Which log file should you view?
You deploy Windows 7 client computers by using System Center Configuration Manager
2007 SP2. You need to find out if a driver was loaded by Windows 7 in the task sequence.
Which log file should you view?
Which of the following types of cables will you use for the network?
You work as a consultant for Tech Perfect Inc. You are required to design a gigabit network for the
company. Which of the following types of cables will you use for the network?
Which file should you modify?
You have a single-domain Active Directory Domain Services (AD DS) forest. All servers run
Windows Server 2008 R2. All client computers run Windows Vista. A custom local security
group exists on all client computers. You are upgrading from Windows Vista to Windows 7.
You will use User State Migration Tool (USMT) 4.0 to migrate user data and settings. You
need to migrate user data and settings while Windows Vista is offline, and you must ensure
that the migration includes the custom local group membership. Which file should you
modify?
You need to ensure that all computers can locate the LTI deployment shares
You will use Microsoft Deployment Toolkit (MDT) 2010 to perform a Lite Touch Installation
(LTI) of Windows 7 on client computers. You need to ensure that all computers can locate
the LTI deployment shares. What should you do?
You need to create a computer association between the Windows Vista computer and the new computer
Your company uses System Center Configuration Manager 2007 R2 for operating system
deployment. You have a client computer that has Windows Vista installed. You also have a
new computer that does not have an operating system installed. You need to create a
computer association between the Windows Vista computer and the new computer. What
should you do first?
You need to ensure that the device drivers are prevented from being reinstalled on each client computer during
You have 100 client computers that have identical hardware configurations. You are
preparing one of these client computers to use as a reference computer when you deploy
Windows 7. You need to ensure that the device drivers are prevented from being reinstalled
on each client computer during the deployment. What should you do?
Which of the following are functions of the application layer of the OSI model?
Which of the following are functions of the application layer of the OSI model?
Each correct answer represents a complete solution. Choose three.
You need to install Outlook 2010 on all client computers
You have a single-domain Active Directory Domain Services (AD DS) forest. Office Outlook
2007 is installed on all client computers. All client computers run the 64-bit version of
Windows 7. You attempt to install the 32-bit version of Outlook 2010 by using a startup
script. The installation fails. You need to install Outlook 2010 on all client computers. What
should you do?
You need to ensure that users can edit the specific Word and Excel files and that all other Office files are v
Your company has a single-domain Active Directory Domain Services (AD DS) forest. You
are upgrading all client computers from Office 2003 to Office 2010. You are using Office
Customization Tool (OCT) to prepare the Office 2010 deployment settings. While testing the
deployment, you discover that users cannot open or edit specific Excel and Word
documents that are located in multiple directories. Users receive the following error
message: “Office has detected a problem with this file. To help protect your computer this
file cannot be opened.” You verify that users have the appropriate share and file
permissions to edit the files. You need to ensure that users can edit the specific Word and
Excel files and that all other Office files are validated before being opened. What should you
do?
You need to identify which registry key is causing the installation to fail
Your company is upgrading its client computers from Windows Vista to Windows 7. You
attempt to manually install a third-party application on a new Windows 7 client computer.
However, the installation fails when the application attempts to modify the registry keys. You
need to identify which registry key is causing the installation to fail. What should you use?