching for one single computer on the network. What command will you run to remove the negative caching? 1. ipconfig /flushdns Correct Answer: 1. Question 156: Where are the policies for controlling UAC located? 4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options Correct Answer: 4. Question157: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose? 4. Both verifier.exe and Driver Verifier Monitor Correct Answer: 4.

Question 158: After how many days will Windows 7 create a restore point if there has been no activity on the system which would create a restore point? 1. 1 week Correct Answer: 1.

Question 159: You want to see the graph of how a particular process is utilizing the available memory on the computer. Which tool will you use for this?

3. Performance Monitor Correct Answer: 3.

Question 160: What is the maximum number of back up schedules that can be created in Windows 7 at one time? 1. 1 Correct Answer: 1. Question 161: When an application installer fails, Windows 7 presents a window, asking you to run the installer under recommended settings. Which of the following policies will you disable to disable this feature? 4. Detect Application Install Failures Correct Answer: 4.

Question 162: Who can uninstall an update?

2. Only the administrator. Correct Answer: 2. Question 163: You are on a network with subnet mask of 255.255.0.0 the default gateway is 192.168.1.254. Which of the following is a valid IP address on this network?

2. 192.168.1.1
Correct Answer: 2. Question 164: You are asked to configure an incoming VPN connection on a Windows 7 Ultimate machine. Where will you go to configure this? 3. Network Adapters List Correct Answer: 3.

Question 165: You are being accused by a user for having deleted a very important report file from her desktop. She claims that it was missing after you helped her run system restore for reverting back the effect of a problematic video driver. Who is guilty here? The user confirms that system restore was successful. 2. The user Correct Answer: 2. Question 166: You are trying to run system restore on your Windows 7 Enterprise edition system while one of your drives has utilized all the space allocated for System Restore function. What will happen in this case?

3. System Restore will still work


Correct Answer: 3. Question 167: What is the file format used for the answer files used in Windows 7 installation procedure? 3. XML Correct Answer: 3.

Question 168: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning?

3. By restoring the User Profile


Correct Answer: 3. Question 169: Your computer shares a folder containing a lot of files on the network using the shared folder feature in Windows 7. How will you get the list of files which are currently being accessed on the network? 4. Open the Computer management console and navigate to the Shared Folders | Open Files node Correct Answer: 4.

Question 170: Which command line tool will you use to edit NTFS permissions?

2. icacls
Correct Answer: 2.

Question 171: What does system images help in?

3. Complete PC recovery
Correct Answer: 3. Question 172: You have to capture a VHD image to boot it on another machine. Which of the following commands will you type in the command prompt to start the tool which will let you make a VHD image?

2. compmgmt.msc
Correct Answer: 2.

Question 173: Which of the following is a valid filename to be placed in the %SYSTEMROOT%\System32 of a customized Windows PE image to load a customized shell instead of the default sommand prompt during the installation process of Windows 7? Windows PE can load a customized command prompt during installation by reading a file from the Windows PE image. This file controls the application to be launched as a shell. Select the filename which is to be used for controlling this behavior.

2. Winpeshl.ini
Correct Answer: 2. Question 174: You are planning to capture an image of a Windows 7 installation and then deploy it on the same computer. Which of the following options are not necessary in this scenario? 1. /generalize Correct Answer: 1. Question 175: A Windows 7 computer is used in a scenario where 3 different devices automatically keep creating files periodically in their respective folders on the single computer. You want to be able to share all the folders with the homegroup. Select the statement from the list below which will not form the part of solution.

3. Share each data folder


Correct Answer: 3.

Question 176: You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal? 1. Secure Desktop Correct Answer: 1.

Question 177: You have to capture a VHD image to boot it on another machine. Which of the following commands will you type in the command prompt to start the tool which will let you make a VHD image?

2. compmgmt.msc Correct Answer: 2. Question 178: A Windows 7 Installation was done on 10 computers using the same installation media. All of the computers failed to boot. It was found that the Boot Configuration Data was corrupted on all machines. Which of the following tools had not worked correctly? Windows Installation is done using the Windows PE Environment which has a set of tools, each for a specific task. Corruption of Boot Configuration Data indicates failure of one of the tools. Select the tool which you think has failed in this case.

3. BCDBoot
Correct Answer: 3. Question 179: You suspect that your Audio device driver is conflicting with the Ethernet driver. Which tool can help you confirm whether you are right with your suspicion or not? 1. Device Manager Correct Answer: 1.

Question 180: You install a new device to your computer and your Audio device stops working. You find that there is a driver conflict. What is the first step you will take to resolve the conflict, if you do not have an internet connection?

2. Disable one of the devices Correct Answer: 2. Question 181: In which folder does Windows 7 search for the drivers when a new PNP device is plugged in? We assume here that Windows has been installed on C: drive. 5. C:\Windows\inf Correct Answer: 5.

Question 182: You want to set your Windows 7 laptop to hibernate when the battery level reaches 15%. What will you do? 4. Change the advanced setting of the power plan in use to match the requirements. Correct Answer: 4.

Question 183: What is the size of address space of IPv6? In the following choices, the caret symbol (^) can be read as "raised to the power". Hence, 2^10 can be read as "Two raised to the power ten" and the resulting numerical value of this expression will be 1024. 1. 2 ^ 128 Correct Answer: 1.

Question 9: What will you use to recover data from a BitLocker encrypted drive? 2. Data Recovery Agent Correct Answer: 2. Question 184: What would you do after you rolled back an update from all client computers running Windows 7 from a WSUS? 4. Nothing needs to be done. Correct Answer: 4.

Question 185: Which command-line command displays the IP onfiguration of a computers interfaces?

2. Ipconfig
Correct Answer: 2. Question 186: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image? 1. Language Pack Correct Answer: 1.

Question 186: How will you manage the add-ons, which have been already installed in Internet Explorer? 1. We can manage it from the Tools -> Manage add-ons menu Correct Answer: 1.

Question 187: You want to create an application restriction rule for the users on your network. You also want that this rule should remain applicable even after that application is updated. Which of the following technologies will you use? You are trying to block the application for a specific group of users on the network on all computers.

2. AppLocker
Correct Answer: 2.

Question 188: Read the following details and answer the question. You are working for a company which has all the machines running on Windows 7 Ultimate along with a Windows Server 2008 R2 machine which hosts all the necessary services for the client computers. The company specializes in Audio production and editing. Users use custom software which allows them to save different project files which are used to modify the sound output without manipulating original audio file. All the audio and project files are stored in a very large volume on their internal hard disks. However, the users require that they should be able to restore (or copy) even very old versions of project files. How much space will you allocate to the System Protection to be able to create shadow copies? 4. 40 % Correct Answer: 4. Question 189: You have a file stored on your computer but you are not able to restore from its shadow copy. Why can this be? 1. It is an offline file Correct Answer: 1. Question 190: How many firewalls does Windows 7 implement?

2. 2
Correct Answer: 2. Question 191: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually.

2. Ctrl + Shift + F3
Correct Answer: 2.

Question 192: What is DirectAccess? 3. A technology which can be used to connect to intranet networks over the Internet. Correct Answer: 3. Question 193: What is Windows PE? Windows PE is a very often-used term in the context of large system deployments. It is also one of the components which is customized in large-scale deployments. You have to select the right statement about Windows PE. 5. Windows PE is a minimal operating system with limited services Correct Answer: 5.

Question 194: Your computer runs on Windows 7 professional. It gets its IP address from a DHCP server and is a member of a domain. Your computer has stopped connecting to the network. Which of the following will be your first step to check for the problem behind the scene? In this case, we assume that the hardware checks for wires and devices have already been completed. 1. Run ipconfig /all Correct Answer: 1. Question 195: Which of the following settings is the best way to keep your computer updated with latest software updates for Windows 7 Operating System? 1. Install Updates automatically Correct Answer: 1. Question 196: You are being accused by a user for having deleted a very important report file from her desktop. She claims that it was missing after you helped her run system restore for reverting back the effect of a problematic video driver. Who is guilty here? The user confirms that system restore was successful. 2. The user Correct Answer: 2.

Question 197: You have been asked to create an answer file for unattended installation for Windows 7. Which of the following tools will help you? Each one of the given tools are part of the suite of tools which play role in unattended installations. However, only one can be used to automatically create an answer file for unattended setups. 3. Windows System Image Manager Correct Answer: 3.

Question 198: You have selected manual method for backing up "Files and Folders" using Windows Backup. Which of the following files will not be backed up? 1. Any files in the %systemroot% directory Correct Answer: 1.

Question 199: You have just configured the BranchCache using the GPE. Which of the following actions will you take now?

2. Configure the firewall


Correct Answer: 2.

Question 200: You want to monitor the network traffic consumed by an application. This application is started and closed many times everyday. You want to write a WMI script to monitor and log the data. Which of the following languages can be used to creating the script? 1. VBS Correct Answer: 1.

Question 201: A computer running Windows 7 Enterprise is suddenly booting into recovery mode. The user of the computer is sure that he has not changed any setting. Which of the following cannot be a problem you would suspect? 5. Windows was updated the last time it ran successfully. Correct Answer: 5. Question 201: One of your clients complains that he is not able to download a file while closing his laptop's lid during the night. Windows hibernates as and when the lid is closed. What will you suggest him? 1. Change the power options from the control panel. Correct Answer: 1. Question 202: Which of the following cannot be used as a backup medium? We assume you are using a Windows 7 Ultimate PC. 5. None of the above Correct Answer: 5.

Question 203: You are an IT administrator in a company. You have been given a removable media which is encrypted with BitLocker. You are also asked to use this media to store a VHD file which will be used for booting physical computers. What are the chances that this setup will work? 1. It will not work at all. Correct Answer: 1. Question 204: You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application. 2. AppLocker Correct Answer: 2. Question 205: You want to enable system restore for an External USB Flash drive but you are not able to find the volume in the list of drives for which system protection can be enabled. What is the problem? 2. USB device is in FAT32 file format. Correct Answer: 2. Question 206: You are using Windows Easy Transfer while migrating from Windows XP to Windows 7. Which of the following will not be available after migration? In this case, the word 'migration' means to save your settings on the Windows XP computer and restoring them back on the Windows 7 computer after installation. 5. Both Programs and Drivers Correct Answer: 5. Question 207: What problem do you suspect if only your computer is not able to resolve the address of a single computer on network by its name? (Read the details for understanding the situation) You try to ping a computer on the network by its name. The DNS in that moment is not working well and fails to resolve the name. You then notice that other computers are able to ping the same target computer by its name and the DNS is working well. In addition, your computer is not having any connectivity issues in any other operation, but the name resolution of that same computer is failing again and again. You computer is running Windows 7 Enterprise. What might be the problem in this case? 4. Your computer is suffering from negative caching Correct Answer: 4.

Question 208: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 2. Interactive Logon: Smart Card removal Behavior Correct Answer: 2.

Question 209: Which command will you use to update the configuration of a volume to support a newly installed DRA?

2. manage-bde.exe Correct Answer: 2.

Question 210: After how many days will Windows 7 create a restore point if there has been no activity on the system which would create a restore point? 1. 1 week Correct Answer: 1. Question 211: There are three applications of which two are intensive on the CPU and third one is intensive for the hard disk of the computer. Both the applications which require more CPU time are single threaded. Your computer contains only one processor with two processing cores. What would you do to get better performance from the system?

3. Use Task Manager to set the processor affinity for both CPU intensive applications to the separate processing cores.
Correct Answer: 3. Question 212: You are trying to capture an image of a Workstation with 8 GB RAM and hence you want to skip the capturing of pagefile.sys. What will you add to the [ExclusionList] section of Wimscript.ini file in order to exclude those files during the capturing process? 3. pagefile.sys Correct Answer: 3.

Question 213: From the following list, select the first backup format which Windows Backup will support.

5. VHD Correct Answer: 5.

Question 214: Which of the following is the right representation of the IPv6 address 1cd:0053:0000:0000:03ad:0000:0000:8d62 ? You must select the right representation from the list. 1. 1cd:0053:00:0:03ad:0000:00:8d62 Correct Answer: 1. Question 215: All the important servers including the DNS and DHCP servers failed on your network. Your network was down on all interfaces for 45 minutes. All the interfaces on all the computers of your network are configured to receive their settings via DHCP. The servers are now again in a functional state. What will you do to make the computers functional with the network once again?

3. Run ipconfig /allcompartments /release for all the interfaces on all the computers
Correct Answer: 3. Question 216: Which of the following will affect the data being shared by a computer on a HomeGroup network?

3. The user account currently active on the system


Correct Answer: 3. Question 217: You want a Windows 7 computer to be able to accept all forwarded events from the network. You have already run the command "winrm qc" on all source computers. What do you need to run on the Collector computer? 4. wecutil qc Correct Answer: 4. Question 218: You have to add the driver file located in the C:\drivers\nwdrv folder to the Driver Store. The .INF file corresponding to the driver is C:\drivers\nwdrv\nwdrv.inf. Which of the following commands will do the job? 5. pnputil a C:\drivers\nwdrv\nwdrv.inf Correct Answer: 5.

Question 219: A Windows 7 Installation was done on 10 computers using the same installation media. All of the computers failed to boot. It was found that the Boot Configuration Data was corrupted on all machines. Which of the following tools had not worked correctly? Windows Installation is done using the Windows PE Environment which has a set of tools, each for a specific task. Corruption of Boot Configuration Data indicates failure of one of the tools. Select the tool which you think has failed in this case.

3. BCDBoot
Correct Answer: 3. Question 220: Which of the following tools will you use to add an application to your offline Windows 7 install image mounted on a local directory?

5. None of the above Correct Answer: 5. Question 221: What does system images help in? 3. Complete PC recovery Correct Answer: 3. Question 222: A Windows 7 computer is used in a scenario where 3 different devices automatically keep creating files periodically in their respective folders on the single computer. You want to be able to share all the folders with the homegroup. Select the statement from the list below which will not form the part of solution. 3. Share each data folder Correct Answer: 3.

Question 223: Which command-line command displays the IP onfiguration of a computers interfaces?

2. Ipconfig
Correct Answer: 2.

Question 224: Which of the following Editions of Windows 7 includes Windows Touch? Touch is available in Windows 7. All the programs of Windows are ready to work on touch from your finger. But not all of the editions come with the support for the technology. Identify the edition(s) which do. 4. Home Premium, Professional, Enterprise and Ultimate Correct Answer: 4.

Question 225: How will you run Wim2VHD tool?

3. cscript wim2vhd.wsf
Correct Answer: 3. Question 226: Which of the following switches will you use with "sysprep" command to capture the disk image of the system, which you have to use as the source for creating a Windows 7 installation disk? The company you work in runs Windows 7 Enterprise editions and many users are having problems with the installation of device drivers, although all computers have the same hardware configuration. Your company's head wants to give away installation disks, which will contain the drivers and the necessary application preinstalled and you, have to prepare the image from the source system. You also have to make sure that the users get to configure their system after the first boot. Select the correct switch among the following switches which will help you achieve the goal. 1. /generalize /oobe Correct Answer: 1. Question 227: Which tool will you use to remove the credentials from the Windows 7 computer? 4. Credentials manager Correct Answer: 4.

Question 228: You are required to create an installation image of Windows 7, which would contain Office 2007. Office 2007 has to be in form of a MSI (Microsoft Installer) package. Which of the following will work? Remember that the installation procedure of the Office 2007 package is not reuired to be hidden. 1. Run msiexec with /package switch Correct Answer: 1. Question 229: You took a system image backup of a Windows 7 Ultimate PC in form of VHD file on an External hard disk. Now you want to run that image as an Operating System on the same system. Which tool will you use? 3. Bcdedit.exe Correct Answer: 3.

Question 230: A computer running Windows 7 automatically boots into recovery mode. This computer was encrypted with BitLocker. What is the problem? 2. Windows is not able to locate the required key for BitLocker decryption Correct Answer: 2.

Question 231: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image? 1. Language Pack Correct Answer: 1. Question 232: You have been asked to install Windows 7 Ultimate x86 on 3 different computers. You have been given separate Install.Wim files for each of the computers on a single bootable Windows 7 Install DVD. Which of the following options will you pass to setup.exe to change the image from which to install Windows 7? You have to use separate images for installing Windows 7 on each computer. However, they are all on the same DVD only? The Install.wim files reside on different paths on the same DVD with the same name. 3. /installfrom: Correct Answer: 3. Question 233: Which of the following settings is the best way to keep your computer updated with latest software updates for Windows 7 Operating System? 1. Install Updates automatically Correct Answer: 1.

Question 234: You want to copy a file from one volume to another while retaining the NTFS permissions. Which tool will you use?

3. robocopy
Correct Answer: 3. Question 235: Which of the following is a valid filename to be placed in the %SYSTEMROOT%\System32 of a customized Windows PE image to load a customized shell instead of the default sommand prompt during the installation process of Windows 7? Windows PE can load a customized command prompt during installation by reading a file from the Windows PE image. This file controls the application to be launched as a shell. Select the filename which is to be used for controlling this behavior.

2. Winpeshl.ini
Correct Answer: 2.

Question 236: Which of the following is not a security feature in Windows Internet Explorer 8?

4. Incognito Window
Correct Answer: 4. Question 237: You want to restore a previous version of driver but Windows does not show any previous versions. However, you created a system restore point just one hour ago and have not changed any setting since Windows was installed yesterday. What could be the problem?

3. Windows does not create shadow copies for files in the %systemroot%
Correct Answer: 3. Question 238: A Windows 7 Installation was done on 10 computers using the same installation media. All of the computers failed to boot. It was found that the Boot Configuration Data was corrupted on all machines. Which of the following tools had not worked correctly? Windows Installation is done using the Windows PE Environment which has a set of tools, each for a specific task. Corruption of Boot Configuration Data indicates failure of one of the tools. Select the tool which you think has failed in this case.

3. BCDBoot
Correct Answer: 3.

Question 239: Which among the following is the extension used for Windows Installer Patch file for an installed application? 3. .MSP Correct Answer: 3. Question 240: Windows 7 will log all the attempts to Log on to the system, whether or not they are successful. Which of the following sentences in the 'general details' section of the security event log of the windows event viewer tell that someone tried to logon to an account but failed? 1. A logon was attempted using explicit credentials. Correct Answer: 1. Question 241: Which of the following cannot be done using ConfigMgr or SCCM? 2. Creating boot image for Windows 7 and Windows Vista Correct Answer: 2.

Question 242: You want to see contents of both IPv4 and IPv6 route table. What command would you use? Choose the first command, which will do the job. There is more than one correct answer in the list. 1. Route print Correct Answer: 1. Question 243: In what format are the Windows language packs stored?

3. .CAB
Correct Answer: 3.

Question 244: DISM is a command-line tool used to service Windows 7 images before deployment. The servicing can be offline. Which of the following can not be done by using DISM?

3. Change the product key of installation


Correct Answer: 3. Question 245: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning? 3. By restoring the User Profile Correct Answer: 3. Question 246: Read the following description and select the correct answer. Your company has two different networks. Employees on one network are developers who write software code and upload it to a server, which allows only FTP connection. Employees on this network (Developer Network). There is another network, which has software testers (Tester Network) on it. They are allowed to download the code uploaded to the server but not allowed to upload anything on it. They use the company's SMTP server to send mails to each other. You have implemented correct security settings on the FTP server. However, you want additional security and hence want that the employees on tester network to be able to perform only two actions on the network: download files from FTP server and send email via SMTP. Which of the following type of rules will you create to achieve your goal?

2. Outbound Correct Answer: 2.

Question 247: What will you use to recover data from a BitLocker encrypted drive?

2. Data Recovery Agent Correct Answer: 2.

Question 248: How many built-in DCS (Data Collector Sets) does Windows 7 Ultimate come with? They save you from creating your custom DCS for some monitoring which any administrator would want to see. 2. 2 Correct Answer: 2.

Question 249: You want to find out the compatibility of an application installer for your computer running on Windows 7. You use the Setup Analysis Tool for the purpose. What happens after the analysis is complete and the application has passed the test? It is a well known fact that a setup will dump a lot of files on the system, most of which will be program executables and binaries. It is to be decided by the reader or the examinee to determine whether the files contained in the package are actually installed on the system or not?

2. The application is not installed at all


Correct Answer: 2.

Question 250: Which of the following is true? 3. BitLocker to Go is used for removable drives, while BitLocker is used for fixed drives. Correct Answer: 3.

Question 251: Read the description and answer the given question. One of your clients have been using a network location as a backup destination for your scheduled backups. Suddenly he reports that Windows has stopped taking backups. You see that all settings are correct and nothing has been altered. All other network shares are working well. Also the web server being hosted on the machine which was used as a backup destination is working well. What may be the problem?

2. A user on the remote Windows computer changed his password.


Correct Answer: 2.

Question 252: You forgot the password of the drive you encrypted with BitLocker. How would you unlock the drive? 1. Use the recovery key. Correct Answer: 1.

Question 253: You want to use Easy connect to forward the Remote Assistance invitations on the LAN consisting Windows Server 2008 computer as a server. Which of the following protocols is needed to support this functionality? 1. Peer Name Resolution Protocol Correct Answer: 1.

Question 254: You are trying to analyse the CPU, Memory, Disk and Network Utilization for 5 applications which you think are slowing down the system. You are not able to analyze them in the Performance Monitor windows because of the clutter that they create on the screen. What will you do? 3. Use multiple Performance Monitor Windows to monitor each process' attribute Correct Answer: 3. Question 255: You are configuring WFAS (Windows Firewall with Advanced Security) to configure a custom port rule for port 87. You have selected the protocol as UDP. At this point of time, when you click next, you will be presented with options to allow or disallow the traffic. How many options will you have to choose from? 2. 3 Correct Answer: 2. Question 256: You are on a network with subnet mask of 255.255.0.0 the default gateway is 192.168.1.254. Which of the following is a valid IP address on this network? 2. 192.168.1.1 Correct Answer: 2. Question 257: You are an IT administrator in a company. You have been given a removable media which is encrypted with BitLocker. You are also asked to use this media to store a VHD file which will be used for booting physical computers. What are the chances that this setup will work? 1. It will not work at all. Correct Answer: 1.

Question 258: You have been asked to use RemoteApp to publish the MS Word. What effect will this have on the users trying to use MS Office on the machine? 1. They will be able to launch the program from their desktop while it resides on the remote computer. Correct Answer: 1.

Question 259: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 4. Use Windows firewall to block this software from connecting to internet Correct Answer: 4.

Question 260: The term OOBE is a frequently used term in the deployment terminology of Windows 7. What does it stand for? 4. Out of box experience Correct Answer: 4. Question 261: You installed an update and it created problems. You have already uninstalled the update. What would you do to make sure Windows does not install that update again? 4. Hide the update Correct Answer: 4.

Question 262: Where are the policies relating to the usage of Smart Card located in Windows 7? Choose the appropriate node in the GPE.

4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options
Correct Answer: 4.

Question 263: You want to copy a file from one volume to another while retaining the NTFS permissions. Which tool will you use?

3. robocopy
Correct Answer: 3.

Question 264: You install a new device to your computer and your Audio device stops working. You find that there is a driver conflict. What is the first step you will take to resolve the conflict, if you do not have an internet connection?

2. Disable one of the devices


Correct Answer: 2. Question 265: Which one of the following is the primary component loaded during the Windows 7 install procedure? 1. Windows PreInstallation Environment (Windows PE) Correct Answer: 1.

Question 266: What is a subnet?

3. A way to represent a part of a bigger network


Correct Answer: 3. Question 267: Which of the following commands will you use to run the command tracert on the computer TestComp?

2. WinRS r:TestComp tracert


Correct Answer: 2.

Question 268: You are planning to capture an image of a Windows 7 installation and then deploy it on the same computer. Which of the following options are not necessary in this scenario? 1. /generalize Correct Answer: 1. Question 269: You want to see contents of both IPv4 and IPv6 route table. What command would you use? Choose the first command, which will do the job. There is more than one correct answer in the list. 1. Route print Correct Answer: 1.

Question 270: What is Teredo?

2. Teredo is a tunneling protocol used for allowing IPv6 traffic to be encapsulated inside IPv6 packets for communication over the IPv4 internet
Correct Answer: 2.

Question 271: You want to install a Windows update manually from a MSU file. Which command will you use to avoid system restart after the install? The update file is: d:\kb123456.msu.

5. Wusa.exe d:\kb123456.msu /quiet /norestart Correct Answer: 5. Question 272: You want to monitor the network traffic consumed by an application. This application is started and closed many times everyday. You want to write a WMI script to monitor and log the data. Which of the following languages can be used to creating the script? 1. VBS Correct Answer: 1.

Question 1: Which command can be used to add or remove drivers from the Driver Store? 1. devmgmt.msc 2. pnputil.exe 3. drvinst.exe 4. driverquery.exe 5. Correct Answer: 2. Question 2: Which of the following is incorrect about the Stability index? 1. Days when the system is powered off or in a sleep state are not used when calculating the System Stability Index 2. Recent failures are weighted less heavily than past failures and the graph is in a descending line in this case. 3. If there are any significant changes to the system time, an Information icon will appear on the graph for each day on which the system time was adjusted. 4. If there is not enough data to calculate a steady System Stability Index, the graphed line will be dotted. 5. Correct Answer: 2.

Question 3: Which of the following commands will not work? 1. Dism /image:C:\offimgrootdir /WinDir:D:\WinNT /Add-Package /PackagePath:C:\pkg1.cab 2. Dism /image:C:\offimgrootdir /WinDir:WinNT /Add-Package /PackagePath:C:\pkg1.cab 3. Dism /image:C:\offimgrootdir /LogPath:AddPkg.log /LogLevel:1 /AddPackage /PackagePath:C:\pkg1.cab 4. Dism /Mount-Wim /WimFile:C:\install.wim /name:"Windows 7 HomeBasic" /MountDir:C:\test\ 5. All of the above are right. Correct Answer: 1. Question 4: Which of the following cannot be done using Windows SIM? Windows SIM is used to create answer files for unattended setups. While it can help you manage things easily, it does not come with an all-in-one functionality. Choose the one functionality which will not be available via this tool. 1. Validate the settings of an existing answer file against a .wim file 2. Update an existing answer file 3. Add third-party drivers, applications, or other packages to an answer file 4. Adding custom applications to the Windows Image file 5. Correct Answer: 4. Question 5: In which format does Windows Backup store the files which have been backed up? We are talking about a file and folder backup. 1. .ZIP 2. .RAR 3. .VHD 4. .WIM 5. It just copies the files into folder. Correct Answer: 1. Question 6: Which system restore point should be selected when you are trying to restore the computer to an earlier point in time? 1. The last system restore point 2. The day on which the problem first began 3. The day just before the problem started occuring 4. The first restore point ever will ensure best results 5. Correct Answer: 3. Question 7: You are performing a wipe-and-load migration from an edition of Windwos Vista to Windows 7. Which of the following versions of USMT can be used? 1. USMT Version 3.0

2. USMT Version 3.2 3. USMT Version 4.0 4. USMT Version 4.1 5. Correct Answer: 3. Question 8: Where are the policies relating to the usage of Smart Card located in Windows 7? Choose the appropriate node in the GPE. 1. Computer configuration | Windows Settings | Security Settings | Local Policy 2. Computer configuration | Windows Settings | Security Settings | Account Policy | Password Policy 3. Computer configuration | Windows Settings | Security Settings | Local Policy | User rights assignments 4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options 5. Correct Answer: 4. Question 9: You suspect that your Audio device driver is conflicting with the Ethernet driver. Which tool can help you confirm whether you are right with your suspicion or not? 1. Device Manager 2. Group Policy Editor 3. diverquery.exe 4. driverconflict.wsf 5. Correct Answer: 1. Question 10: You have been asked to prepare a Windows 7 image for installation which should contain all the applications that any user on the company network would ever want. Which imaging strategy will you use? 1. Thick 2. Hybrid 3. Thin 4. Ultrathin 5. Correct Answer: 1.

Question 11: Which tool will you use to remove the credentials from the Windows 7 computer? 1. Del 2. rem 3. Local GPE 4. Credentials manager 5.

Correct Answer: 4.

Question 12: You have been asked to create an answer file for unattended installation for Windows 7. Which of the following tools will help you? Each one of the given tools are part of the suite of tools which play role in unattended installations. However, only one can be used to automatically create an answer file for unattended setups. 1. oscdimg 2. Deploy.cab 3. Windows System Image Manager 4. Windows Server Operating System Management Pack for Operations Manager 5. None of the above Correct Answer: 3.

Question 13: You have two folders named source and destination on C: drive of your computer. The permissions of Source folder (and all the contents)are different from that of Destination folder (and its contents). You copy a file from Source folder to Destination folder. Which folder's permissions will be applicable to the copy of the file? 1. Source 2. Destination 3. The permissions are first compared and most restrictive permissions are applied. 4. The permissions are first compared and least restrictive permissions are applied. 5. Correct Answer: 2. Question 14: Which of the following tools can not be used for creating a new VHD file? 1. Compmgmt.msc 2. diskpart.exe 3. Virtual PC 4. Hiren's Boot CD 5. Correct Answer: 4.

Question 15: You have to add the driver file located in the C:\drivers\nwdrv folder to the Driver Store. The .INF file corresponding to the driver is C:\drivers\nwdrv\nwdrv.inf. Which of the following commands will do the job? 1. pnputil a C:\drivers\nwdrv\nwdrv.sys 2. pnputil add C:\drivers\nwdrv\ 3. pnputil e C:\drivers\nwdrv\nwdrv.inf 4. pnputil add C:\drivers\nwdrv\nwdrv.inf 5. pnputil a C:\drivers\nwdrv\nwdrv.inf

Correct Answer: 5.

Question 16: How many options does Windows 7 provide you for recovering Windows, if you have not been able to bring it to a healthy state using System Restore? 1. 1 2. 2 3. 3 4. 4 5. 5 Correct Answer: 2. Question 17: What is the size of address space of IPv6? In the following choices, the caret symbol (^) can be read as "raised to the power". Hence, 2^10 can be read as "Two raised to the power ten" and the resulting numerical value of this expression will be 1024. 1. 2 ^ 128 2. 2^86 3. 2^256 4. 2^32 5. 2^64 Correct Answer: 1. Question 18: Where are the Application Compatibility Diagnostics Policies located? 1. Computer Configuration\Administrative Templates\System\Troubleshooting and Diagnostics in GPE 2. Computer Configuration\Administrative Templates\System\Troubleshooting and Diagnostics\ Application Compatibility Diagnostics in GPE 3. They are located in pols.xml in %systemroot%\diagnostics\system folder 4. They are located in the registry only and are ready by explorer when Windows starts 5. Correct Answer: 2.

Question 19: Which of the following switches will tell ImageX tool to search for the Wimscript.ini file and read settings from it? 1. /readsettings 2. /processexclusion 3. /readscript 4. /ruleset: 5. none of the above Correct Answer: 5. Question 20: Which utility can create a DCS at the command prompt? 1. Logcreate

2. createDCS 3. Logman 4. Createset 5. Correct Answer: 3. Question 21: How would you configure BitLocker to Go to use the TPC chip on a computer? 1. Using Computer Management Console 2. Using device manager 3. It cannot be done 4. It can be done but not on Windows 7. We need a Windows Server 2008 R2 for the purpose. 5. Correct Answer: 3. Question 22: You are on a network with subnet mask of 255.255.0.0 the default gateway is 192.168.1.254. Which of the following is a valid IP address on this network? 1. 192.167.1.10 2. 192.168.1.1 3. 192.168.1.255 4. 192.168.1.0 5. Correct Answer: 2.

Question 23: Which of the following protocol will DirectAccess use if the computer you are using is able to connect to the internet but not to the company network? 1. SSTP 2. 6to4 3. 4to6 4. IP-HTTPS 5. Teredo Correct Answer: 4. Question 24: Which of the following is not a part of the functinality offered by DISM.exe? DISM or Deployment Image Servicing and Management is used to alter Windows 7 images for deployment. It offers a wide range of options. You have to choose that functionality which it will not offer. 1. Creating a Windows 7 installtion image 2. Altering Windows 7 installtion image and exit without a commit 3. Altering Windows 7 installtion image and exit without a commit 4. Mounting and unmounting a Windows 7 installtion image 5. Correct Answer: 1.

Question 25: Which of the following packages will get you the Windows SIM tool? Windows SIM is not a standalone tool. Select the package, of which it is a part. 1. Windows Automated Installation Kit 2. Windows Automated Information Kit 3. Windows Unattended Installation Kit 4. Windows Mass Deployment Toolkit 5. Correct Answer: 1.

Question 1: You installed an update and it created problems. You have already uninstalled the update. What would you do to make sure Windows does not install that update again? 1. Restore the update 2. Switch off Windows Update 3. Change Windows Update settings 4. Hide the update 5. Correct Answer: 4.

Question 2: You open the properties of a folder and find that both Allow and Deny actions are active for the "Read and Execute" permission for the account "HalfTrust". What will Windows 7 do when the account HalfTrust is used to access that folder? 1. Access is allowed 2. Access is denied 3. Will deny the access only if the deny permissions were set after setting the allow permissions. 4. The account will be allowed to Read but denied to execute. 5. Correct Answer: 2. Question 3: You want to see the graph of how a particular process is utilizing the available memory on the computer. Which tool will you use for this? 1. Task Manager 2. Resource Monitor 3. Performance Monitor 4. Reliability Monitor 5. Correct Answer: 3. Question 4: Your computer is running on Windows 7 Professional edition, 64-bit edition. The computer is also a part of AD Domain on the network. You are trying to configure DirectAccess but you find that the Policies are missing from the GPE. What would you do now? 1. Install the 32 bit edition of Windows 7 Professional.

2. Create a new administrative account to configure DirectAccess. 3. Upgrade to Windows 7 Ultimate. 4. Create the policies which are required for DirectAccess to work. 5. Correct Answer: 3. Question 5: Which of the following is incorrect about the Stability index? 1. Days when the system is powered off or in a sleep state are not used when calculating the System Stability Index 2. Recent failures are weighted less heavily than past failures and the graph is in a descending line in this case. 3. If there are any significant changes to the system time, an Information icon will appear on the graph for each day on which the system time was adjusted. 4. If there is not enough data to calculate a steady System Stability Index, the graphed line will be dotted. 5. Correct Answer: 2.

Question 6: Which of the following is not the part of "Minimum requirements" set for installing 64-bit version of Windows 7 Ultimate? 1. 64 bit device drivers 2. 64 bit capable processor 3. 4 GB RAM 4. 20 GB Free disk space 5. Correct Answer: 3.

Question 7: Which of the following Basic NTFS permission will allow a user to change the permissions of the folder? 1. Modify 2. Write 3. Full control 4. Read and execute 5. Correct Answer: 3.

Question 8: You are migrating from Windows XP to to Windows 7 Ultimate. Which of the following tools is available as a free download to help you transfer your files and settings from Windows XP to Windows 7? 1. Windows Easy Migration Wizard 2. Windows Easy Transfer 3. Windows 7 Upgrade Advisor 4. LoadState.exe 5. Correct Answer: 2.

Question 9: What is a plug-and-play device? 1. A device, which can be plugged to a computer from outside 2. A device, which does not need any drivers 3. A device, for which the driver gets installed automatically 4. A device, which can play multimedia files upon plugging 5. Correct Answer: 3. Question 10: Select the first command from the list below, which you can use to backup EFS file certificate(s). 1. Cipher.exe 2. Cipher.exe /x 3. cipher.exe /export 4. cipher.exe /x filename.pfx 5. Correct Answer: 2. Question 11: You are working as an administrator for a small company with 15 computers running on Windows 7 on a network. The company does not have a Windows Server on the network but want an easy way to share the resources among the computers. Which of the following will you do? 1. Configure a HomeGroup for the network 2. Setup the Active Directory Domain on the server 3. Share the data using file and folder sharing for all possible folders which can be used for sharing the data 4. Use the skydrive to share data using the internet 5. Correct Answer: 1.

Question 12: What is DirectAccess? 1. An addition to the DirectX to help play games on network 2. A development API specially released for students in the developing countries to encourage game development 3. A technology which can be used to connect to intranet networks over the Internet. 4. An extension to Windows Internet Explorer 8 only which allows fast caching of files which form parts of web pages. 5. Correct Answer: 3. Question 13: Which of the following factors cannot be used to restrict a computer's connection to the corporate intranet? 1. Windows Firewall activation status 2. Status of Automatic Updates 3. Whether or not the computer uses TLS to access the webpages using

Internet Explorer 4. Check whether Antivirus software is installed or not 5. Status of Anti-spyware software Correct Answer: 3. Question 14: You are upgrading from Windows Vista Enterprise to Windows 7 Enterprise. Will the current Windows Vista License cover your new installation? 1. Yes, the old license will cover the new installation 2. The old license will cover the new installation for a period of 1 year 3. The old license will cover the new installation for a period of 30 days 4. No, the old license will not cover the new installation 5. Correct Answer: 4.

Question 15: What type of tool is Windows SIM? 1. Its a web service 2. Its a command line tool 3. Its a standalone GUI tool 4. Its a tool which comes with another package 5. Correct Answer: 4. Question 16: Which of the following command line tools will allow you to take backup of C: drive? 1. wbadmin 2. ntbackup 3. adminbkp 4. sysbackup 5. Correct Answer: 1. Question 17: What does the command netsh advfirewall firewall add rule name="ruleS" profile=domain protocol=TCP dir=in localport=80 security=authdynenc action=allow do when executed from an elevated command prompt? 1. Creates an inbound rule that applies only in the Domain profile that blocks traffic on port 80 and requires security 2. Creates an outbound rule that applies only in the Domain profile that blocks traffic on port 80 and requires security for the connection 3. Creates an outbound rule that applies only in the Domain profile that allows traffic on port 80 4. Creates an inbound rule that applies only in the Domain profile that allows traffic on port 80 and requires security for the connection 5. Correct Answer: 4. Question 18: When an application installer fails, Windows 7 presents a window,

asking you to run the installer under recommended settings. Which of the following policies will you disable to disable this feature? 1. Detect Applications Unable To Launch Installers Under UAC 2. Detect Application Failures Caused By Deprecated Windows DLLs 3. Detect Application Installers That Need To Be Run As Administrator 4. Detect Application Install Failures 5. Correct Answer: 4. Question 19: What will you use to schedule a backup using wbadmin tool? 1. Windows task scheduler 2. Batch file scheduler 3. Windows Backup wizard 4. No methods are available for this. 5. powershell must be used Correct Answer: 1.

Question 20: You have two folders named source and destination on C: drive of your computer. The permissions of Source folder (and all the contents)are different from that of Destination folder (and its contents). You copy a file from Source folder to Destination folder. Which folder's permissions will be applicable to the copy of the file? 1. Source 2. Destination 3. The permissions are first compared and most restrictive permissions are applied. 4. The permissions are first compared and least restrictive permissions are applied. 5. Correct Answer: 2. Question 21: You are going to prepare a system for imaging. You want that after deployment, the users should be given the option to customize their copy of Windows 7. They should be allowed to create user accounts, name the computer and so on. Which of the following switches of "sysprep" will allow you to do this? 1. /audit 2. /oobe 3. /attend 4. /generalize 5. Correct Answer: 2. Question 22: You have a DHCP server on your network, which is set to assign an IP address in the range 10.10.1.1 to 10.10.1.254 automatically when a host powers up in the network. Suddenly you find that the hosts in the network are using IP addresses in the range 169.254.10.1 through 169.254.10.254. What can be the problem?

1. All host computers are infected with a virus. 2. Settings on DHCP server has been changed 3. DHCP server is not working 4. Someone else has manually set the addresses in this range and has disabled the DHCP from the host computers 5. Correct Answer: 3. Question 23: Which command line tool will you use to edit NTFS permissions? 1. lcacls 2. icacls 3. net 4. cipher 5. Correct Answer: 2. Question 24: You want to use BranchCache in Hosted Server mode. What will you require? 1. Windows Server 2008 2. Windows Server 2003 3. Windows Server 2008 R2 4. Any of the above 5. Correct Answer: 3.

Question 25: You want to schedule a file and folder backup but do not want to use the wbadmin command line tool. Which of the following GUI tools will allow you to do this? 1. Windows task scheduler 2. Batch file scheduler 3. Windows Backup wizard 4. No methods are available for this. 5. Powershell Correct Answer: 3.

Question 1: A computer is running Windows Vista Business edition (Without any service packs). Which of the following editions of Windows 7 it can be upgraded to? 1. Windows 7 Ultimate 2. Windows 7 Professional 3. Windows 7 Enterprise 4. All of the above 5. None of the above Correct Answer: 5.

Question 2: You are using Windows Easy Transfer while migrating from Windows XP to Windows 7. Which of the following will not be available after migration? In this case, the word 'migration' means to save your settings on the Windows XP computer and restoring them back on the Windows 7 computer after installation. 1. Your Installed Programs 2. Your installed Drivers 3. Your saved "Internet Favorites" 4. All of the above 5. Both Programs and Drivers Correct Answer: 5. Question 3: Which of the following is not an option in the "Advanced Sharing Settings" in the Network and Sharing Center? 1. Password protected Sharing 2. Homegroup Connections 3. Resource Control 4. Media Streaming 5. Network Discovery Correct Answer: 3. Question 4: There are three applications of which two are intensive on the CPU and third one is intensive for the hard disk of the computer. Both the applications which require more CPU time are single threaded. Your computer contains only one processor with two processing cores. What would you do to get better performance from the system? 1. Suspend one CPU intensive application using Resource Monitor 2. Suspend both CPU intensive application using Resource Monitor 3. Use Task Manager to set the processor affinity for both CPU intensive applications to the separate processing cores. 4. Use Task Manager to set the processor affinity for Hard Disk intensive application to one of the CPU cores. 5. Correct Answer: 3. Question 5: What is the basic difference between Windows firewall and Windows Firewall with Advanced Security (WFAS)? 1. Windows Firewall can be used to make rules based on programs only but WFAS can be used to block essential services as well 2. Windows Firewall can block only TCP traffic but WFAS can be used to block TCP, UDP as well as ICMP traffic 3. Windows Firewall can block programs but WFAS can block traffic based on network parameters such as ports, protocols, addresses etc. 4. Windows firewall is built-in but WFAS needs separate download 5. Correct Answer: 3.

Question 6: Which of the following protocol will DirectAccess use if the computer you are using is able to connect to the internet but not to the company network? 1. SSTP 2. 6to4 3. 4to6 4. IP-HTTPS 5. Teredo Correct Answer: 4. Question 7: You want to know more about the network configuration on your computer. Which of the following commands will not work under Windows 7 professional? Remember that we are talking about Microsoft tools only. 1. ping 2. tracert 3. pathping 4. netsh 5. nmap Correct Answer: 5. Question 8: You are performing an analysis of a network which uses IPv6 protocol. Which of the following addresses can be used for the device which would connect to the IPv6 Internet? 1. 21cd:53::3ad:3f:af37:8a62 2. fe80:d1ff:d266:7888:27d6 3. ::1 4. fec0:0:0:0:fffe::2 5. Correct Answer: 1.

Question 9: On which of the following device's advanced tab of device properties window will you find the "Bandwidth" property? 1. USB mass storage device 2. USB root hub 3. USB Universal host controller 4. Ethernet Network Adapter 5. Correct Answer: 3.

Question 10: How many built-in DCS (Data Collector Sets) does Windows 7 Ultimate come with? They save you from creating your custom DCS for some monitoring which any administrator would want to see. 1. 1 2. 2 3. 3

4. 5 5. Correct Answer: 2. Question 11: Where are the policies for controlling UAC located? 1. Computer configuration | Windows Settings | Security Settings | Local Policy 2. Computer configuration | Windows Settings | Security Settings | Account Policy | Password Policy 3. Computer configuration | Windows Settings | Security Settings | Local Policy | User rights assignments 4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options 5. Correct Answer: 4. Question 12: What is the IP range of APIPA? 1. 196.254.0.0/12 2. 169.254.0.0/24 3. 196.254.0.0/32 4. 196.254.0.0/16 5. 169.254.0.0/16 Correct Answer: 5. Question 13: You have just plugged in a device in a USB port available on your computer. You want to know how much power that device requires. In which tab of the device properties window will you find the information? 1. Power 2. Power Management 3. Advanced 4. Details 5. Correct Answer: 1.

Question 14: Which of the following actions cannot be taken on a Windows 7 Enterprise edition computer, which is part of an AD Domain? 1. Store TPM recovery information in Active Directory Domain Services 2. Move TPM to USB disk drive 3. Disable the TPM 4. Reset the TPM lockout 5. Correct Answer: 2. Question 15: Which of the following is not a service associated with IPv4? 1. DNS

2. DHCP 3. NAT 4. IPSEC 5. Correct Answer: 4. Question 16: A network is assigned the mask 192.168.0.0/24. What is this notation of representing network masks called? 1. VLSR 2. CIDR 3. VLSS 4. SOHO 5. Correct Answer: 2.

Question 17: You want to know your computer's IP address details. Which of the following commands will you type at the command prompt? 1. ping /local /all 2. ipconfig /all 3. netstat /c /a /n 4. net config workstation 5. Correct Answer: 2. Question 18: One of your clients created a WAP in his home. However, he reports that others around him able to access his network without his permission. What would you suggest him to do? 1. Enable the Windows Firewall 2. Change the settings of his WAP and enable security using either WEP or WAP security algorithms 3. Change the channel being used for WAP 4. Disable ICS 5. Correct Answer: 2. Question 19: Which of the following is not a security feature in Windows Internet Explorer 8? 1. InPrivate Browsing 2. InPrivate Filtering 3. Click-jacking prevention 4. Incognito Window 5. Cross Site Scripting (XSS) Filter Correct Answer: 4.

Question 20: You updated your client's Windows 7 with a new video driver.

However, his computer boots with a blank screen since then. What will you do to run system restore? 1. Guess your keystrokes, log in to the system and run the system restore 2. You must reinstall Windows 3. Boot into Linux and manually copy - paste files from a previous restore point. 4. Boot into Windows RE and then use it to run system restore. 5. Correct Answer: 4. Question 21: Read the following description and check the next step you will take to troubleshoot the connectivity problem on your Windows 7 computer. You have been given a computer, which you have to connect to the network. The network is hybrid, which obtains its configurations with a third party WAP. The computer does not have hardware to connect to the wireless network. Therefore, you plug it to the Ethernet port available on the switch. You find that the computer is not able to connect to the internet. You run the ipconfig tool on command prompt to see the configuration. You find the device has an IP address of 10.10.100.110. You know that the network connection is ok and the WAP is working well. What will you try to do next? 1. Reboot the computer 2. Reinstall the Operating System 3. Change the network settings to get IP from DHCP 4. Run Windows recovery to repair the computer 5. Configure the firewall on the WAP Correct Answer: 3.

Question 22: You suspect that there is some problem with one of the 8 network interfaces. You suspect that it may be a driver problem, while your colleague says it may be disabled. There is also a possibility of a configuration clash. Which DCS report will you analyze the problem? 1. System Diagnostics 2. System Performance 3. Create a custom DCS for the purpose 4. Use Reliability Monitor instead 5. Correct Answer: 1. Question 23: Can you restore multiple previous versions of the same file? 1. Yes 2. No 3. Yes, but only for those files which were not in any of the subfolders of the user profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1.

Question 24: You have decided to create a IPv6 subnet. The subnet you have selected is FFFF:FFFF:FFFF:FFFF:FFFF:0000:0000:0000. What is the problem with this subnet mask? 1. IPv6 requires that the subnets be created only on the last two 16-bit blocks 2. IPv6 requires that the subnets be created only on the last 16-bit block 3. The 'F's have to be written in small characters. 4. The representation of subnet is in wrong format. 5. Correct Answer: 4. Question 25: You are a system administrator for a network of 30 computers in an organization. All computers are running Windows Vista Enterprise (SP2). You want to upgrade all the computers to an edition of Windows 7, which would enable you to boot a system from VHD images. To which of the following Windows 7 editions will you upgrade? 1. Windows 7 Ultimate 2. Windows 7 Professional 3. Windows 7 Enterprise 4. Windows 7 Home Premium 5. Correct Answer: 3.

Question 1: You are sure that your computer has a negative caching for one single computer on the network. What command will you run to remove the negative caching? 1. ipconfig /flushdns 2. ipconfig /renew 3. ipconfig /release 4. ipconfig /flushall 5. Correct Answer: 1. Question 2: Which of the following can be used to see the list of the shared folder by a Windows 7 computer? 1. The net share command 2. The group policy editor 3. The Network and Sharing center 4. Windows Explorer 5. Correct Answer: 1. Question 3: Which of the following protocol will DirectAccess use if the computer you are using is able to connect to the internet but not to the company network? 1. SSTP 2. 6to4

3. 4to6 4. IP-HTTPS 5. Teredo Correct Answer: 4. Question 4: Which of the following cannot be done using Windows SIM? Windows SIM is used to create answer files for unattended setups. While it can help you manage things easily, it does not come with an all-in-one functionality. Choose the one functionality which will not be available via this tool. 1. Validate the settings of an existing answer file against a .wim file 2. Update an existing answer file 3. Add third-party drivers, applications, or other packages to an answer file 4. Adding custom applications to the Windows Image file 5. Correct Answer: 4. Question 5: You want to list all driver conflicts in the system at a single place. Which tool will let you do that? 1. driverquery.exe 2. msinfo32.exe 3. Device Manager 4. drvtool.exe 5. Correct Answer: 2. Question 6: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 1. Interactive Logon: require Smart Card for logoff 2. Interactive Logon: Smart Card removal Behavior 3. Interactive Logon: Smart Card usage Behavior 4. Interactive Logon: Smart Card Account Control 5. Correct Answer: 2.

Question 7: One of your clients complains that he is not able to download a file while closing his laptop's lid during the night. Windows hibernates as and when the lid is closed. What will you suggest him? 1. Change the power options from the control panel. 2. Use Windows update to resolve the issue. 3. Use GPE to change the policy. 4. Install Microsoft power manager tool and change the setting. 5. Correct Answer: 1.

Question 8: You run the command "netsh wlan connect name=default

ssid=MyWinNet" on an elevated command prompt from a laptop running Windows 7 Ultimate. What does the word 'default' in that command signify? 1. It tells to perform authentication based on the default network key supplied. 2. It asks Windows to use the default interface to connect to the network 3. It is the name of the network to which you are connecting 4. It is the name of the computer from which you are connecting. 5. It is the name of the profile to be used when connecting to the network MyWinNet Correct Answer: 5. Question 9: Which of the following operations will not be supported by the Windows 7 Disk Management Console? 1. Creating a new volume 2. Resizing a volume 3. Merging two volumes together (given both are adjacent primary partitions or adjacent logical partitions within the same extended partition) 4. Deleting a volume 5. Correct Answer: 3. Question 10: Which of the following packages will get you the Windows SIM tool? Windows SIM is not a standalone tool. Select the package, of which it is a part. 1. Windows Automated Installation Kit 2. Windows Automated Information Kit 3. Windows Unattended Installation Kit 4. Windows Mass Deployment Toolkit 5. Correct Answer: 1. Question 11: You have implemented a disallow rule using the Software Restriction Policies using the path rule to deny the execution of a software. What is drawback of this approach? 1. The application will not be shown in the Control panel's list of programs 2. A change in path will make the rule ineffective 3. The rule will not persist after system reboot 4. An update will make rule ineffective 5. Correct Answer: 2.

Question 12: One of the services suddenly stopped working on your computer. You want the details and open the Event Viewer. In what category will you find this event? 1. Application 2. Security 3. System 4. Forwarded Events 5.

Correct Answer: 3.

Question 13: You tried to instal Windows 7 on a computer and make it dual boot with Windows XP which was already installed on the system. However, the installation failed and corrupted the boot sector of the Volume where Windows XP was installed. Which of the following commands will you run from the Windows 7 DVD to ensure that the boot code on the Windows XP volume becomes usable again. Assume that Windows XP was installed on a volume with drive letter D:. Also, note that the volume is using NTFS as the file system. 1. BCDEdit /restore:MBR /volume:D 2. bootsect.exe /nt60 D: 3. bootsect.exe /nt52 D: 4. BCDEdit /restore D: 5. Correct Answer: 3. Question 14: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning? 1. By using System Restore 2. By using Shadow Copy 3. By restoring the User Profile 4. By restoring the Registry 5. Correct Answer: 3.

Question 15: You have only one network available to you which is configured using IPv6 protocol. You want to access your company network using DirectAccess. What will you do? The network you are trying to use will utilize the Ethernet interface on your computer. 1. It is not possible to connect. 2. It can connect without any problems. 3. It can connect only if the network type is set to public and you are using a Wi-Fi connection. 4. You can use Windows Remote Desktop Gateway of the company netowrk rather than DirectAccess. 5. Correct Answer: 2.

Question 16: Which of the following tools contains the settings for enforcing password settings on a Windows 7 computer? 1. USMT 2. Cipher.exe 3. Local GPE 4. Compmgmt.msc 5. Control Panel

Correct Answer: 3.

Question 17: A computer on your network started behaving erratic. You renewed its IP configuration to solve the problem. Now the computer is working well, but it is not accessible to other computers on the network by the computer name. Which of the following commands will you try? 1. ipconfig /registerdns 2. ipconfig /renew 3. ipconfig /release 4. ipconfig /all 5. Correct Answer: 1.

Question 18: Your client bought a Laptop 3 years ago which came with Windows Vista Ultimate. He has not upgraded to Windows 7 Ultimate and wants to use BitLocker to encrypt the C:\ driver, where Windows is installed. But he is not able to do so. What would you suggest him if he wants to do this? 1. Revert back to Windows Vista Ultimate and install SP2. 2. Buy a new laptop. 3. Install a TPM on the Laptop 4. Use Linux Operating System. 5. Correct Answer: 2. Question 19: You copy a file from your NTFS volume to a USB pen drive formatted with FAT32 and then again copy this file to another system. What permissions will be applicable to the file copied on the destination system on an NTFS volume? 1. The permissions are same as the source file. 2. Permissions are completely destroyed. 3. Permissions are retained but are selected by Windows. 4. Permissions of the destination folder are applied. 5. Correct Answer: 4.

Question 20: You are an IT administrator in a company. Your boss asks you to convert the Windows 7 installation on one of the company workstations into a virtual machine. He asks you to make sure that this virtual machine runs on their Windows Server 2008 R2 with Hyper-V. Which of the following tools will help you? It is noteworthy that to answer this question, you must already know how to capture an image of Windows 7 installation. 1. vhd2vmx 2. wim2vhd 3. vmx2hvs 4. vhd2wim 5. Correct Answer: 2.

Question 21: What does MDT stand for? 1. Microsoft Deployment Toolkit 2. Microsoft Development Toolkit 3. Microsoft Demonstration Tools 4. Microsoft Deployment Tools 5. Microsoft Deployment Toolset Correct Answer: 1. Question 22: What will happen when Application Compatibility Diagnostics Policies have not been configured and a compatibility issue occurs under Windows 7? 1. The issue is ignored silently 2. The issue is ignored but a log entry is made in system event logs 3. The issue is reported to the user 4. Windows 7 will prompt you to set the policies on first such attempt. This is done only for administrative accounts. 5. Correct Answer: 3. Question 23: Which of the following Editions of Windows 7 includes Windows Touch? Touch is available in Windows 7. All the programs of Windows are ready to work on touch from your finger. But not all of the editions come with the support for the technology. Identify the edition(s) which do. 1. All Editions 2. Home Premium and Ultimate only 3. Professional, Enterprise and Ultimate only 4. Home Premium, Professional, Enterprise and Ultimate 5. All Editions, except Starter Edition Correct Answer: 4. Question 24: You want to see contents of both IPv4 and IPv6 route table. What command would you use? Choose the first command, which will do the job. There is more than one correct answer in the list. 1. Route print 2. netstat -r 3. tracert d 4. netsh interface ipv4 route 5. Correct Answer: 1. Question 25: You have been given a problem where a user tried to install Linux over Windows 7 but the GRUB boot loader failed to install on the MBR and the MBR is now corrupted. Both Linux and Windows 7 are now inaccessible due to MBR corruption. He (user) confirms that the disk partitioning was not altered. Which of the following steps will you take first to revert Windows 7 OS to a bootable state?

1. Start Windows Recovery Console and run the command: bcdedit 2. Start Windows Recovery Console and run the command: bootrec /fixboot 3. Use a Custom Linux installation media to reinstall GRUB bootloader 4. Start Windows Recovery Console and run the command: bootrec /fixmbr 5. System cannot be repaired now, so format the whole system and reinstall again Correct Answer: 4.

Question 1: What is the size of address space of IPv6? In the following choices, the caret symbol (^) can be read as "raised to the power". Hence, 2^10 can be read as "Two raised to the power ten" and the resulting numerical value of this expression will be 1024. 1. 2 ^ 128 2. 2^86 3. 2^256 4. 2^32 5. 2^64 Correct Answer: 1. Question 2: You have to add the driver file located in the C:\drivers\nwdrv folder to the Driver Store. The .INF file corresponding to the driver is C:\drivers\nwdrv\nwdrv.inf. Which of the following commands will do the job? 1. pnputil a C:\drivers\nwdrv\nwdrv.sys 2. pnputil add C:\drivers\nwdrv\ 3. pnputil e C:\drivers\nwdrv\nwdrv.inf 4. pnputil add C:\drivers\nwdrv\nwdrv.inf 5. pnputil a C:\drivers\nwdrv\nwdrv.inf Correct Answer: 5. Question 3: You are an IT administrator in a company. Your boss asks you to convert the Windows 7 installation on one of the company workstations into a virtual machine. He asks you to make sure that this virtual machine runs on their Windows Server 2008 R2 with Hyper-V. Which of the following tools will help you? It is noteworthy that to answer this question, you must already know how to capture an image of Windows 7 installation. 1. vhd2vmx 2. wim2vhd 3. vmx2hvs 4. vhd2wim 5. Correct Answer: 2. Question 4: On which of the following file systems Windows 7 will not be able read or write? 1. NTFS

2. FAT32 3. exFAT 4. HPFS 5. Correct Answer: 4. Question 5: Why is subnetting used for different segments of a large network? 1. It complicates networking 2. It makes it easier to configure the network 3. It prevents packet collisions 4. It makes networks expensive 5. Correct Answer: 3.

Question 6: What do you use data collector sets for? 1. To generate a system health report 2. To create a set of attributes for monitoring later and generating reports based on the monitoring 3. To save the system configuration 4. To backup the registry 5. Correct Answer: 2. Question 7: Which utility can create a DCS at the command prompt? 1. Logcreate 2. createDCS 3. Logman 4. Createset 5. Correct Answer: 3. Question 8: Where will you find the policies to configure the setting for offline files? 1. Computer Configuration | Administrative Templates | Windows Explorer | Offline Files 2. Computer Configuration | Administrative Templates | Windows Components | Windows Explorer 3. Computer Configuration | Administrative Templates | Network | SNMP 4. Computer Configuration | Administrative Templates | Network | Offline Files 5. There are no policies to be set for offline files Correct Answer: 4. Question 9: You want to add a new group named "webmgrs" to the list of user groups. What is the fastest way of doing this? 1. Open the Services console and navigate to Local groups and users |

groups and add the new group. 2. Open a command prompt and run net localgroup webmgrs /add 3. Open the Group Policy Editor and navigate to Local groups and users | groups and add the new group. 4. Open an elevated command prompt and run net localgroup webmgrs /add 5. Correct Answer: 4.

Question 10: Which of the following is true about "sysprep" tool? 1. It can be used to install a new Windows 7 Operating System on the computer 2. It can be used to configure the Windows 7 Operating System installed on your system 3. It can be used to capture an image of an installed Windows 7 copy for later deployment 4. Sysprep does the same work as ImageX 5. Correct Answer: 3. Question 11: You want to roll back to the previous version of a driver for one of your devices. Which tool will you use for the purpose? 1. Device Manager 2. Installed Programs Manager (Control Panel -> Programs -> Programs and Features) 3. Windows Update 4. Computer Management Console 5. Correct Answer: 1. Question 12: One of your clients has a habit to tweak settings using registry. He is not ready to give up this habit. Which registry key will you ask him not to alter so that he be able to at least use the "Last known good configuration option" when Windows 7 fails to boot? 1. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001 2. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002 3. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet 4. HKEY_LOCAL_MACHINE\BCD00000000\Objects\{0ce4991b-e6b3-4b16b23c-5e0d9250e5d9} 5. HKEY_CURRENT_USER\System\CurrentControlSet Correct Answer: 3.

Question 13: Which of the following Editions of Windows 7 includes Windows Touch? Touch is available in Windows 7. All the programs of Windows are ready to work on touch from your finger. But not all of the editions come with the support for the technology. Identify the edition(s) which do. 1. All Editions

2. Home Premium and Ultimate only 3. Professional, Enterprise and Ultimate only 4. Home Premium, Professional, Enterprise and Ultimate 5. All Editions, except Starter Edition Correct Answer: 4. Question 14: Read the description and answer the given question. One of your clients have been using a network location as a backup destination for your scheduled backups. Suddenly he reports that Windows has stopped taking backups. You see that all settings are correct and nothing has been altered. All other network shares are working well. Also the web server being hosted on the machine which was used as a backup destination is working well. What may be the problem? 1. Windows Firewall has stopped working and has denied access to the network. 2. A user on the remote Windows computer changed his password. 3. Windows is infected with a malware. 4. Network connectivity is lost. 5. Correct Answer: 2. Question 15: Which tool keeps track of new software installations and updates? 1. Action Center 2. Performance Monitor 3. Task Manager 4. Reliability Monitor 5. Correct Answer: 4.

Question 16: A program designed for Windows XP crashes on Windows 7 when it is run with UAC enabled. Which of the following would you do first to resolve the issue? It is to be understood that the application is already installed. 1. Download and install a newer version which is compatible with Windows 7 2. Download and install a newer version which is compatible with Windows Vista 3. Run the application with the compatibility option "Run this program as an administrator" turned on 4. Run the Program Compatibility Troubleshooter on the application 5. Correct Answer: 3.

Question 17: What is the maximum default period of time, Reliability Monitor collects data for showing the system reliability history? 1. 1 month 2. 4 months 3. 6 months 4. 1 Year 5. Forever

Correct Answer: 4.

Question 18: Which of the two types of files does Windows SIM system uses to collect information for creating an answer file for unattended installations? 1. .INI and .WIM files 2. .WIM and .INF files 3. .WIM and .CLG files 4. .CLG and .INI files 5. Correct Answer: 3.

Question 19: Which of the following technologies will not have any effect due to widespread use of DirectAccess? 1. PPTP 2. HTTP 3. L2TP 4. SSTP 5. Correct Answer: 2. Question 20: What will this command do when you type it in an elevated command prompt "netsh interface ipv6 add v6v4tunnel remote 10.0.0.100 192.168.124.136" ? 1. Create an IPv6-in-IPv4 tunnel between the local address 10.0.0.100 and the remote address 192.168.124.136 2. Create an IPv6-in-IPv4 tunnel between the local address 192.168.124.136 and the remote address 10.0.0.100 3. Create an IPv4-in-IPv6 tunnel between the local address 10.0.0.100 and the remote address 192.168.124.136 4. Create an IPv4-in-IPv6 tunnel between the local address 192.168.124.136 and the remote address 10.0.0.100 5. Correct Answer: 1. Question 21: Read the following description and answer the question given. Your computer has two physical hard disks, both of them contain a single volume with Windows 7 Ultimate and Windows Vista Ultimate installed on them. You want to take backup of your Windows 7 OS. Which drive will you use? 1. The disk which has Windows 7 installed on it 2. Any of the disks can be used 3. None of the disks 4. The disk with Windows Vista installed on it 5. Correct Answer: 3.

Question 22: How will you update a VHD file with latest software updates? Keep in mind that this file is to be kept for emergent uses.

1. Use a tool made for the purpose 2. Install updates in a Windows installation and then image it to WIM, then convert it to VHD using Wim2VHD tool 3. Boot it on the computer with Windows 7 and install the updates 4. Run it under Virtual PC and then update it 5. Correct Answer: 1. Question 23: What extension is allocated to a Library? 1. .Lib 2. .Library-ms 3. .Library 4. It is a folder. 5. Correct Answer: 2. Question 24: Under which node will you find the policy which can be used to set the location of a WSUS server on the internal network? 1. Computer Configuration | Administrative Templates | Network | Windows Update 2. Computer Configuration | Administrative Templates | Network | BranchCache 3. Computer Configuration | Administrative Templates | Windows Components | Windows Update 4. User Configuration | Administrative Templates | Windows Components | Windows Update 5. Correct Answer: 3. Question 25: What is the main difference between EFS and BitLocker from a user's perspective? 1. BitLocker can be used to encrypt everything on a volume. EFS cannot encrypt all contents of a volume. 2. NTFS files cannot be recovered if you forget the password. BitLocker can be opened even without a password. 3. EFS always applies to complete volume, BitLocker does not. 4. BitLocker always applies to complete volume, EFS does not. 5. Correct Answer: 4.

Question 1: What does the standard user analyzer tool do? 1. It checks whether an application will have problems with UAC 2. It monitors whether a given application is being run by a standard user or an administrator 3. It checks whether the application has been tampered by the user or not

4. It reports the behavior of the user to a service running on the server to which the computer is connected 5. Correct Answer: 1. Question 2: What is the basic difference between Windows firewall and Windows Firewall with Advanced Security (WFAS)? 1. Windows Firewall can be used to make rules based on programs only but WFAS can be used to block essential services as well 2. Windows Firewall can block only TCP traffic but WFAS can be used to block TCP, UDP as well as ICMP traffic 3. Windows Firewall can block programs but WFAS can block traffic based on network parameters such as ports, protocols, addresses etc. 4. Windows firewall is built-in but WFAS needs separate download 5. Correct Answer: 3. Question 3: Read the given description and select the right answer. You have a folder named "share" which is shared across the network. You have set the Modify permission in the NTFS permissions and have set the Read permission in the folder share options. A member accesses the folder. Which permissions will apply on him? 1. Read 2. Modify 3. Full control 4. Complete Restriction will be applied 5. Correct Answer: 1. Question 4: Which of the following is not the part of "Minimum requirements" set for installing 64-bit version of Windows 7 Ultimate? 1. 64 bit device drivers 2. 64 bit capable processor 3. 4 GB RAM 4. 20 GB Free disk space 5. Correct Answer: 3.

Question 5: You have a network of computers running Windows 7 Enterprise. Which of the following is true? 1. There has to be a Windows Server 2008 R2 on the network to use BranchCache. 2. The computers can use the BranchCache in Distributed mode. 3. The computers can use the BranchCache in Hosted mode. 4. The computers will not be able to use BranchCache in any of the modes. 5.

Correct Answer: 2.

Question 6: What problem do you suspect if only your computer is not able to resolve the address of a single computer on network by its name? (Read the details for understanding the situation) You try to ping a computer on the network by its name. The DNS in that moment is not working well and fails to resolve the name. You then notice that other computers are able to ping the same target computer by its name and the DNS is working well. In addition, your computer is not having any connectivity issues in any other operation, but the name resolution of that same computer is failing again and again. You computer is running Windows 7 Enterprise. What might be the problem in this case? 1. Computer is infected with virus 2. Someone over your network is trying to hack you 3. The DNS cache is poisoned 4. Your computer is suffering from negative caching 5. The target computer is not connected to the network Correct Answer: 4. Question 7: You have a folder named "sharedata" on your computer. You want to allow the users on the network to read the files on the folder, modify the files, add new files and delete files in the folder. You have created the account necessary for the purpose. What permissions will you assign to that account for the given folder? 1. Read 2. Change 3. Full control 4. We need to edit the advanced permissions for the folder. 5. Correct Answer: 2. Question 8: The Setup Analysis Tool analyses the setup program without actually installing the application. Select the correct name of the process used to do this. 1. Sandboxing 2. Virtualization 3. Profiling 4. Visualization 5. Correct Answer: 3.

Question 9: One of the services suddenly stopped working on your computer. You want the details and open the Event Viewer. In what category will you find this event? 1. Application 2. Security 3. System 4. Forwarded Events 5.

Correct Answer: 3.

Question 10: You have just configured the BranchCache using the GPE. Which of the following actions will you take now? 1. Configure the network conection 2. Configure the firewall 3. Configure the accounts which are authorized to use BranchCache 4. Configure the programs which can use BranchCache 5. Correct Answer: 2.

Question 11: Which of the following actions cannot be taken on a Windows 7 Enterprise edition computer, which is part of an AD Domain? 1. Store TPM recovery information in Active Directory Domain Services 2. Move TPM to USB disk drive 3. Disable the TPM 4. Reset the TPM lockout 5. Correct Answer: 2. Question 12: You have been asked to install Windows 7 Professional x64 edition on 20 computers connected to a network, all of which have the same hardware as below: 1.5 GHz Dual Core Processor 1 GB RAM 18 GB HDD 10/100 Ethernet Port DirectX 10 Video Card with 512 MB video memory Which of the following will you suggest your boss for an upgrade? 1. Upgrade RAM and Hard Disk 2. Upgrade Video Card and RAM 3. Upgrade RAM and Network Adapter 4. Upgrade Hard disk and Video card 5. Correct Answer: 1. Question 13: You have moved a file named data.dat from C:\Source to D:\Destination. While data.dat was compressed, the folder D:\Destination is encrypted. What will happen to the file? 1. It will be both compressed and encrypted. 2. It will be compressed but not encrypted. 3. It will be decompressed and encrypted. 4. Windows 7 will prompt you to make a selection to either keep the file as compressed or Encrypted. 5. Correct Answer: 3. Question 14: You want to add a new group named "webmgrs" to the list of user groups. What is the fastest way of doing this?

1. Open the Services console and navigate to Local groups and users | groups and add the new group. 2. Open a command prompt and run net localgroup webmgrs /add 3. Open the Group Policy Editor and navigate to Local groups and users | groups and add the new group. 4. Open an elevated command prompt and run net localgroup webmgrs /add 5. Correct Answer: 4. Question 15: What will happen when Application Compatibility Diagnostics Policies have not been configured and a compatibility issue occurs under Windows 7? 1. The issue is ignored silently 2. The issue is ignored but a log entry is made in system event logs 3. The issue is reported to the user 4. Windows 7 will prompt you to set the policies on first such attempt. This is done only for administrative accounts. 5. Correct Answer: 3. Question 16: Your network uses a proxy server for protecting internal computer from outside threat and for regulating the traffic. Can Windows Automatic Update still be performed on the Windows 7 computers on the internal network? If yes, then which tool will do the job? 1. Yes, We can use WPAD for this. 2. Yes, We can use Internet Explorer for this. 3. No it cannot be done. 4. It can be done only if the network has a WSUS server. 5. Correct Answer: 1.

Question 17: You want to check your company's intranet website for compatibility with Windows 7. Which of the following tools will let you do this job? Some web sites may not display well in the new Internet Explorer 8, which comes with Windows 7. So they must be checked for compatibility. In this case we assume that the intranet web site you are trying to test was built for Internet Explorer 6. 1. Application Compatibility Toolkit (ACT) 2. Internet Explorer Administration Kit (IEAK) 3. Program Compatibility Troubleshooter (PCT) 4. Microsoft Deployment Toolkit (MDT) 5. Correct Answer: 1. Question 18: In which category will the IPv6 address fec0:0:0:eadf::1ff fall? 1. Multicast 2. Unicast Link-local 3. Unicast global

4. Unicast site-local 5. Correct Answer: 4. Question 19: Which of the following commands will create a recovery agent? 1. Cipher.exe /r:recoveryagent 2. Cipher.exe /recoveryagent /add 3. icacls /newras 4. Cipher.exe /register:recoveryagent 5. Correct Answer: 1. Question 20: What is the minimum processor speed required for running a Windows 7 64 bit Operating System? 1. 800 Mhz 2. 1 GHz 3. 1.2 GHz 4. 1.8 GHz 5. Correct Answer: 2.

Question 21: You can use device manager to perform a few device management functions. Which of the following cannot be done by device manager? 1. Determine whether a particular device and its driver is working properly or not 2. Search the internet for appropriate device driver 3. Enable or disable a device attached to the computer 4. Install updated device driver 5. Correct Answer: 2. Question 22: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image? 1. Language Pack 2. Driver 3. Feature pack in Windows PE image 4. Application patch 5. Application Correct Answer: 1. Question 23: What is the drawback of hash rule? Hash rules are the most effective ones in the list of Software Restriction Policies. You have to select the biggest downside of these rules. 1. Implementing them will give a performance drop

2. It has to be setup independently for each computer 3. It has to be setup independently on a per-file basis 4. They conflict with the NTFS permissions 5. Correct Answer: 3. Question 24: You want fine grained control over how UAC behaves. Where will you go? 1. Local GPE 2. Control Panel 3. Computer Management Console 4. None of the above 5. Correct Answer: 1.

Question 25: Which of the following commands will not work? 1. Dism /image:C:\offimgrootdir /WinDir:D:\WinNT /Add-Package /PackagePath:C:\pkg1.cab 2. Dism /image:C:\offimgrootdir /WinDir:WinNT /Add-Package /PackagePath:C:\pkg1.cab 3. Dism /image:C:\offimgrootdir /LogPath:AddPkg.log /LogLevel:1 /AddPackage /PackagePath:C:\pkg1.cab 4. Dism /Mount-Wim /WimFile:C:\install.wim /name:"Windows 7 HomeBasic" /MountDir:C:\test\ 5. All of the above are right. Correct Answer: 1. Question 1: You have just configured the BranchCache using the GPE. Which of the following actions will you take now? 1. Configure the network conection 2. Configure the firewall 3. Configure the accounts which are authorized to use BranchCache 4. Configure the programs which can use BranchCache 5. Correct Answer: 2. Question 2: Can you restore multiple previous versions of the same file? 1. Yes 2. No 3. Yes, but only for those files which were not in any of the subfolders of the user profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1. Question 3: Who can uninstall an update?

1. Anyone 2. Only the administrator. 3. Only the administrator of the Domain Server 4. Updates can be uninstalled only if they were installed manually. It must be done by a Backup Operator in this case. 5. Any user who is not a Guest user Correct Answer: 2. Question 4: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually. 1. Shift + F3 2. Ctrl + Shift + F3 3. Alt + Shift + F3 4. Ctrl + Alt + F3 5. Correct Answer: 2. Question 5: You installed a new driver for your Audio device. However, it is giving you problems. How will you roll back to the old driver? 1. Use the add/remove programs feature and remove the installed driver package 2. Use the GPE to disable driver updates 3. Use Windows Update 4. Use the Device Manager, select the Audio Device and click on the "Roll Back Driver" button on the "Driver" tab of the device properties window 5. Correct Answer: 4. Question 6: Which of the following is not a requirement for configuring a DirectAccess server? 1. Windows Server 2008 R2 2. 4 network interfaces. 3. Direct connection to corporate intranet 4. Digital certificates to support authentication 5. Correct Answer: 2.

Question 7: You want to allow other computers to ping your computer by its IPv6 address. Which command will you run? 1. netsh firewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow 2. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6 dir=in action=allow

3. netsh firewall firewall add rule name="ICMPv6" protocol=icmp6:any dir=both action=allow 4. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6:any,any dir=in action=allow 5. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow Correct Answer: 5.

Question 8: Which of the following is a Teredo address? 1. 2001::0a0a:1efe:e876:eff:f5ff:ebee 2. fec0:0:0:0:fffe::1 3. 2002:c058:6301:: 4. fe80::5efe:0a00:028f 5. Correct Answer: 1. Question 9: Which of the following commands will not work? 1. Dism /image:C:\offimgrootdir /WinDir:D:\WinNT /Add-Package /PackagePath:C:\pkg1.cab 2. Dism /image:C:\offimgrootdir /WinDir:WinNT /Add-Package /PackagePath:C:\pkg1.cab 3. Dism /image:C:\offimgrootdir /LogPath:AddPkg.log /LogLevel:1 /AddPackage /PackagePath:C:\pkg1.cab 4. Dism /Mount-Wim /WimFile:C:\install.wim /name:"Windows 7 HomeBasic" /MountDir:C:\test\ 5. All of the above are right. Correct Answer: 1.

Question 10: Windows 7 will reserve 20% of internet network bandwidth. This rule can be overridden by a system administrator. Which of the following versions of Windows 7 will NOT allow a system administrator to do so? 1. Windows 7 Ultimate 2. Windows 7 Home Premium 3. Windows 7 Professional 4. Windows 7 Enterprise 5. Both "Home Premium" and "Professional" editions Correct Answer: 2.

Question 11: You have selected manual method for backing up "Files and Folders" using Windows Backup. Which of the following files will not be backed up? 1. Any files in the %systemroot% directory 2. Compressed files 3. Files with .DLL extension 4. All of the above. 5. Correct Answer: 1.

Question 12: Which one of the following upgrades are not possible? 1. Windows Vista Home Basic to Windows 7 Ultimate 2. Windows XP Professional to Windows Vista Home Premium 3. Windows XP Professional to Windows 7 Professional 4. Windows Vista Ultimate to Windows 7 Ultimate 5. Correct Answer: 3. Question 13: Where will you look for the policy in the Local GPE (Group Policy Editor), if you wanted to prevent Windows 7 from installing removable devices? 1. User Configuration -> Administrative Templates -> System -> Device Installation -> Device Installation Restrictions 2. Computer Configuration -> Administrative Templates -> System -> Driver Installation 3. Computer Configuration -> Administrative Templates -> System -> Device Installation 4. Computer Configuration -> Administrative Templates -> System -> Device Installation -> Device Installation Restrictions 5. Correct Answer: 4.

Question 14: One of your clients has a habit to tweak settings using registry. He is not ready to give up this habit. Which registry key will you ask him not to alter so that he be able to at least use the "Last known good configuration option" when Windows 7 fails to boot? 1. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001 2. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002 3. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet 4. HKEY_LOCAL_MACHINE\BCD00000000\Objects\{0ce4991b-e6b3-4b16b23c-5e0d9250e5d9} 5. HKEY_CURRENT_USER\System\CurrentControlSet Correct Answer: 3. Question 15: Some updates have failed to install in the last update session. Which tool will you use to see the list? 1. update.exe 2. Control.exe 3. Winupdate.exe 4. show /updates:Windows 5. Correct Answer: 2. Question 16: You want to test the AppLocker policies but you do not want to implement them right away. What will you do? Applocker needs to be tuned well before deploying it. Mistakes can make Windows non functional. Hence, it is required that the policies be tested and then implemented.

1. Policies should be made in audit mode 2. Policies should be tested at night 3. Policies must be tested on virtual machines 4. A dedicated network is needed to test the correctness of policies 5. Correct Answer: 1.

Question 17: You want to use a network location as a backup destination for file backups. You already know password of an administrative account on the machine. What else do you require on the destination computer? Select the first option which seems right to you. There may be more than one correct answers. 1. NTFS permissions 2. Full control share permission 3. Backup permissions 4. Read permissions 5. Correct Answer: 1. Question 18: You want fine grained control over how UAC behaves. Where will you go? 1. Local GPE 2. Control Panel 3. Computer Management Console 4. None of the above 5. Correct Answer: 1. Question 19: Which of the following will not be backed up in manual backup run through Windows backup? 1. Encrypted Files 2. Compressed files 3. Appdata folder of the User 4. Folders in the %systemdrive% 5. Correct Answer: 1.

Question 20: You want to turn off the UAC. What command will you type at the command prompt for this? 1. uac.exe 2. useraccountcontrolsettings.msc 3. control useraccountcontrolsettings 4. useraccountcontrolsettings.exe 5. Correct Answer: 4.

Question 21: How will you run Wim2VHD tool? 1. cscript wim2vhd.exe 2. wim2vhd.wsf 3. cscript wim2vhd.wsf 4. wim2vhd.exe 5. Correct Answer: 3. Question 22: You took a system image backup of a Windows 7 Ultimate PC in form of VHD file on an External hard disk. Now you want to run that image as an Operating System on the same system. Which tool will you use? 1. Winload.exe 2. bcdtool.exe 3. Bcdedit.exe 4. None of the above 5. Correct Answer: 3. Question 23: Which of the following will write the RAM data to hibernation file? 1. Sleep 2. Hybrid Sleep 3. Shutdown 4. Lock 5. Correct Answer: 2.

Question 24: You want to run Windows 7 with Windows XP mode switched on. Which of the following would you do? In this case we are assuming that your computer has the following configuration: 1. Intel Pentium 4 , 3.0 GHz 2. 120 GB HDD (With only C: drive consuming the full space) 3. DirectX 10.0 compatible Video card (without dual display support) 4. Gigabit Ethernet port 5. 1.5 GB RAM 1. Create a new partition for the Windows XP installation 2. Upgrade RAM to 2 GB 3. Upgrade Video card for dual display support 4. Upgrade to a processor which has at least 2 processing cores 5. Correct Answer: 2.

Question 25: A user has installed Windows 7 Ultimate on his computer. He activated Windows 7 repeatedly for 5 times via the internet. he wants to activate it again, but the activation process is failing over the internet. How can he activate his copy of Windows 7 Ultimate now? 1. There is a problem with the Microsoft servers. Trying again at a later time will activate Windows

2. Activation should be done via phone 3. Activation cannot be done now 4. Windows Genuine Advantage (WGA) tool has to be downloaded and run separately, which will activate Windows automatically 5. Correct Answer: 2

Question 1: You are asked to prevent the execution of a custom appliaction over the network. Which rule will you choose among the following to implement the restriction? 1. Path rule 2. Certificate rule 3. Hash rule 4. Zone rule 5. Correct Answer: 3. Question 2: When are shadow copies created? 1. When Windows boots 2. When restore points are created 3. When you boot into safe mode 4. When system restore is run 5. Correct Answer: 2.

Question 3: You can add the Microsoft-Windows-PnpCustomizationsNonWinPE component to your answer file using the Windows SIM (System Image Manager). In which configuration pass will it be processed? This component can be used to add extra drivers to your Windows 7 Installation. 1. oobeSystem configuration Pass 2. generalize configuration Pass 3. offlineServicing configuration pass 4. specialize configuration Pass 5. auditSystem configuration Pass Correct Answer: 3.

Question 4: When a Windows 7 computer is configured to get its IP address using DHCP and a DHCP server is not available on the network, it will assign an IP address to itself. What range will this IP address be in? 1. 127.0.0.1 through 127.0.255.255 2. 10.0.0.1 through 10.0.0.254 3. 169.254.0.0 through 169.254.255.255 4. 192.168.11.0 through 192.168.11.255 5.

Correct Answer: 3.

Question 5: A computer network consists of computers running 5 different editions of Windows 7 namely "Home Premium","Home Basic", "Professional", "Enterprise" and "Home Starter". Which of the following OS edition(s) can be used as a network backup location? A few editions of Windows 7 cannot backup to network locations. You need to judge your answer based on the knowledge of which ones cannot backup to the network. 1. Home Premium only 2. Home Basic only 3. Enterprise edition only 4. Both Home Premium and Enterprise editions can be used 5. Correct Answer: 3.

Question 6: Windows 7 firewall does not respond to the pings by default. However, your company runs a software which regularly tests connectivity using IPv4 pings within the network. Hence, it is required that you enable pings on all the computers running Windows 7. Which of the following commands will get your work done? 1. netsh advfirewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 2. netsh firewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 3. netsh firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 4. netsh firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=inout action=allow 5. Correct Answer: 1. Question 7: Which of the following is true? 1. Windows 7 is available only in English 2. Windows 7 contains all the language packs, you just need to activate them at the command prompt 3. Windows 7 is a langage neutral Operating System 4. Windows 7 cannot have a French UI 5. Correct Answer: 3.

Question 8: Which of the following is a valid file type to be used as an argument to drvload? 1. .INF 2. .INI 3. .SYS 4. .EXE 5. .WIM

Correct Answer: 1.

Question 9: You are a system administrator for a network of 30 computers in an organization. All computers are running Windows Vista Enterprise (SP2). You want to upgrade all the computers to an edition of Windows 7, which would enable you to boot a system from VHD images. To which of the following Windows 7 editions will you upgrade? 1. Windows 7 Ultimate 2. Windows 7 Professional 3. Windows 7 Enterprise 4. Windows 7 Home Premium 5. Correct Answer: 3.

Question 10: You are performing a wipe-and-load migration from an edition of Windwos Vista to Windows 7. Which of the following versions of USMT can be used? 1. USMT Version 3.0 2. USMT Version 3.2 3. USMT Version 4.0 4. USMT Version 4.1 5. Correct Answer: 3. Question 11: You have to add the driver file C:\drivers\Gfx\nvdm.inf to an offline Windows 7 image directory whose root is C:\Winroot. Which command will get the work done? 1. dism /Windir:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf 2. oscdimg /imgroot:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf 3. dism /image:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf 4. sysprep /image:c:\Winroot /add-driver /driver:C:\drivers\Gfx\nvdm.inf 5. Correct Answer: 3. Question 12: Which of the following is not a part of the functinality offered by DISM.exe? DISM or Deployment Image Servicing and Management is used to alter Windows 7 images for deployment. It offers a wide range of options. You have to choose that functionality which it will not offer. 1. Creating a Windows 7 installtion image 2. Altering Windows 7 installtion image and exit without a commit 3. Altering Windows 7 installtion image and exit without a commit 4. Mounting and unmounting a Windows 7 installtion image 5. Correct Answer: 1.

Question 13: You have been asked to use RemoteApp to publish the MS Word. What effect will this have on the users trying to use MS Office on the machine? 1. They will be able to launch the program from their desktop while it resides on the remote computer. 2. When they launch Word, their Windows 7 computers will automatically start a Remote Desktop connection with the remote computer. 3. Word will not be accessible on the network. 4. Users will be able to copy any part of the installation on their computers and use it as if they have installed it on their own machines. 5. Correct Answer: 1.

Question 14: You want to capture a Windows 7 image of a reference computer in the WIM format and then deploy it. You need to specify the source directory of the WIM file resides and then specify whether Setup or Sysprep files are required (or not). You then want to move the file to the distribution share for deployment of the captured Image. Which tool will let you do this? 1. WDS 2. MDT 3. SCCM 4. SIM 5. Correct Answer: 2. Question 15: What is InPrivate browsing in Windows Internet Explorer 8? 1. It makes you browse the internet without saving any information about the browsing session. 2. It keeps the data transfer between your computer and the web server safe. 3. It is used to block unwanted websites. 4. It can be used by administrators and domain controllers to have a look on what other users have been watching on the internet. 5. Correct Answer: 1. Question 16: You want to add a new group named "webmgrs" to the list of user groups. What is the fastest way of doing this? 1. Open the Services console and navigate to Local groups and users | groups and add the new group. 2. Open a command prompt and run net localgroup webmgrs /add 3. Open the Group Policy Editor and navigate to Local groups and users | groups and add the new group. 4. Open an elevated command prompt and run net localgroup webmgrs /add 5. Correct Answer: 4.

Question 17: Read the description and choose the right answer. The network of computers you manage performs extremely well compared to the

other networks in the office. The branch head is very happy with you. Being a technical guy himself, he has asked all the IT administrators to use Xperfview.exe to show a visual trace analysis of the systems on their network. You try to run this tool but you do not find it anywhere on the system. All computers managed by you use Windows 7 Enterprise. Which tool do you need to install? 1. The tool is available only on Windows Ultimate. 2. It is available with Visual Studio 2008 Professional Edition. 3. It is available in the Sysinternals Suite of applications. 4. It comes in the WPT package 5. Correct Answer: 4.

Question 18: Which of the following command line tools will allow you to take backup of C: drive? 1. wbadmin 2. ntbackup 3. adminbkp 4. sysbackup 5. Correct Answer: 1. Question 19: You want to check your company's intranet website for compatibility with Windows 7. Which of the following tools will let you do this job? Some web sites may not display well in the new Internet Explorer 8, which comes with Windows 7. So they must be checked for compatibility. In this case we assume that the intranet web site you are trying to test was built for Internet Explorer 6. 1. Application Compatibility Toolkit (ACT) 2. Internet Explorer Administration Kit (IEAK) 3. Program Compatibility Troubleshooter (PCT) 4. Microsoft Deployment Toolkit (MDT) 5. Correct Answer: 1. Question 20: Which of the following commands will you run if you want to reconfigure the IP settings of a client computer connected to an enterprise network? 1. Reboot the computer 2. Run ipconfig /release and ipconfig /renew 3. Shutdown the computer, then turn off the Ethernet switch it is connected to, then start the Ethernet switch and the computer on 4. Run ipconfig /renew 5. Correct Answer: 4. Question 21: You have to set up a network during Windows 7 Installation process. Which of the following commands in the set of Windows PE tools will help you set up the network?

1. winpeshl 2. wpeinit 3. wpeutil 4. drvload 5. Correct Answer: 3.

Question 22: You hold the keys and passwords to unlock all the drives on the company network in the campus where you work. Security requirements of the company do not allow any remote access except using MS Excel (using remoteapp) or Command Prompt remotely. What will you do help a user who has forgotten the password of one of his drives encrypted with BitLocker? 1. Go to the computer of the user and help him 2. Call him and tell him the password 3. Unlock the drive using manage-bde.exe 4. An encrypted drive cannot be opened unless it is brought to the computer where it was encrypted. 5. Correct Answer: 3. Question 23: Which registry key will you edit to add a new folder to the list of folders where Windows 7 searches for drivers? 1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DevicePath 2. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\D evicePath 3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\D evicePath 4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\D evice Installer\DevicePath 5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\D evice Installer\FolderListString Correct Answer: 3.

Question 24: You want to find out, which user accounts are allowed to access data in a folder containing sensitive commercial documents. Your machine runs on Windows 7 Enterprise. What will you configure? 1. EFS 2. NTFS permissions 3. Auditing 4. BitLocker 5. Correct Answer: 3.

Question 25: Which of the following is incorrect about the Stability index? 1. Days when the system is powered off or in a sleep state are not used when calculating the System Stability Index 2. Recent failures are weighted less heavily than past failures and the graph is in a descending line in this case. 3. If there are any significant changes to the system time, an Information icon will appear on the graph for each day on which the system time was adjusted. 4. If there is not enough data to calculate a steady System Stability Index, the graphed line will be dotted. 5. Correct Answer: 2.

Question 1: Which of the following tools will you use to keep a number of VHDs upto-date with latest security patches and software updates? 1. Windows Server Update Services 2. System Center Configuration Manager 3. Offline Virtual Machine Servicing Tool 4. Microsoft Deployment Toolkit 5. Correct Answer: 3. Question 2: You are an IT administrator in a company. Your boss asks you to convert the Windows 7 installation on one of the company workstations into a virtual machine. He asks you to make sure that this virtual machine runs on their Windows Server 2008 R2 with Hyper-V. Which of the following tools will help you? It is noteworthy that to answer this question, you must already know how to capture an image of Windows 7 installation. 1. vhd2vmx 2. wim2vhd 3. vmx2hvs 4. vhd2wim 5. Correct Answer: 2. Question 3: What is the feature called which assigns an IP address to your computer when the DHCP service is not available on the network? 1. Automatic Private IP Addressing (APIPA) 2. Loopback Address Assignment Service (LAAS) 3. Automatic Network Addressing (ANA) 4. Local IP Addressing (LIA) 5. Correct Answer: 1.

Question 4: Which of the following switches will tell ImageX tool to search for the Wimscript.ini file and read settings from it? 1. /readsettings 2. /processexclusion 3. /readscript 4. /ruleset: 5. none of the above Correct Answer: 5. Question 5: You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application. 1. NTFS permisssions 2. AppLocker 3. Software Restriction Policies 4. Any of the above 5. Correct Answer: 2. Question 6: You want to configure a VPN connection which uses the most secure authentication protocol. Which protocol will you make use of? 1. PEAP-MS-CHAPv2 2. PEAP-TLS 3. MS-CHAPv2 4. CHAP 5. Correct Answer: 1.

Question 7: Which command-line command displays the IP onfiguration of a computers interfaces? 1. Netstat 2. Ipconfig 3. Tracert 4. Ping 5. Correct Answer: 2.

Question 8: You are analyzing IPv6 traffic on Windows 7. You want to find out the pattern of the ICMPv6 packets which were exchanged by your computer and the neighboring computers to resolve the IPv6 address to MAC addresses. Which protocol will you want to examine? We assume that you have already allowed the ICMPv6 protocol in the Windows firewall. 1. ARP

2. DHCPv6 3. DNS 4. ND 5. ARPv6 Correct Answer: 4. Question 9: You have a folder named "sharedata" on your computer. You want to allow the users on the network to read the files on the folder, modify the files, add new files and delete files in the folder. You have created the account necessary for the purpose. What permissions will you assign to that account for the given folder? 1. Read 2. Change 3. Full control 4. We need to edit the advanced permissions for the folder. 5. Correct Answer: 2. Question 10: You have configured BitLocker on your system in "TPM with PIN" mode. But you want users to use a rather longer password than a small PIN. Where will you find the respective policy? 1. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives 2. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives 3. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives 4. All of the above can be used. 5. Correct Answer: 3. Question 11: One of your clients complains that he is not able to download a file while closing his laptop's lid during the night. Windows hibernates as and when the lid is closed. What will you suggest him? 1. Change the power options from the control panel. 2. Use Windows update to resolve the issue. 3. Use GPE to change the policy. 4. Install Microsoft power manager tool and change the setting. 5. Correct Answer: 1.

Question 12: You buy Windows 7 Enterprise from a store. You install it on your PC and it does not boot after installation. What is the problem? 1. Windows 7 Enterprise cannot give any problems. 2. Enterprise edition of Windows 7 can be installed only on servers 3. PC does not have a compatible hardware for Windows 7 Enterprise 4. The disk was corrupted. 5. None of the above

Correct Answer: 5.

Question 13: You want to run notepad as user "Prince" on the local computer. You want to open a file named C:\rcv.txt which has been encrypted by Prince and it is the only account which can decrypt the file. Which of the following commands will you run to achieve the goal? 1. runas /user:Prince "notepad.txt C:\rcv.txt" 2. runas /user:Prince "notepad.txt C:\rcv.txt" /env 3. runas /profile /user:Prince "notepad.txt C:\rcv.txt" 4. runas /trustlevel /user:Prince "notepad.txt C:\rcv.txt" 5. Correct Answer: 3.

Question 14: You want Windows 7 to search for drivers in C:\MyDriverStore folder, in addition to its default Driver Store folder. What is the easiest way to accomplish this task? 1. Install all drivers in a Windows 7 install image and then deploy this image on the computer. 2. Use pnputil to add all the drivers in C:\MyDriverStore to the Driver Store 3. Copy the contents of C:\MyDriverStore to %systemroot%\System32 directory 4. Edit the registry key which controls the list of the folders where Windows 7 will search for the drivers 5. Correct Answer: 4.

Question 15: You are using Windows SIM to create an unattended installation answer file. Which of the following components will you add to your answer file to add a device driver to your setup? Remember that you are working on an offline image of Windows 7. 1. Microsoft-Windows-PnpCustomizationsWinPE 2. Microsoft-Windows-PnpCustomizationsNonWinPE 3. Microsoft-Windows-PnpSysprep 4. Microsoft-Windows-Setup 5. Correct Answer: 2. Question 16: When Windows 7 boots, the computer can start in one of the two modes. Which are they? 1. Audit System and Audit User 2. Audit System and Windows Welcome 3. Windows Welcome and Generalization 4. Windows Welcome and Audit 5. Correct Answer: 4.

Question 17: Your organization has a large amount of computers. They have various NIC cards installed on them. You want to service a Windows 7 offline image mounted at c:\instimage and add the drivers for all those NIC cards. You have places the NIC drivers in the c:\netdrivers directory and the subdirectories within this directory. Which command will add all the drivers to the image, including those, which are inside the subdirectories of this directory? 1. dism /image:c:\instimage /recursive-add-driver /r /driver:c:\netdrivers 2. dism /image:c:\instimage /add-driver /drivertree:c:\netdrivers 3. dism /image:c:\instimage /add-driver /driver:c:\netdrivers /recurse 4. dism /image:c:\instimage /add-driver /r /driver:c:\netdrivers 5. dism /image:c:\instimage /add-driver /driver:c:\netdrivers Correct Answer: 3. Question 18: Which of the following tools do not require you to install the Windows AIK? This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it. 1. USMT 2. Windows SIM 3. Sysprep 4. ImageX 5. Correct Answer: 3. Question 19: What is VPN Reconnect in Windows 7 Ultimate? 1. It is a new way to connect to a VPN server using a Microsoft specific protocol. 2. It is a new feature to establish a VPN connection without internet connection 3. It is a new API by Microsoft to help software developers write code for intranet specific applications. 4. It is a feature to re-establish a VPN connection if the internet connection is disrupted. 5. Correct Answer: 4. Question 20: You copied an encrypted file (using EFS) from the system to a USB pen drive (formatted with FAT32). What will happen? 1. Windows will copy the file without prompting anything. 2. Windows will ask for the password. 3. Windows will copy the data in encrypted form. 4. Windows will show an error. 5. Correct Answer: 1.

Question 21: You have decided to create a IPv6 subnet. The subnet you have

selected is FFFF:FFFF:FFFF:FFFF:FFFF:0000:0000:0000. What is the problem with this subnet mask? 1. IPv6 requires that the subnets be created only on the last two 16-bit blocks 2. IPv6 requires that the subnets be created only on the last 16-bit block 3. The 'F's have to be written in small characters. 4. The representation of subnet is in wrong format. 5. Correct Answer: 4. Question 22: You want to find out, which user accounts are allowed to access data in a folder containing sensitive commercial documents. Your machine runs on Windows 7 Enterprise. What will you configure? 1. EFS 2. NTFS permissions 3. Auditing 4. BitLocker 5. Correct Answer: 3. Question 23: Assuming that you are able to open all the tools listed below, which one will you open if you had to perform a recovery using a system Image? 1. Command prompt 2. Control Panel 3. Windows Explorer 4. Character Map 5. Correct Answer: 2. Question 24: Where would you find the policies to configure BitLocker to Go? 1. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives 2. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives 3. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives 4. User Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives 5. Correct Answer: 2.

Question 25: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning? 1. By using System Restore 2. By using Shadow Copy 3. By restoring the User Profile

4. By restoring the Registry 5. Correct Answer: 3.

Question 1: What is a plug-and-play device? 1. A device, which can be plugged to a computer from outside 2. A device, which does not need any drivers 3. A device, for which the driver gets installed automatically 4. A device, which can play multimedia files upon plugging 5. Correct Answer: 3.

Question 2: What is a system image? 1. The still picture of what is being shown on the screen. 2. The copy of all files and folders on the disk 3. An image which can be converted to WIM file and then installed on a computer 4. An image which can be opened using Windows Picture Viewer program 5. Correct Answer: 2. Question 3: In how many modes can the "Offline Files" feature of Windows 7 work? 1. 1 2. 2 3. 3 4. 4 5. 5 Correct Answer: 4.

Question 4: Which command-line command displays the IP onfiguration of a computers interfaces? 1. Netstat 2. Ipconfig 3. Tracert 4. Ping 5. Correct Answer: 2.

Question 5: Which of the following is untrue about DirectAccess? 1. It is available on Enterprise and Ultimate editions of Windows Vista and Windows 7 2. DirectAccess is bidirectional in nature. 3. DirectAccess connections are automatic in nature.

4. DirectAccess can be integrated with NAP 5. It can be configured by an Administrator only. Correct Answer: 1. Question 6: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose? 1. dxdiag 2. Driver Verifier Monitor 3. verifier.exe 4. Both verifier.exe and Driver Verifier Monitor 5. None of the above Correct Answer: 4.

Question 7: Which of the image formats are valid for DISM.exe to work with? 1. ISO 2. WIM 3. both WIM and MDF files (respective MDS file is required) 4. both WIM and MDF files (respective MDS file is not required) 5. Correct Answer: 2.

Question 8: You want to check your company's intranet website for compatibility with Windows 7. Which of the following tools will let you do this job? Some web sites may not display well in the new Internet Explorer 8, which comes with Windows 7. So they must be checked for compatibility. In this case we assume that the intranet web site you are trying to test was built for Internet Explorer 6. 1. Application Compatibility Toolkit (ACT) 2. Internet Explorer Administration Kit (IEAK) 3. Program Compatibility Troubleshooter (PCT) 4. Microsoft Deployment Toolkit (MDT) 5. Correct Answer: 1. Question 9: You do not have a separate Windows RE disk with you. You must run system restore to accomplish your task. There is no other way other than system restore. What would you use in this case? 1. Windows XP installation disk 2. Windows Vista installation disk 3. Windows 7 installation disk 4. A VHD containing Windows installation image. 5. Correct Answer: 3. Question 10: Which of the following is not a right representation of the IPv6 address 1cd:0053:0000:0000:03ad:0000:0000:8d62 ? Select the wrong representation.

1. 1cd:0053:0:0:03ad:0:0:8d62 2. 1cd:0053:03ad:0000:0000:8d62 3. 1cd:0053:0000:0000:03ad::8d62 4. 1cd:0053::03ad::8d62 5. Correct Answer: 4.

Question 11: You have to install Windows 7 on all machines in a company office. It is reuired for every employee working there to encrypt even their portable storage devices, such as USB pen drives. Which of the following Windows 7 editions will you install so that the cost is as low as possible? Hint: You have to select the one which comes with 'Bitlocker to go' feature and can be volume licensed 1. Windows 7 Ultimate 2. Windows 7 Professional 3. Windows 7 Enterprise 4. Windows 7 Professional; 64 bit edition 5. Any version except Home editions is OK. Correct Answer: 3. Question 12: Your client bought a Laptop 3 years ago which came with Windows Vista Ultimate. He has not upgraded to Windows 7 Ultimate and wants to use BitLocker to encrypt the C:\ driver, where Windows is installed. But he is not able to do so. What would you suggest him if he wants to do this? 1. Revert back to Windows Vista Ultimate and install SP2. 2. Buy a new laptop. 3. Install a TPM on the Laptop 4. Use Linux Operating System. 5. Correct Answer: 2. Question 13: You can use device manager to perform a few device management functions. Which of the following cannot be done by device manager? 1. Determine whether a particular device and its driver is working properly or not 2. Search the internet for appropriate device driver 3. Enable or disable a device attached to the computer 4. Install updated device driver 5. Correct Answer: 2. Question 14: What is the feature called which assigns an IP address to your computer when the DHCP service is not available on the network? 1. Automatic Private IP Addressing (APIPA) 2. Loopback Address Assignment Service (LAAS) 3. Automatic Network Addressing (ANA)

4. Local IP Addressing (LIA) 5. Correct Answer: 1. Question 15: You have just created a new wired subnet 10.0.10.128/25 with static configuration and the only device currently on the network is a router which has an address of 10.0.10.129. You connect a new computer to the network running on Windows 7 Ultimate x64 edition. Which command will configure this system to be used in the subnet? We assume that the Ethernet interface is named "Local Area Connection". 1. netsh interface ipv4 set address "local area connection" static 10.0.10.162 255.255.255.0 10.0.10.129 2. netsh interface ipv4 set address "local area connection" static 10.0.10.162 255.255.255.128 10.0.10.129 3. netsh interface ipv4 set address name="local area connection" dhcp 4. netsh interface ipv4 set address name="local area connection" static 10.0.10.16 255.255.255.128 10.0.10.129 5. Correct Answer: 2. Question 16: How will you manage the add-ons, which have been already installed in Internet Explorer? 1. We can manage it from the Tools -> Manage add-ons menu 2. We can download a gadget for that 3. By visiting www.ieaddons.com and clicking on manage 4. By using control panel 5. By changing settings in "Internet Options" Correct Answer: 1. Question 17: Which of the following cannot be used as a Update source to Update Windows Automatically? 1. Windows Server Update Service 2. System Center Essentials 3. Microsoft Update Servers (on the internet) 4. System Center Configuration Manager (SCCM) 5. Microsoft Deployment Tool Correct Answer: 5.

Question 18: Remote Desktop can be used to connect to any of the machines on the internet using their hostname or IP address. What technology will you use in order to make a Remote Desktop connection to connect to the devices which are inside a protected internal network? 1. Remote Desktop distribution service 2. Remote Service Gateway 3. Terminal Services Gateway 4. Remote Desktop Services for members in a AD Domain 5.

Correct Answer: 3.

Question 19: Which of the following commands will copy all the files and subfolders from C:\Source to D:\Destination while retaining the NTFS permissions? 1. Robocopy.exe C:\Source D:\destination /copyall /e 2. Robocopy.exe C:\Source D:\destination /purge /e 3. Robocopy.exe C:\Source D:\destination /fft 4. Any of the above 5. Correct Answer: 1.

Question 20: You want the system to send an email to you everytime a person tries to login and fails. What will you do? 1. Configure Windows Mail to do this 2. Attach a task to the event which you want to be taken action on 3. Use Visual Studio 2010 to develop the application in .NET 4.0 4. It has to be done manually only. 5. Correct Answer: 2. Question 21: What does system images help in? 1. Mass Deployment 2. Installation 3. Complete PC recovery 4. Adding updates later on to the Windows installation 5. Correct Answer: 3. Question 22: You want to run notepad as user "Prince" on the local computer. You want to open a file named C:\rcv.txt which has been encrypted by Prince and it is the only account which can decrypt the file. Which of the following commands will you run to achieve the goal? 1. runas /user:Prince "notepad.txt C:\rcv.txt" 2. runas /user:Prince "notepad.txt C:\rcv.txt" /env 3. runas /profile /user:Prince "notepad.txt C:\rcv.txt" 4. runas /trustlevel /user:Prince "notepad.txt C:\rcv.txt" 5. Correct Answer: 3.

Question 23: You are migrating a network of computers from Windows Vista to Windows 7. All of these computers contain sensitive data. You have been asked that the data should remain intact after migration. It is also mandatory to use offline migration method and use USMT 4.0 for the migration. Which of the following will not be migrated by USMT? 1. EFS Files

2. Windows Internet Explorer Settings 3. Network Drive mapping 4. Phone and Modem options 5. Correct Answer: 4. Question 24: Read the following description and choose the right answer from the list. Your computer connects to your company's computer network in two ways - Ethernet and Wireless. While the Ethernet network is dedicated for file sharing inside the network, the wireless network is used to connect to the internet. Your computer runs a program, which is updated very often by its vendor. This program is very essential to be run on every computer on the network. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. You have already blocked the program in the Windows firewall, but it still connects to the internet. What mistake you have done? 1. You have blocked the program on wrong network type. 2. You have not setup the script which would block the program everytime the computer starts. 3. Your computer is infected with virus. 4. The current version of program is not covered by Windows firewall. 5. Correct Answer: 1. Question 25: You want to set your Windows 7 laptop to hibernate when the battery level reaches 15%. What will you do? 1. Change the power button actions. 2. Change the power options 3. Use Computer configuration to put the disks to sleep at 15% charge capacity. 4. Change the advanced setting of the power plan in use to match the requirements. 5. Correct Answer: 4.

Question 1: Which of the following packages will get you the Windows SIM tool? Windows SIM is not a standalone tool. Select the package, of which it is a part. 1. Windows Automated Installation Kit 2. Windows Automated Information Kit 3. Windows Unattended Installation Kit 4. Windows Mass Deployment Toolkit 5. Correct Answer: 1. Question 2: How many firewalls does Windows 7 implement?

1. 1 2. 2 3. 3 4. 4 5. Correct Answer: 2.

Question 3: Which of the following protocol will DirectAccess use if the computer you are using is able to connect to the internet but not to the company network? 1. SSTP 2. 6to4 3. 4to6 4. IP-HTTPS 5. Teredo Correct Answer: 4. Question 4: You installed a new driver for your Audio device. However, it is giving you problems. How will you roll back to the old driver? 1. Use the add/remove programs feature and remove the installed driver package 2. Use the GPE to disable driver updates 3. Use Windows Update 4. Use the Device Manager, select the Audio Device and click on the "Roll Back Driver" button on the "Driver" tab of the device properties window 5. Correct Answer: 4.

Question 5: Which of the following is not a feature of Windows 7? 1. It makes hard disk disposal easier. 2. It protects the boot environment from being modified. 3. It can prevent theft of data using a live Linux distribution. 4. It can be used to protect data from other users while allowing you to access it. 5. Correct Answer: 4. Question 6: Read the following description and answer the question. You work for a company. You were asked to schedule a backup of a single folder on three client machines. You know that the first backup created on a machine is always scheduled automatically by Windows. After one month, one of the system crashes and you are asked to restore the last week's backup. But you find that there is only one single backup taken. Subsequent backups were not taken by Windows. You were using a network share as backup location and you are sure that the credentials on the target computer have not changed. Also, you are sure that you have right permissions on the network location. You use the client computer and find that you are able to take manual backups. User denies any change in any Windows settings. What can be the mistake?

1. Windows is ignoring Backup schedule 2. There is a network connectivity issue. 3. Windows firewall restricted the access. 4. You have not setup the schedule of the backup manually. 5. Correct Answer: 4.

Question 7: Which utility can create a DCS at the command prompt? 1. Logcreate 2. createDCS 3. Logman 4. Createset 5. Correct Answer: 3. Question 8: You want to install a Windows update manually from a MSU file. Which command will you use to avoid system restart after the install? The update file is: d:\kb123456.msu. 1. Wusa.exe /mode=manual /source:"d:\kb123456.msu" /quiet /noreboot 2. Wusa.exe /file:d:\kb123456.msu /quiet /noreboot 3. Wusa.exe d:\kb123456.msu /quiet /noreboot 4. Wusa.exe /source:"d:\kb123456.msu" /quiet /norestart 5. Wusa.exe d:\kb123456.msu /quiet /norestart Correct Answer: 5.

Question 9: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 1. Interactive Logon: require Smart Card for logoff 2. Interactive Logon: Smart Card removal Behavior 3. Interactive Logon: Smart Card usage Behavior 4. Interactive Logon: Smart Card Account Control 5. Correct Answer: 2. Question 10: A network is assigned the mask 192.168.0.0/24. What is this notation of representing network masks called? 1. VLSR 2. CIDR 3. VLSS 4. SOHO 5. Correct Answer: 2.

Question 11: Select the first command from the list below, which you can use to backup EFS file certificate(s).

1. Cipher.exe 2. Cipher.exe /x 3. cipher.exe /export 4. cipher.exe /x filename.pfx 5. Correct Answer: 2.

Question 12: What does TPM mean? 1. Trusted Password Module 2. Third-party Platform Module 3. Trusted Partner Module 4. Trusted Platform Module 5. Correct Answer: 4. Question 13: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 1. Uninstall the program 2. Disconnect from the internet while using that program 3. Check for another program which would do exactly what this program does. 4. Use Windows firewall to block this software from connecting to internet 5. Correct Answer: 4.

Question 14: Which of the following Basic NTFS permission will allow a user to change the permissions of the folder? 1. Modify 2. Write 3. Full control 4. Read and execute 5. Correct Answer: 3. Question 15: One of your clients complains that he is not able to download a file while closing his laptop's lid during the night. Windows hibernates as and when the lid is closed. What will you suggest him? 1. Change the power options from the control panel. 2. Use Windows update to resolve the issue. 3. Use GPE to change the policy. 4. Install Microsoft power manager tool and change the setting. 5. Correct Answer: 1.

Question 16: You want to create an application restriction rule for the users on your network. You also want that this rule should remain applicable even after that application is updated. Which of the following technologies will you use? You are trying to block the application for a specific group of users on the network on all computers. 1. Software Restriction Policies 2. AppLocker 3. NTFS permissions 4. Microsoft Deployment Toolkit (MDT) 5. Any of the above can be used Correct Answer: 2. Question 17: You have to install Windows 7 on all machines in a company office. It is reuired for every employee working there to encrypt even their portable storage devices, such as USB pen drives. Which of the following Windows 7 editions will you install so that the cost is as low as possible? Hint: You have to select the one which comes with 'Bitlocker to go' feature and can be volume licensed 1. Windows 7 Ultimate 2. Windows 7 Professional 3. Windows 7 Enterprise 4. Windows 7 Professional; 64 bit edition 5. Any version except Home editions is OK. Correct Answer: 3. Question 18: You are trying to detect the proxy settings using WPAD for configuring Windows Automatic Updates. WPAD tool has failed to determine the proxy settings. You want to import the proxy settings from Internet Explorer. Which of the following tools can you use for this purpose? 1. import 2. export 3. netsh 4. netstat 5. Correct Answer: 3.

Question 19: Which of the following is not a part of Windows AIK? 1. Windows SIM 2. oscdimg 3. USMT 4. BCDEdit 5. Correct Answer: 4.

Question 20: You want to restore a previous version of a file. What would you do first?

1. Right click the file 2. Open control panel 3. open command prompt 4. open GPE 5. Correct Answer: 1.

Question 21: Which of the following tools do not require you to install the Windows AIK? This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it. 1. USMT 2. Windows SIM 3. Sysprep 4. ImageX 5. Correct Answer: 3. Question 22: Which of the following permissions, when set to active will also set the "Read" permission to active? Select the first correct answer from the list. 1. List folder contents 2. Write 3. Read and Execute 4. Modify 5. Correct Answer: 3.

Question 23: Read the description and select the best answer. One of your business critical applications uses a service installed by the application. The application needs it every 10 minutes to send some report data to a central server. You have just installed a Windows update which makes this service crash every 37 minutes exactly. There is a strict instruction not to roll back this update under any circumstances. What will you do to make this service available when the application needs it? 1. Change the startup type to manual 2. Set the recovery option to launch it after crash. 3. Both of the above. 4. You have to start the service from the services snap-in of Management Console 5. Correct Answer: 3. Question 24: What is the IP range of APIPA? 1. 196.254.0.0/12 2. 169.254.0.0/24 3. 196.254.0.0/32

4. 196.254.0.0/16 5. 169.254.0.0/16 Correct Answer: 5. Question 25: Read the following description and select the correct answer. You work in an environment where the users are not assigned any specific desk. They can come and take any seat they want in the morning and use computer on that set for the day. All the computers are running on Windows 7 and there is a server running Windows Server 2008 R2 acting as the AD Domain Server which holds the accounts of all these users at one place. What type of profile is more important to be backed up in this case? 1. Local 2. LocalLow 3. Roaming 4. Domain 5. Correct Answer: 3.

Question 1: You installed an application which should be denied to access the internet. Your computer uses two connections on different interfaces. The wireless connection is used to access the internet and has a Public network profile. The Ethernet connection is used to share files on the company network only is is in a Domain network profile. Which firewall will you use to deny internet access to the application? 1. Windows Firewall 2. Windows Firewall with Advanced Security 3. Both of them should be used 4. We can use any firewall, but cannot deny it from accessing one network when the computer is connected to both the networks at one time 5. Correct Answer: 1. Question 2: You have to upgrade a computer running on Windows Vista to Windows 7. Which of the following will be available on your computer after upgrade? 1. Clear type fonts can be disabled 2. Taskbar can still be kept below other windows on screen 3. can adjust bit rate when busrning data CDs from Windows Media Player 4. change the size of icons in the Windows Explorer windows without any reduction in the quality 5. Correct Answer: 4. Question 3: Which of the following is true? 1. Windows 7 is available only in English 2. Windows 7 contains all the language packs, you just need to activate them at the command prompt

3. Windows 7 is a langage neutral Operating System 4. Windows 7 cannot have a French UI 5. Correct Answer: 3. Question 4: You want to test the AppLocker policies but you do not want to implement them right away. What will you do? Applocker needs to be tuned well before deploying it. Mistakes can make Windows non functional. Hence, it is required that the policies be tested and then implemented. 1. Policies should be made in audit mode 2. Policies should be tested at night 3. Policies must be tested on virtual machines 4. A dedicated network is needed to test the correctness of policies 5. Correct Answer: 1. Question 5: A company wants to disallow all the software created by a specific software vendor. Which of the following type of rule in AppLocker will help the company achieve the goal? 1. Path 2. Hash 3. Publisher 4. Default 5. Correct Answer: 3.

Question 6: You have configured a network with network address of 10.0.0.0/25. What is the maximum number of computers, which can join this network? 1. 126 2. 255 3. 127 4. 254 5. 128 Correct Answer: 1. Question 7: What would you do after you rolled back an update from all client computers running Windows 7 from a WSUS? 1. Restore the Update 2. Hide the update 3. Blacklist the update 4. Nothing needs to be done. 5. Correct Answer: 4.

Question 8: You are going to prepare a system for imaging. You want that after deployment, the users should be given the option to customize their copy of Windows

7. They should be allowed to create user accounts, name the computer and so on. Which of the following switches of "sysprep" will allow you to do this? 1. /audit 2. /oobe 3. /attend 4. /generalize 5. Correct Answer: 2. Question 9: A Windows 7 computer is used in a scenario where 3 different devices automatically keep creating files periodically in their respective folders on the single computer. You want to be able to share all the folders with the homegroup. Select the statement from the list below which will not form the part of solution. 1. Create a new library say iData 2. Add the folders to this library 3. Share each data folder 4. Share the Library on the homegroup. 5. Correct Answer: 3. Question 10: What is the IP range of APIPA? 1. 196.254.0.0/12 2. 169.254.0.0/24 3. 196.254.0.0/32 4. 196.254.0.0/16 5. 169.254.0.0/16 Correct Answer: 5. Question 11: Which of the following commands will start the reliability monitor? 1. perfmon /rel 2. perfmon /logs 3. evntvwr 4. relmon.exe 5. Correct Answer: 1. Question 12: Which command will you use to update the configuration of a volume to support a newly installed DRA? 1. Cipher.exe 2. manage-bde.exe 3. command.com 4. fdisk.exe 5. managebde.exe Correct Answer: 2.

Question 13: Which of the following is true? 1. BitLocker and BitLocker to Go are two completely different technologies. 2. BitLocker can be used to lock a drive with a password but BitLocker to Go decrypts and encrypts drive automatically 3. BitLocker to Go is used for removable drives, while BitLocker is used for fixed drives. 4. You cannot unlock drives encrypted with BitLocker to Go on other computers but you can do the same for the drives encrypted with BitLocker 5. Correct Answer: 3.

Question 14: Which of the following File Systems are valid for installing Windows 7? 1. HPFS 2. NTFS 3. FAT32 4. Both FAT32 and NTFS 5. Both EXT3 and NTFS Correct Answer: 2. Question 15: What does system images help in? 1. Mass Deployment 2. Installation 3. Complete PC recovery 4. Adding updates later on to the Windows installation 5. Correct Answer: 3. Question 16: Which of the following is not one of the Application Compatibility Diagnostics Policies? 1. Notify Blocked Drivers 2. Detect Application Failures Caused By Deprecated COM Objects 3. Detect Operating System version failure 4. Detect Application Install Failures 5. Correct Answer: 3.

Question 17: Your company has recently migrated from Windows XP to Windows 7. You notice that some of the sites, which displayed well in Internet Explorer in Windows XP are not displaying well in the Internet Explorer in Windows 7. You enable the compatibility view; but the problem remains. What may be the problem? 1. Compatibility mode is not working well.. 2. Internet Explorer has stopped working well. 3. The computer is infected with viruses. 4. The web site is not ready for Internet Explorer 7 either. 5.

Correct Answer: 4.

Question 18: On which of the following editions of Windows 7, can you create policies using Applocker, but cannot enforce them? 1. Windows 7 Enterprise x86 2. Windows 7 Professional x64 3. Windows 7 Home Premium x86 4. Windows 7 Home Premium x64 5. All Editions, except Starter Edition Correct Answer: 2.

Question 19: On 10th January 2011, you scheduled a backup which would run every Wednesday. 10th January 2011 was Monday. Today is 15th March 2011. When was the first backup taken? 1. 10th January 2011 2. 12th January 2011 3. 19th January 2011 4. 11th January 2011 5. Correct Answer: 1.

Question 20: In a normal representation, IPv6 128-bit address is divided at 16-bit boundaries and each block of 16-bit is again converted to sets of 4-digit hexadecimal number. In addition, colons are used as separators. What is this representation usually called? 1. IPv6 representation 2. Hex representation 3. colon-hexadecimal representation 4. colon-division representation 5. Correct Answer: 3. Question 21: You have a NTFS volume on a local disk which is not mounted anywhere on the file system. You want to make sure that the volume is still existent. Select the first Windows component from the following list which allows you to list such volumes? 1. Windows Explorer 2. Windows Command Prompt 3. Device Manager 4. Computer Management Console 5. Both Device manager and Computer Management Console Correct Answer: 3. Question 22: Which one of the following will you get when you upgrade from Windows Vista Home Premium (Service Pack 2) to Windows 7 Professional?

1. AppLocker 2. EFS 3. BranchCache 4. Subsystem for Unix-based Applications 5. Upgrade cannot be done Correct Answer: 5.

Question 23: Windows 7 uses .WIM format for creating images for deployment. What type of image is .WIM? 1. File based 2. Sector based 3. Configuratble as either File based or Sector based while creation process 4. Its an ISO image with the extension changed to .WIM 5. Correct Answer: 1. Question 24: You want a standard user to be able to connect to a machine running Windows 7. The user already has an account on the machine. To which group will you add the user so that he is able to connect to the computer remotely? 1. Remote Desktop Users group 2. Administrators group 3. Replicators group 4. Users group 5. Correct Answer: 1.

Question 25: You have to capture a VHD image to boot it on another machine. Which of the following commands will you type in the command prompt to start the tool which will let you make a VHD image? 1. sysprep.exe 2. compmgmt.msc 3. services.msc 4. diskpart.exe 5. Correct Answer: 2.

Question 1: You have just created a new wired subnet 10.0.10.128/25 with static configuration and the only device currently on the network is a router which has an address of 10.0.10.129. You connect a new computer to the network running on Windows 7 Ultimate x64 edition. Which command will configure this system to be used in the subnet? We assume that the Ethernet interface is named "Local Area Connection". 1. netsh interface ipv4 set address "local area connection" static 10.0.10.162 255.255.255.0 10.0.10.129 2. netsh interface ipv4 set address "local area connection" static 10.0.10.162

255.255.255.128 10.0.10.129 3. netsh interface ipv4 set address name="local area connection" dhcp 4. netsh interface ipv4 set address name="local area connection" static 10.0.10.16 255.255.255.128 10.0.10.129 5. Correct Answer: 2. Question 2: What do you use data collector sets for? 1. To generate a system health report 2. To create a set of attributes for monitoring later and generating reports based on the monitoring 3. To save the system configuration 4. To backup the registry 5. Correct Answer: 2. Question 3: In how many categories is Windows update packages categorized? 1. 3 2. 2 3. 4 4. 5 5. Correct Answer: 1. Question 4: Which of the following is not true regarding HomeGroups? Remember to choose the statement which is false. 1. HomeGroup can be enabled only by a member of the Administrators group. 2. HomeGroup cannot be used on a Domain network 3. Every user is free to choose what he/she wants to share with the HomeGroup 4. The Control Panel can be used to set up the HomeGroup 5. Correct Answer: 2.

Question 5: Which of the following tools in the MDT 2010 will allow you to enter a Welcome message text that will be displayed on the welcome screen? 1. Deployment Workbench 2. UDI Wizard Designer 3. Configure ConfigMgr Integration 4. none of the above 5. Correct Answer: 2. Question 6: Windows 7 will log all the attempts to Log on to the system, whether or not they are successful. Which of the following sentences in the 'general details'

section of the security event log of the windows event viewer tell that someone tried to logon to an account but failed? 1. A logon was attempted using explicit credentials. 2. Special privileges assigned to new logon. 3. The event logging service has shut down. 4. An attempt was made to reset an account's password. 5. Correct Answer: 1. Question 7: Windows 7 will reserve 20% of internet network bandwidth. This rule can be overridden by a system administrator. Which of the following versions of Windows 7 will NOT allow a system administrator to do so? 1. Windows 7 Ultimate 2. Windows 7 Home Premium 3. Windows 7 Professional 4. Windows 7 Enterprise 5. Both "Home Premium" and "Professional" editions Correct Answer: 2. Question 8: Among the following methods, how would you do a successful clean install of the Windows 7 OS with a (single) Upgrade DVD, given that you already own a license to a previous version of Windows. Remember that Microsoft will not activate an OS installed using "clean install" done from a Upgrade DVD of Windows 7. It however is possible. You have to tell which of the following will get your work done. Also, remember that an installation is said to be "successful" only after the OS has been activated. 1. Install Windows Xp and then upgreade to Windows 7 from the Upgrade DVD 2. Do a clean install from the Upgrade DVD and then run the upgrade again on that same installation using the same media 3. Do a clean install using the upgrade DVD and then activate using activators available on the internet 4. Do a clean install of Windows 7 every 30 days but never activate it. 5. There is just no need of these methods, You can use upgrade media for doing clean install. Correct Answer: 2.

Question 9: You want to turn off the UAC. What command will you type at the command prompt for this? 1. uac.exe 2. useraccountcontrolsettings.msc 3. control useraccountcontrolsettings 4. useraccountcontrolsettings.exe 5. Correct Answer: 4. Question 10: Your manager asks you to configure all the desktop computers running

Windows 7 Enterprise on the company network to be configured in a way that the computers require a 12 character long password for using BitLocker to go on the USB disk drives. Which policy will help you configure the computer in the required way? 1. Control Use of BitLocker On removable Drives 2. allow access to BitLocker-protected removable Data Drives From earlier Versions of Windows 3. Configure Use Of passwords For removable Data Drives 4. Configure Use Of Smart Cards On removable Data Drives 5. Correct Answer: 3.

Question 11: Which of the following will not use the VHD file format? VHD files can be used to contain a Windows 7 installation and then use them for booting on different computers. 1. Hyper-V 2. Microsoft Virtual Server 3. Virtual PC 4. XEN 5. Correct Answer: 4.

Question 12: One of your clients created a WAP in his home. However, he reports that others around him able to access his network without his permission. What would you suggest him to do? 1. Enable the Windows Firewall 2. Change the settings of his WAP and enable security using either WEP or WAP security algorithms 3. Change the channel being used for WAP 4. Disable ICS 5. Correct Answer: 2. Question 13: Windows 7 firewall does not respond to the pings by default. However, your company runs a software which regularly tests connectivity using IPv4 pings within the network. Hence, it is required that you enable pings on all the computers running Windows 7. Which of the following commands will get your work done? 1. netsh advfirewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 2. netsh firewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 3. netsh firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow 4. netsh firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=inout action=allow 5. Correct Answer: 1.

Question 14: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 1. Uninstall the program 2. Disconnect from the internet while using that program 3. Check for another program which would do exactly what this program does. 4. Use Windows firewall to block this software from connecting to internet 5. Correct Answer: 4. Question 15: Which utility can create a DCS at the command prompt? 1. Logcreate 2. createDCS 3. Logman 4. Createset 5. Correct Answer: 3. Question 16: Considering all computers on a network running on Windows Vista are upgraded to Service Pack 2, which of the following upgrades are not possible? 1. Windows Vista Business x86 to Windows 7 Ultimate x86 2. Windows Vista Business x64 to Windows 7 Ultimate x64 3. Windows Vista Business x86 to Windows 7 Ultimate x64 4. Windows Vista Business x86 to Windows 7 Enterprise x86 5. Correct Answer: 3.

Question 17: After how many days will Windows 7 create a restore point if there has been no activity on the system which would create a restore point? 1. 1 week 2. 2 weeks 3. 15 days 4. 30 days 5. 1st of the coming month Correct Answer: 1.

Question 18: You want to be able to recover other users' files encrypted by EFS. What do you need? 1. Access to an administrator account 2. Editing a policy in GPE to make another user capable of doing it. 3. Recovery Agent 4. A Microsoft universal decryption certificate and a subscription to the

service. 5. Correct Answer: 3. Question 19: Read the following description and answer the question. Your computer runs on Windows 7 Enterprise. You have a folder on D: drive named "XDat". It contains some data which is used excessively by other computers on the network. This drops down the performance of your own system. You want to restrict the number of users able to access this folder simultaneously to 5. So you open the folder properties and click the share button the Sharing tab of the properties window. But you do not see the setting to control the number of simultaneous users accessing the folder. What is the problem? 1. The setting is disabled on some editions of Windows 7 including Enterprise edition. 2. Windows 7 does not have this feature unless you are connected to the domain 3. This window cannot be used to control the setting. 4. The setting is disabled in the GPE. 5. Correct Answer: 3. Question 20: You are asked to configure an incoming VPN connection on a Windows 7 Ultimate machine. Where will you go to configure this? 1. Network and Sharing Center 2. Registry Editor 3. Network Adapters List 4. Windows Firewall with Advanced Security 5. Correct Answer: 3. Question 21: Which of the following is not a part of the functinality offered by DISM.exe? DISM or Deployment Image Servicing and Management is used to alter Windows 7 images for deployment. It offers a wide range of options. You have to choose that functionality which it will not offer. 1. Creating a Windows 7 installtion image 2. Altering Windows 7 installtion image and exit without a commit 3. Altering Windows 7 installtion image and exit without a commit 4. Mounting and unmounting a Windows 7 installtion image 5. Correct Answer: 1. Question 22: There is a network of computer with 11 computers. One of these computers is connected to a printer which is shared among all the other computers on the network. You have to make sure that the person sitting on the computer physically connected to the printer is able to manage the print queues but is not able to change the printer permissions. What permission should he be assigned?

1. Print 2. Manage Documents 3. Manage This Printer 4. The user to the list of administrators 5. Correct Answer: 2.

Question 23: You are configuring WFAS (Windows Firewall with Advanced Security) to configure a custom port rule for port 87. You have selected the protocol as UDP. At this point of time, when you click next, you will be presented with options to allow or disallow the traffic. How many options will you have to choose from? 1. 2 2. 3 3. 4 4. None. Windows will always block any traffic for a single port for the UDP protocol. 5. Correct Answer: 2. Question 24: There are two subnet on the network. You have been asked to connect these two subnets. Which device will you use? 1. hub 2. switch 3. Modem 4. router 5. Correct Answer: 4. Question 25: Which of the following is not a security feature in Windows Internet Explorer 8? 1. InPrivate Browsing 2. InPrivate Filtering 3. Click-jacking prevention 4. Incognito Window 5. Cross Site Scripting (XSS) Filter Correct Answer: 4.

Question 1: What should be the minimum capacity of a USB drive, if it has to be used for backup using Windows 7 backup and restore functionality? 1. 1 GB 2. 512 MB 3. 2 GB 4. 8 GB 5.

Correct Answer: 1.

Question 2: A user in your network complains that audio device stops working after 1 hour each time he starts his computer. He has been using Windows 7 Home Premium. The problem started after the last Windows update was performed. What would be your first step to resolve the problem? 1. Driver roll back 2. System Restore 3. Windows reinstall 4. Running Windows Backup 5. Correct Answer: 1.

Question 3: What does driverquery.exe do? 1. Displays a list of installed device drivers 2. Displays a list of conflicting device drivers 3. Update the driver using Windows update in the backend 4. Displays number of driver installations currently running on the system and their progress in percentage 5. Correct Answer: 1. Question 4: What steps will you take to create a Windows image with a application installed in it? You have to create a Windows installation image and then distribute it for installation on 225 computers. It is required that an application must be installed on each of the computers after deployment. You do not have access to the MDT package. 1. Download the MDT package and use it 2. Install the application separately on each computer 3. Install the application on a reference computer and then image the computer for mass deployment 4. run dism /add-app /app: on a mounted image 5. Correct Answer: 3. Question 5: Which of the following is not true about the offlineServicing configuration pass of Windows 7 Installation process? 1. out-of-box drivers are added in this pass 2. This configuration pass starts after the system reboots the first time 3. If an answer file was created by DISM, it is read in this pass 4. Updates can be applied in this pass 5. Correct Answer: 2.

Question 6: What does the standard user analyzer tool do?

1. It checks whether an application will have problems with UAC 2. It monitors whether a given application is being run by a standard user or an administrator 3. It checks whether the application has been tampered by the user or not 4. It reports the behavior of the user to a service running on the server to which the computer is connected 5. Correct Answer: 1. Question 7: You have been informed of a critical update which fixes an important issue in Windows 7 OS. Your updates are scheduled to be run on Tuesday at 1:00 PM. Today is Thursday. Which command will you use at the command prompt to get the update? 1. Wuauclt.exe /detectnow 2. Wuauclt.exe /update 3. Wuauclt.exe /update /time:now 4. Winupdate.exe /update 5. Correct Answer: 1. Question 8: You have been asked to create an answer file for unattended installation for Windows 7. Which of the following tools will help you? Each one of the given tools are part of the suite of tools which play role in unattended installations. However, only one can be used to automatically create an answer file for unattended setups. 1. oscdimg 2. Deploy.cab 3. Windows System Image Manager 4. Windows Server Operating System Management Pack for Operations Manager 5. None of the above Correct Answer: 3. Question 9: Your company computers have an application which has to be run at the end of the day, every day. The application is huge and depends on a service which would eat a lot of memory when not being used. What should be the start up type of this service? 1. Automatic 2. Automatic (Delayed) 3. Manual 4. Disabled 5. Correct Answer: 3. Question 10: You do not want to deny any elevation that may be requested to a standard user through UAC. Which of the following policies will you configure?

1. User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode 2. User Account Control: Behavior of the Elevation Prompt for Standard Users 3. User Account Control: Admin Approval Mode For The Built-In Administrator Account 4. User Account Control: Detect Application Installations And Prompt For Elevation 5. Correct Answer: 2. Question 11: You are going to prepare a system for imaging. You want that after deployment, the users should be given the option to customize their copy of Windows 7. They should be allowed to create user accounts, name the computer and so on. Which of the following switches of "sysprep" will allow you to do this? 1. /audit 2. /oobe 3. /attend 4. /generalize 5. Correct Answer: 2. Question 12: You suspect that you have set the network location of a network connection to Public, which should be set to Home. Where would you go to check this? 1. Open the command prompt and use the ipconfig tool. 2. Open the Adpater properties of the network connection concerned. 3. Reboot the system. This will automatically ask me to set the network types once again. 4. Open the Network and Sharing Center 5. Correct Answer: 4. Question 13: Considering all computers on a network running on Windows Vista are upgraded to Service Pack 2, which of the following upgrades are not possible? 1. Windows Vista Business x86 to Windows 7 Ultimate x86 2. Windows Vista Business x64 to Windows 7 Ultimate x64 3. Windows Vista Business x86 to Windows 7 Ultimate x64 4. Windows Vista Business x86 to Windows 7 Enterprise x86 5. Correct Answer: 3. Question 14: You want to run Windows 7 with Windows XP mode switched on. Which of the following would you do? In this case we are assuming that your computer has the following configuration: 1. Intel Pentium 4 , 3.0 GHz 2. 120 GB HDD (With only C: drive consuming the full space) 3. DirectX 10.0 compatible Video card (without dual display support) 4. Gigabit Ethernet port 5. 1.5 GB RAM

1. Create a new partition for the Windows XP installation 2. Upgrade RAM to 2 GB 3. Upgrade Video card for dual display support 4. Upgrade to a processor which has at least 2 processing cores 5. Correct Answer: 2.

Question 15: You have to upgrade Windows Vista Ultimate (SP2) to Windows 7 Ultimate. Suppose the unattended answerfile named automate.xml is placed on the network location \\server-main\installdata\automate.xml. Which of the following set of command line options will do the job. It is to be noted that the installation is to be done underfollowing circumstances: 1. Installation must be automated. 2. The given unattended script has to be used. 3. You must use the file over the network to automate the install. Copying the file and then using it is not permitted. 4. You do not have the rights to alter the filenames on the remote server. 1. setup.exe /m:\\server-main\installdata\ /unattend:automate.xml 2. setup.exe /wdsserver:\\server-main\installdata\automate.xml 3. setup.exe /m:\\server-main\installdata\automate.xml 4. setup.exe /unattend:\\server-main\installdata\automate.xml 5. Correct Answer: 4. Question 16: What file controls the behavior of Windows 7 on its first boot (Windows Welcome)? 1. oobe.ini 2. oobe.xml 3. welcome.xml 4. setup-0.xml 5. Correct Answer: 2. Question 17: Which of the following is the drawback of sector based imaging which the new .WIM imaging format tries to overcome? 1. sector based imaging is slow 2. sector based imaging is insecure 3. sector based imagin cannot be perfomed over the network 4. sector based imaging forces the destination computer to use the same boot controller as the source 5. sector based imaging forces the two computers to have different HAL Correct Answer: 4. Question 18: Which of the following methods cannot be used to activate a installed copy of Windows 7? 1. Internet 2. Phone

3. Local activation server 4. pre-activated installation 5. Correct Answer: 3. Question 19: A computer running Windows 7 Enterprise is suddenly booting into recovery mode. The user of the computer is sure that he has not changed any setting. Which of the following cannot be a problem you would suspect? 1. User is trying to boot without the USB key 2. User is not entering the right PIN 3. TPM was cleared 4. The Boot environment has changed 5. Windows was updated the last time it ran successfully. Correct Answer: 5.

Question 20: You have to install Windows 7 on a machine, which has Intel Core i7 processor and 16 GB of RAM. Which of the following editions of Windows 7 will you install to make sure that none of the resources are under-utilized? 1. Windows 7 Ultimate x64 2. Windows 7 Home Basic x64 3. Windows 7 Home Premium x86 4. Windows 7 Starter x64 5. Correct Answer: 1. Question 21: Which of the following commands will not work? 1. Dism /image:C:\offimgrootdir /WinDir:D:\WinNT /Add-Package /PackagePath:C:\pkg1.cab 2. Dism /image:C:\offimgrootdir /WinDir:WinNT /Add-Package /PackagePath:C:\pkg1.cab 3. Dism /image:C:\offimgrootdir /LogPath:AddPkg.log /LogLevel:1 /AddPackage /PackagePath:C:\pkg1.cab 4. Dism /Mount-Wim /WimFile:C:\install.wim /name:"Windows 7 HomeBasic" /MountDir:C:\test\ 5. All of the above are right. Correct Answer: 1. Question 22: What will you use to schedule a backup using wbadmin tool? 1. Windows task scheduler 2. Batch file scheduler 3. Windows Backup wizard 4. No methods are available for this. 5. powershell must be used Correct Answer: 1. Question 23: Which of the following tools do not require you to install the Windows

AIK? This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it. 1. USMT 2. Windows SIM 3. Sysprep 4. ImageX 5. Correct Answer: 3. Question 24: When Windows 7 boots, the computer can start in one of the two modes. Which are they? 1. Audit System and Audit User 2. Audit System and Windows Welcome 3. Windows Welcome and Generalization 4. Windows Welcome and Audit 5. Correct Answer: 4. Question 25: Which of the following is a Teredo address? 1. 2001::0a0a:1efe:e876:eff:f5ff:ebee 2. fec0:0:0:0:fffe::1 3. 2002:c058:6301:: 4. fe80::5efe:0a00:028f 5. Correct Answer: 1. Question 1: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image? 1. Language Pack 2. Driver 3. Feature pack in Windows PE image 4. Application patch 5. Application Correct Answer: 1.

Question 2: Which of the following commands will you type at the command prompt to open the device manager? 1. azman.msc 2. rsop.msc 3. fsmgmt.msc 4. diskmgmt.msc 5. devmgmt.msc Correct Answer: 5.

Question 3: Which of the following actions cannot be taken on a Windows 7 Enterprise edition computer, which is part of an AD Domain? 1. Store TPM recovery information in Active Directory Domain Services 2. Move TPM to USB disk drive 3. Disable the TPM 4. Reset the TPM lockout 5. Correct Answer: 2. Question 4: You are not able to make a file available offline. What could be the reason? 1. The network location type is set to "Public". 2. The target computer has disabled caching. 3. You do not have the permissions to write in the folder Windows uses to store the offline files 4. Windows 7 does not support this feature. 5. Correct Answer: 2. Question 5: Among the following methods, how would you do a successful clean install of the Windows 7 OS with a (single) Upgrade DVD, given that you already own a license to a previous version of Windows. Remember that Microsoft will not activate an OS installed using "clean install" done from a Upgrade DVD of Windows 7. It however is possible. You have to tell which of the following will get your work done. Also, remember that an installation is said to be "successful" only after the OS has been activated. 1. Install Windows Xp and then upgreade to Windows 7 from the Upgrade DVD 2. Do a clean install from the Upgrade DVD and then run the upgrade again on that same installation using the same media 3. Do a clean install using the upgrade DVD and then activate using activators available on the internet 4. Do a clean install of Windows 7 every 30 days but never activate it. 5. There is just no need of these methods, You can use upgrade media for doing clean install. Correct Answer: 2.

Question 6: Read the following description and answer the question given. Your computer has two physical hard disks, both of them contain a single volume with Windows 7 Ultimate and Windows Vista Ultimate installed on them. You want to take backup of your Windows 7 OS. Which drive will you use? 1. The disk which has Windows 7 installed on it 2. Any of the disks can be used 3. None of the disks 4. The disk with Windows Vista installed on it 5. Correct Answer: 3.

Question 7: Select the number of days from the list which is used to determine the stability index of the system. 1. 14 2. 15 3. 28 4. 30 5. 45 Correct Answer: 3. Question 8: Which among the following is the extension used for Windows Installer Patch file for an installed application? 1. .MSI 2. .MSU 3. .MSP 4. .CAB 5. Correct Answer: 3. Question 9: Windows 7 will start searching Windows Update when it does not find any matching device driver in the Driver store. How will you disable this functionality? 1. In GPE, go to Computer Configuration -> Administrative Templates -> System -> Internet Communication Management -> Internet Communication Settings and enable the "Turn Off Windows Update Device Driver Searching" setting 2. Remove all entries from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\D riverPath 3. Remove all entries from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\D evicePath 4. In GPE, go to Computer Configuration -> Administrative Templates -> System -> Device Installation -> Device Installation Restrictions and add a new policy to disable te use of Windows Update feature for driver updates 5. Correct Answer: 1.

Question 10: Which of the following is true about configuration passes? 1. Not all configuration passes run in a single Windows 7 Install procedure. Some can be skipped 2. All configuration passes will always run in any install procedure but the number of time they are run can be customized 3. Configuration passes are run only after the Windows Image is written on disk 4. The maximum number of configuration passes done during any type of installation is 3. 5.

Correct Answer: 1.

Question 11: What will you do to restore default settings in Windows firewall? 1. Manually change the firewall settings on all interfaces to match the default settings on a fresh install of Windows 7 2. In an elevated command prompt, run the command netsh firewall action=setdefault 3. In Control Panel, click System and Security. Click Windows Firewall. In the left pane, click Restore Defaults. 4. Windows firewall settings cannot be changed back to default. 5. Correct Answer: 3.

Question 12: You have to upgrade a computer running on Windows Vista to Windows 7. Which of the following will be available on your computer after upgrade? 1. Clear type fonts can be disabled 2. Taskbar can still be kept below other windows on screen 3. can adjust bit rate when busrning data CDs from Windows Media Player 4. change the size of icons in the Windows Explorer windows without any reduction in the quality 5. Correct Answer: 4. Question 13: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose? 1. dxdiag 2. Driver Verifier Monitor 3. verifier.exe 4. Both verifier.exe and Driver Verifier Monitor 5. None of the above Correct Answer: 4. Question 14: When an application installer fails, Windows 7 presents a window, asking you to run the installer under recommended settings. Which of the following policies will you disable to disable this feature? 1. Detect Applications Unable To Launch Installers Under UAC 2. Detect Application Failures Caused By Deprecated Windows DLLs 3. Detect Application Installers That Need To Be Run As Administrator 4. Detect Application Install Failures 5. Correct Answer: 4. Question 15: Your client bought a Laptop 3 years ago which came with Windows Vista Ultimate. He has not upgraded to Windows 7 Ultimate and wants to use BitLocker to encrypt the C:\ driver, where Windows is installed. But he is not able to do so. What would you suggest him if he wants to do this?

1. Revert back to Windows Vista Ultimate and install SP2. 2. Buy a new laptop. 3. Install a TPM on the Laptop 4. Use Linux Operating System. 5. Correct Answer: 2.

Question 16: You are configuring WFAS (Windows Firewall with Advanced Security) to configure a custom port rule for port 87. You have selected the protocol as UDP. At this point of time, when you click next, you will be presented with options to allow or disallow the traffic. How many options will you have to choose from? 1. 2 2. 3 3. 4 4. None. Windows will always block any traffic for a single port for the UDP protocol. 5. Correct Answer: 2. Question 17: You are asked to prevent the execution of a custom appliaction over the network. Which rule will you choose among the following to implement the restriction? 1. Path rule 2. Certificate rule 3. Hash rule 4. Zone rule 5. Correct Answer: 3. Question 18: You have selected manual method for backing up "Files and Folders" using Windows Backup. Which of the following files will not be backed up? 1. Any files in the %systemroot% directory 2. Compressed files 3. Files with .DLL extension 4. All of the above. 5. Correct Answer: 1.

Question 19: You have to create a ISO image of a customized version of 64-bit Windows PE. The resulting ISO file should be in UDF format. Which of the following tool will you use? 1. oscdimg 2. WinPEUtil 3. diskedit 4. WinPEinit 5. WinPEshl

Correct Answer: 1.

Question 20: Which of the following will affect the data being shared by a computer on a HomeGroup network? 1. Link Speed 2. Whether or not the option of "media streaming" is set in the Network and Sharing Center 3. The user account currently active on the system 4. Connectivity to the internet 5. Correct Answer: 3. Question 21: In which format does Windows Backup store the files which have been backed up? We are talking about a file and folder backup. 1. .ZIP 2. .RAR 3. .VHD 4. .WIM 5. It just copies the files into folder. Correct Answer: 1. Question 22: You are trying to configure DirectAccess using the Local GPE. Which node will you navigate to? 1. Computer Configuration | Administrative Templates | Network | TCPIP Settings | IPv6 Transition Technologies 2. Computer Configuration | Administrative Templates | Network | Network Connections | Windows Firewall 3. Computer Configuration | Administrative Templates | Network | DirectAccess 4. Computer Configuration | Administrative Templates | Network | Link-Layer Topology Discovery 5. Correct Answer: 1. Question 23: You want to restore a previous version of a file. What would you do first? 1. Right click the file 2. Open control panel 3. open command prompt 4. open GPE 5. Correct Answer: 1.

Question 24: Which one of the following will you get when you upgrade from Windows Vista Home Premium (Service Pack 2) to Windows 7 Professional?

1. AppLocker 2. EFS 3. BranchCache 4. Subsystem for Unix-based Applications 5. Upgrade cannot be done Correct Answer: 5.

Question 25: Which of the following is a valid file type to be used as an argument to drvload? 1. .INF 2. .INI 3. .SYS 4. .EXE 5. .WIM Correct Answer: 1.

Question 1: Read the following description and select the error from the list. You have a huge network of computers in a campus. All the computers are running one of the editions of Windows 7 or Windows Vista. They have all been enabled to get the IP address using DHCP. The servers in the network run on either Windows Server 2008 or Windows Server 2008 R2. Only some of these servers are running the DHCP service. This network has only one internet gateway. This gateway also has a DHCP server installed on it, but has been deactivated. The IP address assigned to this gateway is 169.254.137.8. What is the error in this configuration? 1. The DHCP server on the gateway should be enabled. 2. The IP address of the gateway should be changed. 3. The DHCP service should be enabled on all servers. 4. There is no problem with this network setup. 5. Correct Answer: 2. Question 2: You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal? 1. Secure Desktop 2. Secure Screen 3. Dimmed Display 4. Dimmed Desktop 5. Correct Answer: 1. Question 3: What is the maximum default period of time, Reliability Monitor collects data for showing the system reliability history? 1. 1 month 2. 4 months 3. 6 months

4. 1 Year 5. Forever Correct Answer: 4. Question 4: Your computer running Windows 7 has stopped connecting to the network. You suspect that the IPv4 network protocol is not working on the computer. What will you do to check whether it has stopped? 1. Reinstall Windows and see if it starts working 2. Boot into a live Operating System and check if the protocol is working now 3. open cmd and run the command: ping 127.0.0.1 4. run ipconfig /all in cmd 5. Correct Answer: 3.

Question 5: You want to monitor the network traffic consumed by an application. This application is started and closed many times everyday. You want to write a WMI script to monitor and log the data. Which of the following languages can be used to creating the script? 1. VBS 2. C 3. Java 4. C# 5. C++ Correct Answer: 1. Question 6: What is UAC or User Account Control? 1. It is a security feature which informs you when you take an administrative action. 2. It is a security feature to elevate the permissions temporarily for some administrative work. 3. It is a feature which can temporarily elevate a standard user to administrative level. 4. All of the above. 5. Correct Answer: 4.

Question 7: Which command line tool will you use to edit NTFS permissions? 1. lcacls 2. icacls 3. net 4. cipher 5. Correct Answer: 2.

Question 8: You run the command "netsh wlan connect name=default

ssid=MyWinNet" on an elevated command prompt from a laptop running Windows 7 Ultimate. What does the word 'default' in that command signify? 1. It tells to perform authentication based on the default network key supplied. 2. It asks Windows to use the default interface to connect to the network 3. It is the name of the network to which you are connecting 4. It is the name of the computer from which you are connecting. 5. It is the name of the profile to be used when connecting to the network MyWinNet Correct Answer: 5. Question 9: You have a network of computers running Windows 7 Enterprise. Which of the following is true? 1. There has to be a Windows Server 2008 R2 on the network to use BranchCache. 2. The computers can use the BranchCache in Distributed mode. 3. The computers can use the BranchCache in Hosted mode. 4. The computers will not be able to use BranchCache in any of the modes. 5. Correct Answer: 2. Question 10: Which of the following is not a service associated with IPv4? 1. DNS 2. DHCP 3. NAT 4. IPSEC 5. Correct Answer: 4. Question 11: You booted from a Windows PE disk. Your DVD-ROM drive letter is shown as X: and you want to capture the image on drive D: to C:\images\Windows.wim file. Which of the following commands are right? Notice the drive letter from which the command is being run. 1. x:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 2. x:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /verify 3. c:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 4. d:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /noverify 5. Correct Answer: 2. Question 12: You have a NTFS volume on a local disk which is not mounted anywhere on the file system. You want to make sure that the volume is still existent. Select the first Windows component from the following list which allows you to list such volumes?

1. Windows Explorer 2. Windows Command Prompt 3. Device Manager 4. Computer Management Console 5. Both Device manager and Computer Management Console Correct Answer: 3.

Question 13: You are working as an administrator for a small company with 15 computers running on Windows 7 on a network. The company does not have a Windows Server on the network but want an easy way to share the resources among the computers. Which of the following will you do? 1. Configure a HomeGroup for the network 2. Setup the Active Directory Domain on the server 3. Share the data using file and folder sharing for all possible folders which can be used for sharing the data 4. Use the skydrive to share data using the internet 5. Correct Answer: 1. Question 14: Which of the following is not one of the Application Compatibility Diagnostics Policies? 1. Notify Blocked Drivers 2. Detect Application Failures Caused By Deprecated COM Objects 3. Detect Operating System version failure 4. Detect Application Install Failures 5. Correct Answer: 3. Question 15: You want to find out the details on which remote users are currently accessing one of your shared folders. What will you do? 1. Open the command prompt and use the icacls tool. 2. Open the Computer management console and navigate to the Shared Folders | Sessions node 3. Open the Computer management console and navigate to the Shared Folders | Shares node 4. Open the Computer management console and navigate to the Shared Folders | Open Files node 5. Correct Answer: 2.

Question 16: Which of the following commands will you type at the command prompt to open the device manager? 1. azman.msc 2. rsop.msc 3. fsmgmt.msc

4. diskmgmt.msc 5. devmgmt.msc Correct Answer: 5. Question 17: You have encrypted some files using EFS from your standard account on your Windows 7 computer. You have forgotten the Windows 7 password and have not created a Recovery Agent till now. You want to access those files. Which of the following methods will you use to be able to access these files? 1. Create a Recovery Agent using administrator account and then recover the password. 2. Use Administrator account to reset your password. 3. Use Password reset disk. 4. Use live Linux distribution 5. Correct Answer: 3. Question 18: You are migrating a network of computers from Windows Vista to Windows 7. All of these computers contain sensitive data. You have been asked that the data should remain intact after migration. It is also mandatory to use offline migration method and use USMT 4.0 for the migration. Which of the following will not be migrated by USMT? 1. EFS Files 2. Windows Internet Explorer Settings 3. Network Drive mapping 4. Phone and Modem options 5. Correct Answer: 4.

Question 19: Read the following description and choose the right answer from the list. Your computer connects to your company's computer network in two ways - Ethernet and Wireless. While the Ethernet network is dedicated for file sharing inside the network, the wireless network is used to connect to the internet. Your computer runs a program, which is updated very often by its vendor. This program is very essential to be run on every computer on the network. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. You have already blocked the program in the Windows firewall, but it still connects to the internet. What mistake you have done? 1. You have blocked the program on wrong network type. 2. You have not setup the script which would block the program everytime the computer starts. 3. Your computer is infected with virus. 4. The current version of program is not covered by Windows firewall. 5. Correct Answer: 1.

Question 20: Assuming that you are able to open all the tools listed below, which one will you open if you had to perform a recovery using a system Image? 1. Command prompt 2. Control Panel 3. Windows Explorer 4. Character Map 5. Correct Answer: 2. Question 21: A spanned volume can utilize the free space on more than one disk. What is the drawback of such disks? 1. The chances of data loss are high 2. They cannot use multiple free spaces on the same disk 3. You cannot install application programs on them 4. There is a performance drop 5. Correct Answer: 1. Question 22: Some updates have failed to install in the last update session. Which tool will you use to see the list? 1. update.exe 2. Control.exe 3. Winupdate.exe 4. show /updates:Windows 5. Correct Answer: 2.

Question 23: Which of the following tools in the MDT 2010 will allow you to enter a Welcome message text that will be displayed on the welcome screen? 1. Deployment Workbench 2. UDI Wizard Designer 3. Configure ConfigMgr Integration 4. none of the above 5. Correct Answer: 2. Question 24: You have configured BitLocker on your system in "TPM with PIN" mode. But you want users to use a rather longer password than a small PIN. Where will you find the respective policy? 1. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives 2. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives 3. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives

4. All of the above can be used. 5. Correct Answer: 3. Question 25: Which of the following commands will copy all the files and subfolders from C:\Source to D:\Destination while retaining the NTFS permissions? 1. Robocopy.exe C:\Source D:\destination /copyall /e 2. Robocopy.exe C:\Source D:\destination /purge /e 3. Robocopy.exe C:\Source D:\destination /fft 4. Any of the above 5. Correct Answer: 1. Question 1: Among the following methods, how would you do a successful clean install of the Windows 7 OS with a (single) Upgrade DVD, given that you already own a license to a previous version of Windows. Remember that Microsoft will not activate an OS installed using "clean install" done from a Upgrade DVD of Windows 7. It however is possible. You have to tell which of the following will get your work done. Also, remember that an installation is said to be "successful" only after the OS has been activated. 1. Install Windows Xp and then upgreade to Windows 7 from the Upgrade DVD 2. Do a clean install from the Upgrade DVD and then run the upgrade again on that same installation using the same media 3. Do a clean install using the upgrade DVD and then activate using activators available on the internet 4. Do a clean install of Windows 7 every 30 days but never activate it. 5. There is just no need of these methods, You can use upgrade media for doing clean install. Correct Answer: 2. Question 2: Which of the following commands will copy all the files and subfolders from C:\Source to D:\Destination while retaining the NTFS permissions? 1. Robocopy.exe C:\Source D:\destination /copyall /e 2. Robocopy.exe C:\Source D:\destination /purge /e 3. Robocopy.exe C:\Source D:\destination /fft 4. Any of the above 5. Correct Answer: 1.

Question 3: You are trying to connect to a Windows 7 machine using remote desktop feature. There already is a user on the remote machine, using the machine physically. What will happen when you try to connect to the remote machine under the given circumstances? Note that the user using the remote computer physically is not an administrator. 1. You will be logged in silently without the user on the remote computer knowing that someone else is also using the machine. 2. Windows 7 will lock the machine for the physical user on the remote

computer and then accept your connection. 3. Windows 7 will notify the user on the remote machine but will not give him the control of allowing or disallowing you to connect to the machine. 4. Windows 7 will ask whether or not your remote connection be accepted or not. Only if the user permits, will you be allowed to connect remotely. 5. Correct Answer: 4.

Question 4: You want to remove the driver named netdev3-7.inf from the store. Which switch of pnputil helps you do this? A device driver update for Windows 7 has started making the device misbehave. You have two versions of driver for a device, one for Windows Vista and a newer version for Windows Vista. The device manufacturer has confirmed that the driver built for Windows Vista is fully compatible with Windows 7. You have already added the old driver to the driver store. Now you want to delete the newer one. You are using pnputil to remove the problematic driver from the driver store. Choose the switch, which will let you do this. The new driver file is named netdev3-7.inf. 1. pnputil.exe -r netdev3-7.inf 2. pnputil.exe -i netdev3-7.inf 3. pnputil.exe -f -d netdev3-7.inf 4. pnputil.exe -d netdev7-3.inf 5. Correct Answer: 3. Question 5: Which of the following system is used to automatically create an answer file for unattended formatting, installation and setting customization for new Windows 7 installation? 1. Windows System Image Manager 2. Sysprep 3. Windows Preinstallation Environment Configuration System 4. Tools in Deploy.cab 5. ImageX Correct Answer: 1. Question 6: Select the number of days from the list which is used to determine the stability index of the system. 1. 14 2. 15 3. 28 4. 30 5. 45 Correct Answer: 3. Question 7: What does the utility ImageX will do? 1. Capture new volume image 2. Apply a volume image 3. Append a new volume image

4. All of the above 5. Correct Answer: 4. Question 8: You open the properties of a folder and find that both Allow and Deny actions are active for the "Read and Execute" permission for the account "HalfTrust". What will Windows 7 do when the account HalfTrust is used to access that folder? 1. Access is allowed 2. Access is denied 3. Will deny the access only if the deny permissions were set after setting the allow permissions. 4. The account will be allowed to Read but denied to execute. 5. Correct Answer: 2.

Question 9: How many type of data collectors are available on Windows 7 for creating a DCS? 1. 1 2. 3 3. 4 4. 2 5. Correct Answer: 3. Question 10: Which of the following devices will show a "Power Management" tab when you open its properties from the device manager? 1. Disk Drive (hard disk) 2. Generic PnP Monitor 3. Keyboard 4. Both Monitor and Keyboard 5. Both Disk Drive and Monitor Correct Answer: 3. Question 11: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually. 1. Shift + F3 2. Ctrl + Shift + F3 3. Alt + Shift + F3 4. Ctrl + Alt + F3 5. Correct Answer: 2.

Question 12: Which of the following is the drawback of sector based imaging which the new .WIM imaging format tries to overcome? 1. sector based imaging is slow 2. sector based imaging is insecure 3. sector based imagin cannot be perfomed over the network 4. sector based imaging forces the destination computer to use the same boot controller as the source 5. sector based imaging forces the two computers to have different HAL Correct Answer: 4. Question 13: Which of the following is the most secure mode for BitLocker? 1. TPM-only mode 2. TPM with startup key 3. TPM with PIN 4. TPM with PIN and startup key 5. BitLocker without a TPM Correct Answer: 4. Question 14: You want to schedule a file and folder backup but do not want to use the wbadmin command line tool. Which of the following GUI tools will allow you to do this? 1. Windows task scheduler 2. Batch file scheduler 3. Windows Backup wizard 4. No methods are available for this. 5. Powershell Correct Answer: 3. Question 15: You booted from a Windows PE disk. Your DVD-ROM drive letter is shown as X: and you want to capture the image on drive D: to C:\images\Windows.wim file. Which of the following commands are right? Notice the drive letter from which the command is being run. 1. x:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 2. x:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /verify 3. c:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 4. d:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /noverify 5. Correct Answer: 2. Question 16: You are trying to capture an image of a Workstation with 8 GB RAM and hence you want to skip the capturing of pagefile.sys. What will you add to the [ExclusionList] section of Wimscript.ini file in order to exclude those files during the capturing process?

1. Exclude:pagefile.sys 2. +Rule:pagefile.sys 3. pagefile.sys 4. none of the above 5. Correct Answer: 3.

Question 17: You want to capture a Windows 7 image of a reference computer in the WIM format and then deploy it. You need to specify the source directory of the WIM file resides and then specify whether Setup or Sysprep files are required (or not). You then want to move the file to the distribution share for deployment of the captured Image. Which tool will let you do this? 1. WDS 2. MDT 3. SCCM 4. SIM 5. Correct Answer: 2. Question 18: You have been asked to install Windows 7 Ultimate x86 on 3 different computers. You have been given separate Install.Wim files for each of the computers on a single bootable Windows 7 Install DVD. Which of the following options will you pass to setup.exe to change the image from which to install Windows 7? You have to use separate images for installing Windows 7 on each computer. However, they are all on the same DVD only? The Install.wim files reside on different paths on the same DVD with the same name. 1. /useimage: 2. /image:\Install.wim 3. /installfrom: 4. /iimage:\Install.wim 5. Correct Answer: 3. Question 19: You can connect to a machine on an intranet using a Windows Server 2008 R2 gateway on the internet. You want to configure the policy for this in the Local GPE. Which node of the GPE will you look into? 1. Computer Configuration | Administrative Templates | Windows Components | Remote Desktop Services | RD Gateway 2. User Configuration | Administrative Templates | Windows Components | Remote Desktop Services | RD Gateway 3. User Configuration | Administrative Templates | Windows Components | Digital Locker 4. Computer Configuration | Administrative Templates | Windows Components | Digital Locker 5. Correct Answer: 2.

Question 20: For what type of devices would you configure the Hard Disk Write Caching? 1. Internal hard disks 2. Network Adapters 3. Slower USB Disk drives 4. Printers 5. Correct Answer: 3. Question 21: When you plug your device to the computer, it searches the central repository of its drivers to see if there exists any driver for the device in concern. What does Windows 7 call the driver repository where it searches for the drivers? 1. Driver Repository 2. Driver Store 3. Resource Center 4. Local resource Cache 5. Correct Answer: 2. Question 22: You have configured BitLocker on your system in "TPM with PIN" mode. But you want users to use a rather longer password than a small PIN. Where will you find the respective policy? 1. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives 2. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives 3. Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives 4. All of the above can be used. 5. Correct Answer: 3. Question 23: One of your clients created a WAP in his home. However, he reports that others around him able to access his network without his permission. What would you suggest him to do? 1. Enable the Windows Firewall 2. Change the settings of his WAP and enable security using either WEP or WAP security algorithms 3. Change the channel being used for WAP 4. Disable ICS 5. Correct Answer: 2. Question 24: Your boss said, "I want a ZTI installation of Windows 7 on my network". What did he mean by ZTI? You have to select the right expanded form of ZTI.

1. Zero Tolerance Installation 2. Zonal Transfer and Initialization 3. Zero Touch Initialization 4. Zero Touch Installation 5. Correct Answer: 4.

Question 25: You are migrating a network of computers from Windows Vista to Windows 7. All of these computers contain sensitive data. You have been asked that the data should remain intact after migration. It is also mandatory to use offline migration method and use USMT 4.0 for the migration. Which of the following will not be migrated by USMT? 1. EFS Files 2. Windows Internet Explorer Settings 3. Network Drive mapping 4. Phone and Modem options 5. Correct Answer: 4.

Question 1: What will you use to schedule a backup using wbadmin tool?

1. Windows task scheduler


2. Batch file scheduler 3. Windows Backup wizard 4. No methods are available for this. 5. powershell must be used Correct Answer: 1.

Question 2: Which tool will you use to configure the source of update for Windows 7 Automatic Updates feature? 1. Wusa.exe

2. netsh.exe
3. Wuauclt.exe 4. gpedit.msc 5. Correct Answer: 4.

Question 3: You have to select the least costly edition of Windows for a company that could be volume licensed and can join their ActiveDirectory domain. Which of the following editions would you select? Some editions of Windows cannot be volume licensed and some cannot join an ActiveDirectory domain. You have to select the one which does not have any of these restrictions.

1. Windows 7 Ultimate 2. Windows 7 Home Premium

3. Windows 7 Professional
4. Windows 7 Home Basic 5. Correct Answer: 3. Question 4: Which of the following is not a function of Internet Explorer Administration Kit (IEAK)? 1. Ensuring that same version of Internet Explorer is installed across the network 2. Ensuring that browsers across the network are opening only secure sites

3. Manage the browser installation from a central location


4. Configure automatic connection profiles for various users on a network 5. Correct Answer: 2. Question 5: You want to control the transfer of data on the system via removable devices. Where will you change the settings for this? 1. Group Policy Editor 2. Device Manager

3. Disk Management Console


4. Control Panel -> Hardware and Sound 5. Correct Answer: 1. Question 6: You have a DHCP server on your network, which is set to assign an IP address in the range 10.10.1.1 to 10.10.1.254 automatically when a host powers up in the network. Suddenly you find that the hosts in the network are using IP addresses in the range 169.254.10.1 through 169.254.10.254. What can be the problem? 1. All host computers are infected with a virus. 2. Settings on DHCP server has been changed

3. DHCP server is not working


4. Someone else has manually set the addresses in this range and has disabled the DHCP from the host computers 5. Correct Answer: 3.

Question 7: Which of the following is a false statement? 1. Security Permissions created on a computer running Windows 7 cannot be overridden using a computer running Windows Vista.

2. You cannot encrypt a file on Windows 7 Home Premium edition using EFS.
3. There are six permissions you can edit / set for a file residing on a NTFS volume. 4. Windows 7 uses the same password authentication system as Solaris OS. 5. Correct Answer: 3.

Question 8: What is the minimum processor speed required for running a Windows 7 64 bit Operating System? 1. 800 Mhz

2. 1 GHz
3. 1.2 GHz 4. 1.8 GHz 5. Correct Answer: 2.

Question 9: You have to install Windows 7 on a machine, which has Intel Core i7 processor and 16 GB of RAM. Which of the following editions of Windows 7 will you install to make sure that none of the resources are under-utilized?

1. Windows 7 Ultimate x64


2. Windows 7 Home Basic x64 3. Windows 7 Home Premium x86 4. Windows 7 Starter x64 5. Correct Answer: 1.

Question 10: Among the following methods, how would you do a successful clean install of the Windows 7 OS with a (single) Upgrade DVD, given that you already own a license to a previous version of Windows. Remember that Microsoft will not activate an OS installed using "clean install" done from a Upgrade DVD of Windows 7. It however is possible. You have to tell which of the following will get your work done. Also, remember that an installation is said to be "successful" only after the OS has been activated. 1. Install Windows Xp and then upgreade to Windows 7 from the Upgrade DVD

2. Do a clean install from the Upgrade DVD and then run the upgrade again on that same installation using the same media
3. Do a clean install using the upgrade DVD and then activate using

activators available on the internet 4. Do a clean install of Windows 7 every 30 days but never activate it. 5. There is just no need of these methods, You can use upgrade media for doing clean install. Correct Answer: 2. Question 11: How will you break a subnet into two smaller subnets? 1. Increasing the number of bits used in the subnet mask

2. changing the IP address class of the computers on the network


3. Add an alternate rule for the network adapter which is used to connect to the present network 4. changing the subnet masking in order to split the network into two 5. Correct Answer: 1.

Question 12: You have two folders C:\Source and D:\Destination. You move a file from C:\Source to D:\destination. Which folder's permissions will be applicable on the file after the move is complete? 1. C:\Source 2. D:\Destination 3. The permissions are first compared and most restrictive permissions are applied.

4. The permissions are first compared and least restrictive permissions are applied.
5. Correct Answer: 2. Question 13: Which of the following commands will copy all the files and subfolders from C:\Source to D:\Destination while retaining the NTFS permissions?

1. Robocopy.exe C:\Source D:\destination /copyall /e


2. Robocopy.exe C:\Source D:\destination /purge /e 3. Robocopy.exe C:\Source D:\destination /fft 4. Any of the above 5. Correct Answer: 1.

Question 14: A Windows 7 Installation was done on 10 computers using the same installation media. All of the computers failed to boot. It was found that the Boot Configuration Data was corrupted on all machines. Which of the following tools had not worked correctly? Windows Installation is done using the Windows PE Environment which has a set of tools, each for a specific task. Corruption of Boot Configuration Data indicates failure of one of the tools. Select the tool which you think has failed in this case.

1. BootSect

2. BCDEdit
3. BCDBoot 4. Diskpart 5. Correct Answer: 3. Question 15: You have to edit the booting parameters of a Windows 7 computer. Which one of the following tools will you use to add a new entry to the boot menu with custom booting parameters for the system? You do not want to loose the current set of parameters. For this you have to copy the desired boot entry settings to a new one and then edit it. Select the tool which will can do the job. 1. BootSect 2. BCDEdit

3. BCDBoot
4. Diskpart 5. Correct Answer: 2. Question 16: You are trying to configure DirectAccess using the Local GPE. Which node will you navigate to?

1. Computer Configuration | Administrative Templates | Network | TCPIP Settings | IPv6 Transition Technologies
2. Computer Configuration | Administrative Templates | Network | Network Connections | Windows Firewall 3. Computer Configuration | Administrative Templates | Network | DirectAccess 4. Computer Configuration | Administrative Templates | Network | Link-Layer Topology Discovery 5. Correct Answer: 1.

Question 17: Which of the following switches will you use with "sysprep" command to capture the disk image of the system, which you have to use as the source for creating a Windows 7 installation disk? The company you work in runs Windows 7 Enterprise editions and many users are having problems with the installation of device drivers, although all computers have the same hardware configuration. Your company's head wants to give away installation disks, which will contain the drivers and the necessary application preinstalled and you, have to prepare the image from the source system. You also have to make sure that the users get to configure their system after the first boot. Select the correct switch among the following switches which will help you achieve the goal.

1. /generalize /oobe 2. /generalize /audit

3. /audit /unattend:
4. /oobe /audit 5. Correct Answer: 1. Question 18: You are trying to detect the proxy settings using WPAD for configuring Windows Automatic Updates. WPAD tool has failed to determine the proxy settings. You want to import the proxy settings from Internet Explorer. Which of the following tools can you use for this purpose? 1. import 2. export

3. netsh
4. netstat 5. Correct Answer: 3. Question 19: Which of the following cannot be used as a backup medium? We assume you are using a Windows 7 Ultimate PC. 1. DVD Disk 2. A network share 3. A VHD file 4. A USB flash drive

5. None of the above


Correct Answer: 5. Question 20: Which of the following media cannot be used for scheduled backups? 1. Network Locations 2. USB Flash Drive 3. DVD ROM

4. VHD file
5. Correct Answer: 3. Question 21: Windows 7 has been failing to boot on each alternate boot. You enabled boot logging option. What file will contain the log data? 1. Ntboot.log 2. ntbtlog.log

3. ntbtlog.txt
4. boot.ini 5. Correct Answer: 3. Question 22: You want to know your computer's IP address details. Which of the following commands will you type at the command prompt? 1. ping /local /all

2. ipconfig /all
3. netstat /c /a /n 4. net config workstation 5. Correct Answer: 2. Question 23: Two applications are running at the same time. Both are important to be run as they are critical and you are running short of time. One of these applications is more important than the other. How will you make Windows run the more important application faster than the other? 1. Set the priority of the more important application process to "high" 2. Suspend the less important application process temporarily

3. End process of the less important application


4. Use performance monitor to tune the performance 5. Adjust visual effects to make it easier for the more important application to run on the CPU. Correct Answer: 1. Question 24: You have to customize the Windows 7 installation from the disk you have been given. You know the commands required to do your work. How will you get the command prompt before the actual setup starts? 1. Press Ctrl + Shift + F12

2. Press Shift + F10


3. Press F7 4. Press Windows + C 5. Press Alt + Ctrl + F3 Correct Answer: 2.

Question 25: Read the following description and select the correct answer. Your company has two different networks. Employees on one network are developers who write software code and upload it to a server, which allows only FTP connection. Employees on this network (Developer Network). There is another network, which has software testers (Tester Network) on it. They are allowed to

download the code uploaded to the server but not allowed to upload anything on it. They use the company's SMTP server to send mails to each other. You have implemented correct security settings on the FTP server. However, you want additional security and hence want that the employees on tester network to be able to perform only two actions on the network: download files from FTP server and send email via SMTP. Which of the following type of rules will you create to achieve your goal? 1. Inbound

2. Outbound
3. Isolation 4. Authentication 5. Correct Answer: 2.

Question 1: You wanted to set the DNS server for your computer's Local Area Connection interface to 10.0.0.1. Which of the following commands will you type in an elevated command prompt? 1. netsh interface ipv4 set dns "local area connection" static 10.0.0.1 2. netsh interface ipv4 set dnsservers "local area connection" static 10.0.0.1 3. netsh interface ipv4 set dnsservers default 10.0.0.1

4. netsh interface ipv4 set dnsservers "local area connection" 10.0.0.1


5. Correct Answer: 2.

Question 2: What type of entity is NAP Remediation? 1. Network 2. Service

3. Server
4. Resource 5. Correct Answer: 1.

Question 3: Which of the following devices will show a "Power Management" tab when you open its properties from the device manager? 1. Disk Drive (hard disk) 2. Generic PnP Monitor 3. Keyboard

4. Both Monitor and Keyboard


5. Both Disk Drive and Monitor Correct Answer: 3.

Question 4: You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal?

1. Secure Desktop
2. Secure Screen 3. Dimmed Display 4. Dimmed Desktop 5. Correct Answer: 1.

Question 5: Which of the following is false for a RAID-5 volume? 1. You can install Windows 7 on it 2. Data is disaster protected

3. Using three 500 GB disks will give you storage space of 1000 GB only
4. Raid 5 volume will store parity information on one disk 5. A RAID-5 volume will give performance improvements over basic disks Correct Answer: 1.

Question 6: Which of the following permissions, when set to active will also set the "Read" permission to active? Select the first correct answer from the list.

1. List folder contents


2. Write 3. Read and Execute 4. Modify 5. Correct Answer: 3.

Question 7: Where will you look for the AppLocker audit events in the Event viewer? 1. Windows -> System 2. Windows -> Application

3. Applications and Service Logs -> Microsoft -> Windows


4. Applocker audit events are recorded in separate XML file. They are not logged in the Event logs 5. Correct Answer: 3.

Question 8: DISM is a command-line tool used to service Windows 7 images before deployment. The servicing can be offline. Which of the following can not be done by using DISM? 1. Install or remove Windows 7 Features

2. Configure Windows 7 settings


3. Change the product key of installation

4. Install or remove additional drivers 5. Correct Answer: 3.

Question 9: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image?

1. Language Pack
2. Driver 3. Feature pack in Windows PE image 4. Application patch 5. Application Correct Answer: 1.

Question 10: Your network uses a proxy server for protecting internal computer from outside threat and for regulating the traffic. Can Windows Automatic Update still be performed on the Windows 7 computers on the internal network? If yes, then which tool will do the job?

1. Yes, We can use WPAD for this.


2. Yes, We can use Internet Explorer for this. 3. No it cannot be done. 4. It can be done only if the network has a WSUS server. 5. Correct Answer: 1.

Question 11: You are configuring WFAS (Windows Firewall with Advanced Security) to configure a custom port rule for port 87. You have selected the protocol as UDP. At this point of time, when you click next, you will be presented with options to allow or disallow the traffic. How many options will you have to choose from?

1. 2
2. 3 3. 4 4. None. Windows will always block any traffic for a single port for the UDP protocol. 5. Correct Answer: 2.

Question 12: You have just plugged in a device in a USB port available on your computer. You want to know how much power that device requires. In which tab of the device properties window will you find the information? 1. Power

2. Power Management
3. Advanced 4. Details 5. Correct Answer: 1.

Question 13: You want a standard user to be able to connect to a machine running Windows

7. The user already has an account on the machine. To which group will you add the user so that he is able to connect to the computer remotely? 1. Remote Desktop Users group

2. Administrators group
3. Replicators group 4. Users group 5. Correct Answer: 1.

Question 14: You have just installed an update but after doing that, one of your business critical applications is crashing. What will you do to find what is the problem? 1. Read the update description 2. Uninstall the update. 3. Restart Windows in diagnostic mode.

4. Read the knowledge base article


5. Correct Answer: 4.

Question 15: You have a group named "Testing" on the computer with different members. You have set the folder "Alpha" with Modify (Allow) permissions for the group. Now, you create a file named sample.txt. Your own permissions are at Full Control (allow). What permissions will it have relating to the Testing group?

1. Modify (allow)
2. Full control (allow) 3. Modify (deny) 4. Full control (allow) but Read and Execute (deny) 5. Correct Answer: 1.

Question 16: You suspect that there is some problem with one of the 8 network interfaces. You suspect that it may be a driver problem, while your colleague says it may be disabled. There is also a possibility of a configuration clash. Which DCS report will you analyze the problem?

1. System Diagnostics
2. System Performance 3. Create a custom DCS for the purpose 4. Use Reliability Monitor instead 5. Correct Answer: 1.

Question 17: You want to run notepad as user "Prince" on the local computer. You want to open a file named C:\rcv.txt which has been encrypted by Prince and it is the only account which can decrypt the file. Which of the following commands will you run to achieve the goal? 1. runas /user:Prince "notepad.txt C:\rcv.txt"

2. runas /user:Prince "notepad.txt C:\rcv.txt" /env

3. runas /profile /user:Prince "notepad.txt C:\rcv.txt" 4. runas /trustlevel /user:Prince "notepad.txt C:\rcv.txt" 5. Correct Answer: 3.

Question 18: You want to restore a previous version of driver but Windows does not show any previous versions. However, you created a system restore point just one hour ago and have not changed any setting since Windows was installed yesterday. What could be the problem? 1. System Protection is not enabled for C: drive. 2. System is instable 3. Windows does not create shadow copies for files in the %systemroot%

4. Windows has detected a hardware problem with the device whose driver you are trying to restore.
5. Correct Answer: 3.

Question 19: Which of the following type of images cannot be created by WDS? 1. Install Images

2. Boot Image
3. Capture Image 4. Discover Image 5. Service Image Correct Answer: 5.

Question 20: You are performing an analysis of a network which uses IPv6 protocol. Which of the following addresses can be used for the device which would connect to the IPv6 Internet? 1. 21cd:53::3ad:3f:af37:8a62 2. fe80:d1ff:d266:7888:27d6

3. ::1
4. fec0:0:0:0:fffe::2 5. Correct Answer: 1.

Question 21: Which of the following is the requirement for Windows 7 ZTI? 1. Windows Server 2008 or Windows Server 2008 R2 with WAIK installed 2. Microsoft SMS (System Management Server)

3. Windows System Image Manager


4. Availability of SCCM 2007 with the Operating System Deployment Feature Pack on the network 5.

Correct Answer: 4.

Question 22: You want to control the transfer of data on the system via removable devices. Where will you change the settings for this? 1. Group Policy Editor 2. Device Manager

3. Disk Management Console


4. Control Panel -> Hardware and Sound 5. Correct Answer: 1.

Question 23: Which of the following switches will you use with "sysprep" command to capture the disk image of the system, which you have to use as the source for creating a Windows 7 installation disk? The company you work in runs Windows 7 Enterprise editions and many users are having problems with the installation of device drivers, although all computers have the same hardware configuration. Your company's head wants to give away installation disks, which will contain the drivers and the necessary application pre-installed and you, have to prepare the image from the source system. You also have to make sure that the users get to configure their system after the first boot. Select the correct switch among the following switches which will help you achieve the goal.

1. /generalize /oobe
2. /generalize /audit 3. /audit /unattend: 4. /oobe /audit 5. Correct Answer: 1.

Question 24: You need to confirm failure of a device driver installation. Which of the following methods will you use to get a confirmation? 1. Run driver setup again to confirm the failure 2. Configure a data collector set in the Computer Management console

3. Open the Reliability Monitor and check the infromational events


4. Open the Reliability Monitor and check the warnings 5. Correct Answer: 4.

Question 25: You are being accused by a user for having deleted a very important report file from her desktop. She claims that it was missing after you helped her run system restore for reverting back the effect of a problematic video driver. Who is guilty here? The user confirms that system restore was successful. 1. You (the system administrator)

2. The user
3. System restore function in Windows.

4. Windows Firewall 5. Correct Answer: 2.

Question 1: What is Teredo? 1. Teredo is a tunneling protocol used for allowing IPv4 traffic to be encapsulated inside IPv6 packets

2. Teredo is a tunneling protocol used for allowing IPv6 traffic to be encapsulated inside IPv6 packets for communication over the IPv4 internet
3. Teredo is a protocol which can be used to stream multimedia over the IPv6 network 4. Teredo is a file sharing application which utilizes its own distributed servers allowing IPv4 devices to share files over IPv6 network 5. Correct Answer: 2.

Question 2: Which command can be used to add or remove drivers from the Driver Store? 1. devmgmt.msc 2. pnputil.exe

3. drvinst.exe
4. driverquery.exe 5. Correct Answer: 2.

Question 3: You want to allow other computers to ping your computer by its IPv6 address. Which command will you run? 1. netsh firewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow

2. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6 dir=in action=allow


3. netsh firewall firewall add rule name="ICMPv6" protocol=icmp6:any dir=both action=allow 4. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6:any,any dir=in action=allow 5. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow Correct Answer: 5.

Question 4: You are trying to run a program sample.exe which is located in D:\Progs\. When you double click the program to launch it, you the get the error saying "the parameter is incorrect". What is the error?

1. The program is corrupt

2. The permissions have not been set right 3. The program is encrypted but Windows 7 does not have the key to decrypt it. 4. The program is encrypted but Windows 7 does not have the algorithm or key to decrypt it. 5. Correct Answer: 2.

Question 5: Which of the following is not true about the offlineServicing configuration pass of Windows 7 Installation process?

1. out-of-box drivers are added in this pass


2. This configuration pass starts after the system reboots the first time 3. If an answer file was created by DISM, it is read in this pass 4. Updates can be applied in this pass 5. Correct Answer: 2.

Question 6: A spanned volume can utilize the free space on more than one disk. What is the drawback of such disks? 1. The chances of data loss are high

2. They cannot use multiple free spaces on the same disk


3. You cannot install application programs on them 4. There is a performance drop 5. Correct Answer: 1.

Question 7: You want to be able to recover other users' files encrypted by EFS. What do you need? 1. Access to an administrator account 2. Editing a policy in GPE to make another user capable of doing it.

3. Recovery Agent
4. A Microsoft universal decryption certificate and a subscription to the service. 5. Correct Answer: 3.

Question 8: What problem do you suspect if only your computer is not able to resolve the address of a single computer on network by its name? (Read the details for understanding the situation) You try to ping a computer on the network by its name. The DNS in that moment is not working well and fails to resolve the name. You then notice that other computers are able to ping the same target computer by its name and the DNS is working well. In addition, your computer is not having any connectivity issues in any other operation, but the name resolution of that same computer is failing again and again. You computer is running Windows 7 Enterprise. What might be the problem in this case? 1. Computer is infected with virus 2. Someone over your network is trying to hack you 3. The DNS cache is poisoned

4. Your computer is suffering from negative caching


5. The target computer is not connected to the network Correct Answer: 4.

Question 9: What is the minimum processor speed required for running a Windows 7 64 bit Operating System? 1. 800 Mhz

2. 1 GHz
3. 1.2 GHz 4. 1.8 GHz 5. Correct Answer: 2.

Question 10: You are not able to resolve the problem with a driver and want to test all the drivers you suspect. Which tool will you use for the purpose? 1. dxdiag 2. Driver Verifier Monitor

3. verifier.exe
4. Both verifier.exe and Driver Verifier Monitor 5. None of the above Correct Answer: 4.

Question 11: What is the feature called which assigns an IP address to your computer when the DHCP service is not available on the network? 1. Automatic Private IP Addressing (APIPA) 2. Loopback Address Assignment Service (LAAS)

3. Automatic Network Addressing (ANA)


4. Local IP Addressing (LIA) 5. Correct Answer: 1.

Question 12: Your computer shares a folder containing a lot of files on the network using the shared folder feature in Windows 7. How will you get the list of files which are currently being accessed on the network? 1. Open the command prompt and use the command foldershare /list:current 2. Open the Computer management console and navigate to the Shared Folders | Sessions node 3. Open the Computer management console and navigate to the Shared Folders | Shares node

4. Open the Computer management console and navigate to the Shared Folders | Open Files node
5.

Correct Answer: 4.

Question 13: Remote Desktop can be used to connect to any of the machines on the internet using their hostname or IP address. What technology will you use in order to make a Remote Desktop connection to connect to the devices which are inside a protected internal network? 1. Remote Desktop distribution service

2. Remote Service Gateway


3. Terminal Services Gateway 4. Remote Desktop Services for members in a AD Domain 5. Correct Answer: 3.

Question 14: You can use device manager to perform a few device management functions. Which of the following cannot be done by device manager?

1. Determine whether a particular device and its driver is working properly or not
2. Search the internet for appropriate device driver 3. Enable or disable a device attached to the computer 4. Install updated device driver 5. Correct Answer: 2.

Question 15: You are analyzing IPv6 traffic on Windows 7. You want to find out the pattern of the ICMPv6 packets which were exchanged by your computer and the neighboring computers to resolve the IPv6 address to MAC addresses. Which protocol will you want to examine? We assume that you have already allowed the ICMPv6 protocol in the Windows firewall. 1. ARP 2. DHCPv6

3. DNS
4. ND 5. ARPv6 Correct Answer: 4.

Question 16: Which of the following type of images cannot be created by WDS? 1. Install Images 2. Boot Image

3. Capture Image
4. Discover Image 5. Service Image Correct Answer: 5.

Question 17: You are using Windows 7 ultimate. You want to lock an account in case a user

enters wrong password 27 times continuously when trying to log into his system. Can this be done?

1. Yes
2. No 3. Yes, but only if the computer is a part of an AD Domain 4. It can be done only on Windows 7 Enterprise. 5. Correct Answer: 1.

Question 18: You copy a file from your NTFS volume to a USB pen drive formatted with FAT32 and then again copy this file to another system. What permissions will be applicable to the file copied on the destination system on an NTFS volume?

1. The permissions are same as the source file.


2. Permissions are completely destroyed. 3. Permissions are retained but are selected by Windows. 4. Permissions of the destination folder are applied. 5. Correct Answer: 4.

Question 19: What extension is allocated to a Library?

1. .Lib
2. .Library-ms 3. .Library 4. It is a folder. 5. Correct Answer: 2.

Question 20: Which of the following command line tools will allow you to take backup of C: drive? 1. wbadmin

2. ntbackup
3. adminbkp 4. sysbackup 5. Correct Answer: 1.

Question 21: You run the command "netsh wlan connect name=default ssid=MyWinNet" on an elevated command prompt from a laptop running Windows 7 Ultimate. What does the word 'default' in that command signify? 1. It tells to perform authentication based on the default network key supplied.

2. It asks Windows to use the default interface to connect to the network


3. It is the name of the network to which you are connecting

4. It is the name of the computer from which you are connecting. 5. It is the name of the profile to be used when connecting to the network MyWinNet Correct Answer: 5.

Question 22: You want to deploy your images over the network using WDS. However, there are few computers on the network, which are not capable of PXE boot. Which of the following type of image will you use to boot those computers so that WDS can be used to deploy Windows 7 on them? 1. Boot

2. Install
3. Discover 4. Capture 5. Correct Answer: 3.

Question 23: Why is subnetting used for different segments of a large network? 1. It complicates networking 2. It makes it easier to configure the network

3. It prevents packet collisions


4. It makes networks expensive 5. Correct Answer: 3.

Question 24: From the following list, select the first backup format which Windows Backup will support. 1. ISO 2. BAK 3. RAR 4. ZIP

5. VHD
Correct Answer: 5.

Question 25: You have a folder named "sharedata" on your computer. You want to allow the users on the network to read the files on the folder, modify the files, add new files and delete files in the folder. You have created the account necessary for the purpose. What permissions will you assign to that account for the given folder? 1. Read 2. Change

3. Full control
4. We need to edit the advanced permissions for the folder. 5. Correct Answer: 2.

Question 1: You are using Windows SIM to create an unattended installation answer file. Which of the following components will you add to your answer file to add a device driver to your setup? Remember that you are working on an offline image of Windows 7. 1. Microsoft-Windows-PnpCustomizationsWinPE 2. Microsoft-Windows-PnpCustomizationsNonWinPE

3. Microsoft-Windows-PnpSysprep
4. Microsoft-Windows-Setup 5. Correct Answer: 2.

Question 2: You are sure that your computer has a negative caching for one single computer on the network. What command will you run to remove the negative caching?

1. ipconfig /flushdns
2. ipconfig /renew 3. ipconfig /release 4. ipconfig /flushall 5. Correct Answer: 1.

Question 3: You have been asked to create an answer file for unattended installation for Windows 7. Which of the following tools will help you? Each one of the given tools are part of the suite of tools which play role in unattended installations. However, only one can be used to automatically create an answer file for unattended setups. 1. oscdimg 2. Deploy.cab

3. Windows System Image Manager


4. Windows Server Operating System Management Pack for Operations Manager 5. None of the above Correct Answer: 3.

Question 4: You are trying to capture an image of a Workstation with 8 GB RAM and hence you want to skip the capturing of pagefile.sys. What will you add to the [ExclusionList] section of Wimscript.ini file in order to exclude those files during the capturing process? 1. Exclude:pagefile.sys 2. +Rule:pagefile.sys

3. pagefile.sys
4. none of the above 5. Correct Answer: 3.

Question 5: Windows Update can update the Operating System using automatic updates. Which of the following cannot be updated using Windows Update feature?

1. Microsoft Office
2. Device Drivers 3. Internet Explorer 4. Windows installation Images 5. Correct Answer: 4.

Question 6: Which of the following tools can not be used for creating a new VHD file? 1. Compmgmt.msc 2. diskpart.exe 3. Virtual PC

4. Hiren's Boot CD
5. Correct Answer: 4.

Question 7: Which of the following is not possible using EFS? 1. You can encrypt your own file. 2. You can encrypt a file for some other user. 3. You can encrypt a complete folder.

4. You can encrypt a complete folder for some other user.


5. Correct Answer: 4.

Question 8: Which of the following Editions of Windows 7 includes Windows Touch? Touch is available in Windows 7. All the programs of Windows are ready to work on touch from your finger. But not all of the editions come with the support for the technology. Identify the edition(s) which do. 1. All Editions 2. Home Premium and Ultimate only

3. Professional, Enterprise and Ultimate only


4. Home Premium, Professional, Enterprise and Ultimate 5. All Editions, except Starter Edition Correct Answer: 4.

Question 9: You have to select the least costly edition of Windows for a company that could be volume licensed and can join their ActiveDirectory domain. Which of the following editions would you select? Some editions of Windows cannot be volume licensed and some cannot join an ActiveDirectory domain. You have to select the one which does not have any of these restrictions. 1. Windows 7 Ultimate 2. Windows 7 Home Premium 3. Windows 7 Professional

4. Windows 7 Home Basic


5. Correct Answer: 3.

Question 10: What will you use to see the data collected by a DCS? 1. Notepad 2. Internet Explorer 3. Configuration Reader

4. Event Viewer
5. Performance Monitor Correct Answer: 5.

Question 11: Which of the following commands will you type at the command prompt to open the device manager? 1. azman.msc 2. rsop.msc 3. fsmgmt.msc

4. diskmgmt.msc
5. devmgmt.msc Correct Answer: 5.

Question 12: Which of the following is not a requirement for configuring a DirectAccess server? 1. Windows Server 2008 R2 2. 4 network interfaces.

3. Direct connection to corporate intranet


4. Digital certificates to support authentication 5. Correct Answer: 2.

Question 13: What type of entity is NAP Remediation?

1. Network
2. Service 3. Server 4. Resource 5. Correct Answer: 1.

Question 14: How would you configure BitLocker to Go to use the TPC chip on a computer?

1. Using Computer Management Console


2. Using device manager 3. It cannot be done 4. It can be done but not on Windows 7. We need a Windows Server 2008 R2 for the purpose. 5. Correct Answer: 3.

Question 15: What does driverquery.exe do?

1. Displays a list of installed device drivers


2. Displays a list of conflicting device drivers 3. Update the driver using Windows update in the backend 4. Displays number of driver installations currently running on the system and their progress in percentage 5. Correct Answer: 1.

Question 16: Which of the following is not a IPv6 address type? 1. Site-local 2. Anycast

3. Multicast
4. Unicast 5. Correct Answer: 1.

Question 17: You have just created a new wired subnet 10.0.10.128/25 with static configuration and the only device currently on the network is a router which has an address of 10.0.10.129. You connect a new computer to the network running on Windows 7 Ultimate x64 edition. Which command will configure this system to be used in the subnet? We assume that the Ethernet interface is named "Local Area Connection".

1. netsh interface ipv4 set address "local area connection" static 10.0.10.162 255.255.255.0 10.0.10.129
2. netsh interface ipv4 set address "local area connection" static 10.0.10.162 255.255.255.128 10.0.10.129 3. netsh interface ipv4 set address name="local area connection" dhcp 4. netsh interface ipv4 set address name="local area connection" static 10.0.10.16 255.255.255.128 10.0.10.129 5. Correct Answer: 2.

Question 18: Windows 7 will reserve 20% of internet network bandwidth. This rule can be overridden by a system administrator. Which of the following versions of Windows 7 will NOT allow a system administrator to do so? 1. Windows 7 Ultimate

2. Windows 7 Home Premium

3. Windows 7 Professional 4. Windows 7 Enterprise 5. Both "Home Premium" and "Professional" editions Correct Answer: 2.

Question 19: You have just plugged in a device in a USB port available on your computer. You want to know how much power that device requires. In which tab of the device properties window will you find the information?

1. Power
2. Power Management 3. Advanced 4. Details 5. Correct Answer: 1.

Question 20: Which of the following settings is the best way to keep your computer updated with latest software updates for Windows 7 Operating System?

1. Install Updates automatically


2. Download Updates But Let Me Choose Whether to Install them 3. Check For Updates But Let Me Choose Whether to Download and Install them 4. Never Check For Updates 5. Correct Answer: 1.

Question 21: A computer running Windows 7 automatically boots into recovery mode. This computer was encrypted with BitLocker. What is the problem?

1. Internal BitLocker driver is corrupted.


2. Windows is not able to locate the required key for BitLocker decryption 3. BitLocker was implemented on this disk using another installation 4. Windows is corrupted. 5. Correct Answer: 2.

Question 22: Your company has 100 computers running Windows 7 professional edition. It has been decided by the head to use an older application for an important part of work, which needs you to run it in Windows XP mode. What will you do to enable Windows XP mode on those 100 computers? 1. Upgrade to Windows 7 ultimate 2. Upgrade to Windows 7 professional

3. Download and install Windows XP mode software from the Microsoft web site
4. It cannot be done after Windows 7 has already been installed. 5. Correct Answer: 3.

Question 23: On which of the following device's advanced tab of device properties window will you find the "Bandwidth" property? 1. USB mass storage device 2. USB root hub 3. USB Universal host controller

4. Ethernet Network Adapter


5. Correct Answer: 3.

Question 24: Your computer runs on Windows 7 professional. It gets its IP address from a DHCP server and is a member of a domain. Your computer has stopped connecting to the network. Which of the following will be your first step to check for the problem behind the scene? In this case, we assume that the hardware checks for wires and devices have already been completed.

1. Run ipconfig /all


2. Repair the computer using the Recovery Environment 3. Change the setting from DHCP to manual and then try to see if the computer gets connected 4. Run netstat /n to see what connections are active 5. Run network diagnostics Correct Answer: 1.

Question 25: Which of the following tools do not require you to install the Windows AIK? This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it. 1. USMT 2. Windows SIM

3. Sysprep
4. ImageX 5. Correct Answer: 3.

Question 1: You are not able to make a file available offline. What could be the reason? 1. The network location type is set to "Public". 2. The target computer has disabled caching.

3. You do not have the permissions to write in the folder Windows uses to store the offline files
4. Windows 7 does not support this feature. 5. Correct Answer: 2.

Question 2: You want a Windows 7 computer to be able to accept all forwarded events from the network. You have already run the command "winrm qc" on all source computers. What do you need to run on the Collector computer? 1. Winrm qc 2. wecutil qa 3. winrm enableforwardedevents

4. wecutil qc
5. Correct Answer: 4.

Question 3: What is the biggest benefit of a stripped volume? Stripped volume can be created using the disk management utility in Windows 7. You have to select the most important reason why you would implement this type of volume? 1. It gives data transfer boost 2. It provides security to the data by automatically encrypting it

3. It keeps more than one copy of data, hence preventing data loss in case of a single disk failure
4. Such a volume will not need defragmentation 5. Correct Answer: 1.

Question 4: You want Windows 7 to search for drivers in C:\MyDriverStore folder, in addition to its default Driver Store folder. What is the easiest way to accomplish this task? 1. Install all drivers in a Windows 7 install image and then deploy this image on the computer.

2. Use pnputil to add all the drivers in C:\MyDriverStore to the Driver Store
3. Copy the contents of C:\MyDriverStore to %systemroot%\System32 directory 4. Edit the registry key which controls the list of the folders where Windows 7 will search for the drivers 5. Correct Answer: 4.

Question 5: You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application. 1. NTFS permisssions 2. AppLocker

3. Software Restriction Policies


4. Any of the above 5. Correct Answer: 2.

Question 6: Who can uninstall an update? 1. Anyone

2. Only the administrator.


3. Only the administrator of the Domain Server 4. Updates can be uninstalled only if they were installed manually. It must be done by a Backup Operator in this case. 5. Any user who is not a Guest user Correct Answer: 2.

Question 7: What type of entity is a recovery agent?

1. A special user account.


2. A Special group of users. 3. A special policy which can be generated only on request. 4. A special EFS certificate. 5. Correct Answer: 4.

Question 8: How many options does Windows 7 provide you for recovering Windows, if you have not been able to bring it to a healthy state using System Restore? 1. 1 2. 2

3. 3
4. 4 5. 5 Correct Answer: 2.

Question 9: You have been restricted to access the command prompt or run batch files. You have to prepare a USB drive for booting Windows 7 for installation on a netbook. Which of the following tools will you use to accomplish this task? 1. Windows Movie Maker

2. Windows 7 USB DVD tool


3. Windows Disc Buring tool (inbuilt) 4. diskpart.exe 5. Correct Answer: 2.

Question 10: Which of the following actions cannot be taken on a Windows 7 Enterprise edition computer, which is part of an AD Domain? 1. Store TPM recovery information in Active Directory Domain Services

2. Move TPM to USB disk drive


3. Disable the TPM

4. Reset the TPM lockout 5. Correct Answer: 2.

Question 11: Which of the following is untrue about DirectAccess?

1. It is available on Enterprise and Ultimate editions of Windows Vista and Windows 7


2. DirectAccess is bidirectional in nature. 3. DirectAccess connections are automatic in nature. 4. DirectAccess can be integrated with NAP 5. It can be configured by an Administrator only. Correct Answer: 1.

Question 12: You are in process of encrypting a large volume with BitLocker on a server. Suddenly the demand for the files from the server rise and the users start complaining about the speed of data transfer. What command will you pass to pause the encryption process? The drive letter of the disk under the encryption process is F: 1. stop service bitlocker F:

2. manage-bde.exe -pause F:
3. manage-bde.exe -stop 4. manage-bde.exe -cancle 5. Services.exe /stop:bde /vol:F Correct Answer: 2.

Question 13: You are trying to run system restore on your Windows 7 Enterprise edition system while one of your drives has utilized all the space allocated for System Restore function. What will happen in this case? 1. System Restore will fail 2. Windows will ask you to increase the space for System Restore

3. System Restore will still work


4. Windows will ask you to change the Group Policy which controls this setting 5. Correct Answer: 3.

Question 14: What is UAC or User Account Control? 1. It is a security feature which informs you when you take an administrative action. 2. It is a security feature to elevate the permissions temporarily for some administrative work. 3. It is a feature which can temporarily elevate a standard user to administrative level.

4. All of the above.


5. Correct Answer: 4.

Question 15: Which of the following commands will you use to configure Windows to force users to change their passwords at a regular basis?

1. control.exe

2. wscript.exe
3. passcntl.exe 4. Any of the above 5. None of the above Correct Answer: 5.

Question 16: You have to create a ISO image of a customized version of 64-bit Windows PE. The resulting ISO file should be in UDF format. Which of the following tool will you use? 1. oscdimg 2. WinPEUtil 3. diskedit

4. WinPEinit
5. WinPEshl Correct Answer: 1.

Question 17: Which of the following switches will you use with "sysprep" command to capture the disk image of the system, which you have to use as the source for creating a Windows 7 installation disk? The company you work in runs Windows 7 Enterprise editions and many users are having problems with the installation of device drivers, although all computers have the same hardware configuration. Your company's head wants to give away installation disks, which will contain the drivers and the necessary application pre-installed and you, have to prepare the image from the source system. You also have to make sure that the users get to configure their system after the first boot. Select the correct switch among the following switches which will help you achieve the goal.

1. /generalize /oobe
2. /generalize /audit 3. /audit /unattend: 4. /oobe /audit 5. Correct Answer: 1.

Question 18: You want to remove the driver named netdev3-7.inf from the store. Which switch of pnputil helps you do this? A device driver update for Windows 7 has started making the device misbehave. You have two versions of driver for a device, one for Windows Vista and a newer version for Windows Vista. The device manufacturer has confirmed that the driver built for Windows Vista is fully compatible with Windows 7. You have already added the old driver to the driver store. Now you want to delete the newer one. You are using pnputil to remove the problematic driver from the driver store. Choose the switch, which will let you do this. The new driver file is named netdev3-7.inf.

1. pnputil.exe -r netdev3-7.inf
2. pnputil.exe -i netdev3-7.inf 3. pnputil.exe -f -d netdev3-7.inf

4. pnputil.exe -d netdev7-3.inf 5. Correct Answer: 3.

Question 19: You have to customize the Windows 7 installation from the disk you have been given. You know the commands required to do your work. How will you get the command prompt before the actual setup starts? 1. Press Ctrl + Shift + F12

2. Press Shift + F10


3. Press F7 4. Press Windows + C 5. Press Alt + Ctrl + F3 Correct Answer: 2.

Question 20: You have been informed of a critical update which fixes an important issue in Windows 7 OS. Your updates are scheduled to be run on Tuesday at 1:00 PM. Today is Thursday. Which command will you use at the command prompt to get the update?

1. Wuauclt.exe /detectnow
2. Wuauclt.exe /update 3. Wuauclt.exe /update /time:now 4. Winupdate.exe /update 5. Correct Answer: 1.

Question 21: Your organization has a large amount of computers. They have various NIC cards installed on them. You want to service a Windows 7 offline image mounted at c:\instimage and add the drivers for all those NIC cards. You have placed the NIC drivers in the c:\netdrivers directory. Which command will add all the drivers to the image?

1. dism /image:c:\instimage /add-drivers /drivers:c:\netdrivers


2. dism /image:c:\instimage /add-drivers /driver:c:\netdrivers 3. dism /Windir:c:\instimage /add-all-drivers /driver:c:\netdrivers 4. dism /image:c:\instimage /add-all-drivers /driver:c:\netdrivers 5. dism /image:c:\instimage /add-driver /driver:c:\netdrivers Correct Answer: 5.

Question 22: What does the command netsh advfirewall firewall add rule name="ruleS" profile=domain protocol=TCP dir=in localport=80 security=authdynenc action=allow do when executed from an elevated command prompt? 1. Creates an inbound rule that applies only in the Domain profile that blocks traffic on port 80 and requires security 2. Creates an outbound rule that applies only in the Domain profile that blocks traffic on port 80 and requires security for the connection 3. Creates an outbound rule that applies only in the Domain profile that allows traffic on port 80

4. Creates an inbound rule that applies only in the Domain profile that allows traffic on port 80 and requires security for the connection
5.

Correct Answer: 4.

Question 23: What is the main difference between the Remote Desktop and Remote Assistance? 1. Remote Desktop can be used to control the computer. Remote Assistance can be used only to see the computer remotely.

2. Remote Desktop will handover the complete control of the desktop. Remote Assistance can be used to share control of the desktop.
3. Remote Desktop can be used inside the protected network only. Remote Assistance can be used to connect to any Windows desktop anywhere on the internet. 4. Remote Desktop is dependent on a Windows 7 service while Remote Assistance can be run without requiring the service 5. Correct Answer: 2.

Question 24: You want to set your Windows 7 laptop to hibernate when the battery level reaches 15%. What will you do? 1. Change the power button actions.

2. Change the power options


3. Use Computer configuration to put the disks to sleep at 15% charge capacity. 4. Change the advanced setting of the power plan in use to match the requirements. 5. Correct Answer: 4.

Question 25: Where will you find the policies to configure the setting for offline files?

1. Computer Configuration | Administrative Templates | Windows Explorer | Offline Files


2. Computer Configuration | Administrative Templates | Windows Components | Windows Explorer 3. Computer Configuration | Administrative Templates | Network | SNMP 4. Computer Configuration | Administrative Templates | Network | Offline Files 5. There are no policies to be set for offline files Correct Answer: 4.

Question 1: You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal? 1. Secure Desktop 2. Secure Screen 3. Dimmed Display

4. Dimmed Desktop

5. Correct Answer: 1.

Question 2: You want to configure a VPN connection which uses the most secure authentication protocol. Which protocol will you make use of? 1. PEAP-MS-CHAPv2

2. PEAP-TLS
3. MS-CHAPv2 4. CHAP 5. Correct Answer: 1.

Question 3: How will you update a VHD file with latest software updates? Keep in mind that this file is to be kept for emergent uses. 1. Use a tool made for the purpose 2. Install updates in a Windows installation and then image it to WIM, then convert it to VHD using Wim2VHD tool 3. Boot it on the computer with Windows 7 and install the updates

4. Run it under Virtual PC and then update it


5. Correct Answer: 1.

Question 4: A computer network consists of computers running 5 different editions of Windows 7 namely "Home Premium","Home Basic", "Professional", "Enterprise" and "Home Starter". Which of the following OS edition(s) can be used as a network backup location? A few editions of Windows 7 cannot backup to network locations. You need to judge your answer based on the knowledge of which ones cannot backup to the network. 1. Home Premium only 2. Home Basic only

3. Enterprise edition only


4. Both Home Premium and Enterprise editions can be used 5. Correct Answer: 3.

Question 5: Where are the policies for controlling UAC located? 1. Computer configuration | Windows Settings | Security Settings | Local Policy 2. Computer configuration | Windows Settings | Security Settings | Account Policy | Password Policy 3. Computer configuration | Windows Settings | Security Settings | Local Policy | User rights assignments

4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options
5.

Correct Answer: 4.

Question 6: You are an IT administrator in a company. Your boss asks you to convert the Windows 7 installation on one of the company workstations into a virtual machine. He asks you to make sure that this virtual machine runs on their Windows Server 2008 R2 with HyperV. Which of the following tools will help you? It is noteworthy that to answer this question, you must already know how to capture an image of Windows 7 installation. 1. vhd2vmx

2. wim2vhd
3. vmx2hvs 4. vhd2wim 5. Correct Answer: 2.

Question 7: Which of the following is not a feature of Windows 7?

1. It makes hard disk disposal easier.


2. It protects the boot environment from being modified. 3. It can prevent theft of data using a live Linux distribution. 4. It can be used to protect data from other users while allowing you to access it. 5. Correct Answer: 4.

Question 8: What does UDI stand for in the Windows 7 deployment context? 1. User Driven Initialization 2. Unlimited Data Insertion 3. Unexpected Device Installation 4. Userspace Driver Installation

5. User Driven Installation


Correct Answer: 5.

Question 9: You are trying to detect the proxy settings using WPAD for configuring Windows Automatic Updates. WPAD tool has failed to determine the proxy settings. You want to import the proxy settings from Internet Explorer. Which of the following tools can you use for this purpose?

1. import
2. export 3. netsh 4. netstat 5. Correct Answer: 3.

Question 10: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 1. Interactive Logon: require Smart Card for logoff

2. Interactive Logon: Smart Card removal Behavior 3. Interactive Logon: Smart Card usage Behavior

4. Interactive Logon: Smart Card Account Control


5. Correct Answer: 2.

Question 11: What is the final setting you need to do after having set the policies in Computer Configuration | Administrative Templates | Network | TCPIP Settings | IPv6 Transition Technologies? 1. Set up the Windows Firewall to allow applications.

2. Set up Network to ensure that network connectivity is not lost.


3. Set the name resolution policies. 4. No setting has to be done. We are ready to go! 5. Correct Answer: 3.

Question 12: How much space must be free to enable system restore on a volume? 1. 1 GB 2. 512 MB

3. 300 MB
4. 350 MB 5. Correct Answer: 3.

Question 13: Which of the following technologies will not have any effect due to widespread use of DirectAccess? 1. PPTP

2. HTTP
3. L2TP 4. SSTP 5. Correct Answer: 2.

Question 14: What is a plug-and-play device? 1. A device, which can be plugged to a computer from outside 2. A device, which does not need any drivers

3. A device, for which the driver gets installed automatically


4. A device, which can play multimedia files upon plugging 5. Correct Answer: 3.

Question 15: A network is assigned the mask 192.168.0.0/24. What is this notation of representing network masks called? 1. VLSR

2. CIDR
3. VLSS 4. SOHO 5. Correct Answer: 2.

Question 16: You want to check your company's intranet website for compatibility with Windows 7. Which of the following tools will let you do this job? Some web sites may not display well in the new Internet Explorer 8, which comes with Windows 7. So they must be checked for compatibility. In this case we assume that the intranet web site you are trying to test was built for Internet Explorer 6. 1. Application Compatibility Toolkit (ACT)

2. Internet Explorer Administration Kit (IEAK)


3. Program Compatibility Troubleshooter (PCT) 4. Microsoft Deployment Toolkit (MDT) 5. Correct Answer: 1.

Question 17: Which of the following commands will create a recovery agent?

1. Cipher.exe /r:recoveryagent
2. Cipher.exe /recoveryagent /add 3. icacls /newras 4. Cipher.exe /register:recoveryagent 5. Correct Answer: 1.

Question 18: Which address will be used to send a broadcast message to all computers on the network? 1. 10.10.10.10

2. 127.0.0.1
3. 123.234.345.456 4. 200.233.245.255 5. All of the above Correct Answer: 4.

Question 19: Which of the following tools cannot be used to backup the EFS file encryption certificates? 1. Cipher.exe 2. Manage File encryption Certificates tool 3. certmgr.msc

4. Credentials manager

5. Correct Answer: 4.

Question 20: You have to upgrade Windows Vista Ultimate (SP2) to Windows 7 Ultimate. Suppose the unattended answerfile named automate.xml is placed on the network location \\server-main\installdata\automate.xml. Which of the following set of command line options will do the job. It is to be noted that the installation is to be done underfollowing circumstances: 1. Installation must be automated. 2. The given unattended script has to be used. 3. You must use the file over the network to automate the install. Copying the file and then using it is not permitted. 4. You do not have the rights to alter the filenames on the remote server. 1. setup.exe /m:\\server-main\installdata\ /unattend:automate.xml 2. setup.exe /wdsserver:\\server-main\installdata\automate.xml

3. setup.exe /m:\\server-main\installdata\automate.xml
4. setup.exe /unattend:\\server-main\installdata\automate.xml 5. Correct Answer: 4.

Question 21: How much time will a UAC prompt live on your desktop before denying the elevation to the requesting process? 1. 60 seconds

2. 90 seconds
3. 150 seconds 4. 210 seconds 5. 600 seconds Correct Answer: 3.

Question 22: What does TPM mean? 1. Trusted Password Module 2. Third-party Platform Module 3. Trusted Partner Module

4. Trusted Platform Module


5. Correct Answer: 4.

Question 23: A computer on your network started behaving erratic. You renewed its IP configuration to solve the problem. Now the computer is working well, but it is not accessible to other computers on the network by the computer name. Which of the following commands will you try? 1. ipconfig /registerdns 2. ipconfig /renew

3. ipconfig /release

4. ipconfig /all 5. Correct Answer: 1.

Question 24: Which of the following is not a part of Windows AIK? 1. Windows SIM 2. oscdimg

3. USMT
4. BCDEdit 5. Correct Answer: 4.

Question 25: You are in process of encrypting a large volume with BitLocker on a server. Suddenly the demand for the files from the server rise and the users start complaining about the speed of data transfer. What command will you pass to pause the encryption process? The drive letter of the disk under the encryption process is F: 1. stop service bitlocker F:

2. manage-bde.exe -pause F:
3. manage-bde.exe -stop 4. manage-bde.exe -cancle 5. Services.exe /stop:bde /vol:F Correct Answer: 2

Question 1: A network is assigned the mask 192.168.0.0/24. What is this notation of representing network masks called? 1. VLSR

2. CIDR
3. VLSS 4. SOHO 5. Correct Answer: 2.

Question 2: You are a system administrator in a company and have to install a customized copy of Windows 7 to all computers. You are using "sysprep" command to capture the disk image. Which of the following switches is necessary to be used when running sysprep Remember that all the computers on which Windows 7 has to be installed have the same hardware configuration. 1. /oobe 2. /quiet

3. /generalize

4. /unattend: 5. /audit Correct Answer: 3.

Question 3: Which of the following technologies will not have any effect due to widespread use of DirectAccess? 1. PPTP

2. HTTP
3. L2TP 4. SSTP 5. Correct Answer: 2.

Question 4: You have just configured the BranchCache using netsh command. Which of the following actions will you take now?

1. Configure the network connection


2. Configure the firewall 3. Configure the programs which can use BranchCache 4. Configure the accounts which are authorized to use BranchCache 5. None of the above Correct Answer: 5.

Question 5: Which of the following is true about configuration passes? 1. Not all configuration passes run in a single Windows 7 Install procedure. Some can be skipped 2. All configuration passes will always run in any install procedure but the number of time they are run can be customized 3. Configuration passes are run only after the Windows Image is written on disk

4. The maximum number of configuration passes done during any type of installation is 3.
5. Correct Answer: 1.

Question 6: What is the drawback of hash rule? Hash rules are the most effective ones in the list of Software Restriction Policies. You have to select the biggest downside of these rules. 1. Implementing them will give a performance drop

2. It has to be setup independently for each computer


3. It has to be setup independently on a per-file basis 4. They conflict with the NTFS permissions 5. Correct Answer: 3.

Question 7: You have been given a problem where a user tried to install Linux over Windows 7 but the GRUB boot loader failed to install on the MBR and the MBR is now corrupted. Both Linux and Windows 7 are now inaccessible due to MBR corruption. He (user) confirms that the disk partitioning was not altered. Which of the following steps will you take first to revert Windows 7 OS to a bootable state? 1. Start Windows Recovery Console and run the command: bcdedit 2. Start Windows Recovery Console and run the command: bootrec /fixboot 3. Use a Custom Linux installation media to reinstall GRUB bootloader

4. Start Windows Recovery Console and run the command: bootrec /fixmbr
5. System cannot be repaired now, so format the whole system and reinstall again Correct Answer: 4.

Question 8: You booted from a Windows PE disk. Your DVD-ROM drive letter is shown as X: and you want to capture the image on drive D: to C:\images\Windows.wim file. Which of the following commands are right? Notice the drive letter from which the command is being run. 1. x:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify

2. x:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /verify


3. c:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 4. d:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /noverify 5. Correct Answer: 2.

Question 9: Which of the following switches will tell ImageX tool to search for the Wimscript.ini file and read settings from it? 1. /readsettings 2. /processexclusion

3. /readscript
4. /ruleset: 5. none of the above Correct Answer: 5.

Question 10: Windows 7 computer suffers a drop in performance when started. You see that the disk usage goes high a few seconds after you start the system. Which among the following is the fastest way to find the process which is pushing the disk usage to its peak?

1. Open Performace Monitor and add the counters for processors and processes.
2. Use the taskkill command on the command prompt for processes one by one to see if the disk utilization goes down 3. Open Resource Monitor and sort the running applications by disk access 4. Run a virus scan using an ativirus software to check for a viral infection 5. Count page faults in the task manager for the applications running on the system

Correct Answer: 3.

Question 11: You are trying to detect the proxy settings using WPAD for configuring Windows Automatic Updates. WPAD tool has failed to determine the proxy settings. You want to import the proxy settings from Internet Explorer. Which of the following tools can you use for this purpose? 1. import 2. export

3. netsh
4. netstat 5. Correct Answer: 3.

Question 12: What is the IP range of APIPA? 1. 196.254.0.0/12

2. 169.254.0.0/24
3. 196.254.0.0/32 4. 196.254.0.0/16 5. 169.254.0.0/16 Correct Answer: 5.

Question 13: Which of the following will not be backed up in manual backup run through Windows backup?

1. Encrypted Files
2. Compressed files 3. Appdata folder of the User 4. Folders in the %systemdrive% 5. Correct Answer: 1.

Question 14: DISM is a command-line tool used to service Windows 7 images before deployment. The servicing can be offline. Which of the following can not be done by using DISM? 1. Install or remove Windows 7 Features 2. Configure Windows 7 settings

3. Change the product key of installation


4. Install or remove additional drivers 5. Correct Answer: 3.

Question 15: What is a subnet?

1. A network separated from other networks


2. A network without a router

3. A way to represent a part of a bigger network 4. A network with limited functionality 5. Correct Answer: 3.

Question 16: Which of the following tools will you use to add an application to your offline Windows 7 install image mounted on a local directory? 1. USMT

2. ImageX
3. DISM 4. OSCDIMG 5. None of the above Correct Answer: 5.

Question 17: Which of the following is false for a RAID-5 volume?

1. You can install Windows 7 on it


2. Data is disaster protected 3. Using three 500 GB disks will give you storage space of 1000 GB only 4. Raid 5 volume will store parity information on one disk 5. A RAID-5 volume will give performance improvements over basic disks Correct Answer: 1.

Question 18: What should be the minimum capacity of a USB drive, if it has to be used for backup using Windows 7 backup and restore functionality?

1. 1 GB
2. 512 MB 3. 2 GB 4. 8 GB 5. Correct Answer: 1.

Question 19: A computer network has 72 computers running on Windows 7 professional. It has been observed that many employees working on the computer play the Solitaire game during work hours. You have been asked to block this game. Being an IT administrator, what will you do? 1. Create a hash rule in AppLocker to block the game 2. Create a path rule in Software Restriction Policies to block the game

3. Create a path rule in AppLocker to block the game


4. It cannot be blocked 5. NTFS can be used to block the game's executable file Correct Answer: 2.

Question 20: Which of the following tools can be used to configure the power options from the command prompt?

1. power.exe 2. cipher.exe

3. powercfg.exe
4. bcdedit.exe 5. Correct Answer: 3.

Question 21: What is the maximum number of back up schedules that can be created in Windows 7 at one time?

1. 1
2. 2 3. 3 4. 4 5. 10 Correct Answer: 1.

Question 22: There is a network of computer with 11 computers. One of these computers is connected to a printer which is shared among all the other computers on the network. You have to make sure that the person sitting on the computer physically connected to the printer is able to manage the print queues but is not able to change the printer permissions. What permission should he be assigned? 1. Print 2. Manage Documents

3. Manage This Printer


4. The user to the list of administrators 5. Correct Answer: 2.

Question 23: Which of the following tools will you use to change the rules for new device driver installations? 1. Group Policy Editor

2. Device Manager
3. Computer Management Console 4. pnputil.exe 5. Correct Answer: 1.

Question 24: You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application. 1. NTFS permisssions

2. AppLocker

3. Software Restriction Policies 4. Any of the above 5. Correct Answer: 2.

Question 25: Can you restore multiple previous versions of the same file? 1. Yes

2. No
3. Yes, but only for those files which were not in any of the subfolders of the user profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1

Question 1: The Setup Analysis Tool analyses the setup program without actually installing the application. Select the correct name of the process used to do this. 1. Sandboxing 2. Virtualization 3. Profiling

4. Visualization
5. Correct Answer: 3.

Question 2: Read the following description and choose the correct solution to the problem. You work for a company which has two different campuses in the same city and uses Windows 7 Ultimate on all workstations and Windows Server 2008 R2 for all servers. The two locations are both connected to a dedicated connection of the same ISP. You have just configured computers on both the locations. The computer on location A has address 121.122.67.222 and the computer on location B has an address of 121.122.67.220. You have configured the subnets on both the computers as 255.255.255.0. But a ping on 121.122.67.220 from computer on location A and a ping on 121.122.67.222 from computer on location B fail. What can be the reason for the faliure? 1. Windows firewall is blocking the pings

2. Network subnetting is wrong


3. The ISP network has problems 4. System has no routing table 5. Correct Answer: 1.

Question 3: What will you use to schedule a backup using wbadmin tool?

1. Windows task scheduler 2. Batch file scheduler

3. Windows Backup wizard


4. No methods are available for this. 5. powershell must be used Correct Answer: 1.

Question 4: You installed a new driver for your Audio device. However, it is giving you problems. How will you roll back to the old driver? 1. Use the add/remove programs feature and remove the installed driver package 2. Use the GPE to disable driver updates 3. Use Windows Update

4. Use the Device Manager, select the Audio Device and click on the "Roll Back Driver" button on the "Driver" tab of the device properties window
5. Correct Answer: 4.

Question 5: Which of the following system is used to automatically create an answer file for unattended formatting, installation and setting customization for new Windows 7 installation? 1. Windows System Image Manager

2. Sysprep
3. Windows Preinstallation Environment Configuration System 4. Tools in Deploy.cab 5. ImageX Correct Answer: 1.

Question 6: One of your clients complains that he is not able to download a file while closing his laptop's lid during the night. Windows hibernates as and when the lid is closed. What will you suggest him?

1. Change the power options from the control panel.


2. Use Windows update to resolve the issue. 3. Use GPE to change the policy. 4. Install Microsoft power manager tool and change the setting. 5. Correct Answer: 1.

Question 7: What is the time after which VPN Reconnect will not work and will ask for the corporate password again?

1. 1 Hour
2. 2 Hours 3. 4 Hours 4. 8 Hours 5. 24 Hours

Correct Answer: 4.

Question 8: Which of the following actions cannot be taken on a Windows 7 Enterprise edition computer, which is part of an AD Domain? 1. Store TPM recovery information in Active Directory Domain Services

2. Move TPM to USB disk drive


3. Disable the TPM 4. Reset the TPM lockout 5. Correct Answer: 2.

Question 9: Which of the following is the most secure protocol for a VPN connection? 1. PPTP 2. SSTP

3. IKEv2
4. L2TP/Ipsec 5. Correct Answer: 3.

Question 10: What does MDT stand for?

1. Microsoft Deployment Toolkit


2. Microsoft Development Toolkit 3. Microsoft Demonstration Tools 4. Microsoft Deployment Tools 5. Microsoft Deployment Toolset Correct Answer: 1.

Question 11: Which of the following cannot be used as a Update source to Update Windows Automatically?

1. Windows Server Update Service


2. System Center Essentials 3. Microsoft Update Servers (on the internet) 4. System Center Configuration Manager (SCCM) 5. Microsoft Deployment Tool Correct Answer: 5.

Question 12: Which of the following tools will you use to change the rules for new device driver installations? 1. Group Policy Editor 2. Device Manager 3. Computer Management Console

4. pnputil.exe
5.

Correct Answer: 1.

Question 13: What type of backup is done when Windows Backup runs for the second time for a scheduled backup? 1. Incremental

2. Differential
3. Full 4. Copy 5. Correct Answer: 1.

Question 14: After how many days will Windows 7 create a restore point if there has been no activity on the system which would create a restore point?

1. 1 week
2. 2 weeks 3. 15 days 4. 30 days 5. 1st of the coming month Correct Answer: 1.

Question 15: How will you manage the add-ons, which have been already installed in Internet Explorer?

1. We can manage it from the Tools -> Manage add-ons menu


2. We can download a gadget for that 3. By visiting www.ieaddons.com and clicking on manage 4. By using control panel 5. By changing settings in "Internet Options" Correct Answer: 1.

Question 16: Which of the following tools do not require you to install the Windows AIK? This tool is available on a Windows 7 installation. You do not require to install Windows AIK to run it. 1. USMT

2. Windows SIM
3. Sysprep 4. ImageX 5. Correct Answer: 3.

Question 17: You are trying to run a program sample.exe which is located in D:\Progs\. When you double click the program to launch it, you the get the error saying "the parameter is incorrect". What is the error? 1. The program is corrupt

2. The permissions have not been set right

3. The program is encrypted but Windows 7 does not have the key to decrypt it. 4. The program is encrypted but Windows 7 does not have the algorithm or key to decrypt it. 5. Correct Answer: 2.

Question 18: You have just configured the BranchCache using netsh command. Which of the following actions will you take now? 1. Configure the network connection 2. Configure the firewall

3. Configure the programs which can use BranchCache


4. Configure the accounts which are authorized to use BranchCache 5. None of the above Correct Answer: 5.

Question 19: Which of the following command line tools will allow you to take backup of C: drive? 1. wbadmin

2. ntbackup
3. adminbkp 4. sysbackup 5. Correct Answer: 1.

Question 20: You want to be able to recover other users' files encrypted by EFS. What do you need?

1. Access to an administrator account


2. Editing a policy in GPE to make another user capable of doing it. 3. Recovery Agent 4. A Microsoft universal decryption certificate and a subscription to the service. 5. Correct Answer: 3.

Question 21: You have been asked to install Windows 7 Professional x64 edition on 20 computers connected to a network, all of which have the same hardware as below: 1.5 GHz Dual Core Processor 1 GB RAM 18 GB HDD 10/100 Ethernet Port DirectX 10 Video Card with 512 MB video memory Which of the following will you suggest your boss for an upgrade?

1. Upgrade RAM and Hard Disk


2. Upgrade Video Card and RAM 3. Upgrade RAM and Network Adapter 4. Upgrade Hard disk and Video card 5. Correct Answer: 1.

Question 22: Read the given description and select the right answer. You have a folder named "share" which is shared across the network. You have set the Modify permission in the NTFS permissions and have set the Read permission in the folder share options. A member accesses the folder. Which permissions will apply on him? 1. Read 2. Modify

3. Full control
4. Complete Restriction will be applied 5. Correct Answer: 1.

Question 23: Considering all computers on a network running on Windows Vista are upgraded to Service Pack 2, which of the following upgrades are not possible? 1. Windows Vista Business x86 to Windows 7 Ultimate x86

2. Windows Vista Business x64 to Windows 7 Ultimate x64


3. Windows Vista Business x86 to Windows 7 Ultimate x64 4. Windows Vista Business x86 to Windows 7 Enterprise x86 5. Correct Answer: 3.

Question 24: Which one of the following solutions will you choose if you find that you are not able to create a custom compatibility rule with Application Compatibility Toolkit in Windows 7 for your applications running on Windows XP Professional? Your organization runs some business critical applications under Windows XP Professional. The organization head has made a decision to migrate all computers to Windows 7. However, not all applications are working well. Some of them are refusing to install. What would you do under this condition? 1. Use another application 2. Change the compatibilty mode of the application installer to one of the supported editions of Windows XP 3. Get a newer version of the application which is compatible with Windows 7

4. Use Windows XP mode


5. Correct Answer: 4.

Question 25: What extension is allocated to a Library? 1. .Lib

2. .Library-ms
3. .Library 4. It is a folder. 5. Correct Answer: 2.

Question 1: You want Windows 7 to search for drivers in C:\MyDriverStore folder, in addition to its default Driver Store folder. What is the easiest way to accomplish this task? 1. Install all drivers in a Windows 7 install image and then deploy this image on the computer.

2. Use pnputil to add all the drivers in C:\MyDriverStore to the Driver Store
3. Copy the contents of C:\MyDriverStore to %systemroot%\System32 directory 4. Edit the registry key which controls the list of the folders where Windows 7 will search for the drivers 5. Correct Answer: 4.

Question 2: Which of the following commands can be used to prepare a USB pen drive so that Windows 7 can be installed using the USB pen drive? 1. Compmgmt.msc

2. diskpart.exe
3. BCDedit.exe 4. LoadState.exe 5. Correct Answer: 2.

Question 3: Which of the following is true about "sysprep" tool? 1. It can be used to install a new Windows 7 Operating System on the computer

2. It can be used to configure the Windows 7 Operating System installed on your system
3. It can be used to capture an image of an installed Windows 7 copy for later deployment 4. Sysprep does the same work as ImageX 5. Correct Answer: 3.

Question 4: You have a file stored on your computer but you are not able to restore from its shadow copy. Why can this be? 1. It is an offline file

2. It was excluded by Windows


3. Windows has been corrupted 4. The file is not on C: drive. 5. Correct Answer: 1.

Question 5: What file controls the behavior of Windows 7 on its first boot (Windows Welcome)? 1. oobe.ini

2. oobe.xml
3. welcome.xml 4. setup-0.xml 5. Correct Answer: 2.

Question 6: Your company has 100 computers running Windows 7 professional edition. It has been decided by the head to use an older application for an important part of work, which needs you to run it in Windows XP mode. What will you do to enable Windows XP mode on those 100 computers? 1. Upgrade to Windows 7 ultimate 2. Upgrade to Windows 7 professional 3. Download and install Windows XP mode software from the Microsoft web site

4. It cannot be done after Windows 7 has already been installed.


5. Correct Answer: 3.

Question 7: Windows 7 will log all the attempts to Log on to the system, whether or not they are successful. Which of the following sentences in the 'general details' section of the security event log of the windows event viewer tell that someone tried to logon to an account but failed? 1. A logon was attempted using explicit credentials.

2. Special privileges assigned to new logon.


3. The event logging service has shut down. 4. An attempt was made to reset an account's password. 5. Correct Answer: 1.

Question 8: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 1. Uninstall the program 2. Disconnect from the internet while using that program 3. Check for another program which would do exactly what this program does.

4. Use Windows firewall to block this software from connecting to internet


5. Correct Answer: 4.

Question 9: You can add the Microsoft-Windows-PnpCustomizationsNonWinPE component to your answer file using the Windows SIM (System Image Manager). In which configuration pass will it be processed? This component can be used to add extra drivers to your Windows 7 Installation.

1. oobeSystem configuration Pass

2. generalize configuration Pass


3. offlineServicing configuration pass 4. specialize configuration Pass 5. auditSystem configuration Pass Correct Answer: 3.

Question 10: In which folder does Windows 7 search for the drivers when a new PNP device is plugged in? We assume here that Windows has been installed on C: drive. 1. C:\Windows\System32 2. C:\Windows 3. C:\Windows\system

4. C:\Windows\System32\DRVSTORE
5. C:\Windows\inf Correct Answer: 5.

Question 11: You are trying to connect to a Windows 7 machine using remote desktop feature. There already is a user on the remote machine, using the machine physically. What will happen when you try to connect to the remote machine under the given circumstances? Note that the user using the remote computer physically is not an administrator. 1. You will be logged in silently without the user on the remote computer knowing that someone else is also using the machine. 2. Windows 7 will lock the machine for the physical user on the remote computer and then accept your connection.

3. Windows 7 will notify the user on the remote machine but will not give him the control of allowing or disallowing you to connect to the machine.
4. Windows 7 will ask whether or not your remote connection be accepted or not. Only if the user permits, will you be allowed to connect remotely. 5. Correct Answer: 4.

Question 12: You are analyzing IPv6 traffic on Windows 7. You want to find out the pattern of the ICMPv6 packets which were exchanged by your computer and the neighboring computers to resolve the IPv6 address to MAC addresses. Which protocol will you want to examine? We assume that you have already allowed the ICMPv6 protocol in the Windows firewall. 1. ARP 2. DHCPv6 3. DNS

4. ND
5. ARPv6 Correct Answer: 4.

Question 13: Your company has recently migrated from Windows XP to Windows 7. You notice that some of the sites, which displayed well in Internet Explorer in Windows XP are not displaying well in the Internet Explorer in Windows 7. You enable the compatibility view; but the problem remains. What may be the problem?

1. Compatibility mode is not working well..


2. Internet Explorer has stopped working well. 3. The computer is infected with viruses. 4. The web site is not ready for Internet Explorer 7 either. 5. Correct Answer: 4.

Question 14: Your computer is running on Windows 7 Professional edition, 64-bit edition. The computer is also a part of AD Domain on the network. You are trying to configure DirectAccess but you find that the Policies are missing from the GPE. What would you do now? 1. Install the 32 bit edition of Windows 7 Professional. 2. Create a new administrative account to configure DirectAccess. 3. Upgrade to Windows 7 Ultimate.

4. Create the policies which are required for DirectAccess to work.


5. Correct Answer: 3.

Question 15: A DCS is run for 60 seconds by Windows 7. Which tool will you use to change this duration?

1. Registry
2. Local GPE 3. Performance Monitor 4. Device Manager 5. Correct Answer: 3.

Question 16: Some updates have failed to install in the last update session. Which tool will you use to see the list? 1. update.exe 2. Control.exe

3. Winupdate.exe
4. show /updates:Windows 5. Correct Answer: 2.

Question 17: What is the main difference between the Remote Desktop and Remote Assistance?

1. Remote Desktop can be used to control the computer. Remote Assistance can be used only to see the computer remotely.

2. Remote Desktop will handover the complete control of the desktop. Remote Assistance can be used to share control of the desktop.
3. Remote Desktop can be used inside the protected network only. Remote Assistance can be used to connect to any Windows desktop anywhere on the internet. 4. Remote Desktop is dependent on a Windows 7 service while Remote Assistance can be run without requiring the service 5. Correct Answer: 2.

Question 18: Which of the following commands will you type at the command prompt to open the device manager? 1. azman.msc 2. rsop.msc 3. fsmgmt.msc

4. diskmgmt.msc
5. devmgmt.msc Correct Answer: 5.

Question 19: What type of entity is NAP Remediation? 1. Network

2. Service
3. Server 4. Resource 5. Correct Answer: 1.

Question 20: You have been asked to create an answer file for unattended installation for Windows 7. Which of the following tools will help you? Each one of the given tools are part of the suite of tools which play role in unattended installations. However, only one can be used to automatically create an answer file for unattended setups. 1. oscdimg 2. Deploy.cab 3. Windows System Image Manager

4. Windows Server Operating System Management Pack for Operations Manager


5. None of the above Correct Answer: 3.

Question 21: Your computer shares a folder containing a lot of files on the network using the

shared folder feature in Windows 7. How will you get the list of files which are currently being accessed on the network? 1. Open the command prompt and use the command foldershare /list:current

2. Open the Computer management console and navigate to the Shared Folders | Sessions node
3. Open the Computer management console and navigate to the Shared Folders | Shares node 4. Open the Computer management console and navigate to the Shared Folders | Open Files node 5. Correct Answer: 4.

Question 22: Where are the policies relating to the usage of Smart Card located in Windows 7? Choose the appropriate node in the GPE. 1. Computer configuration | Windows Settings | Security Settings | Local Policy 2. Computer configuration | Windows Settings | Security Settings | Account Policy | Password Policy 3. Computer configuration | Windows Settings | Security Settings | Local Policy | User rights assignments

4. Computer configuration | Windows Settings | Security Settings | Local Policy | Security options
5. Correct Answer: 4.

Question 23: Which of the following is a Teredo address? 1. 2001::0a0a:1efe:e876:eff:f5ff:ebee 2. fec0:0:0:0:fffe::1 3. 2002:c058:6301::

4. fe80::5efe:0a00:028f
5. Correct Answer: 1.

Question 24: Which registry key will you edit to add a new folder to the list of folders where Windows 7 searches for drivers? 1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DevicePath 2. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DevicePa th 3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DevicePa th

4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Device Installer\DevicePath

5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Installer\FolderListString Correct Answer: 3.

Question 25: You want to capture a Windows 7 image of a reference computer in the WIM format and then deploy it. You need to specify the source directory of the WIM file resides and then specify whether Setup or Sysprep files are required (or not). You then want to move the file to the distribution share for deployment of the captured Image. Which tool will let you do this? 1. WDS 2. MDT 3. SCCM

4. SIM
5. Correct Answer: 2.

Question 1: One of the services suddenly stopped working on your computer. You want the details and open the Event Viewer. In what category will you find this event?

1. Application
2. Security 3. System 4. Forwarded Events 5. Correct Answer: 3.

Question 2: You copy a file from your NTFS volume to a USB pen drive formatted with FAT32 and then again copy this file to another system. What permissions will be applicable to the file copied on the destination system on an NTFS volume? 1. The permissions are same as the source file. 2. Permissions are completely destroyed. 3. Permissions are retained but are selected by Windows.

4. Permissions of the destination folder are applied.


5. Correct Answer: 4.

Question 3: You have a group named "Testing" on the computer with different members. You have set the folder "Alpha" with Modify (Allow) permissions for the group. Now, you create a file named sample.txt. Your own permissions are at Full Control (allow). What permissions will it have relating to the Testing group?

1. Modify (allow)
2. Full control (allow) 3. Modify (deny) 4. Full control (allow) but Read and Execute (deny) 5.

Correct Answer: 1.

Question 4: Which of the following is a Teredo address?

1. 2001::0a0a:1efe:e876:eff:f5ff:ebee
2. fec0:0:0:0:fffe::1 3. 2002:c058:6301:: 4. fe80::5efe:0a00:028f 5. Correct Answer: 1.

Question 5: What is wrong with the IPv6 address: 1cd:0053::03ad:::8d62? Which rule does it violate in the IPv6 addressing convention? 1. You cannot have the shortcut notations :: and ::: in same representation 2. There is no :: shorthand notation 3. There is no ::: shorthand notation

4. The third octet of IPv6 cannot be left empty


5. The ::: notation cannot be used in a representation if :: notation has already been used. Correct Answer: 3.

Question 6: You are IT administrator for a computer network where all the client computers run on Windows 7 Enterprise. You have configured a Windows Server acting as WSUS. However, the client computers are not able to use this server for update. Other functions are working well. What can be the problem? 1. Network connectivity problems are present. 2. Windows 7 cannot use WSUS in the Enterprise edition.

3. WSUS software on the server is not compatibile with Windows 7.


4. Internet connectivity is not present for the Client comptuers. 5. Correct Answer: 3.

Question 7: Which of the following is the most secure mode for BitLocker? 1. TPM-only mode 2. TPM with startup key 3. TPM with PIN

4. TPM with PIN and startup key


5. BitLocker without a TPM Correct Answer: 4.

Question 8: Which of the following statements is correct? 1. A single install image can contain more than one .WIM files. 2. A single .WIM file can contain more than one install image.

3. DISM will always mount an image on the first drive letter available after C:\

4. You can split an existing WIM file into multiple read-only WIM parts using DISM 5. Correct Answer: 2.

Question 9: What is the size of address space of IPv6? In the following choices, the caret symbol (^) can be read as "raised to the power". Hence, 2^10 can be read as "Two raised to the power ten" and the resulting numerical value of this expression will be 1024. 1. 2 ^ 128 2. 2^86 3. 2^256 4. 2^32

5. 2^64
Correct Answer: 1.

Question 10: Your company computers have an application which has to be run at the end of the day, every day. The application is huge and depends on a service which would eat a lot of memory when not being used. What should be the start up type of this service?

1. Automatic
2. Automatic (Delayed) 3. Manual 4. Disabled 5. Correct Answer: 3.

Question 11: How will you update a VHD file with latest software updates? Keep in mind that this file is to be kept for emergent uses. 1. Use a tool made for the purpose 2. Install updates in a Windows installation and then image it to WIM, then convert it to VHD using Wim2VHD tool

3. Boot it on the computer with Windows 7 and install the updates


4. Run it under Virtual PC and then update it 5. Correct Answer: 1.

Question 12: You are migrating from Windows XP to to Windows 7 Ultimate. Which of the following tools is available as a free download to help you transfer your files and settings from Windows XP to Windows 7?

1. Windows Easy Migration Wizard


2. Windows Easy Transfer 3. Windows 7 Upgrade Advisor 4. LoadState.exe 5.

Correct Answer: 2.

Question 13: For what type of devices would you configure the Hard Disk Write Caching?

1. Internal hard disks


2. Network Adapters 3. Slower USB Disk drives 4. Printers 5. Correct Answer: 3.

Question 14: What problem do you suspect if only your computer is not able to resolve the address of a single computer on network by its name? (Read the details for understanding the situation) You try to ping a computer on the network by its name. The DNS in that moment is not working well and fails to resolve the name. You then notice that other computers are able to ping the same target computer by its name and the DNS is working well. In addition, your computer is not having any connectivity issues in any other operation, but the name resolution of that same computer is failing again and again. You computer is running Windows 7 Enterprise. What might be the problem in this case? 1. Computer is infected with virus 2. Someone over your network is trying to hack you

3. The DNS cache is poisoned


4. Your computer is suffering from negative caching 5. The target computer is not connected to the network Correct Answer: 4.

Question 15: You want to change the network settings on your Windows 7 machine. Which of the following will you open? 1. Windows PowerShell

2. Windows Command Prompt


3. Elevated Command Prompt 4. Windows PowerShell ISE 5. Correct Answer: 3.

Question 16: Can you restore multiple previous versions of the same file?

1. Yes
2. No 3. Yes, but only for those files which were not in any of the subfolders of the user profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1.

Question 17: Which of the following tools will you use to keep a number of VHDs up-to-date with latest security patches and software updates?

1. Windows Server Update Services


2. System Center Configuration Manager 3. Offline Virtual Machine Servicing Tool 4. Microsoft Deployment Toolkit 5. Correct Answer: 3.

Question 18: Who can uninstall an update? 1. Anyone

2. Only the administrator.


3. Only the administrator of the Domain Server 4. Updates can be uninstalled only if they were installed manually. It must be done by a Backup Operator in this case. 5. Any user who is not a Guest user Correct Answer: 2.

Question 19: What does TPM mean? 1. Trusted Password Module 2. Third-party Platform Module 3. Trusted Partner Module

4. Trusted Platform Module


5. Correct Answer: 4.

Question 20: Read the following description and select the correct answer. You work in an environment where the users are not assigned any specific desk. They can come and take any seat they want in the morning and use computer on that set for the day. All the computers are running on Windows 7 and there is a server running Windows Server 2008 R2 acting as the AD Domain Server which holds the accounts of all these users at one place. What type of profile is more important to be backed up in this case?

1. Local
2. LocalLow 3. Roaming 4. Domain 5. Correct Answer: 3.

Question 21: Which of the following permissions, when set to active will also set the "Read" permission to active? Select the first correct answer from the list. 1. List folder contents 2. Write

3. Read and Execute

4. Modify 5. Correct Answer: 3.

Question 22: You want to restore a previous version of driver but Windows does not show any previous versions. However, you created a system restore point just one hour ago and have not changed any setting since Windows was installed yesterday. What could be the problem? 1. System Protection is not enabled for C: drive. 2. System is instable

3. Windows does not create shadow copies for files in the %systemroot%
4. Windows has detected a hardware problem with the device whose driver you are trying to restore. 5. Correct Answer: 3.

Question 23: You forgot the password of the drive you encrypted with BitLocker. How would you unlock the drive?

1. Use the recovery key.


2. Use the Startup key used to start the OS. 3. Use the PIN used to start the OS. 4. Use the password of the account in use, instead. 5. Discard the data; it cannot be done now. Correct Answer: 1.

Question 24: When Windows 7 boots, the computer can start in one of the two modes. Which are they? 1. Audit System and Audit User 2. Audit System and Windows Welcome 3. Windows Welcome and Generalization

4. Windows Welcome and Audit


5. Correct Answer: 4.

Question 25: Which of the following command line tools will allow you to take backup of C: drive?

1. wbadmin
2. ntbackup 3. adminbkp 4. sysbackup 5. Correct Answer: 1

Question 1: Which of the following is not a function of Windows 7 Upgrade Advisor?

1. Check if the installed hardware meets the requiremetns for upgrade


2. Create a file which will help Windows 7 PE to speed up the upgrade process 3. Check if the installed programs will have any issues after upgradation 4. Suggest you which version of Windows 7 you can upgrade to 5. Correct Answer: 2.

Question 2: You have two folders named source and destination on C: drive of your computer. The permissions of Source folder (and all the contents)are different from that of Destination folder (and its contents). You copy a file from Source folder to Destination folder. Which folder's permissions will be applicable to the copy of the file? 1. Source

2. Destination
3. The permissions are first compared and most restrictive permissions are applied. 4. The permissions are first compared and least restrictive permissions are applied. 5. Correct Answer: 2.

Question 3: You have implemented a disallow rule using the Software Restriction Policies using the path rule to deny the execution of a software. What is drawback of this approach? 1. The application will not be shown in the Control panel's list of programs

2. A change in path will make the rule ineffective


3. The rule will not persist after system reboot 4. An update will make rule ineffective 5. Correct Answer: 2.

Question 4: Which command will you use to update the configuration of a volume to support a newly installed DRA? 1. Cipher.exe 2. manage-bde.exe 3. command.com

4. fdisk.exe
5. managebde.exe Correct Answer: 2.

Question 5: You have been asked to configure a subnet 192.168.11.0/24. What is the subnet mask you must set to meet the configuration requirements? 1. 255.0.0.0. 2. 255.255.0.0. 3. 255.255.254.0

4. 255.255.255.0
5. 255.255.255.254

Correct Answer: 4.

Question 6: Which of the following commands of Windows 7 Ultimate does the same job as Bootcfg.exe in Windows XP Professional? 1. BootSect

2. BCDEdit
3. BCDBoot 4. Diskpart 5. WPEUtil Correct Answer: 2.

Question 7: Which of the following Basic NTFS permission will allow a user to change the permissions of the folder? 1. Modify 2. Write

3. Full control
4. Read and execute 5. Correct Answer: 3.

Question 8: Remote Desktop can be used to connect to any of the machines on the internet using their hostname or IP address. What technology will you use in order to make a Remote Desktop connection to connect to the devices which are inside a protected internal network? 1. Remote Desktop distribution service

2. Remote Service Gateway


3. Terminal Services Gateway 4. Remote Desktop Services for members in a AD Domain 5. Correct Answer: 3.

Question 9: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 1. Interactive Logon: require Smart Card for logoff

2. Interactive Logon: Smart Card removal Behavior


3. Interactive Logon: Smart Card usage Behavior 4. Interactive Logon: Smart Card Account Control 5. Correct Answer: 2.

Question 10: You are working in the IT administrator team of a company, which uses Windows 7 on all of the computers. One of your colleagues asks you to help him install lp.cab files to image. What type of object is he trying to add to the image?

1. Language Pack

2. Driver 3. Feature pack in Windows PE image 4. Application patch 5. Application Correct Answer: 1.

Question 11: Which of the following is not a feature of Windows 7? 1. It makes hard disk disposal easier. 2. It protects the boot environment from being modified. 3. It can prevent theft of data using a live Linux distribution.

4. It can be used to protect data from other users while allowing you to access it.
5. Correct Answer: 4.

Question 12: You are planning to capture an image of a Windows 7 installation and then deploy it on the same computer. Which of the following options are not necessary in this scenario? 1. /generalize

2. /oobe
3. /restart 4. /quit 5. /unattend Correct Answer: 1.

Question 13: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 1. Uninstall the program 2. Disconnect from the internet while using that program 3. Check for another program which would do exactly what this program does.

4. Use Windows firewall to block this software from connecting to internet


5. Correct Answer: 4.

Question 14: When Windows 7 boots, the computer can start in one of the two modes. Which are they? 1. Audit System and Audit User 2. Audit System and Windows Welcome 3. Windows Welcome and Generalization

4. Windows Welcome and Audit


5.

Correct Answer: 4.

Question 15: You booted from a Windows PE disk. Your DVD-ROM drive letter is shown as X: and you want to capture the image on drive D: to C:\images\Windows.wim file. Which of the following commands are right? Notice the drive letter from which the command is being run. 1. x:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify

2. x:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /verify


3. c:\imagex.exe /capture c: d:\images\ Windows.wim "Installation image" /compress fast /verify 4. d:\imagex.exe /capture d: c:\images\ Windows.wim "Installation image" /compress fast /noverify 5. Correct Answer: 2.

Question 16: You have just configured the BranchCache using the GPE. Which of the following actions will you take now? 1. Configure the network conection

2. Configure the firewall


3. Configure the accounts which are authorized to use BranchCache 4. Configure the programs which can use BranchCache 5. Correct Answer: 2.

Question 17: You are running Windows 7 Enterprise. Which of the following is the most suitable backup destination for a failover backup? 1. DVD ROM 2. USB Flash Drive 3. Network

4. VHD file
5. Correct Answer: 4.

Question 18: Which utility can create a DCS at the command prompt? 1. Logcreate 2. createDCS

3. Logman
4. Createset 5. Correct Answer: 3.

Question 19: You are an IT administrator. You want users on your network to be disallowed from running a particular application. You do not want to apply any additional rules for that

application. Which of the following technologies will you use for the purpose? Remember that you do not want to use conflicting rules for the application. 1. NTFS permisssions

2. AppLocker
3. Software Restriction Policies 4. Any of the above 5. Correct Answer: 2.

Question 20: A computer on your network started behaving erratic. You renewed its IP configuration to solve the problem. Now the computer is working well, but it is not accessible to other computers on the network by the computer name. Which of the following commands will you try?

1. ipconfig /registerdns
2. ipconfig /renew 3. ipconfig /release 4. ipconfig /all 5. Correct Answer: 1.

Question 21: What does UDI stand for in the Windows 7 deployment context? 1. User Driven Initialization 2. Unlimited Data Insertion 3. Unexpected Device Installation 4. Userspace Driver Installation

5. User Driven Installation


Correct Answer: 5.

Question 22: You have two folders C:\Source and D:\Destination. You move a file from C:\Source to D:\destination. Which folder's permissions will be applicable on the file after the move is complete? 1. C:\Source

2. D:\Destination
3. The permissions are first compared and most restrictive permissions are applied. 4. The permissions are first compared and least restrictive permissions are applied. 5. Correct Answer: 2.

Question 23: Read the following description and answer the question. You work for a company. You were asked to schedule a backup of a single folder on three client machines. You know that the first backup created on a machine is always scheduled automatically by Windows. After one month, one of the system crashes and you are asked to restore the last week's backup. But you find that there is only one single backup taken. Subsequent backups were not taken by Windows. You were using a network share as backup location and you are sure that the credentials on the target computer have not changed. Also, you are sure that you have right permissions on the network location. You use the client computer and find that you are able to take manual backups. User denies any change in any Windows settings. What can be the mistake?

1. Windows is ignoring Backup schedule


2. There is a network connectivity issue. 3. Windows firewall restricted the access. 4. You have not setup the schedule of the backup manually. 5. Correct Answer: 4.

Question 24: You want to be able to recover other users' files encrypted by EFS. What do you need? 1. Access to an administrator account 2. Editing a policy in GPE to make another user capable of doing it.

3. Recovery Agent
4. A Microsoft universal decryption certificate and a subscription to the service. 5. Correct Answer: 3.

Question 25: Your manager asks you to configure all the desktop computers running Windows 7 Enterprise on the company network to be configured in a way that the computers require a 12 character long password for using BitLocker to go on the USB disk drives. Which policy will help you configure the computer in the required way?

1. Control Use of BitLocker On removable Drives


2. allow access to BitLocker-protected removable Data Drives From earlier Versions of Windows 3. Configure Use Of passwords For removable Data Drives 4. Configure Use Of Smart Cards On removable Data Drives 5. Correct Answer: 3.

Question 1: What type of entity is a recovery agent? 1. A special user account. 2. A Special group of users. 3. A special policy which can be generated only on request.

4. A special EFS certificate.


5. Correct Answer: 4.

Question 2: DISM is a command-line tool used to service Windows 7 images before deployment. The servicing can be offline. Which of the following can not be done by using DISM?

1. Install or remove Windows 7 Features

2. Configure Windows 7 settings 3. Change the product key of installation 4. Install or remove additional drivers 5. Correct Answer: 3.

Question 3: Your computer has suddenly stopped connecting to the network. What is the first step you will take in the direction of troubleshooting?

1. Check if the networking devices are switched on and working correctly


2. Check if the network configuration of the computer was changed 3. Check if rules in Windows Firewall were altered 4. Check if the network cables are connected to the computer 5. Correct Answer: 4.

Question 4: Which tool will you use to change the boot order of your Windows 7 Professional computer, which is currently dual booting with Windows Vista Ultimate? 1. MDT 2. USMT

3. System Configuration Tool


4. Computer Management Console 5. Correct Answer: 3.

Question 5: What will happen when Application Compatibility Diagnostics Policies have not been configured and a compatibility issue occurs under Windows 7? 1. The issue is ignored silently

2. The issue is ignored but a log entry is made in system event logs
3. The issue is reported to the user 4. Windows 7 will prompt you to set the policies on first such attempt. This is done only for administrative accounts. 5. Correct Answer: 3.

Question 6: You have uninstalled an update. What will happen to that update? 1. Windows will never install it again. 2. Windows will hide the update. 3. Windows will install it again in the next update session.

4. Windows will not install it unless explicitly allowed by an administrator.


5. Correct Answer: 3.

Question 7: Which of the following command line tools will allow you to take backup of C: drive?

1. wbadmin
2. ntbackup 3. adminbkp 4. sysbackup 5. Correct Answer: 1.

Question 8: When are shadow copies created? 1. When Windows boots 2. When restore points are created 3. When you boot into safe mode

4. When system restore is run


5. Correct Answer: 2.

Question 9: What steps will you take to create a Windows image with a application installed in it? You have to create a Windows installation image and then distribute it for installation on 225 computers. It is required that an application must be installed on each of the computers after deployment. You do not have access to the MDT package. 1. Download the MDT package and use it 2. Install the application separately on each computer 3. Install the application on a reference computer and then image the computer for mass deployment

4. run dism /add-app /app: on a mounted image


5. Correct Answer: 3.

Question 10: Assuming that you are able to open all the tools listed below, which one will you open if you had to perform a recovery using a system Image?

1. Command prompt
2. Control Panel 3. Windows Explorer 4. Character Map 5. Correct Answer: 2.

Question 11: Can you restore multiple previous versions of the same file?

1. Yes
2. No 3. Yes, but only for those files which were not in any of the subfolders of the user

profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1.

Question 12: What is the risk of converting an MBR partitioned disk to Dynamic disk? 1. The disk may not get detected by Windows 7 anymore 2. You may not be able to use the disk on another computer 3. The disk may become unbootable

4. Your disk controller drivers will stop working and you may lose data
5. Correct Answer: 3.

Question 13: Which policy will you configure to disable BitLocker to go on your client's Windows Vista machine? 1. Control Use of BitLocker On removable Drives 2. Deny Write access to removable Drives Not protected By BitLocker 3. Configure Use Of passwords For removable Data Drives

4. Choose how BitLocker-protected removable Drives Can Be recovered


5. Correct Answer: 1.

Question 14: Which command line tool will you use to edit NTFS permissions? 1. lcacls 2. icacls

3. net
4. cipher 5. Correct Answer: 2.

Question 15: You have to make a bootable USB pen drive with a capacity of 2 GB to boot into Windows PE for installing it on a netbook. Which of the following tools will help you achieve the objective? 1. diskpart 2. drvload 3. oscdimg

4. none of the above


5. Correct Answer: 4.

Question 16: Which of the following is not true regarding HomeGroups? Remember to choose the statement which is false.

1. HomeGroup can be enabled only by a member of the Administrators group.

2. HomeGroup cannot be used on a Domain network


3. Every user is free to choose what he/she wants to share with the HomeGroup 4. The Control Panel can be used to set up the HomeGroup 5. Correct Answer: 2.

Question 17: Your computer running Windows 7 has stopped connecting to the network. You suspect that the IPv4 network protocol is not working on the computer. What will you do to check whether it has stopped? 1. Reinstall Windows and see if it starts working 2. Boot into a live Operating System and check if the protocol is working now 3. open cmd and run the command: ping 127.0.0.1

4. run ipconfig /all in cmd


5. Correct Answer: 3.

Question 18: You want to run notepad as user "Prince" on the local computer. You want to open a file named C:\rcv.txt which has been encrypted by Prince and it is the only account which can decrypt the file. Which of the following commands will you run to achieve the goal? 1. runas /user:Prince "notepad.txt C:\rcv.txt" 2. runas /user:Prince "notepad.txt C:\rcv.txt" /env

3. runas /profile /user:Prince "notepad.txt C:\rcv.txt"


4. runas /trustlevel /user:Prince "notepad.txt C:\rcv.txt" 5. Correct Answer: 3.

Question 19: Which of the following packages will get you the Windows SIM tool? Windows SIM is not a standalone tool. Select the package, of which it is a part.

1. Windows Automated Installation Kit


2. Windows Automated Information Kit 3. Windows Unattended Installation Kit 4. Windows Mass Deployment Toolkit 5. Correct Answer: 1.

Question 20: A user in your network complains that audio device stops working after 1 hour each time he starts his computer. He has been using Windows 7 Home Premium. The problem started after the last Windows update was performed. What would be your first step to resolve the problem?

1. Driver roll back


2. System Restore 3. Windows reinstall 4. Running Windows Backup 5.

Correct Answer: 1.

Question 21: How would you configure BitLocker to Go to use the TPC chip on a computer? 1. Using Computer Management Console 2. Using device manager

3. It cannot be done
4. It can be done but not on Windows 7. We need a Windows Server 2008 R2 for the purpose. 5. Correct Answer: 3.

Question 22: What is the IP range of APIPA? 1. 196.254.0.0/12 2. 169.254.0.0/24 3. 196.254.0.0/32

4. 196.254.0.0/16
5. 169.254.0.0/16 Correct Answer: 5.

Question 23: You want to change the amount of space the pagefile consumes to increase the system performance for an application which over-utilizes the system memory. Where can you change this setting?

1. Advanced System Settings in Control Panel\System and Security\System


2. Advanced System Settings in Control Panel\System 3. Local GPE 4. perfmon.exe 5. Correct Answer: 1.

Question 24: What does the utility ImageX will do? 1. Capture new volume image 2. Apply a volume image 3. Append a new volume image

4. All of the above


5. Correct Answer: 4.

Question 25: Windows 7 has been failing to boot on each alternate boot. You enabled boot logging option. What file will contain the log data? 1. Ntboot.log 2. ntbtlog.log

3. ntbtlog.txt

4. boot.ini 5. Correct Answer: 3

Question 1: You have to make a bootable USB pen drive with a capacity of 2 GB to boot into Windows PE for installing it on a netbook. Which of the following tools will help you achieve the objective? 1. diskpart 2. drvload 3. oscdimg

4. none of the above


5. Correct Answer: 4.

Question 2: Which of the following tools will you use to add an application to your offline Windows 7 install image mounted on a local directory? 1. USMT

2. ImageX
3. DISM 4. OSCDIMG 5. None of the above Correct Answer: 5.

Question 3: You are upgrading from Windows Vista Enterprise to Windows 7 Enterprise. Will the current Windows Vista License cover your new installation? 1. Yes, the old license will cover the new installation 2. The old license will cover the new installation for a period of 1 year 3. The old license will cover the new installation for a period of 30 days

4. No, the old license will not cover the new installation
5. Correct Answer: 4.

Question 4: What does TPM mean? 1. Trusted Password Module 2. Third-party Platform Module 3. Trusted Partner Module

4. Trusted Platform Module


5. Correct Answer: 4.

Question 5: You want to install a Windows update manually from a MSU file. Which command will you use to avoid system restart after the install? The update file is: d:\kb123456.msu. 1. Wusa.exe /mode=manual /source:"d:\kb123456.msu" /quiet /noreboot 2. Wusa.exe /file:d:\kb123456.msu /quiet /noreboot

3. Wusa.exe d:\kb123456.msu /quiet /noreboot


4. Wusa.exe /source:"d:\kb123456.msu" /quiet /norestart 5. Wusa.exe d:\kb123456.msu /quiet /norestart Correct Answer: 5.

Question 6: You install a new device to your computer and your Audio device stops working. You find that there is a driver conflict. What is the first step you will take to resolve the conflict, if you do not have an internet connection? 1. Disable both the devices

2. Disable one of the devices


3. Nothing can be done now; Windows has to be reinstalled 4. Get an internet connection and update the driver 5. Correct Answer: 2.

Question 7: A computer running Windows 7 Enterprise is suddenly booting into recovery mode. The user of the computer is sure that he has not changed any setting. Which of the following cannot be a problem you would suspect? 1. User is trying to boot without the USB key

2. User is not entering the right PIN


3. TPM was cleared 4. The Boot environment has changed 5. Windows was updated the last time it ran successfully. Correct Answer: 5.

Question 8: What is a system image? 1. The still picture of what is being shown on the screen. 2. The copy of all files and folders on the disk

3. An image which can be converted to WIM file and then installed on a computer
4. An image which can be opened using Windows Picture Viewer program 5. Correct Answer: 2.

Question 9: You have been restricted to access the command prompt or run batch files. You have to prepare a USB drive for booting Windows 7 for installation on a netbook. Which of the following tools will you use to accomplish this task? 1. Windows Movie Maker

2. Windows 7 USB DVD tool


3. Windows Disc Buring tool (inbuilt) 4. diskpart.exe 5. Correct Answer: 2.

Question 10: In which category will the IPv6 address fec0:0:0:eadf::1ff fall? 1. Multicast 2. Unicast Link-local

3. Unicast global
4. Unicast site-local 5. Correct Answer: 4.

Question 11: Which of the following is the most secure protocol for a VPN connection? 1. PPTP 2. SSTP

3. IKEv2
4. L2TP/Ipsec 5. Correct Answer: 3.

Question 12: What is DRVLOAD tool and is used for what? 1. Verify a hardware driver during Windows 7 installation 2. To verify if a hardware device driver is signed during Windows 7 installation procedure

3. Load a device driver during the Windows 7 installation procedure


4. Load the drivers for the first time after Windows 7 installation completes 5. Correct Answer: 3.

Question 13: Which of the following is not a part of the functinality offered by DISM.exe? DISM or Deployment Image Servicing and Management is used to alter Windows 7 images for deployment. It offers a wide range of options. You have to choose that functionality which it will not offer.

1. Creating a Windows 7 installtion image


2. Altering Windows 7 installtion image and exit without a commit 3. Altering Windows 7 installtion image and exit without a commit 4. Mounting and unmounting a Windows 7 installtion image 5. Correct Answer: 1.

Question 14: How much space must be free to enable system restore on a volume?

1. 1 GB 2. 512 MB

3. 300 MB
4. 350 MB 5. Correct Answer: 3.

Question 15: Which of the following commands of Windows 7 Ultimate does the same job as Bootcfg.exe in Windows XP Professional? 1. BootSect 2. BCDEdit

3. BCDBoot
4. Diskpart 5. WPEUtil Correct Answer: 2.

Question 16: Read the following description and select the error from the list. You have a huge network of computers in a campus. All the computers are running one of the editions of Windows 7 or Windows Vista. They have all been enabled to get the IP address using DHCP. The servers in the network run on either Windows Server 2008 or Windows Server 2008 R2. Only some of these servers are running the DHCP service. This network has only one internet gateway. This gateway also has a DHCP server installed on it, but has been deactivated. The IP address assigned to this gateway is 169.254.137.8. What is the error in this configuration?

1. The DHCP server on the gateway should be enabled.


2. The IP address of the gateway should be changed. 3. The DHCP service should be enabled on all servers. 4. There is no problem with this network setup. 5. Correct Answer: 2.

Question 17: Computers on a network are already running on Windows Vista. You have been asked to install Windows 7 on all of them in a dual-boot configuration with the already installed Windows Vista. How many volumes, in minimum, will you need on each of the system?

1. 2 volumes
2. 3 volumes 3. 1 volume is enough 4. Two separate physical drives are needed 5. No. of volumes does not matter - Upgrading Windows Vista to Windows 7 gives dual-boot option. Correct Answer: 1.

Question 18: On which of the following file systems Windows 7 will not be able read or write? 1. NTFS

2. FAT32
3. exFAT 4. HPFS 5. Correct Answer: 4.

Question 19: Which of the following tools will you use to change the rules for new device driver installations? 1. Group Policy Editor 2. Device Manager 3. Computer Management Console

4. pnputil.exe
5. Correct Answer: 1.

Question 20: Which of the following commands will not be available in the installed copy of Windows 7? You have to select the filename which is available for use during the Windows 7 installation process, but is not installed on disk during the installation. This file will not be on hard disk after the installation is complete. 1. pkgmgr.exe 2. dism.exe 3. drvload.exe

4. BCDboot.exe
5. Correct Answer: 3.

Question 21: Which of the following is not possible using EFS? 1. You can encrypt your own file.

2. You can encrypt a file for some other user.


3. You can encrypt a complete folder. 4. You can encrypt a complete folder for some other user. 5. Correct Answer: 4.

Question 22: Which of the following is a valid filename to be placed in the %SYSTEMROOT%\System32 of a customized Windows PE image to load a customized shell instead of the default sommand prompt during the installation process of Windows 7? Windows PE can load a customized command prompt during installation by reading a file from the Windows PE image. This file controls the application to be launched as a shell. Select the filename which is to be used for controlling this behavior. 1. Wpeinit.ini

2. Winpeshl.ini 3. Winpeutil.inf

4. Winpeinit.inf
5. Correct Answer: 2.

Question 23: Which one of the following sequence of actions will you take to upgrade from Windows Vista Home Premium to Windows 7 Ultimate? 1. Run setup.exe from the Windows 7 installation DVD and select "Upgrade" for the "Type of installation"

2. Boot from the Windows 7 installation DVD and select "Upgrade" for the "Type of installation"
3. Edit the setup.cfg in the source/inf/ folder on the Windows 7 Installation DVD 4. Copy an edited version of setup.cfg from the source/inf/ folder on the Windows 7 Installation DVD to a USB pen drive and boot from the DVD 5. Correct Answer: 1.

Question 24: Which of the following will not be logged by the Reliability Monitor? 1. A change in Group Policy

2. Cancellation of a navigation by user in Windows Explorer due to hang


3. Crash of an application 4. A new software installation 5. Correct Answer: 1.

Question 25: You want to set specific power settings on all the computers on the network. Which tool will help you do this? 1. powercfg.exe 2. control.exe

3. powerexp.wsf
4. Local GPE 5. Compmgmt.msc Correct Answer: 1.

Das könnte Ihnen auch gefallen