Exam 1 to 5

122
Exam 1 1. Which edition of Windows includes DirectAccess and BranchCache? A. Windows 7 Enterprise B. Windows 7 Professional C. Windows 7 Home Basic D. Windows 7 Home Premium Answer: A Windows 7 Enterprise is targeted for managed environments, mainly large enterprises. It includes all features that Windows 7 offers, including BitLocker, BitLocker To Go, AppLocker, DirectAccess, and BranchCache. 2. How much memory does a 32-bit version of Windows 7 support? A. 1 GB B. 2 GB C. 4 GB D. 8 GB Answer: C A 32-bit version of Windows is based on a 32-bit address bus, which can use up to 4 GB of memory. 3. Which of the following does NOT include Aero? A. Windows 7 Home Premium B. Windows 7 Professional C. Windows 7 Home Basic D. Windows 7 Enterprise Answer: C Aero is not included in Windows 7 Home Basic or Windows 7 Starter. 4. What is the minimum processor that you need to install Windows 7 Home Basic, 32 bit? A. 800 MHz B. 1 GHz C. 1.2 GHz D. 2.0 GHz Answer: B To install Windows 7 Home Basic, you need to have a 1 GHz processor. However, a faster processor gives you better performance. 5. What do you call a minimal 32-bit or 64-bit version of Windows 7 that you can use in a DVD to install or repair the Windows operating system? A. Windows PE B. Windows Basic

description

70-680 Exams all in One 5Exams in one

Transcript of Exam 1 to 5

Exam 11.Which edition of Windows includes DirectAccess and BranchCache?A. Windows 7 EnterpriseB.Windows 7 ProfessionalC.Windows 7 Home BasicD.Windows 7 Home PremiumAnswer: AWindows 7 Enterprise is targeted for managed environments, mainly large enterprises. It includes all features that Windows 7 offers, including BitLocker, BitLocker To Go, AppLocker, DirectAccess, and BranchCache.2.How much memory does a 32-bit version of Windows 7 support?A.1 GBB.2 GBC.4 GBD.8 GBAnswer: CA 32-bit version of Windows is based on a 32-bit address bus, which can use up to 4 GB of memory.3.Which of the following does NOT include Aero?A.Windows 7 Home PremiumB.Windows 7 ProfessionalC.Windows 7 Home BasicD.Windows 7 EnterpriseAnswer: CAero is not included in Windows 7 Home Basic or Windows 7 Starter.4.What is the minimum processor that you need to install Windows 7 Home Basic, 32 bit?A.800 MHzB.1 GHzC.1.2 GHzD.2.0 GHzAnswer: BTo install Windows 7 Home Basic, you need to have a 1 GHz processor. However, a faster processor gives you better performance.5.What do you call a minimal 32-bit or 64-bit version of Windows 7 that you can use in a DVD to install or repair the Windows operating system?A.Windows PEB.Windows BasicC.Windows MinD.Windows BareAnswer: AWindows PE is a minimum 32-bit or 64-bit operating system with limited services built on the Windows 7 kernel. It can be used to install and repair Windows and can be useful if your system does not boot.6.What tool is used to determine if your computer can run Windows 7?A.Windows 7 Upgrade AdvisorB.Program Compatibility TroubleshooterC.Application Compatibility ToolkitD.Application Compatibility ManagerAnswer: AIf you are not sure if your system is ready to run Windows 7, you can use the Windows 7 Upgrade Advisor, which can be downloaded from the Microsoft website.7.Where do you find the previous operating system, user data, and programs if you install Windows 7 on a hard disk volume that contains an existing Windows installation?A.C:\Windows\BackupB.C:\Windows\System32\ArchiveC.C:\Windows.OLDD.C:\Windows.BAKAnswer: CWhen you perform a clean installation of Windows 7 on a volume that contains an existing Windows installation, assuming you did not reformat the volume, the previous operating system, user data, and program files are saved to the Windows.OLD folder.8.If you cannot do an in-place upgrade, which of the following tools can assist you in migrating your data files and settings from one Windows installation to another?A.Migration toolkitB.Windows PEC.Internet ExplorerD.WETAnswer: DWindows Easy Transfer (WET) and User State Migration Tool (USMT) can help you migrate data files and settings between Windows installations. 9.Windows 7 includes several tools to migrate user settings between Windows installations. Which of these tools is a command-line tool that provides this functionality?A.USMTB.WETC.Windows ExplorerD.Magic MigrateAnswer: AWhile the Windows Easy Transfer program is a graphical program, the User State Migration Tool (USMT) is a scriptable command-line tool that is highly customizable. Because it a scriptable command-line tool, it is usually used to automate migration during large deployments of the Windows 7 operating system.10.What can you use to automate the installation of Windows 7 using the Microsoft Windows 7 DVD?A.Create an answer file named autounattend.xml and copy it to a USB drive.B.Create an answer file called winnt.sif file and copy it to the USB drive.C.Create an answer file and copy it to the C:\ folder.D.Create an answer file and copy it to the system BIOS.Answer: ATo perform an automated installation of Windows 7, the installation process automatically looks for the autounattend.xml file on the DVD or USB drive.11.Which option used with the sysprep command restarts the computer in Windows Welcome mode, enabling you to customize the Windows operating system, create user accounts, and name the computer?A./generalizeB./oobeC./rebootD./quietAnswer: BThe /oobe option, short for out-of-box experience, restarts the computer in Windows Welcome mode, which enables end users to customize the Windows operating system.12.What script do you use to create an image of a Windows 7 computer on multiple CDs?A.Span.cmdB.WinPE.cmdC.AIK.cmdD.Createspannedshares.cmdAnswer: DIf you have an older system that does not have DVD drives, but does have CD-ROM drives, you can use the createspannedshares.cmd script to create spanned media, which then breaks the DVD into multiple CDs. The createspannedshares.cmd is part of the Windows Automated Installation Kit (AIK).13.What is the primary tool to manage and configure Windows 7?A.Registry EditorB.Windows ExplorerC.Control panelD.Computer Management consoleAnswer: CThe primary program to configure Windows is the Control Panel. You can change the name of the computer, modify user profiles, create users and groups, change the display settings, change the power settings, and many other options.14.Where do you enable IIS in Windows 7?A.Registry EditorB.Windows ExplorerC.Programs in the Control PanelD.Computer Management consoleAnswer: CYou can enable and disable Windows features by clicking Programs in the Control Panel and then clicking Turn Windows features on or off.15.What type of device enables you to connect it to Windows 7 and then automatically configure itself for use?A.Free deviceB.Plug and play deviceC.PCI deviceD.Signed deviceAnswer: BPlug and play refers to the capability of a computer system to automatically configure expansion boards and other devices. You should be able to plug in a device and play with it without worrying about setting DIP switches, jumpers, and other configuration elements.16.What tool do you use to disable a device?A.Windows ExplorerB.RegeditC.Add/Remove DriversD.Device ManagerAnswer: DTo disable a driver, you open Device Manager. You can then either right-click the device to disable it or open the properties of the device to disable it.17.What is a combination of pictures, colors, and sounds on your computer that describes your desktop look and feel?A.Windows SchemeB.Windows SaturationC.Power schemesD.ThemeAnswer: DA theme is a collection of visual elements and sounds for your computer desktop.18.Where do you go to stop and disable a service?A.AccessoriesB.Administrative ToolsC.System ToolsD.System32 folderAnswer: BServices are managed with the Services console, which is also part of the Computer Management console. Both of these are found in the Administrative Tools.19.Where do you find the Windows Firewall with Advanced Security?A.Administrative ToolsB.Registry EditorC.Program ManagerD.File ManagerAnswer: AThe Administrative Tools include the Computer Management console, Event Viewer, Local Security Policy, services console, Task Scheduler, and Windows Firewall with Advanced Security.20.You have a new 5-GB hard drive. Which partitioning style do you have to use?A.MBRB.GPTC.EFID.BIOSAnswer: BMBR and GPT are the two partitioning styles used in Windows 7. If you have a disk larger than 2 TB, you must use GPT21.You just connected a large USB drive. You try to make it a dynamic disk, but the option is not available to you. What is the problem?A.You dont have the correct drive loaded.B.The drive is disabled.C.Dynamic disks are not supported on USB disks.D.The drive needs to be powered on.Answer: CDynamic disks are supported on SCSI, IDE, Fiber Channel, and Serial Storage Architecture (SSA). They are not supported on USB, Firewire/IEEE 1994, and removable disks.22.You want Windows 7 to implement RAID 1. What do you need to do?A. Enable Write caching on the first disk.B.Enable Write Caching on the second disk.C.Convert the basic disk to dynamic disks.D. Convert the dynamic disk to basic disks.Answer: CRAID 1, or disk mirroring, needs two disks. In addition, both disks must be dynamic disks.23.Where do you find the Disk Management console?A.Control PanelB.Computer Management consoleC.Device ManagerD.RegeditAnswer: BThe Disk Management console is an MMC console that is included in the Computer Management console.24.Which of the following gives you the best read access performance?A.Simple diskB.Spanned diskC.Mirrored diskD.Stripped diskAnswer: DStripped volumes can improve the speed of access to the disk because data is spread across multiple disks. However, it does not provide fault tolerance. If one disk fails, you lose the entire volume.25.What is the default subnet mask for a host with the address of 220.67.34.87?A.255.0.0.0B.255.255.0.0C.255.255.255.0D.255.255.255.255Answer: CThe 220.67.34.87 is a class C address. Therefore, the default subnet mask is 255.255.255.0.26.How many bits is an IPv4 address?A.4B.16C.24D.32Answer: DAn IPv4 address is 32 bits. To make it easier to work with, it is usually expressed in four 8-bit octets, each octet ranging from 0 to 255 (an example is 172.24.4.23).27.What type of IPv6 address is used by hosts when communicating with neighboring hosts on the same link?A.Global unicast addressesB.Link-Local addressesC.Unique local unicast addressesD.Multicast addressesAnswer: BLink-Local addresses are used by hosts when communicating with neighboring hosts on the same link. By using Link-Local addresses, you can have one network device communicate with another network to figure out its surrounding without any configuring.28.What command is used to configure and monitor various network parameters on a computer running Windows 7 including configuring IP addresses and default gateways?A.netB.netshC.nslookupD.ipconfigAnswer: BThe netsh command can be used to configure and monitor various networking parameters including configure IP addresses, default gateway, DNS servers, interfaces, routing protocols, and filters.29.What command is used to test network connectivity to another host?A.ipconfigB.pingC.nslookupD.netstatAnswer: BThe ping command uses the ICMP protocol to verify connections to a remote host.30.If you have a wireless access point configured to use Advanced Encryption Standard (AES) security and you are using digital certificates, which option should you choose to connect to the wireless access point?A.WPA2-EnterpriseB.WPA2-PersonalC.WPA-EnterpriseD.WPA-PersonalAnswer: AWPA2 uses AES encryption. WPA-Enterprise uses digital certificates.31.When connecting to a wireless network, what is used to identify the wireless network?A.AESB.SSIDC.TKIPD.Digital certificateAnswer: BThe SSID, short for service set identifier, is a unique identifier attached to the header or packet sent over a wireless network.32.Which VPN does Windows 7 NOT support?A.PPTPB.IPSec with IPSecC.SSTPD.CISPAnswer: DWindows 7 supports PPTP, LTP with IPSec, SSTP, and IKEv2. Therefore, it does not support CISP.33.When using authentication, which of the following authentication methods is the least secure?A.PAPB.CHAPC.MS-CHAPv2D.EAP-MS-CHAPv2Answer: APAP is short for Password Authentication Protocol, which sends the password in plain text (unencrypted).34.What defines the type of access granted to an object or object attribute?A.PermissionB.RightC.Authentication keyD.FingerprintsAnswer: AA permission defines the type of access granted to an object or object attribute. An object can be a file, folder, printer, or user account. An attribute might be a persons phone number or address in the user account.35.What feature helps prevent unauthorized changes to a computer running Windows 7 by a program?A.UACB.USBC.GMTD.ActiveXAnswer: AUser Account Control (UAC) is a feature that can help prevent unauthorized changes to your computer.36.How do you enable auditing in Windows?A.Modify the boot.ini file.B.Open the System Properties through the Control Panel.C.Use the Users console in the Control Panel.D.Use group policies.Answer: DYou can enable auditing in Windows using group policies including local policies.37.What is the minimum standard NTFS permission to change permissions of a file or folder?A.Full ControlB.ModifyC.ReadD.WriteAnswer: ATo change permissions and take ownership, you need to have the Full Control permission.38.When you move a file from a folder in the C drive to a folder in the D drive, which permissions does the file retain?A.Permissions assigned to the source folderB.Permissions assigned to the target folderC.No permissionsD.Full permissions to EveryoneAnswer: BWhen you move from one drive to another, the file retains permissions assigned to the target folder. 39.You have several data folders on your computer running Windows 7. You would like to view them as one folder while still keeping them separate. What should you do?A.Create a search connector.B.Create a library.C.Create an index.D.Create a local profile.Answer: BLibraries are virtual folders that link two or more folders so that they can be viewed as one. 40.Which search tool is NOT a method for Windows 7 to search for files?A.The search box on the Start menuB.The search box located at the top of the open windowC.The search box at the top of the libraryD.The search box in the desktopAnswer: DWindows 7 has several ways to perform searches including the Start menu, open windows, and libraries. 41.What do you do to recover EFS encrypted files if the encryption key is lost or damaged?A.Right-click the file and click recover.B.Use an EFS Recovery Agent to update the encrypted file.C.Convert to BitLocker.D.Convert to BitLocker To Go.Answer: BA recovery certificate is a special Encrypting File System (EFS) certificate you can use to recover encrypted files if your encryption key is lost or damaged. You need to create the recovery certificate, install it, and then update previously encrypted files with the new recovery certificate.42.You have a shared folder on an NTFS volume. Which one of the following statements is true?A.A user who accesses the folder remotely has the same or more restrictive access permissions than if she accesses the folder locally.B.A user who accesses the folder remotely has less restrictive access permissions than if she accesses the folder locally.C.A user who accesses the folder remotely has the same access permissions than if she accesses the folder locally.D.A user who accesses the folder remotely has more restrictive access permissions than if she accesses the folder locally.Answer: AWhen you access a computer remotely through the share, you include the share permissions and NTFS permissions that can restrict access. When you access the local folder directly, only the NTFS permissions apply. Therefore, they can have the same or more restrictive access if both are applied.43.Which of the following is NOT a share permission for a standard shared folder in Windows 7?A.Full ControlB.ChangeC.ModifyD.ReadAnswer: CThe three share permissions are Full Control, Change, and Read.44.Which mode of BranchCache has the cache data reside on local clients at the remote site?A.Distributed CacheB.Hosted CacheC.Proxy CacheD.Link CacheAnswer: AThe BranchCache caches files on a remote site after it communicates with the central office so that it the future it can use the cache to provide without going to the central office. Distributed Cache is distributed across client computers in the branch.45.What permission do you have to give for a user to change the configuration of a printer?A.Allow Manage PrintersB.Allow Manage DocumentsC.Allow Full Control for DocumentsD.Allow Modify for PrintersAnswer: AThe Allow Manage Printers allows you to modify printer settings and configuration including the ACL.46.You add a printer directly to the network using a built-in Ethernet card. Now you want to load the printer onto your computer. Which of the following is true?A.The printer is considered a local printer.B.The printer is considered a network printer.C.The printer needs to be moved so that it can be plugged directly into the Windows computer.D.The printer needs to be assigned a name such as http://servername/printername.Answer: AWhen you connect to the network printer, you install the printer as a local printer and use the Create a New Port Wizard to create a standard TCP/IP port.47.If you print a document and get garbled text, what is most likely the problem?A.The print spooler becomes unresponsive.B.The printer is not using the right ink-cartridge.C.The printer has not been calibrated.D.You are using the incorrect driver.Answer: DIf you have the incorrect print driver, you get strange characters, garbled characters, or snippets of program code.48.Which of the following is NOT a rule you can create with software restrictions?A.HashB.PathC.CertificatesD.LocationAnswer: DThe four types of rules used with software restrictions include hash, certificate, path, and zone.49.Where do you configure an individual application to run as an administrator?A.Using local security policyB.The System Configuration ToolC.The Computer Management ToolD.The Application Compatibility Options under the application propertiesAnswer: DIf you right-click the executable and select properties, you can select the Compatibility tab to configure what OS to run under, 256 colors, 640x480 resolution, and privilege level.50.You have a website that appears not to display properly. What can you do for the website to display properly?A.Enable an accelerator.B.Enable a SmartScreen Filter.C.Enable Compatibility Mode.D.Enable a RSS feed.Answer: CWebsites designed for earlier versions of Internet Explorer might not display correctly in the current version. Often, you can improve how a website looks in Internet Explorer by using Compatibility View.51.You have a website that is too hard to read because it is too small. What can you do?A.You need to decrease the screen resolution.B.You need to increase the screen resolution.C.You need to decrease the zoom level for the tab.D.You need to increase the zoom level for the tab.Answer: DWhen you have trouble seeing a website because its content is too small, you can use the zoom feature.52.Which of the following do you NOT find in the Mobility Center?A.VolumeB.Presentation SettingsC.Display SettingsD.External DisplayAnswer: CThe Mobility Center includes Volume, Battery Status, Wireless Network, External Display, Sync Center, Presentation Settings, and Screen Rotation. Display Settings is not in the Mobility Center. 53.You are ready to give a presentation using your computer running PowerPoint. What should do you prepare your system for the presentation? A.Create a second hardware profile, reboot the computer, and load the second hardware profile.B.Shut off your e-mail messengers, change your volume control, change your screen, and disable the screen savers and sleep features.C.Create a second user profile and configure the profile for presentations and logins as the user to give the presentation.D.Configure your Presentation Settings and turn on Presentation Settings.Answer: DThe best way to give presentations is to configure Presentation Settings with the Mobility Center and turn the Presentation Settings on when you are ready to give the presentation.54.Which version of Windows 7 does NOT support Remote Desktop Hosting?A.Windows 7 Home PremiumB.Windows 7 ProfessionalC.Windows 7 UltimateD.Windows 7 EnterpriseAnswer: AYou cannot use Remote Desktop Connections to connect to computers running Windows 7 Starter, Windows 7 Home Basic, Windows 7 Home Premium, and you can only create outgoing connections from these editions of Windows 7. Only Windows 7 Professional, Ultimate, and Enterprise editions support Remote Desktop Hosting.55.To connect to a computer using Windows Remote Desktop, what group do you need to be a member of on the remote computer? A.GuestsB.Power usersC.Remote Desktop UsersD.Power UsersAnswer: CAll administrators are automatically given the necessary permission to use Windows Remote Desktop. For other users, you must add them to the Remote Desktop Users group.56.Which technology is used to improve the performance of computers using a USB flash drive?A.ReadyBoostB.ReadyCacheC.ReadyDriveD.ReadyUpAnswer: AWindows ReadyBoost boosts system performance by using USB flash devices as additional sources for caching.57.If you want to see if you are running out of physical memory, which counter should you use?A.CPU utilizationB.Pages\secC.Network utilizationD.Interrupts\secAnswer: BTo see how much paging takes place between RAM and the paging file, you use the pages\sec. A high value indicates that you need to utilize paging more often, which means you are running out of physical memory.58.In Windows 7, what can be used to quickly determine if your antivirus is up to date and if Windows is patched?A.Event ViewerB.Action CenterC.Reliability MonitorD.System InformationAnswer: BAction Center is a central place to view alerts and take actions that can help keep Windows running smoothly.59.What tool can be used to thoroughly test memory?A.Computer Management consoleB.System InformationC.Memory Diagnostic ToolD.Safe ModeAnswer: CWindows 7 has multiple diagnostic tools including a Memory Diagnostic Tool and Network Diagnostic Tool.60.What should you do if you made changes to the video refresh rate on your computer and the display does not work properly?A.Run the SysEdit tool.B.Reinstall Windows.C.Reboot the system with the emergency repair disk.D.Press the F8 key during the boot sequence, and select Last Known Good Configuration.Answer: DIf you load a driver and your machine does not boot properly, you can access the advanced boot menu and try Last Known Good Configuration.Exam 21.Which edition of Windows 7 includes BitLocker To Go and AppLocker?A.Windows 7 Home StarterB.Windows 7 Home PremiumC. Windows 7 UltimateD.Windows 7 ProfessionalAnswer: CWindows 7 Ultimate has all the features that Windows 7 offers including BitLocker, BitLocker To Go, AppLocker, DirectAccess, and BranchCache. Different from Windows Enterprise, Windows 7 Ultimate is not available for volume licensing.2.Which feature in Windows 7 enables you to quickly reveal hidden icons and gadgets?A.Aero PeekB.Aero SnapC.Aero Flip 3DD.Aero ShakeAnswer: AAero Peek enables you to see through your open windows by making all them transparent so that you can see your desktop, icons, and gadgets.3.What is the maximum number of applications that you can run concurrently with the Windows 7 Starter?A.1B.2C.3D.4Answer: CWindows 7 Start is specifically made for small-form factor PCs that only available for 32-bit platforms and can support up to three concurrent programs.4.What is the minimum processor needed to install Windows 7 Starter edition?A.800 MHzB.1 GHzC.1.2 GHzD.2.0 GHzAnswer: ATo install Windows 7 Starter edition, you need to have an 800-MHz processor. However, a faster processor will give you better performance.5.You have a machine with Windows XP Professional. How do you upgrade to Windows 7 Professional while keeping the application and user settings?A.Perform a clean installation of Windows 7.B.Perform a direct upgrade to Windows 7.C.Perform a clean installation of Windows Vista and then upgrade to Windows 7.D.Perform an upgrade to Windows Vista and then upgrade to Windows 7.Answer: DTo keep your settings, you must perform an upgrade first to Windows Vista and then upgrade to Windows 7.6.During the installation of Windows 7, where does Windows write the logs into which it records the setup program and information related to problems encountered during setup?A.C:\Windows\LogsB.C:\C.C:\WindowsD.C:\Windows\PantherAnswer: DDuring setup, Windows produces log files located in the C:\Windows\Panther folder into which it records setup program and information related to problems encountered during setup.7.What is the boot loader for Windows 7?A.ntldrB.bootmgrC.io.sysD.bcdAnswer: BA boot loader is a file that contains necessary information that instructs the system how to boot or start an operating system. The Windows XP boot loader file is ntldr, whereas the boot loader for Windows Vista and 7 is bootmgr.8.What command would you use to start the Windows Easy Transfer program?A.wet.exeB.backup.exeC.migwiz.exeD.usmt.exeAnswer: CWindows Easy Transfer (Migwiz.exe) is installed with Windows 7 and is located under the System Tools under Accessories. It is also available on the Windows 7 DVD in the support\Migwiz directory.9.Which USMT command allows you to save user settings to a shared folder or USB device?A.migwiz.exeB.copyrawC.scanstate.exeD.loadstate.exeAnswer: CThe scanstate command is used to scan the source computer, collect files and settings, and create a store. You then use loadstate.exe to copy the store to a target Windows installation.10.You have an offline Windows 7 image. How can you add an updated device driver to the image?A.Use imagex.exeB.Use pkmgr.exeC.Use sysprep.exeD.Use the DISM toolAnswer: DDeployment Image Servicing and Management (DISM) is a command line tool that is used to service and manage Windows images. Therefore, you would use DISM to update a device driver to the image.11.Which option used with the sysprep command remove the computers security ID (SID), removes any system restores, and deletes the event logs?A./generalizeB./oobeC./rebootD./quietAnswer: AThe /generalize option removes all unique system information for a Windows installation including the security ID (SID).12.Which command would you configure Windows 7 to be the default operating system on a dual-boot system that boots either Windows Vista or Windows 7?A.Use the bcdedit.exe command with the /default option.B.Use the bcdedit.exe command with the /vista option.C.Use the bcdedit.exe command with the /7 option.D.Modify the boot.ini file to boot Vista using a text editor.Answer: ABCDEdit is a command-line tool for managing the Boot Configuration Data (BCD) stores. The /default option defines which operating system is the default boot operating system.13.Which applet in the Control Panel do you use to change the settings for the virtual memory?A.SystemB.Computer ManagementC.HardwareD.Device ManagerAnswer: AThe System applet allows you to change computer names, manage user profiles, change virtual memory settings, and change other system settings.14.Where do you uninstall a program that has been installed on a Windows 7 computer?A.Select System from the Control Panel.B.Select Programs from the Control Panel.C.Select Add/Remove Features from the Control Panel.D.Use the Computer Management console.Answer: BTo uninstall a program, open the Control Panel and click Programs. You then have to drill down further and click Programs and Features.15.Which Microsoft method ensures that you load only reliable drivers?A.Use Plug and Play drivers.B.Use PCI and AGP drivers.C.Use signed drivers.D.Use hibernate capable drivers.Answer: CTo ensure reliable drivers, Microsoft implemented signed drivers starting with Windows 2000. A signed driver is a device driver that includes a digital signature, which is an electronic security mark that can indicate the publisher of the software and information that can show if a driver has been altered.16.You just upgraded your sound card driver. Unfortunately, there is no sound. What should you do?A.Disable the device.B.Uninstall the device and try again.C.Roll back the driver.D.Update the device driver again.Answer: CBecause the device driver did not work, you roll back the driver to the older driver that did give you sound. You then try to find a newer driver than the one you had that works.17.What is the quickest way to modify display settings such as colors and themes?A.Right-click the Desktop, and then select PersonalizeB.Right-click the Desktop, and then select Properties.C.Right-click My Computer, and then click Properties.D.Open the Control Panel, and then click Display.Answer: AThe quickest way to configure your display setting is to right-click the Desktop and select Personalize. You can also quickly modify your screen resolution by right-clicking the Desktop and selecting Screen Resolution.18.What is the central secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies?A.The Control PanelB.The Boot.INI fileC.The registryD.The NTLDR storeAnswer: CThe registry is a central, secure database that stores most of your Windows configuration. To manage you registry manually, you use the Registry Editor (regedit.exe).19.Which of the following is not a good source to get device drivers?A.Using a peer-to-peer search engineB.Bundled with Windows 7C.Supplied with a deviceD.Updated with Windows UpdateAnswer: ADrivers should come from reliable sources including being already bundled with Windows 7, included with the device, and updated through Windows Updates or from the Manufacturers website. You should not use peer-to-peer search engines.20.What is the largest disk you can use with the MBR partitioning style?A.1 TBB.2 TBC.4 TBD.8 TBAnswer: BMBR and GPT are the two partitioning styles used in Windows 7. If you have a disk larger than 2 TB, you must use GPT.21.How do you convert a dynamic disk back to a basic disk?A.Use the Disk Management console.B.Use the Diskpart command.C.Use the Device Management console.D.Delete the disks, and recreate the disk as a basic disk.Answer: DConverting a basic disk to a dynamic disk is a one-way process. The only way to convert a dynamic disk back to a basic disk is to back up data, delete the old disk, and recreate it. Then restore the data back to the new disk.22.How many primary partitions can you have on a disk with a MBR partitioning style?A.2B.4C.8D.16Answer: BA disk using the MBR partition style can have four primary partitions or three primary partitions and one logical partition.23.Windows 7 does NOT support which of the following for software RAID using Windows?A.Simple volumesB.Spanned volumeC.Mirrored volumesD.RAID-5 volumesAnswer: DWindows Server 2008 supports RAID5, whereas Windows does not support RAID-5 software RAID using Windows.24.What option would you use with the chkdsk command to fix problems that it finds?A./fB./xC./cD.No option is required.Answer: AWithout the /f option, chkdsk reports only the status of the drive and any problems that it finds. Therefore, you need to use the /f if you want to fix any problems it finds.25.What address is considered the loopback address?A.192.168.1.1B.172.0.0.255C.127.0.0.1D.1.1.1.1Answer: CThe loopback, which means it is assigned an address of 127.0.0.1.26.How many bits is an IPv6 address?A.24B.32C.64D.128Answer: DAn IPv6 is 128 bits. To make it easier to work with, it is usually expressed in hexadecimal format. Each hexadecimal digit is equivalent to 4 bits.27.What address is used by a local host when you need to forward packets to the host on a different subnet?A.Network maskB.Default gatewayC.NATD.DNSAnswer: BThe default gateway is a device, usually a router, that connects the local network to other networks. When you need to communicate with a host on another subnet, you forward all packets to the default gateway.28.What command do you use to view your IPv4 interfaces on a computer running Windows 7?A.netsh interface ipv4 show interfacesB.netsh interface ipv4 set address name allC.netsh interface ipv4 add interfaceD.netsh interface ipv4 set address name sourceAnswer: ATo view your interfaces, you use the netsh command with the show interfaces option.29.What command helps you test name resolution?A.ipconfigB.netshC.pathpigD.nslookupAnswer: DThe nslookup command displays information that you can use to diagnose your DNS infrastructure.30.If you have a wireless access point configured to use Advanced Encryption Standard security and you are using pre-shared keys, which option should you choose to connect to the wireless access point?A.WPA2-EnterpriseB.WPA2-PersonalC.WPA-EnterpriseD.WPA-PersonalAnswer: AWPA2 uses AES encryption. Personal uses pre-shared keys.31.After you create a VPN, where do you find the VPN connection when you want to connect to your place of work?A.Ease of AccessB.Network and Sharing CenterC.Mobile PCD.Parental ControlAnswer: BThe Network and Sharing Center program is where you would to go to view all of your network connections, including VPN connections.32.Which is the strongest form of authentication?A.PAPB.CHAPC.MS-CHAPD.MS-CHAPv2Answer: DMS-CHAP v2 provides two-way authentication (mutual authentication) and provides stronger authentication than PAP, CHAP, and MS-CHAP.33.DirectAccess requires which protocol to operate?A.IPv4B.IPv6C.HTTPSD.PPTPAnswer: CDirectAccess is a new feature of Windows 7 and Windows Server 2008 R2. It provides a secure, always-on connection that requires little or no user interaction using IPv6 and IPSec.34.Which account is designed for users who need one-time or occasional access and is disabled by default?A.administratorB.guestC.remoteuserD.poweruserAnswer: BThe guest account is designed for users who need one-time or occasional access. Although guests have limited system privileges, you should be careful about using the account. 35.Which UAC slider option dims the Desktop and causes other programs to pause while the UAC dialog box displays?A.Always notifyB.Notify me only when programs try to make changes to my computer.C.Notify me only when programs try to make changes to my computer.D.Never notifyAnswer: AThe only option that dims the screen when a UAC prompt displays is Always notify.36.Which protocol is the main logon authentication method when logging on to a computer running Windows 7 that is part of an Active Directory domain?A.KerberosB.Windows NT LAN ManagerC.Certificate mappingsD.Password Authentication ProtocolAnswer: AKerberos is the main logon authentication method used by clients and servers running Microsoft Windows operating systems to authenticate both user accounts and computer accounts.37.What do you call permissions that are directly assigned to a file or folder?A.ExplicitB.InheritedC.BlockedD.PrimaryAnswer: AExplicit permissions are those granted directly to the folder or file.38.When you copy a file from a folder in the C drive to another folder in the C drive, which permissions does the file retain?A.Permissions assigned to the source folderB.Permissions assigned to the target folderC.No permissionsD.Full permissions to EveryoneAnswer: BWhen you copy from one folder to another folder within the same drive, it will retain permissions assigned to the target folder. 39.Which folder does Windows 7 use to store offline folders?A.C:\Windows\System32\OfflineB.C:\Windows\CSCC.C:\Windows\WinsxsD.C:\Windows\LogsAnswer: BThe CSC folder is where Windows stores offline files.40.What allows you to encrypt a single file on an NTFS volume?A.BitLockerB.BitLocker To GoC.EFSD.TPMAnswer: CEFS is short for Encrypted File System, which is used to encrypt individual files.41.What do you use to encrypt removable data drives such as USB drives?A.BitLockerB.BitLocker To GoC.EFSD.Smart cardsAnswer: BBitLocker To Go extends the BitLocker protection to removable data drives to ensure that critical data is protected when a USB drive is misplaced or stolen.42.You have two users who share a Windows 7 Business Edition. Both users are working on a presentation for the annual stock report. You want to give both users access to the report without giving access to the other users data files. What should you do?A.Give the appropriate NTFS permissions to each user's My Documents folder.B.Have the users log in with the same account.C.Instruct the users to store the report in the public folder.D.Instruct the users to log out and log in as the other user's report.Answer: CIf you store the document in the public folder, both have access to it. 43.You want to access the C drive remotely on a computer called PC1, but it has not been manually shared. If you are an administrator, how can you access it?A.Access it through \\PC1\C.B.Access it through \\PC1\C$.C.Access it through \\PC1\CDrive.D.Access it through \\PC1\Drives\C.Answer: BAdministrative shares are hidden shared folders that allow administrative personnel to connect to the root directory of a drive. In this case, it is identified with the C$.44.Which mode of BranchCache has the cached data reside on a Windows Server 2008 R2 server?A.Distributed CacheB.Hosted CacheC.Proxy CacheD.Link CacheAnswer: BWhen you use the hosted caching mode, cache resides on a Windows Server 2008 R2 computer that is deployed in the branch office.45.Where do you find the logs of printer activity and printer errors?A.The System logs in the Event ViewerB.The Application logs in the Event ViewerC.The C:\Windows\Spooler\Logs folderD.The C:\Widnows\System32\Log folderAnswer: ATo look at spooler and printer activity, you can use the logs showing the Event Viewer, specifically the System logs.46.What do you call a program designed to enable other programs to work with a particular printer without concerning themselves with the specifics of the printers hardware and internal language.A.Print deviceB.PrinterC.SpoolerD.Print driverAnswer: DA print driver is a program designed to enable other programs to work with a particular printer without concerning themselves with the specifics of the printers hardware and internal language.47.What do you call small fixes that might allow applications to run under Windows 7?A.A permission packageB.A SHIMC.The BOOT.INI file optionD.Windows DefenderAnswer: AIn new versions of Windows, Microsoft includes numerous SHIMs or minor fixes that are used to improve compatibility with existing non-Microsoft software.48.When using AppLocker, what are the rules based on?A.File passwordsB.NTFS permissions of fileC.Size of the fileD.Files digital signatureAnswer: BAppLocker is used to create rules based on the digital signature of an application. By using digital signatures, you do not have to update the rule when a new version of the application is released.49.You have a website within your corporations local intranet. When a user accesses the website, he is prompted for a username and password. How can you make the authentication occur automatically?A.Change the authentication for the website to anonymous.B.Add the web sites URL to the Local Intranet zone.C.Add the web sites URL to Trusted Sites zone.D.Change the credentials in the Credential Manager.Answer: BBy adding the website to the Local Intranet zone, Internet Explorer will automatically try to use your Windows username and password.50.What should you use to prevent an application from being installed when visiting a website?A.InPrivate BrowsingB.Protected modeC.Enable Parental ControlD.Enable Compatibility modeAnswer: BInternet Explorers protected mode is a feature that makes it more difficult for malicious software to be installed on your computer.51.You have a user who wants to save files from various websites. How can you make sure that the websites dont modify the files she has already downloaded?A.Disable all ActiveX controls.B.Enable the Phishing filter.C.Change the security level for the Internet zone to High.D.Enable Protected mode option.Answer: DProtected mode helps protect you from websites that try to save files or install programs on your computer.52.How do you turn off the hibernate function and remove the hiberfil.sys file?A.Run the powercgf hibernate off command.B.Delete the hiberfil.sys file from a command prompt with the del command.C.Open the Power settings within the Control Panel and uncheck Enable Hibernate option.D.Run the Hibernate Off command.Answer: ATo disable hibernate and remove the hiberfil.sys file, use the powercfg command.53.Which of the following shut down options enables you to save the contents of RAM into a file, shut down the system, quickly boot the system, and continue with the same application that you had open when you shut down the system?A.SleepB.HibernateC.Reduced power modeD.Deep sleep modeAnswer: BWhen you hibernate your computer, the system state and the contents of the system memory are saved to a file (hiberfil.sys) on the hard disk, and the computer is shut down.54.What task-based, command-line shell and scripting language is provided with Windows 7 to enable you to control local and remote computers and their Microsoft network services?A.ActiveXB.PowerShellC.GPOD.BackscriptAnswer: BWindows PowerShell is a task-based, command-line shell and scripting language that helps IT professionals and users control and automate the administration of the Windows operating system and the applications that run on Windows.55.You are working in your office, you get an emergency call from a client. You need to stop work and resume as quickly as possible when you get to the client site. You also want to be protected from data loss if there is a power problem. What do you suggest?A.Ensure that the laptop workstations have Centrino hardware. You should configure hybrid sleep on the laptop.B.Ensure that the users are administrators. You should configure hybrid sleep on the laptop.C.Ensure that there is available disk space equivalent to the amount of RAM. Configure sleep on the laptop workstations.D.Ensure you have enough free disk space equivalent to the amount of RAM. Configure hibernate on the laptop.Answer: CWhen you perform hybrid sleep, it keeps the memory alive so that it can do a quick restart to where you left off. IT also writes to the hard drive in case power is interrupted.56.What indicates that your processor is working too hard?A.A processor that is consistently above 25%B.A processor that is consistently above 50%C.A processor that is consistently above 80%D.A processor that is consistently above 95%Answer: CIf the processor is at 80% all the time, you should upgrade your processor (use a faster processor or add additional processors) or move some of the services or programs to other systems.57.What should be the maximum page rate used for Windows 7?A.Less than 5B.Less than 10C.Less than 20D.Less than 50Answer: CIf the performance monitor shows no or little available memory, it has a high pages/sec (20 or higher), or the paging file is high, you should increase the memory.58.What key do you need to press to enter Safe mode during boot up?A.F1B.F4C.F8D.F10Answer: CBy pressing F8, you can enter the Advanced Startup menu and select Safe mode.59.What technology used on NTFS volumes automatically makes extra copies of data files?A.Shadow CopyB.IISC.Windows BackupD.MSconfigAnswer: AShadow copies, when configured, automatically create backup copies of the data stored in data folders on specific drive volumes at scheduled times. The drive volume must be formatted as NTFS. Windows 7 utilizes Shadow copies to provide previous versions of files even if they have never been backed up.60.What tool do you use to temporarily disable a service that starts during the boot process?A.Device ManagerB.System ConfigurationC.Boot.ini toolD.Last Known Good Configuration optionAnswer: BThe System Configuration tool is a diagnostic tool that can help you isolate startup programs and services that prevent Windows from booting.Exam 31.Which of the following editions of Windows allow the computer to be added to a domain?A.Windows 7 StarterB.Windows 7 Home BasicC.Windows 7 Home PremiumD.Windows 7 ProfessionalAnswer: DWindows 7 is a business-focused edition of Windows. It includes support to join a domain and group policies, advanced network backup, Encrypted File System (EFS), and offline folders.2.Which feature in Windows 7 enables you to quickly resize open windows by dragging them to the edges of your screen?A.Aero PeekB.Aero SnapC.Aero Flip 3DD.Aero ShakeAnswer: BAero Snap, new to Windows 7, is a quick way to resize open windows by dragging them to the edges of your screen.3.What is the maximum memory that Windows 7 Home Basic 32-bit can recognize?A.1 GBB.2 GBC.4 GBD.8 GBAnswer: CMost 32-bit versions of Windows 7 can recognize up to 4 GB. The only version that is different is Windows 7 Starter, which can recognize only up to 2 GB.4.What is the minimum amount of memory needed to install a 32-bit version of Windows 7 Ultimate edition?A.512 MBB.1 GBC.2 GBD.4 GBAnswer: BTo install most versions of 32-bit versions of Windows 7 is 1 GB of RAM. 5.What kind of upgrade can you perform from Windows Vista Home Premium to Windows 7 Professional?A.In-Place UpgradeB.Custom InstallC.Replace UpgradeD.Enhanced UpgradeAnswer: BBecause you are not upgrading like editions, you have to use a custom install, which is not capable of upgrading all application and user settings.6.After you install Windows 7, what should you do next to ensure that Windows is as secure and stable as possible?A.Run the Windows 7 Upgrade Advisor.B.Check for any fixes, patches, or service packs from Windows Updates.C.Look at the installation logs.D.Run a check disk and a defrag on the hard drive.Answer: BAfter installation Windows, you should check to see if Microsoft has any fixes, patches, service packs, and device drivers and apply them to the Windows systems. 7.You configured your computer to dual-boot between Windows Vista and Windows 7. What do you use to modify the boot configuration so that it will boot to Windows Vista by default?A.Modify the boot.ini file.B.Modify the bootmgr file to point to the volume with Windows Vista.C.Use the disk management tool within the Computer Management console.D.Use the bcdedit command.Answer: DTo modify the boot configuration for Windows Vista and Windows 7 systems, you need to use the bcdedit command to edit the hidden file that stores the boot configuration.8.When using USMT, which file is used to migrate application settings to computers running Windows 7?A.MigApp.xmlB.MigUser.xmlC.MigDocs.xmlD.MigSet.xmlAnswer: AThe User State Migration Tool (USMT) is a scriptable command-line tool that allows you to migrate settings between Windows installations. The MigApp.xml file is used to migrate application settings to computers running Windows 7.9.Which USMT command migrates the files and settings from the store to the destination Windows?A.migwiz.exeB.copyrawC.scanstate.exeD.loadstate.exeAnswer: DThe scanstate command is used to scan the source computer, collect files and settings, and create a store. You then use loadstate.exe to copy the store to a target Windows installation.10.Which tool can you use to create a bootable disk that is used to deploy Windows 7 on nonPXE supporting client computers?A.Use Windows SIM.B.Use Windows AIK.C.Use DISM.D.Use scanstate.Answer: BTo create bootable media to deploy Windows 7 on nonPXE supporting client computers, you need to create a WinPE disk, which is done with Windows Automated Installation Kit (AIK).11.What format does Microsoft use to deploy Windows using a file-based imaging format ?A..WIMB..ISOC..GHOD..WDSAnswer: AThe Windows installation files can be distributed in a Windows Imaging Format (WIM) file. WIM is a file-based imaging format that can be used for rapid installation of new computers.12.When using a virtual system such as Hyper-Vi, where is the disk for the virtual system stored?A..VSVB..AVHDC..VHDD..VMCAnswer: CThe virtual hard drive (.vhd) file stores guest operating system, applications, and data for the virtual machine.13.What tool enables features that aid people with disabilities to use Windows 7?A.Accessibility appletB.Ease of Access CenterC.Administrative ToolsD.Ease of Use ToolsAnswer: BTo configure accessibility options, use the Ease of Access Center.14.You have a corporate laptop. You take it home, and you would you like your children to use it when you are not using it. You are having trouble finding Parental Control. What do you need to do?A.Download Parental Control from the Microsoft website and install it on your machine.B.Enable Parental Control using Programs in the Control Panel.C.You need to add your children to the Administrators group.D.You cannot use Parental Control if your computer is part of a domain.Answer: DParental Control is not available if your computer is part of a domain. In addition, Parental Control applies only to standard user accounts, not administrators.15.What happens if you load a driver that does not have a valid digital signature on a 64-bit version of Windows?A.It warns you that the driver is not properly signed.B.You need to add the driver to the unknown device in the Device Manager.C.You need to shut off check hardware service.D.You are not able to load the driver.Answer: DA driver that lacks a valid digital signature or that was altered after it was signed cant be installed on x64-based versions of Windows Vista or Windows 7.16.How do you identify a device in the Device Manager that is having problems?A.There is a red X.B.There is an exclamation point.C.There is a down arrow.D.It is flashing.Answer: BA black exclamation point (!) on a yellow field indicates that the device is in a problem state.17.Where do you extend your Windows desktop across a second monitor?A.Right-click the Desktop and choose Screen Resolution.B.Right-click the Desktop and choose Personalize.C.Open the Device Manager.D.Open the Computer Management console.Answer: ATo extend your desktop, right-click the Desktop and choose Screen Resolution. Click the drop-down list next to Multiple displays, and then click Extend these displays. Then click OK.18.Which of the following editions of Windows 7 does NOT support Windows Aero?A.Windows 7 BusinessB.Windows 7 EnterpriseC.Windows 7 Home PremiumD.Windows 7 Home BasicAnswer: DWindows Aero is supported on Windows 7 Business, Windows Enterprise, Windows 7 Home Premium, and Windows 7 Ultimate. It is not supported on Windows 7 Home Basic or Windows 7 Starter.19.How do you make Windows 7 open files with a tst filename extension to open with Internet Explorer?A.Open the Default Programs and select Set Association from the Control Panel.B.Right-click IExplore, and then select Properties.C.Modify the filename association using regedit.D.Modify the filename association with the local security policy.Answer: AWhen you want to change what programs open a particular type of data file, you should use the Control Panels Default Program and select Set Association.20.Which of the following describes the boot volume?A.The volume that contains the Windows boot filesB.The volume that contains the Windows operating systemC.The Z driveD.The fastest driveAnswer: BAs strange as it sounds, the system volume contains the Windows boot files, whereas the boot volumes contains the Windows operating system.21.What is the number of disks needed for RAID1?A.OneB.TwoC.ThreeD.FourAnswer: BRAID1 is known as disk mirroring, which has one disk act as a duplicate of another disk. If one fails, you can keep on working without any downtime. Therefore, you need to have two disks.22.How many partitions does a disk with the GPT partitioning style support?A.4B.16C.32D.128Answer: DGPT disks support volume sizes up to 18 exabytes (EB) or 18 billion gigabtyes and can store up to 128 partitions on each disk.23.Why do you need to keep your drives defragged?A.It keeps your drive from filling up.B.It keeps your drive clean from viruses.C.It keeps your drive optimized for better performance.D.It keeps your drive free from errors.Answer: CDisk defragmentation leads to slow disk performance because files are spread throughout a volume in pieces instead of being grouped as one large piece. 24.Which of the following is not true when considering extending a volume?A.You can extend partitions on basic disks.B.You can extend volumes on dynamic disks.C.You cannot extend system to boot volumes.D.You can only extend volumes if the volume is NTFS or raw (not formatted).Answer: CYou can extend a system or boot volume if the drive has contiguous space and only if the disk is a dynamic disk.25.For a subnet mask of 255.255.255.0, what is the CIDR notation?A./8B./16C./24D./32Answer: CBecause the 255.255.255.0 translated to binary is 11111111.11111111.11111111.00000000, it means 24 bits are masked. Therefore, the CIDR notation is /24.26.What is the binary equivalent of 255.255.248.0?A.11111111.11111111.11000000.00000000B.11111111.11111111.11111100.00000000C.11111111.11111111.11111111.00000000D.11111111.11111111.11111000.00000000Answer: DIf you translate 248, it is equivalent to 111110000. Therefore, the correct answer is 11111111.11111111.11111000.00000000.27.What is the primary method for name resolution on a TCP/IP network?A.DNSB.NATC.PingD.TCPAnswer: AOne way to translate host names to an IP address is to use the Domain Name System (DNS). 28.Which command can you use to display your current IP address and subnet mask?A.NetstatB.NslookupC.IpconfigD.PingAnswer: CThe ipconfig command displays current TCP/IP configuration.29.You have a host that has been assigned a 169.254.33.23 address. Unfortunately, the host cannot connect to other hosts. What is the problem?A.It cannot connect to a DHCP server.B.It has not been assigned a default gateway.C.It does not have TCP/IP loaded.D.It has not been assigned a host name.Answer: AIf your computer is set to accept a DHCP server and one does not respond, the computer uses Automatic Private IP addressing, which generates an IP address in the form of 169.255.xxx.xxx and the subnet mask of 255.255.0.0.30.If you have a wireless access point configured to use Temporary Key Integrity Protocol (TKIP) security and you are using digital certificates, which option should you choose to connect to the wireless access point?A.WPA2-EnterpriseB.WPA2-PersonalC.WPA-EnterpriseD.WPA-PersonalAnswer: AWPA uses TKIP encryption. Enterprise uses digital certificates.31.What new connections introduced with Windows 7 provide always-on secure connections using IPSec and IPv6 to your corporation while connected to the Internet?A.BitLockerB.DirectAccessC.TeredoD.ISATAPAnswer: BDirectAccess is a new technology that establishes a secure bi-directional connection to access a corporate network or resources.32.You just installed a new wireless router; however, you cannot discover other computers on the local wireless network. What should you do?A.Configure the wired and wireless network adapters as a network bridge.B.Configure the network category settings of the wireless connection to public.C.Change the network category settings of the wireless connection to private.D.Disable the Windows firewall.Answer: CIf the network category is set to public, the network discovery is disabled. Therefore, you need to change it from public to private. 33.What is the process used to confirm a users identity?A.AuthenticationB.AuthorizationC.AuditingD.SigningAnswer: AAuthentication is the process to confirm a users identity, which he uses to access a computer system or network resource.34.Which type of Windows 7 user account should you assign to a user to do everyday tasks such as checking e-mail or creating documents?A.AdministratorB.GuestC.StandardD.Power userAnswer: CWindows 7 supports two types of accounts, Standard and Administrator. The standard account is the account to use for everyday computing.35.What feature tracks and records various security-related events so that you can detect intruders and attempts to compromise the system?A.AuditingB.ACLC.PermissionsD.AuthenticationAnswer: AIf you enable auditing, you can track and record various security-related events such as when someone logs on the computer or tries to access a file or folder.36.What generates a message asking if you need to permission to continue when installing an application?A.Windows firewallB.NTFS permissionsC.UACD.Internet SharingAnswer: CThe User Account Control (UAC) is used to prevent unauthorized changes to the computer, particularly by programs.37.What do you call the permission that is assigned to a folder, which flows to the subfolders and its documents?A.ExplicitB.InheritedC.BlockedD.PrimaryAnswer: BWhen you set permissions to a folder (explicit permissions), the files and subfolders that exist in the folder inherit these permissions.38.When you move a file from a folder on the C drive to another folder on the C drive, which permissions does the file retain?A.Permissions assigned to the source folderB.Permissions assigned to the target folderC.No permissionsD.Full permissions to EveryoneAnswer: AWhen you copy from one folder to another folder on the same drive, the file retains permissions assigned to the source folder. 39.Where do you find 32-bit program files on a 64-bit version of Windows?A.C:\Program FilesB.C:\Program Files (x86)C.C:\WindowsD.C:\Windows\System32Answer: BThe default program for x86 programs loaded on a 64-bit version of Windows is C:\Program Files (x86).40.Which of the following is not a requirement for BitLocker?A.A computer with TPMB.A computer with only one large NTFS volumeC.A computer that has a compatible BIOS with TPMD.A USB flash if your system does not have TPMAnswer: BTo use Bit Locker, you need to have two NTFS volumes, not one.41.You right-click a file to encrypt it, and you later decide to compress the file. A few days later, you notice that the file is no longer encrypted. What is the problem?A.The file is encrypted for 24 hours only.B.The file was overwritten.C.You do not have permission to encrypt the file.D.You cannot have a file compressed and encrypted using NTFS at the same time.Answer: DBecause you compressed the file using NTFS, the file was automatically decrypted.42.Where would you enable network discovery?A.Windows Firewall with Advanced SecurityB.Network and Sharing CenterC.Registry EditorD.Computer Management consoleAnswer: BLink Layer Topology Discovery/network discovery queries each device that supports Plug and Play extensions or Web services for devices to determine its capabilities and to determine the topology of the network. To enable network discovery, you use the Network and Sharing Center.43.Which type of share is not displayed when browsing using Network Neighborhood?A.Public shareB.Hidden shareC.Administrative sharesD.NTFS shareAnswer: CDifferent from regular shares, administrative shares do not show when a user browses the computer resource using Network Neighborhood, My Network Place, or similar software.44.What is the minimum Share permission that enables you to read and execute files, create files and subfolders, modify files, and change attributes?A.Full ControlB.ChangeC.WriteD.ReadAnswer: BThe Change permission allows you to read files, create files and subfolders, modify files, change attributes on files and subfolders, and delete files and subfolders.45.In Windows 7, the printer is considered _______________.A.The logical device that represents the printer deviceB.The physical printer deviceC.The network IP address located in DNSD.The print driverAnswer: AThe printer is the logical representation that points to the physical printer device.46.If you use TCP/IP Printer port, what is the default port?A.25B.80C.443D.9100Answer: DTHE TCP/IP printer port uses host port 9100 to communicate.47.You have a customized project management application that was written for Windows XP. Unfortunately, it does not run under Windows 7. What should you try first?A.Run the application in XP mode.B.Modify the privilege level for the application to run as a standard user.C.Run the MST transform on the application.D.Run the application under 256 colors.Answer: AYou need to run the application in Windows XP mode because the enhanced security does not allow the application to run.48.Which edition of Windows 7 does NOT include Windows XP mode?A.Windows 7 ProfessionalB.Windows 7 EnterpriseC.Windows 7 Home PremiumD.Windows 7 UltimateAnswer: CTo run Windows XP Mode, you need to run Windows 7 Professional, Enterprise, or the Ultimate edition. You cannot run it on Windows 7 Home Premium.49.What can you use to prevent Internet Explorer from saving data while browsing the Internet?A.Use BranchCache.B.Use InPrivate Blocking.C.Turn on the user of cookies.D.Disable the save data option in the Internet zone.Answer: BInPrivate Browsing (new to IE 8) enables you to surf the Web without leaving a trail in Internet Explorer.50.How do you reset Internet Explorer to its original settings?A.Reinstall Internet Explorer 8.0.B.Navigate to the Security tab in Internet Explorer, and click Reset all zones to the default level.C.Navigate to the Advanced tab in Internet Explorer, and click Restore Advanced settings.D.Navigate to the Advanced tab, and click Reset.Answer: DTo reset Internet Explorer to its original settings, you have to open Internet Options, select the Security tab, and click Restore.51.When a user clicks on a link on a webpage, nothing happens. What is most likely the problem?A.The link is disabled.B.The URL is not listed in the Trusted sites.C.The URL is not listed in the pop-up blockers Allowed sites list.D.The URL is not listed in the Allowed sites list on the Privacy tab.Answer: BWhen you click some links, the link is set to open a separate window. If you have a popup blocker set up, the site might be blocked.52.What application do you use to manage your offline folder?A.System Configuration toolB.Offline folder consoleC.Sync CenterD.Mobility Share toolAnswer: CThe Sync Center is a syncing technology that allows you to keep your PC to access files from other PCs, Servers and other mobile devices such as Windows Mobile phones. To configure offline files, open the Sync Center and click Manage offline files.53.Which tool do you use to view the Desktop of a remote user so that you can see the problem as she tries to open a program?A.Remote AssistanceB.Remote DesktopC.Computer Management consoleD.System Information consoleAnswer: ARemote Assistant allows you to view a users session on a computer running Windows 7 so that you can work with the user to troubleshoot and fix the problem.54.What provides you a graphical user interface that allows you to run commands and write, edit, run, test, and debug scripts?A.ISEB.GPOC.PSDebugD.PS-RunAnswer: AWindows PowerShell Integrated Scripting Environment (ISE) is a graphical user interface that enables you to run commands and write, edit, run, test, and debug scripts in the same window.55.After you close the lid on your Windows 7 laptop, you want to be able to start working as soon as you start the computer. You also dont want to use battery power while the computer is shut off. What should you do?A.Configure the computer to hibernate when the lid is closed.B.Configure the computer to sleep when the lid is closed.C.Configure the computer to shut down when the lid is closed.D.Configure the computer to go into standby when the lid is closed.Answer: AYou should configure the computer to hibernate when the lid is closed.56.What measure tool does Windows 7 offer to help determine if your system can run a certain applications or perform certain functions?A.WEIB.CPUIndexC.PagingGuideD.PerfMonAnswer: AThe Windows Experience Index measures the capability of your computers hardware and software configuration and expresses this measurement as a number called a base score. A higher base score generally means that your computer performs better and faster than a computer with a lower base score, especially when performing more advanced and resource-intensive tasks.57.What can you use to quickly capture performance data of multiple performance counters and configure alert activities based on the performance counters?A.Alert CounterB.Task ParameterC.Data Collector SetD.Windows Experience IndexAnswer: CAn important feature in Performance Monitor is the Data Collector Set (DCS), which groups data collectors into reusable elements. After a DCS is defined, you can schedule the collection of data using the DCS or see it in real time.58.What tool do you need to disable several programs that automatically start up during boot up?A.System ConfigurationB.System InformationC.Action CenterD.BCDBootAnswer: ASystem Configuration is an advanced tool that can help identify problems that might prevent Windows from starting correctly. You can start Windows with common services and startup programs turned off and then turn them back on, one at a time.59.What program do you use to quickly restore your computers system files to an earlier point in time without affecting your data?A.System RestoreB.Shadow CopyC.System Image BackupD.Safe ModeAnswer: ASystem Restore helps you restore your computers system files to an earlier point in time. Its a way to undo system changes to your computer without affecting your personal files, such as e-mail, documents, or photos.60.You just loaded a new application. Now your computer has become slow and sometimes causes stop errors. Even after reinstalling the application, you still have the same problems. What can you try next?A.Roll back the latest driver using Device Manager.B.Reboot the computer in safe mode.C.Press F8 during the boot sequence, and select Last Known Good configuration.D.Use the System Restore to a known good working restore point.Answer: DSystem Restore can reconfigure Windows back to its original settings before the problem occurred.Exam 41.Which of the following versions supports 16-bit applications?A.32-bit Windows 7B.64-bit Windows 7C.32-bit and 64-bit Windows 7D.None of the aboveAnswer: AWhen using 64-bit Windows 7, you are not able to run 16-bit applications. Instead, you need to install XP mode if you still need access to 16-bit applications.2.Which feature in Windows 7 enables you to flip through all open windows in a three-dimensional stack?A.Aero PeekB.Aero SnapC.Aero Flip 3DD.Aero ShakeAnswer: CWindows Flip 3D enables you to flip through all open windows in a three-dimensional stack without having to click the taskbar.3.Where do you place your gadgets?A.Task BarB.The DesktopC.Notification AreaD.Quick ListAnswer: BDifferent from Windows Vista, gadgets are placed on the Desktop.4.What is the minimum amount of memory needed to install a 64-bit version of Windows 7 Ultimate edition?A.512 MBB.1 GBC.2 GBD.4 GBAnswer: CTo install most versions of 64-bit versions of Windows 7, you need 2 GB of RAM.5.What kind of upgrade can you perform from Windows Vista Home Premium to Windows 7 Home Premium that maintains application and user settings?A.In-Place UpgradeB.Custom InstallC.Replace UpgradeD.Enhanced UpgradeAnswer: ABecause you are upgrading like editions, you can use the in-place upgrade, which keeps user and application settings. 6.You work for a large corporation, and you just installed Windows. You try to check for Windows updates, but you cannot access the Windows update website. What should you do?A.Be sure you are logged in as a domain administrator.B.Add yourself to the Windows Update local group.C.Activate Windows.D.Check your proxy settings in Internet Explorer.Answer: DIf Windows update fails to get updates, you should check your proxy settings in Internet Explorer to see if it can get through your proxy server or firewall.7.You have a Windows XP computer that you need to upgrade to Windows 7, but you are not sure if the older video card is compatible with Windows 7. What should you do?A.Run the Windows 7 Program Compatibility Assistant tool.B.Run the Windows 7 Upgrade Advisor.C.Run Windows update.D.Open the device manager and update its drivers.Answer: BTo see if your system is compatible with Windows 7, you need to run the Windows 7 Upgrade Advisor.8.When using USMT, which file is used to migrate user folders, files, and file types to computers running 7?A.MigApp.xmlB.MigUser.xmlC.MigDocs.xmlD.MigSet.xmlAnswer: BThe User State Migration Tool (USMT) is a scriptable command-line tool that enables you to migrate settings between Windows installations. The MigUser.xml file is used to migrate user folders, files, and file types to computers running Windows 7.9.When using USMT, which option should you use to include the EFS files and digital certificates?A./keyB./nocompressC./encryptD./efs:copyrawAnswer: DThe /efs:copyraw copies the files in the encrypted format. If you are running Windows Vista or Windows 7 with the /efs:copyraw option, USMT will migrate EFS encrypted files and EFS certificates.10.What do you use to validate a Windows 7 answer file?A.ScanstateB.Windows SIMC.DISMD.SMSAnswer: DAlthough you can create an answer file with any text editor, it is recommended that you use Windows SIM to validate the answer file.11.What command can you use to view the contents of a WIM file?A.SyspepB.Windows SIMC.WINPED.ImageXAnswer: DImageX can be used to view the contents of a WIM file, capture Desktop images, mount images for offline image editing, and compress image files.12.What tool would you use to create a VHD file?A.BCDBootB.BCDEditC.ImageX.exeD.Disk Management console.Answer: DThe Disk Management console that is part of the Computer Management console can be used to create a VHD file.13.Where do you check to see how much memory your system has?A.Device ManagerB.Hardware consoleC.System applet in the Control PanelD.Display settingsAnswer: CYou can view a summary of important information about your computer by opening System in the Control panel (including the system type 32-bit or 64-bit), your Windows Experience Index, and the amount of RAM you have.14.You just started Device Manager. How can you determine if a device is disabled?A.There is a red X.B.It is grayed out.C.There is a down arrow.D.It is flashing.Answer: CA down black arrow indicates a device is disabled. A disabled device is a device that is physically present in the computer and consumes resources but does not have a driver loaded.15.Where can you manage all your devices that are connected through your USB ports?A.Devices folderB.Devices and Printers folderC.USB folderD.Plug and Play folderAnswer: BThe Devices and Printers folder gives you a quick view of devices connected to your computer. These devices are typically external devices that you can connect to or disconnect from your computer through a port or network connection.16.How do scan for new devices with Windows 7?A.Run the sigverif.exe command.B.Run the Scandisk.exe command.C.Click Hardware and Sound in the Control Panel and select Add a device under the Devices and Printers section.D.Run the scanhw.exe command.Answer: CUsually when you connect a device, it is automatically recognized, and Windows 7 automatically tries to load the proper driver. If not, you need to select the Add a device under the Devices and Printers section in the Control Panel so that Windows scans for hardware changes.17.To support Windows Aero, which of the following is not true?A.You need to have a color depth of 32 bits per pixel.B.You need to have a refresh rate of less than 10 hertz.C.You need to set a Windows Aero theme.D.You need to have Windows frame transparency on.Answer: BYou need to have a refresh rate that is higher than 10 hertz.18.What is the minimum WEI score for your system to support Windows Aero?A.1.0B.2.0C.3.0D.4.0Answer: CFor Windows 7 to support Windows Aero, you must have a Windows Experience Index of 3.0 or higher.19.Which command enables you to manage your partitions and volumes?A.diskpartB.scandiskC.defragD.fdiskAnswer: AThe two main programs or utilities to manage your volumes and partitions are the diskpart command and the disk management console. 20.Which of the following describes the system volume?A.The volume that contains the Windows boot filesB.The volume that contains the Windows operating systemC.The Z driveD.The fastest driveAnswer: AAs strange as it sounds, the system volume contains the Windows boot files, whereas the boot volumes contains the Windows operating system.21.How many disks do you need to create RAID0?A.OneB.TwoC.ThreeD.FourAnswer: BRAID0 is called stripping, which uses 2 to 32 disks to create a single volume that is spread out through all of the disks. Because it is spread out throughout all the disks, the spanned disk provides better performance. 22.How many drive letters can Windows 7 support for disks, excluding the floppy disks?A.8B.16C.24D.32Answer: CBecause there are 26 letters in the alphabet and two are reserved for floppy disks, you are limited to 24 drive letters (C through Z).23.How can you ensure that a single user does not use too much disk space?A.Defrag the hard drive.B.Establish disk quotas.C.Run the disk cleanup tool.D.Schedule the disk cleanup tool with the /q option.Answer: BTo limit how much space a user can use within a volume, use disk quotas.24.What is the default subnet mask for the host address of 172.32.32.67?A.255.0.0.0B.255.255.0.0C.255.255.255.0D.255.255.255.255Answer: BThe 172.32.32.67 address is a class B address and a private address. The default subnet mask for a class B address is 255.255.0.0.25.What is the CIDR notation for the 255.255.240.0 subnet mask?A./18B./20C./22D./24Answer: BIf you translate 255.255.240.0 to binary, you have 11111111.11111111.11110000.00000000. Because there are 20 bits masked, the CIDR notation is /20.26.Which of the following is NOT a private address?A.172.31.34.7B.10.31.0.1C.192.168.3.39D.172.32.32.32Answer: DThe private address is assigned 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.0.x and 192.168.255.x. The 172.32.32.32 does not follow any of those ranges.27.What service can you use that translates from computer/NetBIOS names to IP addresses?A.DNSB.WINSC.DHCPD.NATAnswer: BTo translate from the NetBIOS computer names, you use WINS, which is short for Windows Internet Name Service.28.Which command is used to show all TCP/IP configurations including the DNS and WINS servers used by the host?A.ipconfigB.ipconfig /allC.ipconfig /flushdnsD.ipconfig /registerdnsAnswer: BThe ipconfig /all command is used to display full TCP/IP configuration information. 29.What command would you use to release the IPv6 address handed out by a DHCP server?A.ipconfig /allB.ipconfig /releaseC.ipconfig /release 6D.ipconfig /flushdnsAnswer: CThe ipconfig /release6 releases the IPv6 address configured by a DHCP server.30.If you have a wireless access point configured to use Temporary Key Integrity Protocol (TKIP) security and you are using pre-shared keys, which option should you choose to connect to the wireless access point?A.WPA2-EnterpriseB.WPA2-PersonalC.WPA-EnterpriseD.WPA-PersonalAnswer: DWPA uses TKIP encryption. Personal uses pre-shared keys.31.A user connects to your corporate network using a VPN. What do you call it when the user can access an intranet resource through the VPN while surfing the Internet without going through the corporate VPN but while connected through the VPN?A.Split tunnelingB.NATC.Name resolutionD.DHCPAnswer: ASplit tunneling is the process of allowing a remote VPN user to access a public network such as the Internet at the same time that the user is allowed to access resources through the VPN.32.You need to configure multiple computers with the least amount of administrative effort to connect to your wireless network. What should you do?A.Manually configure each computers wireless adapters.B.Save the wireless network settings to a USB device and apply it to each computer.C.Copy the wireless network settings to a shared folder and access the configuration from the share folder on each laptop.D.Copy the wireless network settings to the hard disk of each of the new computers.Answer: BYou can save the information to a USB device and then use the device to copy the configuration to each computer.33.Which account is automatically created and disabled when you install a fresh copy of Windows 7?A.AdministratorB.AdministratorsC.RemoteIdentityD.PowerUserAnswer: AThe built-in administrator account provides access to files, directories, and service. The Administrator and Guest accounts are disabled by default.34.What enables you to store credentials such as user names and passwords that you use to log on to a website or other computers and that can be used to log you in automatically?A.Password CacheB.DLL LibraryC.Credential ManagerD.Password CaptureAnswer: CCredential Manager enables you to store credentials so that you can use them in the future.35.What is the first thing you need to do to enable auditing on some printers?A.Enable user auditing.B.Enable user quotas.C.Enable object auditing.D.Enable ACL auditing.Answer: CFiles, folders, and printers are examples of objects. Therefore, the first step in enabling auditing for a printer, file, or folder is that you must enable object auditing.36.Which of the following file systems is the most secure?A.FATB.FAT32C.NTFSD.VFATAnswer: CNTFS is the only one that provides security features such as encryption and NTFS permissions and the capability to use transaction tracking to keep the file system reliable. 37.Which permission always wins out?A.ExplicitB.InheritedC.Full Control D.DenyAnswer: DThe Deny permission always overrides the permissions that have been granted, including when a user or group has been given full control.38.How do you prevent someone from connecting a USB drive to a corporate laptop and copying sensitive data to the USB drive?A.Use group policies.B.Use NTFS permissions.C.Use disk quotas.D.Use rights.Answer: ABy using group policies with Windows 7, you can block the automatic installation of USB storage devices on the computers.39.In which folder do you find x86 programs on a 32-bit version of Windows?A.C:\Program FilesB.C:\Program Files (x86)C.C:\WindowsD.C:\Windows\System32Answer: AThe Program Files folder is the default program to contain programs that are not part of Windows.40.What enables you to encrypt an entire volume?A.BitLockerB.FAT32C.EFSD.PAPAnswer: ABitLocker is designed to help protect all of the personal and system files of the drive that Windows is installed on if your computer is stolen.41.The Documents library includes the My Documents folder and _______.A.The All Documents folderB.Public DocumentsC.FavoritesD.The Administrator folderAnswer: AThe Documents library includes the My Documents folder and the Public Documents folder.42.Which of the following is NOT a folder-sharing technology available in Windows 7?A.Public SharingB.Basic SharingC.NFSD.Advanced SharingAnswer: CThe three types of sharing available in Windows 7 are Public Sharing, Basic Sharing, and Advanced Sharing. NFS sharing is associated with UNIX machines.43.You share a couple of folders in your Windows 7 computer. Unfortunately, they are not visible on anyones network map so that users can find the shares easily. What is most likely the problem?A.You need to enable the Network Discovery service.B.You did not give the proper NTFS permissions.C.You did not give the proper Share permissions.D.You did not register your system in your DNS server.Answer: ATo vie the computer using network map, you need to have the Link Layer Topology Discovery (LLDT) operational. Therefore, you need to have the Network Discovery service enabled. This is done using the Network and Sharing Center.44.You have a shared folder on an NTFS volume. What is the best way to share folders and lock it down?A.Set Everyone to have full control share permissions and lock it down with NTFS permission.B.Set Everyone to have full control NTFS permissions and lock it down with Share permissions.C.Set Everyone to have full control NTFS and share permissions and lock it down with file attributes.D.Lock it down with both share and NTFS permissions.Answer: AWith Microsofts best practices, you should grant full control to Everyone and use NTFS to lock it down.45.What do you call the component that holds and forwards the print jobs that are sent to the physical printer?A.The printer driverB.The spoolerC.The PrintTemp folderD.The Processor areaAnswer: BThe printer spooler is often referred to as a queue, which accepts each document being printed, stores it, and sends it to the printer device when the printer device is ready.46.You have a print job that you cannot delete, and it does not finish. What should you try?A.Restart the printer.B.Restart the Server service.C.Restart the print spooler.D.Make sure the printer is connected.Answer: CIf the print spooler becomes unresponsive or you have print jobs that you cannot delete, you should try to restart the Print Spooler service.47.What do you call a package of multiple SHIMs bundled together by Microsoft?A.An MSI packageB.An XP PackageC.A Microsoft Application Compatibility ToolkitD.A Microsoft Application Reconfig KitAnswer: CIn new versions of Windows, Microsoft includes numerous SHIMs or minor fixes that are used to improve compatibility with existing non-Microsoft software. Microsoft analyzed the application and provided an application compatibility SHIM. These SHIMs are bundled together with the Microsoft Application Compatibility Toolkit.48.You upgraded your computer running Windows XP with SP2 to Windows 7 Professional. What should you do when you run the PickUp.exe program and you receive the following error: This application is only designed to run on Windows XP or later. A.You should run the application with elevated privileges.B.You should run the application in VGA mode.C.You should install Windows XP mode and run the application under Windows XP mode.D.You should make sure your machine has all the Windows updates.Answer: CWhen an application that was written for an older version of Windows does not run under Windows 7, you should try compatibility mode or run the application under Windows XP mode.49.What can you use to easily invoke an online service by using only the mouse?A.CookiesB.ActiveXC.AcceleratorsD.SmartScreen FilterAnswer: CAn accelerator is a form of selection-based search that allows a user to invoke an online service from any page using only the mouse.50.How do you remove the stored passwords from a computer?A.On the Security tab in Internet Options, set the Internet zone security to High.B.On the Privacy tab in Internet Explorer, set the level to Medium.C.On the Privacy tab in Internet Options, set the level to High.D.In Explorer, click Tools, and then click Delete Browsing History. Click Delete passwords. Answer: DTo delete saved passwords in Internet Explorer, you must delete the browsing history.51.What technology in Internet Explorer is used to protect you from spoofed sites that might try to trick you into divulging confidential information?A.Protected modeB.Phishing filterC.Junk mail filterD.Fake Site filterAnswer: BSome sites are created to look as other sites that are used to lure people to divulge confidential information. Because these sites are fishing for information, these sites are referred to as phishing.52.Which edition of Windows 7 enables you to sync with network folders?A.Windows 7 Home BasicB.Windows 7 StarterC.Windows 7 ProfessionalD.Windows 7 Home PremiumAnswer: CThe capability to sync with network folders is not included in Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.53.You want to view someones Event Viewer without logging directly onto that persons computer. What option should you use?A.System InformationB.Computer Management consoleC.System Information toolD.Remote Management consoleAnswer: BBy using the Computer Management console, you can connect to remote computers to manage viewing the Event Viewer.54.You need to give a presentation using your mobile computer. When you connect the project to the computer with an S-Video cable, how do you get the Desktop to display on the projector?A.Open Display Settings. Select the icon that represents the project. Then, select the This is my main monitor option.B.Open Display Settings. Select the icon that represents the laptop display. Then, clear the Extend the desktop onto this monitor option.C. Clear the Lock the taskbar option of the taskbars context menu. Drag the taskbar as far to the right as possible.D.Clear the Lock the taskbar option of the taskbars context menu. Drag the taskbar as far to the left as possible.Answer: AIf you want to use the projector as the main monitor, open the display settings in the Control Panel. Then, select the icon that represents the project and make it the main monitor.55.What program is used to directly connect to a network projector?A.Remote DesktopB.Remote AssistanceC.Remote ProjectorD.Remote SideShowAnswer: CA network projector is a video project thats connected to a wireless or wired local area network (LAN). What sets the network projector apart from other presentation methods is that you can connect to and operate the project remotely over a network connection. If your computer can connect to the project, you can deliver a presentation from any location that has network access, whether its your private office or a configure room where the project is located.56.How large does your USB drive have to be to make use of ReadyBoost?A.256 MBB.512 MBC.1 GBD.2 GBAnswer: BUSB flash devices that can be used with Windows ReadyBoost include USB 2.0 flash drives, Secure Digital (SD) cards, and CompactFlash cards. These devices must have sufficiently fast flash memory and be at least 512 MB or larger in size.57.What should the minimum WEI be if you want to support multiplayer 3-D gaming and recording and playback of HDTV?A.2.0B.3.0C.4.0D.6.0Answer: DA computer with a base score of 6.0 or 7.0 has a faster hard disk and can support high-end, graphics-intensive experiences, such as multiple and 3-D gaming and recording a playback of HDTV content.58.What tool can you use to increase the number of processors used during boot?A.Computer Management ConsoleB.System InformationC.System ConfigurationD.IISAnswer: CIf you start System Configuration, click the Boot tab and clicked the Advanced Options button.59.You are going to upgrade a couple of applications, and you want to backup all system and data files. What should you use?A.Create a System Image Backup.B.Use System Restore.C.Use previous versions of files.D.Use System Configuration.Answer: ASystem Image Backup, sometimes referred to as the Complete PC Backup, is a copy of the system drives required for Windows to run and is one of the fastest ways to restore your hard drive. It can also include additional drives.60.You have a computer running Windows 7 with C and D drives. Both hard drives are formatted with NTFS file system. You need to disable the previous versions on the D drive. What should you do?A.Modify the Quota settings.B.Modify the Sharing settings.C.Use the Disk Management snap-in.D.Modify the System protection settings from System properties.Answer: DTo enable or disable what is affected by System Restore and previous versions, you must use the System Protection Settings from System Properties.Exam 51.Which edition of Windows 7 is the minimum needed to fully support HomeGroups and DVD video playback and authoring?A.Windows 7 Home StarterB.Windows 7 Home BasicC.Windows 7 Home PremiumD.Windows 7 ProfessionalAnswer: CHomeGroup and DVD video playback and authoring are supported by Windows Home Premium, Windows 7 Professional, and Windows Enterprise. The minimum is Windows 7 Home Premium. 2.You click the Internet Explorer button on the taskbar, which provides a list of recently opened items. What do you call this list?A.Notification listB.Jump listC.Quick LaunchD.Shortcut menuAnswer: BA jump list is a list of items you go to frequently. Jump lists appear on the Start menu next to pinned programs and recently used programs. The jump list can contain recently opened items and items you have pinned to the jump list. You can also add jump lists to the task bar.3.What is the maximum amount of memory that Windows 7 Home Premium 64-bit can recognize?A.2 GBB.4 GBC.8 GBD.16 GBAnswer: DWindows 7 Home Premium 64-bit can recognize up to 16 GB. Windows 7 Home Basic 64-bit can recognize up to 8 GB and 64-bit versions of Windows 7 Ultimate, Enterprise, and Windows 7 Ultimate can recognize up to 192 GB.4.What is the minimum amount of free disk space you need to install a 32-bit version of Windows 7 Ultimate edition?A.10 GBB.20 GBC.40 GBD.50 GBAnswer: CTo install most 32-bit versions of Windows 7, you need 40 GB of free disk space. 5.What kind of upgrade can you perform from Windows Vista Home Premium 32-bit to Windows 7 Home Premium 64-bit?A.In-Place UpgradeB.Custom InstallC.Replace UpgradeD.Enhanced UpgradeAnswer: BBecause you are not upgrading different versions, you have to do a custom install, which will not be able to upgrade all application and user settings.6.After you install Windows 7, Windows limits its function after 30 days if you dont __________________.A.Run Windows updates.B.Add yourself to the local administrators group.C.Activate Windows.D.Run the Compatibility toolkit application.Answer: CMost copies of Windows need to be activated after installation. If not, you are not able to do anything with Windows after 30 days except activate it.7.If you cannot do an in-place upgrade, which of the following tools can assist you in migrating your data files and settings from one Windows installation to another?A.Migration toolkitB.XcopyC.Windows ExplorerD.USMTAnswer: DWindows Easy Transfer (WET) and User State Migration Took (USMT) can help you migrate data files and settings between Windows installations. 8.Windows 7 includes several tools to migrate user settings between Windows installations. Which of these tools provides a graphical program to migrate settings?A.USMTB.WETC.Windows ExplorerD.Magic MigrateAnswer: BThe Windows Easy Transfer (WET) is a graphical program that enables you to transfer one users profile or multiple user profiles. You cannot use WET to move program files or system files.9.Which command do you use to remove the security identifiers and all other user-specific or computer-specific information from the computer before you clone a computer?A.sysprep B.WinPEC.OscdimgD.ImageXAnswer: AIf you create a cloned copy of Windows and apply the cloned copy to multiple computers, each copy of Windows cloned to a target computer using the same image has the same parameters, such as the same computer name and security identifier (SID). Unfortunately, for these computers to operate properly on a network, these parameters have to be unique. The command sysprep overcomes this problem by removing the security identifier and all other user-specific or computer-specific information from the computer.10.When migrating a server between two Windows 7 computers,