Exam 5
1.Which edition of Windows 7 is the minimum needed to fully support HomeGroups and DVD video playback and authoring?
A.Windows 7 Home Starter
B.Windows 7 Home Basic
C.Windows 7 Home Premium
D.Windows 7 Professional
2.You click the Internet Explorer button on the taskbar, which provides a list of recently opened items. What do you call this list?
A.Notification list
B.Jump list
C.Quick Launch
D.Shortcut menu
3.What is the maximum amount of memory that Windows 7 Home Premium 64-bit can recognize?
A.2 GB
B.4 GB
C.8 GB
D.16 GB
4.What is the minimum amount of free disk space you need to install a 32-bit version of Windows 7 Ultimate edition?
A.10 GB
B.20 GB
C.40 GB
D.50 GB
5.What kind of upgrade can you perform from Windows Vista Home Premium 32-bit to Windows 7 Home Premium 64-bit?
A.In-Place Upgrade
B.Custom Install
C.Replace Upgrade
D.Enhanced Upgrade
6.After you install Windows 7, Windows limits its function after 30 days if you don’t ______.
A.Run Windows updates.
B.Add yourself to the local administrators group.
C.Activate Windows.
D.Run the Compatibility toolkit application.
7.If you cannot do an in-place upgrade, which of the following tools can assist you in migrating your data files and settings from one Windows installation to another?
A.Migration toolkit
B.Xcopy
C.Windows Explorer
D.USMT
8.Windows 7 includes several tools to migrate user settings between Windows installations. Which of these tools provides a graphical program to migrate settings?
A.USMT
B.WET
C.Windows Explorer
D.Magic Migrate
9.Which command do you use to remove the security identifiers and all other user-specific or computer-specific information from the computer before you clone a computer?
A.sysprep
B.WinPE
C.Oscdimg
D.ImageX
10.When migratinga server between two Windows 7 computers,what command do you use to determine the amount of space needed to accomplish the migration?
A.scanstate with the /nocompress /p option on the source computer.
B.scanstate with the/nocompress /p option on the target computer.
C.scanstate with the /copyraw /p option on the source computer.
D.scanstate with the /copyraw /p option on the target computer
11.What option do you use with imagex.exe to capture a volume image from a drive to a new .wim file?
A./append
B./apply
C./export
D./capture
12.What tool do you use to add a virtual hard disk with Windows 7 to your Windows boot menu?
A.Use the diskpart command.
B.Use the Disk Management console.
C.Use the BCDboot command.
D.Use the BCDedit command.
13.Where do you add a computer to a domain?
A.Device Manager
B.Computer Management console
C.System applet in the Control Panel
D.Display settings.
14.How do you determine which edition and version of Windows 7 you are using?
A.Use the Task Manager.
B.Use the Start menu.
C.Use the System properties.
D.Use the Notification area.
15.How would you manage the devices installed inside your computer such as expansion cards?
A.Devices folder
B.Devices and Printers folder
C.Device Manager
D.Plug and Play folder
16.What command can you use to verify that your drivers are properly signed?
A.Use the sigverif command.
B.Use the scandisk command.
C.Use the Task Manager.
D.Use the Verification toolkit.
17.Which of the following is not a requirement to use Windows Aero?
A.The display adapter driver must follow the Windows 7 Display Driver Model (WDDM).
B.The display adapter must support DirectX 9.
C.The display adapter must support Pixel Shader 2.0.
D.The display adapter must support up to 1920 x1200 screen resolution.
18.Which registry hive stores the settings specific to a local computer?
A.HKEY_CURRENT_USER
B.HKEY_USERS
C.HKEY_LOCAL_MACHINE
D.HKEY_CURRENT_CONFIG
19.What do you need to be able to extend a hard drive in Windows 7?
A.The volumes must exist on a Basic disk.
B.The volumes must exist on a Dynamic disk.
C.The disk needs to use MBR.
D.The disk needs to use GPT.
20.What is usually the %systemroot%?
A.C:\
B.C:\Windows
C.C:\WINNT
D.C:\Windows\system32
21.What is the maximum number of disks you can use with RAID0?
A.4
B.8
C.16
D.32
22.How can you add another volume to a computer that has no more drive letters available?
A.Graft two volumes together and assign them both to the same drive letter.
B.Use mount points.
C.Merge two volumes together and assign them both to the same drive letter.
D.Start using double drive letters.
23.How do you check for errors on a volume?
A.Run the chkdsk driveletter: command.
B.Run the scandisk driveletter: command.
C.Run the defrag driveletter: command.
D.Run the check driveletter: command.
24.What is 2027::3ff4:932b:65bb called?
A.MAC Address
B.WEP key
C.IPv4 address
D.IPv6 address
25.What technology hides multiple private addresses behind a single public address so that multiple people can access the Internet at the same time?
A.MASK
B.REAL
C.NAT
D.DNS
26.Which type of IPv6 addresses are equivalent to IPv4 public addresses so they are globally routable and reachable on the IPv6 portion on the Internet?
A.Global unicast addresses
B.Link-local addresses
C.Unique local addresses
D.Multicast addresses
27.What is used to assign IP addresses to your hosts?
A.DNS
B.WINS
C.DHCP
D.NAT
28.What command is used to clear all local entries for the DNS cache?
A.ipconfig /registerdns
B.ipconfig /flushdns
C.ipconfig /register
D./ipconfig /renew
29.What command do you use to query a DNS server for a name translation to an IP address?
A.ipconfig
B.ipconfig /flushdns
C.ipconfig /registerdns
D.nslookup
30.What is the maximum speed for 802.11b?
A.2 Mbps
B.11 Mbps
C.54 Mbps
D.110 Mbps
31.Where do you enable splittunneling when you create a VPN connection?
A.Right-click a VPN connection, and then click Properties. Click the Networking tab, and open the Advanced option for the Internet Protocol 4 (TCP/IP4). Then, deselect the Use default gateway on remote network.
B.Right-click the VPN connection, and then click the split-tunnel option.
C.Right-click the VPN connection, select Advanced options, andthen, select the split-tunnel option.
D.Right-click the VPN connection, select Properties,and then, select the split-tunnel option.
32.To protect a tunnel created with L2TP, what protocol do you use to provide encryption?
A.MPPE
B.IPSec
C.SSTP
D.CHAP
33.What authorizes a user to perform certain actions on a computer such as backing up files and directories or performing a system shutdown?
A.Permission
B.Right
C.Authentication key
D.Fingerprints
34.Where do you find the Users console?
A.Accessories
B.Maintenance folder
C.Control Panel
D.System properties
35.Where do you look to see information gathered through auditing?
A.System Configuration
B.Registry Editor
C.Logs folder
D.Event Viewer
36.Which standard NTFS permission allows you to read files and folders, execute files, write and modify files, delete files and folders, and change attributes of files and folders.
A.Modify
B.List Folder Contents
C.Read
D.Execute
37.When you copy a file from a folder in the C drive to a folder in the D drive, which permissions will the file retain?
A.Permissions assigned to the source folder.
B.Permissions assigned to the target folder.
C.No permissions.
D.Full permissions to Everyone.
38.You add Pat to the DataUsers group, then to the Management group. Which permission does Pat receive?
A.The permissions for the DataUsers group
B.The permissions for the Management group
C.The permissions for the Data Users and Management groups
D.No permissions
39.What would you use to search remote data stores?
A.Library
B.Local index
C. Search connector
D.Top views
40.What is used for quick searches on your hard drive?
A.XML Search file
B.Index
C.Search cache
D.File Hash
41.What technology was released with Windows 7 to make it easier for home users to share files and printers?
A.EasyShares
B.HomeGroup
C.UserShares
D.PrivateShare
42.Where is the Public folder located?
A.C:\Public
B.C:\Inetpub\Public
C.C:\Users\Public
D.C:\My Documents
43.What technology is designed to reduce traffic (including web and file-sharing traffic) between two remote sites, specifically the central site and smaller remote site?
A.Distributed File System
B.Proxy server
C.IIS
D.BranchCache
44.Which special or administrative share is used during remote administration of a computer and for viewing a computer’s shared resources?
A.NetLogin
B.Print$
C.C$
D.IPC$
45.By default, which printer permission is assigned to the Everyone group?
A.Allow Print
B.Allow Manage Printers
C.Allow Manage Documents
D.Allow Full Control
46.Where is the print spooler kept on a computer running Windows 7?
A.C:\Windows\spool
B.C:\spool
C.C:\Windows\System32\Spool\Printers
D.C:\Windows\Spool\Printers
47.Which of the following tools can be used to restrict what applications a user can run on Windows 7?
A.Applocker in group policies
B.System Configuration tool
C.Application Compatibility Toolkit
D.Computer Management Toolkit
48.Which of the following is NOT a requirement to run Windows XP mode?
A.2 GB of memory
B.A video card with 512 MB of memory
C.A processor and motherboard that support hardware virtualization
D.15 GB of additional free disk space
49.How can you configure Internet Explorer to automatically delete temporary Internet files when you close Internet Explorer?
A.Modify the properties of the Recycle Bin.
B.Modify the security level of the Internet zone.
C.Create a script, and execute it with Task Scheduler.
D.Modify the advanced settings from the Internet Options.
50.What can be done to notify you when a website has change?
A.Configure autoupdate with IIS.
B.Configure dynamic update with IIS.
C.If a website supports RSS, you can configure an RSS feed.
D.Close Internet Explorer, and restart it.
51.Which tab do you use from Internet Options to delete cookies and temporary files?
A.General
B.Security
C.Privacy
D.Connections
52.You have a folder that you want to make available offline. What do you need to do?
A.Share a folder and ensure that the Allow caching of files in this shared folder check box is selected.
B.Map a network drive to the folder and select the cached option.
C.Use the cache command.
D.Grant the cache permission to the user.
53.Which of the following is NOT a way to send an invitation to a user to connect using Remote Assistance?
A. Save the invitation to a file.
B.Use e-mail to send an invitation.
C.Use the Publish in Active Directory Invitation.
D.Use Easy Connect.
54.You have a Bluetooth-enabled handheld device that you want to connect to your laptop. What do you need to do?
A.Configure the passkey and ensure the device is discoverable.
B.Configure the appropriate wireless security method and ensure that the device is discoverable.
C.Turn on the network Discovery and configure the passkey.
D.Configure the passkey and ensure that the mobile device is Wi-Fi-enabled.
55.What program gives you quick access to process and memory utilization and which programs use the processor and memory?
A.Windows Task Manager
B.Performance Monitor
C.Windows Experience Index
D.Event Viewer
56.You insert a flash drive and discover that you cannot make use of all the memory on the USB flash device when configuring ReadyBoost. What do you think the problem is?
A.The USB flash drive has slow flash memory.
B.The USB flash drive has fast flash memory.
C.The USB flash drive has both slow and fast flash memory.
D.The USB flash drive does not meet with the minimum requirements to configure ReadyBoost.
57.You have a user who has had problems during the last few weeks. You need to identify the cause of the problem. Therefore, you want to look at the historical view of workstation performance and see when the problem first started. What should you do?
A.You should use Performance Monitor.
B.You should use the Reliability Monitor.
C.You should use a System Diagnostics Data Collector Set.
D.You should use the Resource Overview tool.
58.Windows fails to start. What can you useto load the minimal set of Windows drivers and services so that you can troubleshoot the problem?
A.Safe mode
B.WinPE
C.Windows Backup
D.System Information
59.System Restore do NOT backup which of the following?
A.Registry
B.COM+ and WMI Information
C.IIS metabase
D.Data files created by a user
60.What can you use to delete all System Protection snapshots on a computer running Windows 7?
A.You should run Disk Defrag.
B.You should run Disk Cleanup for System Restore and Shadow Copies.
C.Restore files from the previous versions.
D.Restore files using System Restore.