Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLET, Exercises of Nursing

TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

Typology: Exercises

2023/2024

Available from 06/13/2024

dr_judy._
dr_judy._ 🇺🇸

3.3

(4)

599 documents

Partial preview of the text

Download TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE NEWEST ACTUAL EXAM COMPLET and more Exercises Nursing in PDF only on Docsity!

TEST OUT PRO CERTIFICATION EXAM, PRACTICE EXAM AND STUDY GUIDE

NEWEST ACTUAL EXAM COMPLETE 500 QUESTIONS AND CORRECT DETAILED

ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7. What should you do? Run the Windows 7 Upgrade Advisor. You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7. What should you do? Run the Windows 7 Upgrade Advisor. You manage a notebook system running Windows. You would like to log all of the packets that are dropped by the firewall on your computer. What should you do? In the local security policy, configure object access policies for the Windows Filtering Platform (WFP). View audit entries in the Security log in Event Viewer. You manage a notebook system running Windows. You would like to log all of the packets that are dropped by the firewall on your computer. What should you do?

In the local security policy, configure object access policies for the Windows Filtering Platform (WFP). View audit entries in the Security log in Event Viewer. You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the ff. specifications:

  • 1 GHz processor
  • 1 GB RAM
  • 128 MB video card
  • 16 GB free disk space
  • DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first? Install the latest service pack You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the ff. specifications:
  • 1 GHz processor
  • 1 GB RAM
  • 128 MB video card
  • 16 GB free disk space
  • DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first? Install the latest service pack

You have computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from CompA to CompB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do? On CompB, run loadstate with /lae and /lac options. You have computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from CompA to CompB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do? On CompB, run loadstate with /lae and /lac options. You have a computer that currently has Win7 installed. You need to perform a clean installation of Win onto the computer, but you would like to retain the existing settings and user files from the Windows 7 installation. What should you do? While running the Win8 installation, select the Custom (advanced) option. You have a computer that currently has Win7 installed. You need to perform a clean installation of Win onto the computer, but you would like to retain the existing settings and user files from the Windows 7 installation. What should you do? While running the Win8 installation, select the Custom (advanced) option. You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs WinServer 2003 and hold all shared files for the company. The office in Olympia has 5

clients computers, all running Win7. The Olympia office is connected to the Seattle office with WAN link. You want to implement BranchCache in the Olympia office. What should you do? Upgrade the server in Seattle to WinServer 2008 R2 or later. Configure BranchCache on Distributed Cache mode. You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs WinServer 2003 and hold all shared files for the company. The office in Olympia has 5 clients computers, all running Win7. The Olympia office is connected to the Seattle office with WAN link. You want to implement BranchCache in the Olympia office. What should you do? Upgrade the server in Seattle to WinServer 2008 R2 or later. Configure BranchCache on Distributed Cache mode. You have two Win systems named Comp1 and Comp2. Both computers are members of domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do? Export the recovery agent keys from Comp1 and import them to Comp2. You have two Win systems named Comp1 and Comp2. Both computers are members of domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do? Export the recovery agent keys from Comp1 and import them to Comp2. Prior to installing some software on your Windows system, you turn off User Account Control (UAC), Reboot the computer, and install the software. You turn back on, but it does not prompt you before

performing sensitive actions. You want the protection of UAC, but is not working at all. What should you do? Reboot the machine. Prior to installing some software on your Windows system, you turn off User Account Control (UAC), Reboot the computer, and install the software. You turn back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but is not working at all. What should you do? Reboot the machine. Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house by your organization's application development team. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do? Click Repair. Several weeks ago, you installed a desktop application on your Windows system. Yesterday, you installed another desktop application on your system that was developed in-house by your organization's application development team. After doing so, you notice that the first application behaves erratically and frequently locks up. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do? Click Repair.

You currently use a Win7 Ultimate desktop system. You have been asked to evaluate Win8.1 Enterprise as a possible upgrade for the Win7 systems you manage. You decide to install Win8.1 in a VHD file on your Win7 system. To ensure that the evaluation is realistic, you need to ensure the best possible performance. Which type of VHD file should you use? Fixed Size. You currently use a Win7 Ultimate desktop system. You have been asked to evaluate Win8.1 Enterprise as a possible upgrade for the Win7 systems you manage. You decide to install Win8.1 in a VHD file on your Win7 system. To ensure that the evaluation is realistic, you need to ensure the best possible performance. Which type of VHD file should you use? Fixed Size. You have a Win notebook system that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first? Run cipher /r. You have a Win notebook system that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first? Run cipher /r.

An employee has a Win notebook system. The employee has just been fired, but not before he assigned Deny Full Control Permission to Everyone to all the files and folders on the system. All users, including you, are now blocked from accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do? Take ownership of the files, and change the permissions. An employee has a Win notebook system. The employee has just been fired, but not before he assigned Deny Full Control Permission to Everyone to all the files and folders on the system. All users, including you, are now blocked from accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do? Take ownership of the files, and change the permissions. You have a single running WinXP. You perform a Custom (advanced) installation of Win7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the WinXP installation to the Win7 installation. What should you do? Run scanstate with the /offlineWinOld: option. You have a single running WinXP. You perform a Custom (advanced) installation of Win7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the WinXP installation to the Win7 installation. What should you do? Run scanstate with the /offlineWinOld: option. You manage a Win system with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users

who are not members of this group can print to the printer. You want only members of the Sales group to print to Printer1. What should you do? Remove Everyone from the printer's access control list. You manage a Win system with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users who are not members of this group can print to the printer. You want only members of the Sales group to print to Printer1. What should you do? Remove Everyone from the printer's access control list. You want to modify the default settings of UAC on your Win system to meet the ff. criteria:

  • Prompts should be shown when programs make changes to your computer and when you make changes to Win settings.
  • The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. •Settings should apply to all standard users. What should you do? Disable the Switch to the secure desktop when prompting for elevation setting in Group Policy. You want to modify the default settings of UAC on your Win system to meet the ff. criteria:
  • Prompts should be shown when programs make changes to your computer and when you make changes to Win settings.
  • The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. •Settings should apply to all standard users. What should you do? Disable the Switch to the secure desktop when prompting for elevation setting in Group Policy.

You have a computer running Win7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do? Download the Win Automated Installation Kit (Windows AIK) from Microsoft. You have a computer running Win7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do? Download the Win Automated Installation Kit (Windows AIK) from Microsoft.

  • You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the ff. hardware specifications: o Hard drive with 12 GB of free space o 1GB of RAM, one additional socket available o One Pentium 2.8 GHz processor, one additional socket available o Video card with 128 MB of memory You need to change the hardware so that you can install Windows 7 Enterprise. What should you do? Free up some space on the hard drive.
  • You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the ff. hardware specifications: o Hard drive with 12 GB of free space o 1GB of RAM, one additional socket available

o One Pentium 2.8 GHz processor, one additional socket available o Video card with 128 MB of memory You need to change the hardware so that you can install Windows 7 Enterprise. What should you do? Free up some space on the hard drive.

  • You work for a company with headquarters in Seattle and an office in Olympia. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. All servers are located in the Seattle office, and shared files are stored on those servers. You want to improve file access for users in the Olympia office to meet the ff. requirements: o Copies of files should be saved on the client computers in the Olympia office. o Only a single copy of each file should exist in the Olympia office. o Files should only be transferred once from the Seattle office to the Olympia office (unless the file has changed.). o Copies of files in the Olympia office should be shared and available to all computers in that office. o Files should be encrypted during transit between the two offices. Which features should you implement in the Olympia office? BranchCache
  • You work for a company with headquarters in Seattle and an office in Olympia. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. All servers are located in the Seattle office, and shared files are stored on those servers. You want to improve file access for users in the Olympia office to meet the ff. requirements: o Copies of files should be saved on the client computers in the Olympia office. o Only a single copy of each file should exist in the Olympia office. o Files should only be transferred once from the Seattle office to the Olympia office (unless the file has changed.). o Copies of files in the Olympia office should be shared and available to all computers in that office. o Files should be encrypted during transit between the two offices.

Which features should you implement in the Olympia office? BranchCache You need to upgrade a notebook system running 64-bit Windows 7 Home premium edition to 64-bit Windows 8 Enterprise. Which of the ff. is true regarding this upgrade path? Windows 7 Home Premium cannot be upgraded to Windows 8 Enterprise. You need to upgrade a notebook system running 64-bit Windows 7 Home premium edition to 64-bit Windows 8 Enterprise. Which of the ff. is true regarding this upgrade path? Windows 7 Home Premium cannot be upgraded to Windows 8 Enterprise.

  • You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fine on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next? Run the Compatibility Administrator.
  • You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fine on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next?

Run the Compatibility Administrator.

  • You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next? Re-install all applications.
  • You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next? Re-install all applications.
  • You have a VHD file which contains a Windows 7 Enterprise installation and other data files. You want to view, but not modify the installation and data files in the VHD file. What should you do? Use Disk Management to attach the VHD file as read-only.
  • You have a VHD file which contains a Windows 7 Enterprise installation and other data files. You want to view, but not modify the installation and data files in the VHD file. What should you do? Use Disk Management to attach the VHD file as read-only.

You manage a Windows system with a printer connected to it that is shared with the name Printer1. You need to modify the permissions that apply to the shared printer for network users. What should you do? In Devices and Printers, right-click the printer and select Printer properties. Edit the Security settings. You manage a Windows system with a printer connected to it that is shared with the name Printer1. You need to modify the permissions that apply to the shared printer for network users. What should you do? In Devices and Printers, right-click the printer and select Printer properties. Edit the Security settings. You have a computer running Windows 7 Ultimate. You need to copy files to an existing VHD file that contains a Windows 7 installation. What should you do? Run diskpart.exe, then use the list, select, and attach commands. You have a computer running Windows 7 Ultimate. You need to copy files to an existing VHD file that contains a Windows 7 installation. What should you do? Run diskpart.exe, then use the list, select, and attach commands.

  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olypia office is connected to Seattle office with a WAN link. You want to implement BranchCache in the Olympia office, caching all content on a server in the Olympia office. What should you do to configure the client computers in the Olympia office? Run the netsh command to set the BranchCache mode to Hosted Cache. Use the FQDN of the server in the Olympia office.
  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olypia office is connected to Seattle office with a WAN link. You want to implement BranchCache in the Olympia office, caching all content on a server in the Olympia office. What should you do to configure the client computers in the Olympia office? Run the netsh command to set the BranchCache mode to Hosted Cache. Use the FQDN of the server in the Olympia office.
  • You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array partitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do? On the screen where you select the disk to install Windows, click Load Driver.
  • You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array partitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do? On the screen where you select the disk to install Windows, click Load Driver.
  • You manage a Windows system on a small home network. You want to share the ff. folders on your computer with other users on the network:

o D:\Clipart o D:\Fonts o D:\VacationPictures You want to allow access to these folders while still meeting the ff. requirements:

  • Users will access all folders through a single share.
  • The share should include only these folders and no others.
  • The folders should remain in their current locations in the file system structure. What should you do? Create a library. Add all folders to the library. Share the library with HomeGroup.
  • You manage a Windows system on a small home network. You want to share the ff. folders on your computer with other users on the network: o D:\Clipart o D:\Fonts o D:\VacationPictures You want to allow access to these folders while still meeting the ff. requirements:
  • Users will access all folders through a single share.
  • The share should include only these folders and no others.
  • The folders should remain in their current locations in the file system structure. What should you do? Create a library. Add all folders to the library. Share the library with HomeGroup. You've been using a Windows Store app and now need to exit out of it. What should you do? Click the top of the app and drag it to the bottom of the screen.

You've been using a Windows Store app and now need to exit out of it. What should you do? Click the top of the app and drag it to the bottom of the screen.

  • Your Windows system provides a shared printer named Printer1. You want to allow user Chard to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer. What should you do? Assign Chad the Allow Manage Documents permission to the printer.
  • Your Windows system provides a shared printer named Printer1. You want to allow user Chard to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer. What should you do? Assign Chad the Allow Manage Documents permission to the printer. You have a computer running Windows 8. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do? Download the Windows Assessment and Deployment Kit (ADK) from Microsoft.

You have a computer running Windows 8. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do? Download the Windows Assessment and Deployment Kit (ADK) from Microsoft. You have a computer running Windows 7 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2008 R2. You log on to the computer using an account named Mary. With least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin. What should you do? From Credential Manager, select Add a Windows credential. You have a computer running Windows 7 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2008 R2. You log on to the computer using an account named Mary. With least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin. What should you do? From Credential Manager, select Add a Windows credential.

  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Distributed Cache mode. Using Group Policy, you enable the ff. policies: o Turn on BranchCache o Set BranchCache Distributed Cache mode What else is required to complete the configuration? Configure advanced firewall rules to allow the necessary ports.
  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Distributed Cache mode. Using Group Policy, you enable the ff. policies: o Turn on BranchCache o Set BranchCache Distributed Cache mode What else is required to complete the configuration? Configure advanced firewall rules to allow the necessary ports.
  • You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the image on the Windows installation disc. You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management. What should you do next? Attach the VHD.
  • You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the image on the Windows installation disc. You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management. What should you do next? Attach the VHD.
  • You manage several Windows systems in a domain network. You try to install internally-developed accounting software on the new computers. However, you discover that it will not run because User

Account Control (UAC) causes it to fail. Because the accounting will not be upgraded anytime soon, you must get it to work with UAC as-is. What can you do to get the application to work with UAC? (Choose the best solution.) Alter the program settings to Run this program as an administrator.

  • You manage several Windows systems in a domain network. You try to install internally-developed accounting software on the new computers. However, you discover that it will not run because User Account Control (UAC) causes it to fail. Because the accounting will not be upgraded anytime soon, you must get it to work with UAC as-is. What can you do to get the application to work with UAC? (Choose the best solution.) Alter the program settings to Run this program as an administrator. Your Windows system has device which are Personal Identify Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What shoud you do? Use smart card authentication. Your Windows system has device which are Personal Identify Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What shoud you do? Use smart card authentication. You have a stand-alone computer running both Windows 7 and Windows 8. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 8 as the default operating system instead. What should you do? Run bcdedit.exe.

You have a stand-alone computer running both Windows 7 and Windows 8. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 8 as the default operating system instead. What should you do? Run bcdedit.exe.

  • You have two computers: WS1 is running Windows Vista Business and WS2 is running Windows 8. Professional. You are using USMT to migrate only the user profiles and user data from WS1 to WS2. You need to specify the rules used for the migration to include all .vmx and .vdmsk files. What should you do? Create a custom XML file and use elements.
  • You have two computers: WS1 is running Windows Vista Business and WS2 is running Windows 8. Professional. You are using USMT to migrate only the user profiles and user data from WS1 to WS2. You need to specify the rules used for the migration to include all .vmx and .vdmsk files. What should you do? Create a custom XML file and use elements.
  • Management has decided to purchase new tablet systems for the administrative assistants in your organization. After conducting a needs assessment, they have determined that the new systems must meet the ff. requirements: o They must be joined to the organization's existing Active Directory domain. o Whole-disk encryption must be implemented with Device Encryption. o They must support User Account Control (UAC) to prevent unauthorized application privilege escalation.

A sales re from a computer manufactured recently offered you a very competitive price on Windows RT tablet systems. Can you use these systems in this implementation? No, Windows RT does not support domain join.

  • Management has decided to purchase new tablet systems for the administrative assistants in your organization. After conducting a needs assessment, they have determined that the new systems must meet the ff. requirements: o They must be joined to the organization's existing Active Directory domain. o Whole-disk encryption must be implemented with Device Encryption. o They must support User Account Control (UAC) to prevent unauthorized application privilege escalation. A sales re from a computer manufactured recently offered you a very competitive price on Windows RT tablet systems. Can you use these systems in this implementation? No, Windows RT does not support domain join.
  • You need to use the runas command to run the zip.exe executable on your Windows system as the Admin user on your system, which is a member of the Administrators group. Which option should you use with the runas command to do this? /user:Admin
  • You need to use the runas command to run the zip.exe executable on your Windows system as the Admin user on your system, which is a member of the Administrators group. Which option should you use with the runas command to do this? /user:Admin
  • You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB port. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next? On each computer, edit the BIOS to boot from the network first.
  • You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB port. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next? On each computer, edit the BIOS to boot from the network first.
  • You use a 32-bit version of Windows 8.1 Professional on your desktop computer. This system has 500GB hard disk installed and 4GB of system RAM. You need to use virtual machines to test an application on different platforms as it is being developed. You decide to implement Client Hyper-V on your desktop system. What should you do? Upgrade to the 64-bit version of Windows 8.1 Prof.
  • You use a 32-bit version of Windows 8.1 Professional on your desktop computer. This system has 500GB hard disk installed and 4GB of system RAM. You need to use virtual machines to test an application on different platforms as it is being developed. You decide to implement Client Hyper-V on your desktop system. What should you do?

Upgrade to the 64-bit version of Windows 8.1 Prof.

  • Rodney, a user in the research department, uses a Windows notebook system with a single NTFS volume. Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all Rodney's files. You make Kate's account an administrator for Rodney's computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney's documents, receiving an access denied message. You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do? Log on to the laptop using an account DRA privileges. Clear the Encrypt attribute on the file.
  • Rodney, a user in the research department, uses a Windows notebook system with a single NTFS volume. Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all Rodney's files. You make Kate's account an administrator for Rodney's computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney's documents, receiving an access denied message. You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do? Log on to the laptop using an account DRA privileges. Clear the Encrypt attribute on the file.
  • Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key? HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.
  • Installed desktop applications on a Windows system that are displayed in Programs and Features typically have associated entries in which Registry key? HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.
  • You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first? Run Anytime Upgrade.
  • You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first? Run Anytime Upgrade.
  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Hosted Cache mode. Which of the ff. best describes the infrastructure requirements for this scenario? Clients running Windows 7 Ultimate or Enterprise; server running Windows Server 2008 R2 or later in Olympia; Active Directory Certificate Services.
  • You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Hosted Cache mode. Which of the ff. best describes the infrastructure requirements for this scenario? Clients running Windows 7 Ultimate or Enterprise; server running Windows Server 2008 R2 or later in Olympia; Active Directory Certificate Services.
  • Which type of VHD file allocates additional physical disk space in the file as virtual disk storage is used? Dynamically expanding.
  • Which type of VHD file allocates additional physical disk space in the file as virtual disk storage is used? Dynamically expanding.
  • Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. However, after using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do? Click Change.
  • Several weeks ago, you installed a desktop application on your Windows system using the default parameters suggested by the application installer. However, after using the application for a time, you realize that you need an optional application feature that wasn't included in the default installation. You have opened Control Panel on your Windows system, accessed Programs and Features, and selected the application. What should you do? Click Change.