Which two actions should you perform in sequence?
Drag and Drop (Build List and Reorder)
A company has client computers in an Active Directory Domain Services (AD DS) environment.
You deploy a new wireless access point (WAP). Third-party security software controls access to the wireless
network.
Users are able to connect to the wireless network and access the Internet but are unable to access the
company’s file servers.
You need to enable users to connect to the file servers by using the wireless network.
Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.)
Build List and Reorder:
You need to design a user state migration strategy that supports the requirements
Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise onthe existing client computers.
You have the following requirements:
Migrate user data and operating system components.
Encrypt and password-protect the migration store.
You need to design a user state migration strategy that supports the requirements.
What should you do?
You need to select the appropriate tool to detect application-compatibility issues
Your company uses Windows Update to download and install security updates on client computers.
When Microsoft releases a security update, you havethe following requirements:
Establish which client computers require the security update.
Identify what changes will occur as a result of thesecurity update.
Identify which applications might be affected by the security update.
You need to select the appropriate tool to detect application-compatibility issues.
What should you do?
Which images should you recommend?
You are designing a Windows 7 Enterprise image creation strategy.
The strategy must meet the following requirements:
Support 32-bit and 64-bit hardware.
Support 64-bit applications.
Minimize the total number of images.
Reduce the bandwidth required to deploy an image.
Use System Center Configuration Manager (ConfigMgr)for application deployment.
You need to recommend the images that meet the requirements.
Which images should you recommend? (Choose all thatapply.)
Which command line options should you use to execute the ScanState command?
You plan to upgrade Windows Vista to Windows 7 on acomputer named Computer1.
You run ScanState and store the results on a remotecomputer at \\Server1\migstore. After the ScanState
command completes, a user customizes a profile and adds mission-critical data.
You attempt to run ScanState again but it fails.
You need to overwrite Computer1’s existing information on Server1.
Which command line options should you use to execute the ScanState command? (Choose all that apply.)
You need to ensure that the company can use the application
Your company plans to upgrade 1,000 client computers to Windows 7.
The company uses a custom line-of-business application that is frequently updated. The application is not
compatible with Windows 7.
You need to ensure that the company can use the application. You also need to ensure that the application can
be updated with the least amount of administrative effort.
What should you do?
You need to design a zero-touch deployment strategyto increase the number of client computers that can be imag
Your company has 1,000 client computers. Each client computer has 1 GB of RAM.
You are planning to deploy Windows 7 Enterprise.
You need to design a zero-touch deployment strategyto increase the number of client computers that can be
imaged at one time.
What should you do?
You need to reduce the bandwidth that is consumed by requests for frequently accessed files
Your company’s network includes a main office and several branch offices. The branch offices are connected to
the main office by high-latency links.
All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. No servers are
located in the branch offices.
Client computers in the branch offices frequently access a specific group of files on a file server named
Server1. These access requests consume significant amounts of bandwidth and reduce the speed of higher-priority traffic.
You need to reduce the bandwidth that is consumed by requests for frequently accessed files.
What should you do?
Which tool should you use?
You are planning a Zero Touch Installation of Windows 7.
You need to design a deployment strategy that enables the company computers to sleep and hibernate without
creating a security risk.
Which tool should you use?
You need to select the appropriate license type forthe VDI operating system deployment
You need to deploy Windows 7 Enterprise in VDI.
You need to select the appropriate license type forthe VDI operating system deployment.
Choose two.