logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification Comments

  • Question
  • You have a reference computer that runs Windows 7. You plan to deploy an image of the computer. You create an answer file named answer.xml. You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?


  • Options
  • A. Imagex.exe /append answer.xml /check
  • B. Imagex.exe /mount answer.xml /verify
  • C. Sysprep.exe /reboot /audit /unattend:answer.xml
  • D. Sysprep.exe /generalize /oobe /unattend:answer.xml

  • Correct Answer
  • Sysprep.exe /generalize /oobe /unattend:answer.xml 


  • Microsoft Certification problems


    Search Results


    • 1. You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. You need to identify how much space is required to complete the migration. What should you do?

    • Options
    • A. On Computer1 run Loadstate c:\store /nocompress
    • B. On Computer1 run Scanstate c:\store /nocompress /p
    • C. On Computer2 run Loadstate \\computer1\store /nocompress
    • D. On Computer2 run Scanstate \\computer1\store /nocompress /p
    • Discuss
    • 2. Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?

    • Options
    • A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
    • B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
    • C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
    • D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
    • Discuss
    • 3. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as_________ ?

    • Options
    • A. integrated software packages
    • B. personal information managers
    • C. software processing packages
    • D. software suites
    • Discuss
    • 4. What do you mean by APM ?
    • Discuss
    • 5. Both Joyel and Susy share a Windows 10 tablet with different user accounts. Joyel needs to access some files in Susy?s Documents folder. How can he do this ?

    • Options
    • A. Joyel can access the files only if he has administrative rights
    • B. Susy must choose to make the Documents folder Public for Joyel to see them
    • C. Joyel can, by default, see and access the files in any Documents folder on this computer
    • D. Joyel cannot access those files without Susy moving them to another folder
    • Discuss
    • 6. Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). You install and configure Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy Object named GPO1 that enables automatic updating. You link GPO1 to the domain. You need to ensure that each client computer obtains software updates from Server1. What should you do?

    • Options
    • A. On each client computer, run Gpupdate /Force.
    • B. On each client computer, run wuauclt /detectnow.
    • C. From GPO1, configure the Enable client side targeting setting.
    • D. From GPO1, configure the Specify intranet Microsoft update service location setting.
    • Discuss
    • 7. You have a computer that runs Windows 7. A printer is installed on the computer. You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer. You need to ensure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the print jobs of other users. What should you do?

    • Options
    • A. From the printer's properties, assign the Print permission to the Sales group.
    • B. From the printer's properties, assign the Manage Documents permission to the Sales group.
    • C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
    • D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
    • Discuss
    • 8. You are a member of a team of developers creating several ASP.NET applications for XYZ. You want to create a reusable toolbar that will be used in each of the applications. The toolbar will be displayed at the top of each page viewed by the user. The contents of the toolbar will vary depending on options each user selects when creating a profile. You want to be able to add the toolbar to the ASP.NET toolbox for each of the developers on your team.What should you do?

    • Options
    • A. Create a new Web Control Library project. Create the toolbar within a Web custom control.
    • B. Add a new Web user control to your ASP.NET project. Create the toolbar within the Web user control.
    • C. Add a new Web Form to your ASP.NET project. Design the toolbar within the Web Form and save the Web Form with an .ascx extension.
    • D. Add a new component class to your ASP.NET project. Design the toolbar within the designer of the component class.
    • Discuss
    • 9. Which of the following best describes how the user is alerted with information system and configuration alerts?

    • Options
    • A. A popup occurs and the Windows 7 desktop contrast is dimmed. Until you acknowledge the alert the screen will not move.
    • B. If Aero is installed the shaking alert flag appears in the index bar of every open window.
    • C. A flag in the taskbar with a red
    • D. All of the above
    • Discuss
    • 10. Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: -Members of the SalesUsers group must be able to read, create, and modify all files and folders. -All other users must be able to view items in the folder. What should you do?

    • Options
    • A. On the Sales folder, block permission inheritance and remove permissions. Assign the Allow Modify permission to the SalesUsers group.
    • B. On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow Modify permission to the SalesUsers group.
    • C. On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
    • D. On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow Modify permissions to the SalesUsers group.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment