PrepAway - Latest Free Exam Questions & Answers

Category: 70-638

Exam 70-638: TS: Microsoft Office Communications Server 2007, Configuring

You need to ensure that BitLocker Drive Encryption is disabled on deployed computers

You have a single-domain Active Directory Domain Services (AD DS) forest. All servers run Windows Server 2008 R2. You use Microsoft Deployment Toolkit (MDT) 2010 and System Center Configuration Manager 2007 R2 to deploy Windows 7 using Zero Touch Installation (ZTI). You have a Windows 7 reference computer that is encrypted using BitLocker Drive Encryption.

You need to ensure that BitLocker Drive Encryption is disabled on deployed computers.

What should you do?

Which protocol should you allow?

You are preparing for a Zero Touch Installation (ZTI) of Windows 7 using Windows Deployment Services (WDS) and System Center Configuration Manager 2007 R2. Your network includes branch offices that are separated by firewalls.

You need to ensure that the necessary protocol is allowed through the firewalls to support the deployment.

Which protocol should you allow?

You need to ensure that this client computer is successfully deployed with the modified task sequence

You are using Windows Deployment Services (WDS) and System Center Configuration Manager 2007 R2 to perform a Zero Touch Installation (ZTI) of Windows 7 on your company’s client computers. A user shuts down his computer during the deployment process. Before the computer boots, the task sequence is modified.

You need to ensure that this client computer is successfully deployed with the modified task sequence.

What should you do first?

Which two actions should you perform? (Each correct answer presents part of the solution

You have a single-domain Active Directory Domain Services (AD DS) forest. You are using Microsoft Deployment Toolkit (MDT) 2010 to perform a Lite Touch Installation (LTI) of Windows 7 on client computers.

You need to ensure that users are not prompted for a computer name during the installation of Windows 7 on their client computers.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to ensure that the third-party application can run on Windows 7 client computers

Your company is upgrading its client computers from Windows Vista to Windows 7. You install a third-party application on a new Windows7 client computer.
When you start the third-party application, it fails.

You need to ensure that the third-party application can run on Windows 7 client computers. You create a shim for the application.

What should you do next?

You need to identify which registry key is causing the installation to fail

Your company is upgrading its client computers from Windows Vista to Windows 7. You attempt to manually install a third-party application on a new Windows 7 client computer. However, the installation fails when the application attempts to modify the registry keys.

You need to identify which registry key is causing the installation to fail.

What should you use?


Page 5 of 9« First...34567...Last »