mcts training kit 70 - 686 Windows 7 Enterprise Desktop Support administrator phần 10 pot

60 250 0
mcts training kit 70 - 686 Windows 7 Enterprise Desktop Support administrator phần 10 pot

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 2: Lesson Review Answers   Lesson 2   Correct Answer: B   Incorrect: Windows 7 Home Premium does not support deployment to a VHD le. This edition also does not support activation through KMS.   Correct: Windows 7 Enterprise supports deployment to a VHD le on a physical host and also supports KMS activation.   Incorrect: Although Windows 7 Ultimate supports deployment to a VHD, this edition of Windows does not support KMS activation.   Incorrect: Windows 7 Professional does not support deployment to a VHD. You can use Windows 7 Professional with KMS activation.   Correct Answer: C   Incorrect: Windows 7 Enterprise includes licenses to allow four instances rather than two instances.   Incorrect: Windows 7 Enterprise includes licenses to allow four instances rather than three instances.   Correct: Windows 7 Enterprise includes licenses to allow four instances of the product to be run virtually without requiring additional licenses.   Incorrect: Windows 7 Enterprise includes licenses to allow four instances rather than ve instances.   Correct Answer: A   Correct: Only the Enterprise and Ultimate editions of Windows 7 support BranchCache. Only an x64 version supports 16 GB of RAM.   Incorrect: Only the Enterprise and Ultimate editions of Windows 7 support BranchCache. The x86 version does not support 16 GB of RAM.   Incorrect: Only the Enterprise and Ultimate editions of Windows 7 support BranchCache. The Professional edition of Windows 7 does not.   Incorrect: Only the Enterprise and Ultimate editions of Windows 7 support BranchCache. The Professional edition of Windows 7 does not. The x86 versions do not support 16 GB of RAM.   Correct Answers: A and C   Correct: Hyper-V supports hosting x64 versions of Windows 7 Enterprise, which is required if 8 GB of memory is to be allocated to the client.   Incorrect: Virtual PC 2007 does not support x64 clients, so it is unable to support a virtual client assigned 8 GB of memory.   Correct: Virtual Server 2005 R2 supports hosting x64 operating systems, so it can support hosting the x64 version of Windows 7 Enterprise.   Incorrect: Windows Virtual PC does not support hosting x64 versions of Windows 7 Enterprise.   Lesson 3   Correct Answers: A, B, and C   Correct: Windows 7 supports ofine migration by using USMT.   Correct: Windows XP Professional supports ofine migration by using USMT.   Correct: Windows Vista supports ofine migration by using USMT.   Incorrect: Windows 2000 Professional does not support an ofine migration by using USMT.   Correct Answer: D   Incorrect: MigApp.xml contains rules about the migration of application settings.   Incorrect: Cong.xml contains information about what should be excluded from migration.   Incorrect: MigUser.xml contains information about migrating user proles and user data.   Correct: MigDocs.xml allows you to congure rules that specify the location of custom user documents folders.   Correct Answer: C   Incorrect: Hard-link migration stores use the original les, so you cannot encrypt a hard-link migration by using Scanstate.exe.   Incorrect: You cannot encrypt uncompressed migration stores by using Scanstate.exe.   Correct: You can encrypt compressed stores, both remote and local, by using the Scanstate.exe utility.   Incorrect: You cannot encrypt uncompressed migration stores by using Scanstate.exe.   Correct Answer: C   Incorrect: Using a remote store violates the condition that the data not be transferred from the computer.   Incorrect: An uncompressed local store requires more space than a hard-link migra- tion store.   Correct: Hard-link migration stores keep the data on the computer during a wipe-and- load migration but do not require that the data be copied, which would consume more space on the volume.   Incorrect: A compressed local store requires more space than a hard-link migration store. Chapter 3: Lesson Review Answers    Case Scenario 1: Branch Ofce and Head Ofce Activation   The Professional and Ultimate editions of Windows 7 can be used with volume licenses.   You should use KMS at the head ofce location because this strategy minimizes the amount of administrative effort required. You need to activate only the one KMS server.   You should use MAK Proxy Activation at each location. You cannot use KMS because you do not have a sufcient number of clients on the isolated network to allow the use of KMS. You must have at least 25 clients on a network before you can use a KMS solution. MAK Proxy Activation minimizes the amount of effort required for activating clients on isolated networks. Case Scenario 2: Migrating Users to Virtual Machines   You should choose Windows 7 Enterprise edition because this edition allows the use of AppLocker and can be activated by using KMS.   You can use a compressed remote store. This meets your goal of using a Scanstate- encrypted store. You cannot use a local store because you are moving files to new computers.   The Loadstate.exe utility is used to import data from an encrypted migration store to a client virtual machine when you are using the User State Migration Tool.  Lesson 1   Correct Answer: A   Correct: Deployment Workbench is a tool included with MDT 2010, not Windows AIK.   Incorrect: Windows System Image Manager (SIM) is included in the Windows 7 AIK.   Incorrect: Sysprep.exe is included in the Windows 7 AIK.   Incorrect: ImageX.exe is included in the Windows 7 AIK.     Correct Answer: D   Incorrect: Manual image creation is the least complex method, but Microsoft Deployment Toolkit 2010 is for more complex deployments than Windows 7 Automated Installation Kit.   Incorrect: Microsoft Deployment Toolkit 2010 is for more complex deployments than Windows 7 Automated Installation Kit, and manual image creation is the least complex.   Incorrect: Windows 7 Automated Installation Kit is for more complex deployments than manual image creation, and Microsoft Deployment Toolkit 2010 is the most complex.   Correct: Manual image creation is the least complex method, Windows 7 Automated Installation Kit is for more complex deployments, and Microsoft Deployment Toolkit 2010 is the most complex.   Correct Answer: C   Incorrect: The rst step in a typical Windows 7 AIK image creation is to create an answer le, which is an XML script le named Unattend.xml or Autounattend.xml by default.   Incorrect: The second step in a typical Windows 7 AIK image creation is to start the reference computer and use the answer file you created to install the operating system.   Correct: After installing the operating system on the reference computer, you must prepare it for imaging by running the Sysprep.exe utility, not the Oscdimg.exe utility. You use the Oscdimg.exe utility to generate a sector-based image (with an .iso extension) of the Windows PE boot disk.   Incorrect: The nal step of a typical Windows 7 AIK image creation is to start the refer- ence computer with a Windows PE disk and use the ImageX.exe utility to create an image le.   Correct Answer: B   Incorrect: You can create the deployment share in a stand-alone Distributed File System (DFS) namespace.   Correct: You should not create the deployment share in a domain-based DFS namespace because Windows PE will not be able to access it.   Incorrect: You can create the deployment share on a local disk.   Incorrect: You can create the deployment share on a network share.   Correct Answer: A   Correct: Although a domain controller is recommended if you are deploying computers in an Active Directory Domain Services environment, it is not a required component in the image creation lab.   Incorrect: A Windows 7 AIK or MDT 2010 image creation lab requires a build computer to run the image creation and deployment tools. Chapter 3: Lesson Review Answers     Incorrect: A Windows 7 AIK or MDT 2010 image creation lab requires a reference computer to serve as a model for the workstation images.   Incorrect: A Windows 7 AIK or MDT 2010 image creation lab requires at least one test workstation, which you use to make sure your images function properly. Lesson 2   Correct Answer: B   Incorrect: You can add cabinet (.cab) les to an ofine image by using DISM.exe.   Correct: You cannot add Microsoft System Installer (.msi) packages to an ofine image by using DISM.exe.   Incorrect: You can add device drivers that have a Windows Information (.inf) le to an ofine image by using DISM.exe.   Incorrect: You can add Windows Update Stand-alone Installer (.msu) packages to an ofine image by using DISM.exe.   Correct Answers: B and C   Incorrect: You cannot use DISM.exe to add a device driver to an image that is currently online.   Correct: You can use DISM.exe to add a language pack to an online image.   Correct: DISM.exe enables you to enable and disable operating system features while the image is online.   Incorrect: Although you can add a language pack le to an online image, you cannot change the currently active user interface language while the image is online.   Correct Answer: C   Incorrect: DISM.exe enables you to install device drivers to an ofine image le, including drivers required to boot the workstation.   Incorrect: DISM.exe enables you to activate and deactivate specic operating system features.   Correct: DISM.exe enables you to install Windows Update Stand-alone Installer (.msu) packages, but after you have installed them, you cannot remove them.   Incorrect: DISM.exe enables you to apply an answer le containing application installation instructions to an ofine image le.    Case Scenario 1: Capturing an Image by Using ImageX.exe Ralph’s rst mistake was to install the Windows 7 AIK on the computer he wanted to image. He should have installed Windows AIK on another computer. Ralph also neglected to run Sysprep.exe with the /generalize parameter on the Windows 7 computer before attempting to image it. Finally, ImageX.exe generated an error because the program cannot capture an image of a system disk while the operating system is running. To perform a successful image capture, Ralph must create a Windows PE boot disk on the computer running the Windows 7 AIK and use that to boot the new Windows 7 workstation. Then he can run ImageX.exe and successfully capture an image. Case Scenario 2: Modifying the User Interface Language   Before he can make any modications to the image, Harold must mount it to a folder.   Windows 7 is a language-neutral operating system, so Harold must install a language pack to provide the image with support for the French user interface.   After installing the language pack, Harold must reset the default user interface from English to French.   After modifying the mounted image les, Harold must commit the changes he has made to the Windows Imaging le.   Having modied the image and committed the changes, Harold must dismount the image before he can deploy it to the workstations.  Lesson 1   Correct Answer: B   Incorrect: Group Policy Management Console is a tool administrators use to deploy conguration settings. You use GPMC to create Group Policy objects, which are Active Directory Domain Services (AD DS) objects containing conguration settings, which administrators can apply to users or computers and can associate with domains, sites, or organizational units (OUs).   Correct: The Local Group Policy Editor is an MMC snap-in that you can use to apply Group Policy settings to the local computer only, not to large numbers of computers. Chapter 4: Lesson Review Answers     Incorrect: Administrators use logon/logoff script les to deploy conguration settings that execute when a user logs on.   Incorrect: Administrators use startup/shutdown script les to deploy conguration settings that execute when the system starts, and they apply to all users.   Correct Answers: A and B   Correct: Logon/logoff scripts run under the account with which the user logs on, and they are relatively limited in the types of tasks they can perform.   Correct: Startup/shutdown scripts use the credentials of the computer object and have System privileges on the local computer. This makes it possible for startup/shutdown scripts to access the entire local le system and the registry.   Incorrect: Logon/logoff scripts run under the account with which the user logged on and they are relatively limited in the types of tasks they can perform. The Startup/shutdown scripts use the credentials of the computer object and have System privileges on the local computer, making it possible for startup/shutdown scripts to access the entire local le system and the registry.   Incorrect: Startup/shutdown scripts use the credentials of the computer object and have System privileges on the local computer. This makes it possible for startup/shutdown scripts to access the entire local le system and the registry. The Logon/logoff scripts run under the account with which the user logs on and are relatively limited in the types of tasks they can perform.   Correct Answers: A, C, and D   Correct: Startup/shutdown and logon/logoff scripts can be simple batch les.   Incorrect: WSH is a script hosting engine, not a scripting language in itself.   Correct: VBScript is a limited variation of the Visual Basic programming language that administrators can use to create startup/shutdown and logon/logoff scripts.   Correct: Startup/shutdown and logon/logoff scripts can consist of Windows PowerShell commands.   Correct Answer: D   Incorrect: Background processing skips certain resource-intensive policies, such as Folder Redirection, which makes it faster than foreground processing.   Incorrect: Under some conditions, functional GPOs can process faster than monolithic GPOs.   Incorrect: GPO processing is highly dependent on whether the GPO has changed since it was last processed. GPOs that are unchanged load much faster than those that have changed.   Correct: Asynchronous processing is faster than synchronous processing because it uses background rather than foreground processing.     Correct Answer: D   Incorrect: It is true that functional GPOs are numerous and contain relatively few settings.   Incorrect: It is true that functional GPOs are dedicated to a specic area or type of setting.   Incorrect: It is true that functional GPOs enable you to organize related settings into separate GPOs so that you can delegate responsibility for them to specic administrators.   Correct: Monolithic GPOs contain all of the settings a workstation needs, including Computer Conguration and User Conguration settings, Policies and Preferences settings, and Administrative Templates settings. Lesson 2   Correct Answers: A, B, and D   Correct: By selecting the Follow The Documents Folder setting, you can make Videos a subdirectory of the Documents folder.   Correct: By selecting the Follow The Documents Folder setting, you can make Music a subdirectory of the Documents folder.   Incorrect: The Saved Games folder redirection policy does not have a Follow The Documents Folder setting, so you cannot make it a subdirectory of the Documents folder.   Correct: By selecting the Follow The Documents Folder setting, you can make Pictures a subdirectory of the Documents folder.   Correct Answer: D   Incorrect: Local user proles are stored on the workstation and do not require network access.   Incorrect: Roaming proles are stored on network servers, but if the network is not available, the computer uses a local prole instead.   Incorrect: Mandatory proles are read-only proles stored on network servers, but if the network is not available, the computer uses a local prole instead.   Correct: Super-mandatory proles are read-only proles stored on network servers. If the network is not available, the user logon process fails. Chapter 5: Lesson Review Answers    Case Scenario 1: Deploying GPOs   Linking the Sales and Order Entry GPOs to the domain object does not achieve the conguration you want because all of the workstations in the Sales and Order Entry OUs receive settings from whatever OU has the highest precedence.   Linking the Sales GPO to the Sales OU and the Order Entry GPO to the Order Entry OU is the simplest way to achieve the required conguration because the policy values in the Order Entry GPO overwrite the values from the Sales GPO on the Order Entry workstations.   Blocking inheritance would prevent the computers in the Order Entry OU from receiving the baseline settings applied to the domain object.   Although creating Sales and Order Entry groups and using security lters can create the required conguration, it is far from being the easiest way. Case Scenario 2: Conguring Audit Policies To deploy the GPO so that only Windows 7 workstations receive the settings, Alice can link the GPO to the domain object and then create a WMI lter that queries each workstation for its operating system.  Lesson 1   Correct Answers: A and D   Correct: AppLocker policies can be used to restrict the execution of applications only on computers running Windows 7 Enterprise or Ultimate. Software Restriction Policies must be used to restrict the execution of applications on clients running Windows 7 Professional.   Incorrect: AppLocker policies can be hosted on Windows Server 2003 and Windows Server 2008 domain controllers as long as the Active Directory Schema has been extended to support AppLocker.   Incorrect: AppLocker policies can be used to restrict the execution of applications that are not digitally signed.   Correct: AppLocker policies can be used to restrict the execution of applications only on computers running Windows 7 Enterprise and Ultimate. Software Restriction Policies must be used to restrict the execution of applications on clients running Windows Vista Enterprise.     Correct Answer: A   Correct: You need to congure the User Account Control: Behavior Of The Elevation Prompt For Standard Users policy so that when a user who is not a member of the local administrators group performs a task that requires elevated privileges, an administrator connected through remote assistance is able to provide the appropriate credentials for elevation.   Incorrect: You do not need User Account Control: Behavior Of The Elevation Prompt For Administrators In Admin Approval Mode because users who are receiving remote assistance are logged on with accounts that have standard permissions.   Incorrect: You should not congure the User Account Control: Detect Application Installations And Prompt For Elevation policy because this policy relates to elevation for a specic activity and does not allow an administrator connected through a remote assistance session to a standard user’s desktop to be able to enter her credentials.   Incorrect: You should not congure the User Account Control: Run All Administrators In Admin Approval Mode because you need to congure a policy for standard users. Conguring this policy does not allow an administrator connected through a remote assistance session to a standard user’s desktop to be able to enter his credentials.   Correct Answers: A, C, E, and F   Correct: You need to congure the Account Lockout Duration policy to ensure that user lockout occurs for 15 minutes if a user enters an incorrect password sequentially three times.   Incorrect: You do not need to congure the Enforce Password History policy. This policy is used to ensure that users do not use the same password after it is changed. The question makes no mention of this requirement.   Correct: You need to congure the Maximum Password Age policy to ensure that users change their passwords every 21 days.   Incorrect: You do not need to congure the Minimum Password Age policy because the question makes no mention of minimum password ages.   Correct: You must congure the Account Lockout Threshold policy so that you can specify how many invalid passwords entered in succession trigger an account lockout.   Correct: You must set the Reset Account Lockout Counter After policy to ensure that sequential failed logins are tracked over a 30-minute period.   Correct Answers: B, C, and D   Incorrect: You do not need to set the Congure Use Of Passwords For Removable Data Drives policy to meet your goals. This policy determines how passwords are used with BitLocker To Go–protected devices, but it does not restrict the use of USB ash devices to those that are specically protected by BitLocker congured with a particular organi- zational ID. [...]... is included in Microsoft Deployment Toolkit 2 010, not Windows 7 AIK C Incorrect: Deployment Image Servicing and Management is included in Windows 7 AIK 5 22 B Incorrect: ImageX.exe is included in Windows 7 AIK D Incorrect: Windows System Image Manager is included in Windows 7 AIK Answers Lesson 2 1 Correct Answer: B A Incorrect: The new computer scenario is supported in a ZTI deployment B Correct:... running Windows 7 in branch offices to share files that have been retrieved across the wide area network link from a specially configured head office Windows Server 2008 R2 server build computer  A computer running Microsoft Deployment Toolkit and/or Windows Automated Installation Kit, which administrators use to create and deploy Windows Imaging files build-to-order (BTO)  A type of image deployment, supported... image deployment, supported by Windows 7 Automated Installation Kit, in which administrators use an answer file to build the reference computer, deploy the resulting image on the target computers, and then boot the computers in audit mode to make further customizations build-to-plan (BTP)  A type of image deployment, supported by Windows 7 Automated Installation Kit, in which administrators build the reference... Deployment Image Servicing and Management (DISM.exe)  A command-line tool, included with Windows 7 and Windows 7 Automated Installation Kit, that you can use to mount, view, and modify Windows Imaging files in their online or offline state discover image  A type of Windows Deployment Services (WDS) image file that enables computers without Pre-Boot Execution Environment–compliant network adapters to boot... Lesson Review Answers Lesson 1 1 Correct Answer: B A Incorrect: Ping.exe is included with Windows 7 B Correct: Network Monitor is available as a free download from Microsoft, but it is not included with Windows 7 5 36 C Incorrect: Pathping.exe is included with Windows 7 D Incorrect: Tracert.exe is included with Windows 7 Answers 2 Correct Answer: A A Correct: Wireless devices must be configured to use... an operating system to support a particular language latency interval  The time it takes to transmit data between two computers Lite-Touch Installation (LTI)  A deployment methodology supported by Microsoft Deployment Toolkit 2 010 that enables administrators to install computers with a minimum of interaction Microsoft Application Virtualization (App-V)  A technology that enables Windows servers to virtualize... with access to applications and entire Windows desktops Formerly known as Terminal Services Remote Desktop Session Host  The core service running on a Remote Desktop Services server, hosting individual applications and full desktops RemoteApp  A Remote Desktop Services feature that delivers individual applications to clients in separate windows Replica mode  A Windows Server Update Services (WSUS) server... attention Windows Imaging   A file-based image format, developed by Microsoft, which contains a complete image of one or more operating systems 544 Glossary Windows Installer  An installation engine included with Windows 7 and earlier Windows versions that reads the contents of package files and uses them to install an application or other software entity Windows Preinstallation Environment (Windows. .. the network I ImageX.exe  A command-line tool, included in the Windows 7 Automated Installation Kit, that enables administrators to capture and service Windows Imaging files InPrivate Browsing  An Internet Explorer browsing mode that blocks the application from recording browsing history information InPrivate Filtering  An Internet Explorer mode that blocks third-party sites from tracking a browsing... settings in which a Windows computer stores its desktop environment and user configuration V VBScript  See Microsoft Visual Basic Scripting Edition (VBScript) Glossary 543 W Wi-Fi Protected Access (WPA and WPA2)  A wireless security protocol that can use various encryption algorithms to provide a more secure environment than Wired Equivalent Privacy Windows 7 Automated Installation Kit (Windows AIK)  A . Ultimate editions of Windows 7 support BranchCache. The Professional edition of Windows 7 does not.   Incorrect: Only the Enterprise and Ultimate editions of Windows 7 support BranchCache also supports KMS activation.   Incorrect: Although Windows 7 Ultimate supports deployment to a VHD, this edition of Windows does not support KMS activation.   Incorrect: Windows 7 Professional. B   Incorrect: Windows 7 Home Premium does not support deployment to a VHD le. This edition also does not support activation through KMS.   Correct: Windows 7 Enterprise supports deployment

Ngày đăng: 09/08/2014, 11:21

Tài liệu cùng người dùng

Tài liệu liên quan