Which deployment method should you choose?
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7
computers.
You are planning to deploy a custom application.
You need to schedule the deployment to occur outside of business hours and without user interaction.
Which deployment method should you choose?
You need to ensure that the application deploys only during non-business hours
Your network has 1,000 client computers that run Windows 7.
You plan to deploy a new application.
You need to ensure that the application deploys only during non-business hours.
What should you do?
Which deployment method should you use in your design?
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista
computers.
You are planning to deploy Windows 7 and a custom application.
You have the following requirements:
The application must be available to only a specific group of users.
You must be able to monitor application usage.
You need to design a deployment method for the custom application that meets the requirements.
Which deployment method should you use in your design?
You need to plan a software deployment process thatmeets the requirements
Your company’s network has client computers that run Windows 7.
A software vendor releases version 2 of an application that your company uses.
Your company currently uses version 1. Version 1 and version 2 are not compatible.
You plan to deploy version 2 of the application.
You have the following requirements:
Users must be able to run both versions of the application on their computers.
Version 2 must be available when a client computer is not connected to the network.
You need to plan a software deployment process thatmeets the requirements.
What should you do?
What are two possible ways to achieve this goal?
Your network has client computers that run Windows XP. Users do not have administrative rights to their local
computers. You use Windows Server Update Services (WSUS) to manage software updates.
You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with
Windows 7.
You need to ensure that all users are able to run the custom application.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose
two.)
You need to display information about client connectivity to the WAP
Your company’s client computers run Windows 7. Yourcompany’s network has a wireless access point (WAP).
A user reports that he regularly loses connectivityto the WAP.
You need to display information about client connectivity to the WAP.
What should you do?
You need to identify and resolve Group Policy issues to ensure that the mapped drives are available
Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.
com. The design of the domain and Group Policy object (GPO) is shown in the exhibit. (Click the Exhibit
button.)
You configure Group Policy preferences to define mapped drives in the Boston staff GPO.
Users in the Boston organizational unit (OU) then report that the mapped drives are not available.
You need to identify and resolve Group Policy issues to ensure that the mapped drives are available.
What should you do?
You need to find out whether an add-on is the causeof the problem
You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers.
Internet Explorer closes when users run a specific Web application.
You need to find out whether an add-on is the causeof the problem.
What should you do?
You need to ensure that client computers are not shut down when the security log becomes full
Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named
contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers
container in the contoso.com domain.
You discover that multiple client computers were automatically shut down because the security log was full.
You need to ensure that client computers are not shut down when the security log becomes full.
What should you do?
You need to ensure that user configuration settingsare being applied
Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.
com.
You deploy a new Group Policy object (GPO) named NYComputers GPO as part of the organizational unit
(OU) and GPO design shown in the exhibit. (Refer to the Exhibit.)
The NY Computers GPO contains computer configuration settings and user configuration settings.
User configuration settings are not being applied to users who log on to client computers in the NY Computers
OU.
You need to ensure that user configuration settingsare being applied.
What should you do?