You are on page 1of 34

Question 1: Which of the following protocol will DirectAccess use if the computer you are using is able to connect

to the internet but not to the company network? IPHTTPS Question 2: You installed an application which should be denied to access the internet. Your computer uses two connections on different interfaces. The wireless connection is used to access the internet and has a Public network profile. The Ethernet connection is used to share files on the company network only is is in a Domain network profile. Which firewall will you use to deny internet access to the application? Windows Firewall Question 3: You have a driver, which is a .EXE file. You want to add this driver to your mounted offline image of Windows 7 installation. Which of the following is the right command to do so? Here we assume that the image is mounted at c:\instmount and the driver to be added is located at c:\drivers\devdriver.exe. 1. dism /image:c:\instmount /adddriver:c:\drivers\devdriver.exe 2. dism /image:c:\instmount /drivertype:exec /add-driver:c:\drivers\devdriver.exe 3. dism /Windir:c:\instmount /add-driver:c:\drivers\devdriver.exe 4. dism /image:c:\instmount /add-driver:c:\drivers\devdriver.exe /ignoreinf 5. None of the above Question 4: A folder on your computer contains some programs which is used by the users on the network very frequently. These users do not have the program available on their systems. What will you do to make sure that the users using the program from that folder using the shared folder feature have it available in case your computer has to be shutdown for some time? 1. configure caching options for the folder Question 5: How much space must be free to enable system restore on a volume? 3. 300 MB Question 6: You have just installed an update but after doing that, one of your business critical applications is crashing. What will you do to find what is the problem? Read the knowledge base article Question 7: Which of the following is true about configuration passes? Not all configuration passes run in a single Windows 7 Install procedure. Some can be skipped Question 8: What file controls the behavior of Windows 7 on its first boot (Windows Welcome)? 1. oobe.ini 2. oobe.xml 3. welcome.xml 4. setup-0.xml 5. Correct Answer: 2. Question 9: You want to set your Windows 7 laptop to hibernate when the battery level reaches 15%. What will you do? 1. Change the power button actions.

2. Change the power options 3. Use Computer configuration to put the disks to sleep at 15% charge capacity. 4. Change the advanced setting of the power plan in use to match the requirements. 5. Correct Answer: 4. Question 10: You are migrating a network of computers from Windows Vista to Windows 7. All of these computers contain sensitive data. You have been asked that the data should remain intact after migration. It is also mandatory to use offline migration method and use USMT 4.0 for the migration. Which of the following will not be migrated by USMT? 1. EFS Files 2. Windows Internet Explorer Settings 3. Network Drive mapping 4. Phone and Modem options 5. Correct Answer: 4. Question 11: What is Teredo? 1. Teredo is a tunneling protocol used for allowing IPv4 traffic to be encapsulated inside IPv6 packets 2. Teredo is a tunneling protocol used for allowing IPv6 traffic to be encapsulated inside IPv6 packets for communication over the IPv4 internet 3. Teredo is a protocol which can be used to stream multimedia over the IPv6 network 4. Teredo is a file sharing application which utilizes its own distributed servers allowing IPv4 devices to share files over IPv6 network 5. Correct Answer: 2. Question 12: You want to see contents of both IPv4 and IPv6 route table. What command would you use? Choose the first command, which will do the job. There is more than one correct answer in the list. 1. Route print 2. netstat -r 3. tracert d 4. netsh interface ipv4 route 5. Correct Answer: 1. Question 13: Which of the following is not the part of "Minimum requirements" set for installing 64-bit version of Windows 7 Ultimate? 1. 64 bit device drivers

2. 64 bit capable processor 3. 4 GB RAM 4. 20 GB Free disk space 5. Correct Answer: 3. Question 14: You want to use a network location as a backup destination for file backups. You already know password of an administrative account on the machine. What else do you require on the destination computer? Select the first option which seems right to you. There may be more than one correct answers. 1. NTFS permissions 2. Full control share permission 3. Backup permissions 4. Read permissions 5. Correct Answer: 1. Question 15: Which of the following commands will create a recovery agent? 1. Cipher.exe /r:recoveryagent 2. Cipher.exe /recoveryagent /add 3. icacls /newras 4. Cipher.exe /register:recoveryagent 5. Correct Answer: 1. Question 16: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually. 1. Shift + F3 2. Ctrl + Shift + F3 3. Alt + Shift + F3 4. Ctrl + Alt + F3 5. Correct Answer: 2. Question 17: You want to turn off the UAC. What command will you type at the command prompt for this? 1. uac.exe 2. useraccountcontrolsettings.msc 3. control useraccountcontrolsettings 4. useraccountcontrolsettings.exe 5. Correct Answer: 4.

Question 18: What will you use to recover data from a BitLocker encrypted drive? 1. Recovery Agent 2. Data Recovery Agent 3. Computer Recovery Console 4. Windows PE 5. Correct Answer: 2. Question 19: What is Windows XP mode? Windows 7 features something called as Windows XP mode in some of its editions. It is claimed by Microsoft to retain 100% application compatibility for applications which are not completely compatible with Windows 7. What exactly is this Windows XP mode? 1. When Windows 7 enters the XP mode, applications are run in the Windows XP compatibility mode 2. All libraries and executables switch to the inbuilt Windows XP functionality and Windows 7 disables those applications and features which were not available in Windows XP 3. Windows XP is started under a virtual machine which can be used to run the wanted applications 4. When you purchase the Windows XP functionality, it will ask you to install Windows XP separately on the machine. 5. Correct Answer: 3. Question 20: You created a system restore point yesterday and took backup of the user profile and registry. How would you revert back the change in the settings of a user who has forgotten what settings he changed today morning? 1. By using System Restore 2. By using Shadow Copy 3. By restoring the User Profile 4. By restoring the Registry 5. Correct Answer: 3. Question 21: You want to copy a file from one volume to another while retaining the NTFS permissions. Which tool will you use? 1. xcopy 2. copy 3. robocopy 4. It cannot be done 5. Correct Answer: 3. Question 22: One of your clients created a WAP in his home. However, he reports that others around him able to access his network without his permission. What would you suggest him to do?

1. Enable the Windows Firewall 2. Change the settings of his WAP and enable security using either WEP or WAP security algorithms 3. Change the channel being used for WAP 4. Disable ICS 5. Correct Answer: 2. Question 23: Which of the following media cannot be used for scheduled backups? 1. Network Locations 2. USB Flash Drive 3. DVD ROM 4. VHD file 5. Correct Answer: 3. Question 24: Which tool will you use to scan your computer and identify any unsigned drivers on the system? 1. sigverif.exe 2. verify.exe 3. dxdiag.exe 4. devmgmt.msc 5. Correct Answer: 1. Question 25: Which among the following is the extension used for Windows Installer Patch file for an installed application? 1. .MSI 2. .MSU 3. .MSP 4. .CAB 5. Correct Answer: 3. Question 1: How much time will a UAC prompt live on your desktop before denying the elevation to the requesting process? 1. 60 seconds 2. 90 seconds 3. 150 seconds 4. 210 seconds 5. 600 seconds Correct Answer: 3. Question 2: Which of the following media cannot be used for scheduled backups?

1. Network Locations 2. USB Flash Drive 3. DVD ROM 4. VHD file 5. Correct Answer: 3. Question 3: Which command line tool will you use to edit NTFS permissions? 1. lcacls 2. icacls 3. net 4. cipher 5. Correct Answer: 2. Question 4: You want the workstation of a user to be logged off (forcefully) when he pulls out the smart card. Which policy will you configure? 1. Interactive Logon: require Smart Card for logoff 2. Interactive Logon: Smart Card removal Behavior 3. Interactive Logon: Smart Card usage Behavior 4. Interactive Logon: Smart Card Account Control 5. Correct Answer: 2. Question 5: You suspect that your Audio device driver is conflicting with the Ethernet driver. Which tool can help you confirm whether you are right with your suspicion or not? 1. Device Manager 2. Group Policy Editor 3. diverquery.exe 4. driverconflict.wsf 5. Correct Answer: 1. Question 6: You want to check your company's intranet website for compatibility with Windows 7. Which of the following tools will let you do this job? Some web sites may not display well in the new Internet Explorer 8, which comes with Windows 7. So they must be checked for compatibility. In this case we assume that the intranet web site you are trying to test was built for Internet Explorer 6. 1. Application Compatibility Toolkit (ACT) 2. Internet Explorer Administration Kit (IEAK)

3. Program Compatibility Troubleshooter (PCT) 4. Microsoft Deployment Toolkit (MDT) 5. Correct Answer: 1. Question 7: You are trying to analyse the CPU, Memory, Disk and Network Utilization for 5 applications which you think are slowing down the system. You are not able to analyze them in the Performance Monitor windows because of the clutter that they create on the screen. What will you do? 1. Analyze them one by one. 2. Analyze the processes with each property for some time one after another by selecting a different set of counters 3. Use multiple Performance Monitor Windows to monitor each process' attribute 4. Use Process Explorer from the Sysinternals suite of Microsoft. 5. Correct Answer: 3. Question 8: Which of the following is the drawback of sector based imaging which the new .WIM imaging format tries to overcome? 1. sector based imaging is slow 2. sector based imaging is insecure 3. sector based imagin cannot be perfomed over the network 4. sector based imaging forces the destination computer to use the same boot controller as the source 5. sector based imaging forces the two computers to have different HAL Correct Answer: 4. Question 9: You have to edit the booting parameters of a Windows 7 computer. Which one of the following tools will you use to add a new entry to the boot menu with custom booting parameters for the system? You do not want to loose the current set of parameters. For this you have to copy the desired boot entry settings to a new one and then edit it. Select the tool which will can do the job. 1. BootSect 2. BCDEdit 3. BCDBoot 4. Diskpart 5. Correct Answer: 2. Question 10: You want to use BranchCache in Hosted Server mode. What will you require? 1. 2. 3. 4. 5. Windows Server 2008 Windows Server 2003 Windows Server 2008 R2 Any of the above

Correct Answer: 3. Question 11: Your computer runs a program, which is updated very often by its vendor. The program downloads a heavy setup file every time the software is updated. This consumes a large amount of internet network traffic. However, you do not want any updates for this software. What will you do? 1. Uninstall the program 2. Disconnect from the internet while using that program 3. Check for another program which would do exactly what this program does. 4. Use Windows firewall to block this software from connecting to internet 5. Correct Answer: 4. Question 12: You want to roll back to the previous version of a driver for one of your devices. Which tool will you use for the purpose? 1. Device Manager 2. Installed Programs Manager (Control Panel -> Programs -> Programs and Features) 3. Windows Update 4. Computer Management Console 5. Correct Answer: 1. Question 13: Windows 7 will reserve 20% of internet network bandwidth. This rule can be overridden by a system administrator. Which of the following versions of Windows 7 will NOT allow a system administrator to do so? 1. Windows 7 Ultimate 2. Windows 7 Home Premium 3. Windows 7 Professional 4. Windows 7 Enterprise 5. Both "Home Premium" and "Professional" editions Correct Answer: 2. Question 14: Which of the following is not a part of Windows AIK? 1. Windows SIM 2. oscdimg 3. USMT 4. BCDEdit 5. Correct Answer: 4. Question 15: You have been asked to install a Windows 7 Edition which is equivalent to the Windows XP Media Center edition. Which one, of the following editions will you choose? Every edition of Windows 7 resembles the functionality of some edition of Windows Vista. A few editions of Windows 7 resemble the functionality of one of the editions of Windows XP.

You have to choose the edition of Windows 7 which is closer to the Windows XP Media Center edition in terms of functionality and features. 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 4. 7 7 7 7 Ultimate Professional Home Basic Home Premium

Question 16: Which of the following File Systems are valid for installing Windows 7? 1. HPFS 2. NTFS 3. FAT32 4. Both FAT32 and NTFS 5. Both EXT3 and NTFS Correct Answer: 2. Question 17: An error occurred during the Windows install process. The error occurred after Disk configuration was done. You have decided to check the log files to find what went wrong. Assuming that Windows was being installed on the Volume 'E:', where will you look for the log files? 1. E:\Windows\Panther 2. E:\Windows\Inf\Setupapi*.log 3. E:\Windows\System32\Sysprep\Panther 4. Windows stops logging actions after disk configuration; hence, the log file will not be available 5. Correct Answer: 1. Question 18: You want to change the amount of space the pagefile consumes to increase the system performance for an application which over-utilizes the system memory. Where can you change this setting? 1. Advanced System Settings in Control Panel\System and Security\System 2. Advanced System Settings in Control Panel\System 3. Local GPE 4. perfmon.exe 5. Correct Answer: 1. Question 19: You are not able to make a file available offline. What could be the reason? 1. The network location type is set to "Public". 2. The target computer has disabled caching. 3. You do not have the permissions to write in the folder Windows uses to store the offline files 4. Windows 7 does not support this feature. 5.

Correct Answer: 2. Question 20: How many firewalls does Windows 7 implement? 1. 1 2. 2 3. 3 4. 4 5. Correct Answer: 2. Question 21: You are on a network with subnet mask of 255.255.0.0 the default gateway is 192.168.1.254. Which of the following is a valid IP address on this network? 1. 192.167.1.10 2. 192.168.1.1 3. 192.168.1.255 4. 192.168.1.0 5. Correct Answer: 2. Question 22: A spanned volume can utilize the free space on more than one disk. What is the drawback of such disks? 1. The chances of data loss are high 2. They cannot use multiple free spaces on the same disk 3. You cannot install application programs on them 4. There is a performance drop 5. Correct Answer: 1. Question 23: Which command can be used to add or remove drivers from the Driver Store? 1. devmgmt.msc 2. pnputil.exe 3. drvinst.exe 4. driverquery.exe 5. Correct Answer: 2. Question 24: You want to run notepad as user "Prince" on the local computer. You want to open a file named C:\rcv.txt which has been encrypted by Prince and it is the only account which can decrypt the file. Which of the following commands will you run to achieve the goal? 1. 2. 3. 4. 5. runas runas runas runas /user:Prince "notepad.txt C:\rcv.txt" /user:Prince "notepad.txt C:\rcv.txt" /env /profile /user:Prince "notepad.txt C:\rcv.txt" /trustlevel /user:Prince "notepad.txt C:\rcv.txt"

Correct Answer: 3. Question 25: Read the following description and answer the given quesiton. You are running Windows 7 on an older hard disk of 40 GB capacity. The hard disk contains two volumes of 30 Gb and 10 GB. You have an external hard disk which is also of 40 Gb and is similarly divided into two volumes of 31 GB and 9 GB. Both the volumes are empty. Both are detected by Windows and shown empty but when you try to use the 30 GB volume on external Hard disk, you are not able to do so. What may be the reason? 1. It does not contain enough space for backup 2. It is detected as old and Windows 7 cannot use old devices. 3. It may be formatted with FAT32 4. It contains a Linux partition 5. Correct Answer: 3.

Question 1: Which command will you use to update the configuration of a volume to support a newly installed DRA? 1. Cipher.exe 2. manage-bde.exe 3. command.com 4. fdisk.exe 5. managebde.ex e Correct Answer: 2. Question 2: Which of the following commands can be used to prepare a USB pen drive so that Windows 7 can be installed using the USB pen drive? 1. Compmgmt.msc 2. diskpart.exe 3. BCDedit.exe 4. LoadState.exe 5. Correct Answer: 2. Question 3: Which of the following is true about "sysprep" tool? 1. It can be used to install a new Windows 7 Operating System on the computer 2. It can be used to configure the Windows 7 Operating System installed on your system 3. It can be used to capture an image of an installed Windows 7 copy for later deployment

4. Sysprep does the same work as ImageX 5. Correct Answer: 3. Question 4: You have been restricted to access the command prompt or run batch files. You have to prepare a USB drive for booting Windows 7 for installation on a netbook. Which of the following tools will you use to accomplish this task? 1. Windows Movie Maker 2. Windows 7 USB DVD tool 3. Windows Disc Buring tool (inbuilt) 4. diskpart.exe 5. Correct Answer: 2. Question 5: You suspect that there is some problem with one of the 8 network interfaces. You suspect that it may be a driver problem, while your colleague says it may be disabled. There is also a possibility of a configuration clash. Which DCS report will you analyze the problem? 1. System Diagnostics 2. System Performance 3. Create a custom DCS for the purpose 4. Use Reliability Monitor instead 5. Correct Answer: 1. Question 6: You want to create an application restriction rule for the users on your network. You also want that this rule should remain applicable even after that application is updated. Which of the following technologies will you use? You are trying to block the application for a specific group of users on the network on all computers. 1. Software Restriction Policies 2. AppLocker 3. NTFS permissions 4. Microsoft Deployment Toolkit (MDT) 5. Any of the above can be used Correct Answer: 2. Question 7: Which of the following disk management utility is not present in Windows 7? 1. 2. 3. 4. 5. Disk Management Console Disk Cleanup diskpart fdisk

Correct Answer: 4. Question 8: How will you update a VHD file with latest software updates? Keep in mind that this file is to be kept for emergent uses. 1. Use a tool made for the purpose 2. Install updates in a Windows installation and then image it to WIM, then convert it to VHD using Wim2VHD tool 3. Boot it on the computer with Windows 7 and install the updates 4. Run it under Virtual PC and then update it 5. Correct Answer: 1. Question 9: You are going to prepare a system for imaging. You want that after deployment, the users should be given the option to customize their copy of Windows 7. They should be allowed to create user accounts, name the computer and so on. Which of the following switches of "sysprep" will allow you to do this? 1. /audit 2. /oobe 3. /attend 4. /generalize 5. Correct Answer: 2. Question 10: Select the edition of Windows 7 which will give your company the option to boot from VHDs. You have been asked to install Windows 7 on all computers in a network of a company. The company decided to make this move to avail the beneit of booting from virtual hard disk files on many of its computers. VHD booting is available in only selected editions of Windows 7. Select the edition which will give you the feature at least price. 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 4. 7 7 7 7 Professional Home Premium Business Enterprise

Question 11: You want to set your Windows 7 laptop to hibernate when the battery level reaches 15%. What will you do? 1. Change the power button actions. 2. Change the power options 3. Use Computer configuration to put the disks to sleep at 15% charge capacity. 4. Change the advanced setting of the power plan in use to match the requirements. 5. Correct Answer: 4.

Question 12: You are running Windows 7 Enterprise. Which of the following is the most suitable backup destination for a failover backup? 1. DVD ROM 2. USB Flash Drive 3. Network 4. VHD file 5. Correct Answer: 4. Question 13: You are trying to run system restore on your Windows 7 Enterprise edition system while one of your drives has utilized all the space allocated for System Restore function. What will happen in this case? 1. System Restore will fail 2. Windows will ask you to increase the space for System Restore 3. System Restore will still work 4. Windows will ask you to change the Group Policy which controls this setting 5. Correct Answer: 3. Question 14: You want to capture a Windows 7 image of a reference computer in the WIM format and then deploy it. You need to specify the source directory of the WIM file resides and then specify whether Setup or Sysprep files are required (or not). You then want to move the file to the distribution share for deployment of the captured Image. Which tool will let you do this? 1. WDS 2. MDT 3. SCCM 4. SIM 5. Correct Answer: 2. Question 15: Which of the following can be used to see the list of the shared folder by a Windows 7 computer? 1. The net share command 2. The group policy editor 3. The Network and Sharing center 4. Windows Explorer 5. Correct Answer: 1. Question 16: What is the file format used for the answer files used in Windows 7 installation procedure? 1. INI 2. INF 3. XML

4. INI 5. Correct Answer: 3. Question 17: On which of the following device's advanced tab of device properties window will you find the "Bandwidth" property? 1. USB mass storage device 2. USB root hub 3. USB Universal host controller 4. Ethernet Network Adapter 5. Correct Answer: 3. Question 18: Which of the following commands will create a recovery agent? 1. Cipher.exe /r:recoveryagent 2. Cipher.exe /recoveryagent /add 3. icacls /newras 4. Cipher.exe /register:recoveryagent 5. Correct Answer: 1. Question 19: What will this command do when you type it in an elevated command prompt "netsh interface ipv6 add v6v4tunnel remote 10.0.0.100 192.168.124.136" ? 1. Create an IPv6-in-IPv4 tunnel between remote address 192.168.124.136 2. Create an IPv6-in-IPv4 tunnel between remote address 10.0.0.100 3. Create an IPv4-in-IPv6 tunnel between remote address 192.168.124.136 4. Create an IPv4-in-IPv6 tunnel between remote address 10.0.0.100 5. Correct Answer: 1. the local address 10.0.0.100 and the the local address 192.168.124.136 and the the local address 10.0.0.100 and the the local address 192.168.124.136 and the

Question 20: Which of the following system is used to automatically create an answer file for unattended formatting, installation and setting customization for new Windows 7 installation? 1. Windows System Image Manager 2. Sysprep 3. Windows Preinstallation Environment Configuration System 4. Tools in Deploy.cab 5. ImageX Correct Answer: 1. Question 21: What file controls the behavior of Windows 7 on its first boot (Windows Welcome)?

1. oobe.ini 2. oobe.xml 3. welcome.xml 4. setup-0.xml 5. Correct Answer: 2. Question 22: Windows 7 has been failing to boot on each alternate boot. You enabled boot logging option. What file will contain the log data? 1. Ntboot.log 2. ntbtlog.log 3. ntbtlog.txt 4. boot.ini 5. Correct Answer: 3. Question 23: You need to find out the amount of writeable space available on a Windows PE system volume when booted in RAMdisk mode. Assuming that the PE image is mounted in the C:\WinPEMount directory, what command would you use? 1. dism /image:c:\winpemount 2. dism /image:c:\winpemount 3. dism /image:c:\winpemount 4. dism /image:c:\winpemount 5. Correct Answer: 1. /get-scratchspace /get-profile-info /get-profiling /spaceinfo

Question 24: A computer running Windows 7 Enterprise is suddenly booting into recovery mode. The user of the computer is sure that he has not changed any setting. Which of the following cannot be a problem you would suspect? 1. User is trying to boot without the USB key 2. User is not entering the right PIN 3. TPM was cleared 4. The Boot environment has changed 5. Windows was updated the last time it ran successfully. Correct Answer: 5. Question 25: You have to create a ISO image of a customized version of 64-bit Windows PE. The resulting ISO file should be in UDF format. Which of the following tool will you use? 1. oscdimg 2. WinPEUtil 3. diskedit 4. WinPEinit 5. WinPEshl Correct Answer: 1.

Question 1: You want to find out, which user accounts are allowed to access data in a folder containing sensitive commercial documents. Your machine runs on Windows 7 Enterprise. What will you configure? 1. EFS 2. NTFS permissions 3. Auditing 4. BitLocker 5. Correct Answer: 3. Question 2: What is UAC or User Account Control? 1. It is a security feature which informs you when you take an administrative action. 2. It is a security feature to elevate the permissions temporarily for some administrative work. 3. It is a feature which can temporarily elevate a standard user to administrative level. 4. All of the above. 5. Correct Answer: 4. Question 3: You want to change the network settings on your Windows 7 machine. Which of the following will you open? 1. Windows PowerShell 2. Windows Command Prompt 3. Elevated Command Prompt 4. Windows PowerShell ISE 5. Correct Answer: 3. Question 4: What is the main difference between the Remote Desktop and Remote Assistance? 1. Remote Desktop can be used to control the computer. Remote Assistance can be used only to see the computer remotely. 2. Remote Desktop will handover the complete control of the desktop. Remote Assistance can be used to share control of the desktop. 3. Remote Desktop can be used inside the protected network only. Remote Assistance can be used to connect to any Windows desktop anywhere on the internet. 4. Remote Desktop is dependent on a Windows 7 service while Remote Assistance

can be run without requiring the service 5. Correct Answer: 2. Question 5: Read the description and choose the right answer. The network of computers you manage performs extremely well compared to the other networks in the office. The branch head is very happy with you. Being a technical guy himself, he has asked all the IT administrators to use Xperfview.exe to show a visual trace analysis of the systems on their network. You try to run this tool but you do not find it anywhere on the system. All computers managed by you use Windows 7 Enterprise. Which tool do you need to install? 1. The tool is available only on Windows Ultimate. 2. It is available with Visual Studio 2008 Professional Edition. 3. It is available in the Sysinternals Suite of applications. 4. It comes in the WPT package 5. Correct Answer: 4. Question 6: Which policy will you configure to disable BitLocker to go on your client's Windows Vista machine? 1. Control Use of BitLocker On removable Drives 2. Deny Write access to removable Drives Not protected By BitLocker 3. Configure Use Of passwords For removable Data Drives 4. Choose how BitLocker-protected removable Drives Can Be recovered 5. Correct Answer: 1. Question 7: You have a folder named "sharedata" on your computer. You want to allow the users on the network to read the files on the folder, modify the files, add new files and delete files in the folder. You have created the account necessary for the purpose. What permissions will you assign to that account for the given folder? 1. Read 2. Change 3. Full control 4. We need to edit the advanced permissions for the folder. 5. Correct Answer: 2. Question 8: Read the following description and select the right answer from the list. You have just joined a company as an IT administrator. The company runs software which was disallowed from accessing any network using Windows Firewall rules. Now the company has setup a new network in the same domain, which has services running on all its computers which require communicating with the blocked software on the other network to get the work done. What will you modify in the rule which allows the software for communication but restricts it to the new network only?

1. Protocols and ports 2. Scope 3. Domain 4. Interface Types 5. Correct Answer: 2. Question 9: You are an IT administrator in a company. You have been given a removable media which is encrypted with BitLocker. You are also asked to use this media to store a VHD file which will be used for booting physical computers. What are the chances that this setup will work? 1. It will not work at all. 2. It will work without problems 3. When booting, bootmgr will ask for the password used to encrypt the drive. 4. When booting, bootmgr will ask for the key used to encrypt the drive. 5. Correct Answer: 1. Question 10: Which of the following is not one of the Application Compatibility Diagnostics Policies? 1. Notify Blocked Drivers 2. Detect Application Failures Caused By Deprecated COM Objects 3. Detect Operating System version failure 4. Detect Application Install Failures 5. Correct Answer: 3. Question 11: You have uninstalled an update. What will happen to that update? 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 3. will will will will never install it again. hide the update. install it again in the next update session. not install it unless explicitly allowed by an administrator.

Question 12: Considering all computers on a network running on Windows Vista are upgraded to Service Pack 2, which of the following upgrades are not possible? 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 3. Vista Vista Vista Vista Business Business Business Business x86 x64 x86 x86 to to to to Windows Windows Windows Windows 7 7 7 7 Ultimate x86 Ultimate x64 Ultimate x64 Enterprise x86

Question 13: Windows 7 uses .WIM format for creating images for deployment. What type of image is .WIM? 1. File based 2. Sector based 3. Configuratble as either File based or Sector based while creation process 4. Its an ISO image with the extension changed to .WIM 5. Correct Answer: 1. Question 14: Which of the following type of images cannot be created by WDS? 1. Install Images 2. Boot Image 3. Capture Image 4. Discover Image 5. Service Image Correct Answer: 5. Question 15: Which of the following will not use the VHD file format? VHD files can be used to contain a Windows 7 installation and then use them for booting on different computers. 1. Hyper-V 2. Microsoft Virtual Server 3. Virtual PC 4. XEN 5. Correct Answer: 4. Question 16: You have moved a file named data.dat from C:\Source to D:\Destination. While data.dat was compressed, the folder D:\Destination is encrypted. What will happen to the file? 1. It will be both compressed and encrypted. 2. It will be compressed but not encrypted. 3. It will be decompressed and encrypted. 4. Windows 7 will prompt you to make a selection to either keep the file as compressed or Encrypted. 5. Correct Answer: 3. Question 17: What is the biggest benefit of a stripped volume? Stripped volume can be created using the disk management utility in Windows 7. You have to select the most important reason why you would implement this type of volume? 1. It gives data transfer boost 2. It provides security to the data by automatically encrypting it 3. It keeps more than one copy of data, hence preventing data loss in case of a single disk failure

4. Such a volume will not need defragmentation 5. Correct Answer: 1. Question 18: Which of the following commands will you use to configure Windows to force users to change their passwords at a regular basis? 1. control.exe 2. wscript.exe 3. passcntl.exe 4. Any of the above 5. None of the above Correct Answer: 5. Question 19: Windows 7 has been failing to boot on each alternate boot. You enabled boot logging option. What file will contain the log data? 1. Ntboot.log 2. ntbtlog.log 3. ntbtlog.txt 4. boot.ini 5. Correct Answer: 3. Question 20: Which tool will you use to change the boot order of your Windows 7 Professional computer, which is currently dual booting with Windows Vista Ultimate? 1. MDT 2. USMT 3. System Configuration Tool 4. Computer Management Console 5. Correct Answer: 3. Question 21: You suspect that you have set the network location of a network connection to Public, which should be set to Home. Where would you go to check this? 1. Open the command prompt and use the ipconfig tool. 2. Open the Adpater properties of the network connection concerned. 3. Reboot the system. This will automatically ask me to set the network types once again. 4. Open the Network and Sharing Center 5. Correct Answer: 4. Question 22: Which command can be used to add or remove drivers from the Driver Store? 1. devmgmt.msc 2. pnputil.exe 3. drvinst.exe

4. driverquery.exe 5. Correct Answer: 2. Question 23: Which of the following disk management utility is not present in Windows 7? 1. Disk Management Console 2. Disk Cleanup 3. diskpart 4. fdisk 5. Correct Answer: 4. Question 24: You wanted to set the DNS server for your computer's Local Area Connection interface to 10.0.0.1. Which of the following commands will you type in an elevated command prompt? 1. netsh interface 2. netsh interface 3. netsh interface 4. netsh interface 5. Correct Answer: 2. ipv4 ipv4 ipv4 ipv4 set set set set dns "local area connection" static 10.0.0.1 dnsservers "local area connection" static 10.0.0.1 dnsservers default 10.0.0.1 dnsservers "local area connection" 10.0.0.1

Question 25: In a normal representation, IPv6 128-bit address is divided at 16-bit boundaries and each block of 16-bit is again converted to sets of 4-digit hexadecimal number. In addition, colons are used as separators. What is this representation usually called? 1. IPv6 representation 2. Hex representation 3. colon-hexadecimal representation 4. colon-division representation 5. Correct Answer: 3.

Question 1: You want to set specific power settings on all the computers on the network. Which tool will help you do this? 1. powercfg.exe 2. control.exe 3. powerexp.wsf 4. Local GPE 5. Compmgmt.msc Correct Answer: 1.

Question 2: Which of the following is not an IP range reserved by IANA for use in private networks only? 1. 10.0.0.1 through 10.255.255.254 2. 172.16.0.1 through 172.31.255.255 3. 192.168.0.1 through 192.168.255.255 4. 127.0.0.1 through 127.1.255.255.255 5. Correct Answer: 4. Question 3: Which tool will you use to scan your computer and identify any unsigned drivers on the system? 1. sigverif.exe 2. verify.exe 3. dxdiag.exe 4. devmgmt.msc 5. Correct Answer: 1. Question 4: Which of the following tools in Windows AIK is recommended for manipulating and managing offline images? 1. USMT 2. DISM 3. IMAGEX 4. BCDBOOT 5. Correct Answer: 2. Question 5: UAC automatically allows the older applications to write data elsewhere when they try to write to system folders. You want to deny any such accesses completely. Which policy will you configure? 1. User Account Control: Locations 2. User Account Control: 3. User Account Control: Secure Locations 4. User Account Control: Signed And Validated 5. Correct Answer: 1. Virtualize File And Registry Write Failures To Per-User Behavior Of The Elevation Prompt For Standard Users Only Elevate Uiaccess Applications That Are Installed In Only Elevate Executables That Are

Question 6: Which of the following cannot be done using Windows SIM? Windows SIM is used to create answer files for unattended setups. While it can help you manage things easily, it does not come with an all-in-one functionality. Choose the one functionality which will not be available via this tool. 1. Validate the settings of an existing answer file against a .wim file 2. Update an existing answer file 3. Add third-party drivers, applications, or other packages to an answer file 4. Adding custom applications to the Windows Image file 5. Correct Answer: 4. Question 7: You have just plugged in a device in a USB port available on your computer. You want to know how much power that device requires. In which tab of the device properties window will you find the information? 1. Power 2. Power Management 3. Advanced 4. Details 5. Correct Answer: 1. Question 8: Which of the following is a valid filename to be placed in the %SYSTEMROOT %\System32 of a customized Windows PE image to load a customized shell instead of the default sommand prompt during the installation process of Windows 7? Windows PE can load a customized command prompt during installation by reading a file from the Windows PE image. This file controls the application to be launched as a shell. Select the filename which is to be used for controlling this behavior. 1. Wpeinit.ini 2. Winpeshl.ini 3. Winpeutil.inf 4. Winpeinit.inf 5. Correct Answer: 2. Question 9: Which tool will you use to remove the credentials from the Windows 7 computer? 1. Del 2. rem 3. Local GPE 4. Credentials manager 5. Correct Answer: 4. Question 10: What does MDT stand for? 1. Microsoft Deployment Toolkit

2. Microsoft 3. Microsoft 4. Microsoft 5. Microsoft Correct Answer: 1.

Development Toolkit Demonstration Tools Deployment Tools Deployment Toolset

Question 11: How will you run Wim2VHD tool? 1. cscript wim2vhd.exe 2. wim2vhd.wsf 3. cscript wim2vhd.wsf 4. wim2vhd.exe 5. Correct Answer: 3. Question 12: Performance Monitor will show the current activity in the graph. What will you do to make it show graph from a log file? 1. Open the properties and select the source as log file. 2. Click on "add a counter" button and select the item as "log file" from the primary list. 3. Open the log file as a report and double click to show it as a graph. 4. Launch the Resource monitor and open the log file in resource monitor and then attach the process of performance monitor to the Resource monitor. 5. Correct Answer: 1. Question 13: Read the following description and answer the question given. Your computer has two physical hard disks, both of them contain a single volume with Windows 7 Ultimate and Windows Vista Ultimate installed on them. You want to take backup of your Windows 7 OS. Which drive will you use? 1. The disk which has Windows 7 installed on it 2. Any of the disks can be used 3. None of the disks 4. The disk with Windows Vista installed on it 5. Correct Answer: 3. Question 14: You are planning to capture an image of a Windows 7 installation and then deploy it on the same computer. Which of the following options are not necessary in this scenario? 1. /generalize 2. /oobe 3. /restart 4. /quit 5. /unattend Correct Answer: 1.

Question 15: You want to allow other computers to ping your computer by its IPv6 address. Which command will you run? 1. netsh firewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow 2. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6 dir=in action=allow 3. netsh firewall firewall add rule name="ICMPv6" protocol=icmp6:any dir=both action=allow 4. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmp6:any,any dir=in action=allow 5. netsh advfirewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow Correct Answer: 5. Question 16: You have to edit the booting parameters of a Windows 7 computer. Which one of the following tools will you use to add a new entry to the boot menu with custom booting parameters for the system? You do not want to loose the current set of parameters. For this you have to copy the desired boot entry settings to a new one and then edit it. Select the tool which will can do the job. 1. BootSect 2. BCDEdit 3. BCDBoot 4. Diskpart 5. Correct Answer: 2. Question 17: On which of the following file systems Windows 7 will not be able read or write? 1. NTFS 2. FAT32 3. exFAT 4. HPFS 5. Correct Answer: 4. Question 18: An error occurred during the Windows install process. The error occurred after Disk configuration was done. You have decided to check the log files to find what went wrong. Assuming that Windows was being installed on the Volume 'E:', where will you look for the log files? 1. E:\Windows\Panther 2. E:\Windows\Inf\Setupapi*.log 3. E:\Windows\System32\Sysprep\Panther 4. Windows stops logging actions after disk configuration; hence, the log file will not be available 5. Correct Answer: 1.

Question 19: Where will you look for the AppLocker audit events in the Event viewer? 1. Windows -> System 2. Windows -> Application 3. Applications and Service Logs -> Microsoft -> Windows 4. Applocker audit events are recorded in separate XML file. They are not logged in the Event logs 5. Correct Answer: 3. Question 20: Considering all computers on a network running on Windows Vista are upgraded to Service Pack 2, which of the following upgrades are not possible? 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 3. Vista Vista Vista Vista Business Business Business Business x86 x64 x86 x86 to to to to Windows Windows Windows Windows 7 7 7 7 Ultimate x86 Ultimate x64 Ultimate x64 Enterprise x86

Question 21: What will you do to restore default settings in Windows firewall? 1. Manually change the firewall settings on all interfaces to match the default settings on a fresh install of Windows 7 2. In an elevated command prompt, run the command netsh firewall action=setdefault 3. In Control Panel, click System and Security. Click Windows Firewall. In the left pane, click Restore Defaults. 4. Windows firewall settings cannot be changed back to default. 5. Correct Answer: 3. Question 22: Assuming that you are able to open all the tools listed below, which one will you open if you had to perform a recovery using a system Image? 1. Command prompt 2. Control Panel 3. Windows Explorer 4. Character Map 5. Correct Answer: 2. Question 23: Which of the following is a Teredo address? 1. 2. 3. 4. 5. 2001::0a0a:1efe:e876:eff:f5ff:ebee fec0:0:0:0:fffe::1 2002:c058:6301:: fe80::5efe:0a00:028f

Correct Answer: 1. Question 24: There is a network of computer with 11 computers. One of these computers is connected to a printer which is shared among all the other computers on the network. You have to make sure that the person sitting on the computer physically connected to the printer is able to manage the print queues but is not able to change the printer permissions. What permission should he be assigned? 1. Print 2. Manage Documents 3. Manage This Printer 4. The user to the list of administrators 5. Correct Answer: 2. Question 25: You want to enable system restore for an External USB Flash drive but you are not able to find the volume in the list of drives for which system protection can be enabled. What is the problem? 1. Windows 7 does not support Restore points on USB devices 2. USB device is in FAT32 file format. 3. USB device is not having sufficient space 4. Windows 7 does not have the System Protection feature. 5. Correct Answer: 2.

Question 1: You tried to instal Windows 7 on a computer and make it dual boot with Windows XP which was already installed on the system. However, the installation failed and corrupted the boot sector of the Volume where Windows XP was installed. Which of the following commands will you run from the Windows 7 DVD to ensure that the boot code on the Windows XP volume becomes usable again. Assume that Windows XP was installed on a volume with drive letter D:. Also, note that the volume is using NTFS as the file system. 1. BCDEdit /restore:MBR /volume:D 2. bootsect.exe /nt60 D: 3. bootsect.exe /nt52 D: 4. BCDEdit /restore D: 5. Correct Answer: 3. Question 2: Which of the following will not be backed up in manual backup run through Windows backup? 1. Encrypted Files 2. Compressed files 3. Appdata folder of the User

4. Folders in the %systemdrive% 5. Correct Answer: 1. Question 3: What is the risk of disabling DEP? 1. Malware threat gets increased 2. System Performance drops 3. Shutdown time is increased 4. Hibernation option is not available 5. Correct Answer: 1. Question 4: What does the utility ImageX will do? 1. Capture new volume image 2. Apply a volume image 3. Append a new volume image 4. All of the above 5. Correct Answer: 4. Question 5: Which of the following settings is the best way to keep your computer updated with latest software updates for Windows 7 Operating System? 1. Install Updates automatically 2. Download Updates But Let Me Choose Whether to Install them 3. Check For Updates But Let Me Choose Whether to Download and Install them 4. Never Check For Updates 5. Correct Answer: 1. Question 6: Which of the following tools will you use to change the rules for new device driver installations? 1. Group Policy Editor 2. Device Manager 3. Computer Management Console 4. pnputil.exe 5. Correct Answer: 1. Question 7: On which of the following device's advanced tab of device properties window will you find the "Bandwidth" property?

1. USB mass storage device 2. USB root hub 3. USB Universal host controller 4. Ethernet Network Adapter 5. Correct Answer: 3. Question 8: When a Windows 7 computer is configured to get its IP address using DHCP and a DHCP server is not available on the network, it will assign an IP address to itself. What range will this IP address be in? 1. 127.0.0.1 through 127.0.255.255 2. 10.0.0.1 through 10.0.0.254 3. 169.254.0.0 through 169.254.255.255 4. 192.168.11.0 through 192.168.11.255 5. Correct Answer: 3. Question 9: You have implemented a disallow rule using the Software Restriction Policies using the path rule to deny the execution of a software. What is drawback of this approach? 1. The application will not be shown in the Control panel's list of programs 2. A change in path will make the rule ineffective 3. The rule will not persist after system reboot 4. An update will make rule ineffective 5. Correct Answer: 2. Question 10: You want to change the amount of space the pagefile consumes to increase the system performance for an application which over-utilizes the system memory. Where can you change this setting? 1. Advanced System Settings in Control Panel\System and Security\System 2. Advanced System Settings in Control Panel\System 3. Local GPE 4. perfmon.exe 5. Correct Answer: 1. Question 11: You have to install Windows 7 on a machine, which has Intel Core i7 processor and 16 GB of RAM. Which of the following editions of Windows 7 will you install to make sure that none of the resources are under-utilized? 1. Windows 2. Windows 3. Windows 4. Windows 5. Correct Answer: 1. 7 7 7 7 Ultimate x64 Home Basic x64 Home Premium x86 Starter x64

Question 12: You deployed a Windows 7 installation in form of a VHD file for 25 employees. Their computers have been configured to boot from the VHD file. Which of the following functions will not work when they boot from the VHD file? 1. EFS 2. Windows search 3. plug and play devices 4. Windows hibernate function 5. Correct Answer: 4. Question 13: Select the first command from the list below, which you can use to backup EFS file certificate(s). 1. Cipher.exe 2. Cipher.exe /x 3. cipher.exe /export 4. cipher.exe /x filename.pfx 5. Correct Answer: 2. Question 14: You do not want the desktop to freeze and dim when UAC prompt occurs. Which feature will you disable when setting the policy for achieving the goal? 1. Secure Desktop 2. Secure Screen 3. Dimmed Display 4. Dimmed Desktop 5. Correct Answer: 1. Question 15: Which of the following can violate the licensing terms and conditions? You have to think about mass deployment scenarios where one image is used to install Operating System on hundreds of computers. In this question, the term image means "installation image". This image will be used to install Windows 7 on multiple computers. 1. Installing drivers on the reference computer and then imaging it 2. Applying software update to an offline image 3. Installing additional applications on the reference computer and then imaging it 4. Doing mass deployment of Windows 7 without buying the "Mass Deployment License" from Microsoft 5. Correct Answer: 3. Question 16: Some updates have failed to install in the last update session. Which tool will you use to see the list? 1. update.exe 2. Control.exe 3. Winupdate.exe

4. show /updates:Windows 5. Correct Answer: 2. Question 17: Which of the following factors cannot be used to restrict a computer's connection to the corporate intranet? 1. Windows Firewall activation status 2. Status of Automatic Updates 3. Whether or not the computer uses TLS to access the webpages using Internet Explorer 4. Check whether Antivirus software is installed or not 5. Status of Anti-spyware software Correct Answer: 3. Question 18: What is a plug-and-play device? 1. A device, 2. A device, 3. A device, 4. A device, 5. Correct Answer: 3. which can be plugged to a computer from outside which does not need any drivers for which the driver gets installed automatically which can play multimedia files upon plugging

Question 19: Read the description and select the best answer. One of your business critical applications uses a service installed by the application. The application needs it every 10 minutes to send some report data to a central server. You have just installed a Windows update which makes this service crash every 37 minutes exactly. There is a strict instruction not to roll back this update under any circumstances. What will you do to make this service available when the application needs it? 1. Change the startup type to manual 2. Set the recovery option to launch it after crash. 3. Both of the above. 4. You have to start the service from the services snap-in of Management Console 5. Correct Answer: 3. Question 20: A computer network consists of computers running 5 different editions of Windows 7 namely "Home Premium","Home Basic", "Professional", "Enterprise" and "Home Starter". Which of the following OS edition(s) can be used as a network backup location? A few editions of Windows 7 cannot backup to network locations. You need to judge your answer based on the knowledge of which ones cannot backup to the network. 1. Home Premium only 2. Home Basic only 3. Enterprise edition only 4. Both Home Premium and Enterprise editions can be used 5. Correct Answer: 3.

Question 21: Which of the following cannot be done using ConfigMgr or SCCM? 1. Metering software usage 2. Creating boot image for Windows 7 and Windows Vista 3. Remote administration of computers 4. Deploying operating systems and software updates 5. Correct Answer: 2. Question 22: Your computer shares a folder containing a lot of files on the network using the shared folder feature in Windows 7. How will you get the list of files which are currently being accessed on the network? 1. Open the command 2. Open the Computer Sessions node 3. Open the Computer Shares node 4. Open the Computer Open Files node 5. Correct Answer: 4. prompt and use the command foldershare /list:current management console and navigate to the Shared Folders | management console and navigate to the Shared Folders | management console and navigate to the Shared Folders |

Question 23: What is transparent caching? 1. A feature of Windows to make the source window transparent using Windows AERO. 2. A feature of Windows which makes all the files accessed over network shares available on the local computer. 3. A caching method which utilizes the system memory (RAM) to cache files but does not use the disk. 4. A technology to use BranchCache on those editions of Windows who are not part of a corporate network. 5. Correct Answer: 2. Question 24: You can skip Windows Welcome and boot directly to Audit mode by pressing a key at the first Windows Welcome screen. Which of the following is the right combination for this work? In case you want to deploy Windows 7 on only a handful of computers, you may want to enter the audit mode manually. 1. Shift + F3 2. Ctrl + Shift + F3 3. Alt + Shift + F3 4. Ctrl + Alt + F3 5. Correct Answer: 2. Question 25: Can you restore multiple previous versions of the same file?

1. Yes 2. No 3. Yes, but only for those files which were not in any of the subfolders of the user profile folder 4. Yes, but only for those files which were backed up 5. Correct Answer: 1.

You might also like