Shared Flashcard Set

Details

Configuring Windows 7
Practice for Exam 70-680
329
Computer Science
Professional
03/01/2011

Additional Computer Science Flashcards

 


 

Cards

Term
dism /cleanup-wim
Definition
Removes corrupt files
Term
dism /remount-wim
Definition

 

Retrieves and remounts orphaned images

 

Term
dism /cleanup-image
Definition

 

Option is typically used with the /RevertPendingActions parameter to attempt a system recovery if you experience a boot failure. This operation reverts all pending actions from the previous servicing operations because these actions might be the cause of the boot failure. Note that /RevertPendingActions is not supported on a running operating system or a Windows PE or Windows Recovery Environment (Windows RE) image.

 

Term
You want to add all the drivers in the folder C:\Orinsnewdrivers and its subfolders to the mounted offline image in D:\Orinsimage. What command would you use?
Definition
dism /image:d:\orinsimage /add-driver /driver:d:\orinsimage /recurse
Term
/get-apppatches and /get-apppatchInfo
Definition
Apply only to installed patches (.msp files)
Term
/get-apps and get-/appinfo
Definition

Apply only to Windows Installer applications (.msi files). You cannot, for example, use DISM to obtain information about .exe or .dll files. Also, remember that when you check the applicability of an MSP patch, only the Windows Installer applications for which the patch is applicable will be displayed. One patch can be applied to many installed applications and many patches can be applied to one application.

 

Term
You want to display information about two patch files, Mypatch.msp and Otherpatch.msp, both in C:\Windows\Patches, in an image mounted in D:\Myimages\Mountedimage1. What command would you use?
Definition
dism /image:d:\myimages\mountedimagei /check-apppatch /patchlocation:c:\windows\patches\mypatch.msp /patchlocation:c:\windows\patches\otherpatch.msp
Term
DISM /commit-wim option
Definition
Saves the changes to the original source image. For example, changing an offline-mounted image by adding a package, removing a package, and so on needs to have the changes saved to the original source image
Term
You want more information about the package Package_for_KB654321~ 22cf8952ad824e22~x86~~6.1.0.0 in a WIM image currently mounted in the folder C:\MountedImages. What command would you use?
Definition
dism /image:c:\mountedimages /get-packageinfo /packagename:Package_for_KB654321~22cf8952ad824e22~x86~~6.1.0.0
Term
You want to obtain a list of PE settings in a mounted Windows PE image in the folder C:\Mypeimage. What command do you enter in the elevated Deployment Tools command prompt?
Definition
dism /image:c:\mypeimage /get-pesettings
Term
You need to determine the amount of Windows PE system volume scratch space available on a Windows PE system volume in a mounted Windows PE image in the folder C:\Mypeimage when booted in RAMdisk mode. What command do you enter in the elevated Deployment Tools command prompt?
Definition
dism /image:c:\ mypeimage /get-targetpath
Term
Your offline-mounted WIMimage file is in C:\Images\Mounted. An unattend answer file that you want to associate with this image has the file path C:\Answerfiles\Unattend\Unattend.hml. What command associates the answer file with the image?
Definition
dism /image:c:\images\mounted /apply-unattend:c:\answerfiles\unattend\ unattend.hml
Term
A distribution share is a shared Windows folder that contains the following subfolders
Definition

$OEM$ folders, Packages,

Out-of-box drivers, LangPacks

Term
You have copied the system image Install .wim file from your Windows 7 installation media to the folder C:\Images . You have mounted the image with index value 5 (Windows 7 Ultimate) to the folder D:\Mount . You want to add third-party drivers that you have stored in C:\Drivers\Printer and C:\Drivers\Scanner to the mounted image . Which of the following DISM commands would you use? (Choose all that apply.)
Definition

A. dism /image:c:\images /add-driver /driver:c:\drivers /recurse

B. dism /image:d:\mount /add-driver /driver:c:\drivers /recurse

C. dism /image:c:\images /add-driver /driver:c:\drivers\printer /driver:c:\drivers\scanner

D. dism /image:d:\mount /add-driver /driver:c:\drivers\printer /driver:c:\drivers\scanner

Term
You need to find out the amount of writeable space available on a Windows PE system volume when booted in RAMdisk mode. The PE image is mounted in the folder D:\PEMount. What command would you use?
Definition

A. dism /image:d:\pemount /get-scratchspace

B. dism /image: d:\pemount /get-targetpath

C. dism /image: d:\pemount /get-profiling

D. dism /image: d:\pemount /enable-profiling

Term
Which of the following DISM options can you run against an online, running operating system?
Definition

A. /set-syslocale

B. /set-userlocale

C. /set-inputlocale

D. /get-intl

Term
You have created an answer file called Unattend .xml in the C:\Textfiles\Answer folder . You want to apply it to an image mounted in the C:\Mount folder. What command would you use?
Definition

A. dism /image:c:\textfiles\answer /apply-unattend:c:\ mount \unattend.xml

B. dism /image:c:\mount /apply-unattend:c:\textfiles\answer\unattend.xml

C. dism /image:c:\mount /apply:c:\textfiles\answer\unattend.xml

D. dism /image:c:\mount /apply-answer:c:\textfiles\answer\unattend.xml

Term
You want to obtain detailed information about all the Windows Installer (.msi) applications installed in the WIM image mounted in the C:\Mount folder. What command do you use?
Definition

A. dism /online /get-packageinfo

B. dism /image:c:\mount /get-featureinfo

C. dism /image:c:\mount /get-appinfo

D. dism /image:c:\mount /get-apppatchinfo

Term
What is a thick image?
Definition
Thick images contain core applications, language packs, and other files in addition to the operating system. Thick images can be less costly to develop, because they frequently do not require advanced scripting technique. The disadvantage of thick images is that updating a thick image with a new version of an application or language pack requires rebuilding, retesting, and redistributing the image.
Term
When are thick images supposed to be used?
Definition
You use thick images when you employ WIM files for backup and failover on bootable VHDs on individual computers running Windows 7 Enterprise or Ultimate.
Term
What is a thin image?
Definition
A thin image carries a much lower cost to maintain and store. It contains few (if any) core applications or language packs. Applications and language packs are installed separately from the disk image. If you choose to build thin images that do not include applications or language packs, your organization should have a systems management infrastructure such as SCCM 2007 in place to deploy applications and language packs. You should use this infrastructure to deploy applications and language packs after installing the thin image.
Term
What is a hybrid image?
Definition

Hybrid images mix thin-image and thick-image strategies. In a hybrid image, the disk image is configured to install applications and language packs on first run but automatically installs the applications and language packs from a network source. Hybrid images present most of the advantages of thin images, but they are not complex to develop and do not require a software distribution infrastructure. They do, however, require longer installation times. Hybrid images store applications and language packs on the network but include the commands to install them when you deploy the disk image. This process differs from installing the applications and language packs in the disk image because the image deployment process installations that would typically occur during the disk imaging process is deferred.

 

Term
You have installed Windows AIK and MDT 2010. What additional software tools do you require to implement ZTI?
Definition
SCCM 2007 and SQL Server
Term

Can you add an application to an image using DISM?

Definition

You cannot add an application to an image using DISM. You can, however, add an application to an image build in a distribution share in MDT 2010.

Term

Deployment Point Types -

Lab or single-server deployment point

Definition

This enables you to use the distribution share to deploy task sequences.

Term

Deployment Point Types -

 

Separate deployment share 

Definition

This creates a new local or remote deployment share that contains a subset of the files in the distribution share. You can choose the images,

device drivers, updates, and applications that are replicated to this type of deployment point.

Term

Deployment Point Types -

 

Removable media

Definition

This creates directories and (optionally) an International

Organization for Standardization (ISO) image that can be installed on removable media such as DVD-ROM, universal serial bus (USB) disk, or USB flash memory so you can perform stand-alone, network-disconnected deployments.

 

Term
What is SCCM 2007?
Definition
SCCM (System Center Configuration Manager) is Windows Server 2003 or Windows Server 2008 software that implements change and configuration management for Microsoft platforms. SCCM 2007 collects information in a SQL Server database that you can configure, using tools such as MDT 2010. This allows queries and reports to consolidate information throughout the organization. SCCM 2007 can manage a wide range of Microsoft operating systems, including client platforms, server platforms, and mobile devices. It works with MDT 2010 to implement ZTI.
Term

What command-line utility enables you to prestage target computers for system image deployment?

Definition
WDSUTIL
Term
SCCM 2007 Discovery Methods
Definition

 

Heartbeat Discovery

Network Discovery

Active Directory User Discovery

Active Directory System Group Discovery

Active Directory Security Group Discovery

Active Directory System Discovery

 

Term
What does MDT 2010 enable you to do?
Definition

 

MDT 2010 enables you to manage and manipulate disk images and to create a distribution

share to distribute an operating system image to other computers on your network. You need to install Windows AIK before you can create or deploy WIM

image files.

 

Term
What type of image does WDS use to boot from the network and obtain an install image?
Definition

 

WDS uses boot images that enable PXE-compliant computers to boot from the

network and obtain an install image. If a computer is not PXE-compliant, you can boot

it from a discover image on bootable media and WDS can then deploy an install image

to it. Discover images enable you to boot a reference computer and transfer its system

image to WDS, which can then deploy it to other computers.

 

Term
What software is required to implement ZTI using MDT 2010?
Definition

MDT 2010 can work with WDS in an LTI scenario. To implement ZTI, MDT 2010 requires

that SCCM 2007 and SQL Server are available on the network. MDT 2010 requires that

Windows AIK is installed.

Term
Boot image
Definition

An image that boots a target computer

and enables deployment of the install image. Capture

and discover images are special types of boot image.

Term
Deploy
Definition

In the context of system images, you deploy

an image when you install it on one or more target

computers.

Term
Deployment Share
Definition

A shared network folder that

contains a system image to be deployed an all the

files, such as unattend answer files, that are part of that deployment.

Term
What tool can you use to mount and unmount a system image?
Definition
You can use DISM or Image X to mount and unmount a system image. DISM adds packages, drivers, and updates to a mounted image and obtains information about online and offline-mounted system images. You can also use DISM to mount and service Windows PE images.
Term
WDS (Windows Deployment Services)
Definition

WDS creates a boot menu that you can use from a PXE-compliant computer booted

from the network to install a system image to that computer. If a target computer is

not PXE-compliant, you can boot it from a discover image to access the boot menu.

A capture image is a type of boot image and appears on the boot menu. If you boot

a reference computer from a capture image, you can capture its system image and

copy it to a WDS server, which can in turn deploy it to other target computers.

Term
Install Image
Definition

The system image (typically a WIM file)

that you deploy to target computers.

Term
Mount
Definition

In the context of system images you mount an

image by expanding it into a folder so you can obtain

information about it and add or remove features such

as drivers, updates, and language packs.

Term

 

Fact: Device manager works in read-only mode on a remote computer

 

Definition

 

You can use Device Manager to manage devices and drivers only on a local computer. On a remote computer, Device Manager works in read-only mode, enabling you to view but not to change that computer’s hardware configuration.

 

Term

 

Fact: The procedure to sign a device driver digitally has been deliberately given as a high- level procedure. You typically would do this in a domain, organizational unit, or site.

 

Definition
Term
mmc gpedit.msc
Definition
Local Group Policy Object Editor
Term

Fact: A non-administrator can install PnP devices with valid digital signatures linked to

certificates in the Trusted Publishers store. If the device driver is not in the device driver

store, or if it is unsigned, or if the signature is not trusted, administrator credentials are

required to install the device.

Definition
Term

Fact: An administrator can prestage a device by placing its driver in the device driver store.

If the device driver is unsigned, the administrator can sign it with a certificate obtained

from an internal CA to allow it to be installed by standard users within an organization.

Definition
Term

Fact: You can prevent drivers downloading from Windows Update and automatically

installing.

You can also remove Windows Update from the device driver search path.

You can disable or stop drivers to diagnose driver problems. If a new driver is giving

you problems, you can roll back to a previous driver.

Definition
Term

Fact: The Defrag syntax has changed from Windows Vista. Traditionally, examiners have tended

to test things that have changed.

Definition
Term
What partition type enables you to have more than four partitions on each disk?
Definition
GPT
Term
Striped Volume (RAID-0)
Definition

 

A striped volume uses the free space on more than one physical hard disk to create the

volume. It enables the operating system to write across all disks in small blocks, or stripes,

distributing the load across the disks in the volume. Data is written to a stripe on the first disk,

the next block of data is written to a stripe on the next disk, and so on. The data can be split

into stripe-sized blocks and written to all the disks in the stripe set simultaneously. A striped

(RAID-0) volume requires at least two disks.

 

Term
Mirrored Volume (RAID-1)
Definition

 

A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve

performance. It uses two disks (or two portions on separate disks) that are the same size. Any

changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk

fails, the mirror is broken and the second disk is used until the first is repaired or replaced.

The mirror is then re-created, and the information on the working disk is mirrored on the

repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks

to hold 200 GB of data. The advantage is that you can mirror a system disk containing your

operating system.

 

Term
Striped Volume with Parity (RAID-5)
Definition

 

A striped volume with parity offers high availability, failover protection, and performance

improvement. It requires at least three disks, or equally sized portions of unallocated space

on at least three separate disks. The volume is striped in a similar way to RAID-0, but on

each disk, some of the capacity is used to store parity information, which is compressed

information about the contents of the other disks in the set. Thus, if a disk fails, the data it contained is stored on the other disks in the set,

although there is a performance degradation because the parity information needs to be

decompressed whenever it is accessed. If a replacement disk is installed, its contents can be

regenerated from the parity information on the other disks.

 

Term

You have selected a volume using the Diskpart tool. What command tells you the

maximum amount by which you can shrink it?

Definition
shrink querymax
Term

 

Fact: You can use the Disk Management console or the Diskpart command-line tool to

manage disks, partitions, and volumes on a computer running Windows 7.

 

Definition
Term
Fact: You can use Group Policy to control access to removable devices.
Definition
Term

Fact: Windows 7 supports basic disks, dynamic disks, the MBR partition type, and the GPT

partition type and allows you to convert from one to the other.

Definition
Term

Fact: Windows 7 offers software RAID-0, RAID-1, and RAID-5 volumes. You can also create

simple and spanned volumes. You can shrink or expand a volume without needing to

use third-party tools.

Definition
Term

Fact: If a device is not PnP, you need to supply administrator credentials to install it. You can

prestage a device driver and (if necessary) digitally sign it so non-administrators can

install it.

Definition
Term

Fact: You can prevent drivers downloading from Windows Update and installing

automatically.

You can also remove the Windows Update site from the search path for

device drivers not in the device driver store. You can update, disable (or stop), uninstall,

or roll back device drivers.

Definition
Term
defragmentation
Definition

Files on a hard disk can become

fragmented so that they are stored on noncontiguous

areas of the disk. Defragmentation addresses this

problem by rearranging the disk so files are stored in

contiguous areas.

Term
driver store
Definition

A protected area on disk that contains the

drivers for PnP devices.

Term
Staging
Definition

An administrator can stage a device driver by

placing it in the driver store. A non-administrator can

then install the device.

Term
Redundant Array of Independent Disks (RA ID)
Definition

Volumes that use disk space on several disks to

implement volumes that offer increased performance, fault tolerance, or both. Windows 7 supports RAID-0,

RAID-1, and RAID-5.

Term
Trusted Publisher Store
Definition

A protected area of a

hard disk that contains the digital certificates that

authenticate signed device drivers.

Term

How do you check the DirectX video card and discover whether the driver is not

WHQL-approved and if there are any other problems?

Definition

The Dxdiag tool diagnoses any problems with the video card and will tell you whether the

driver is WHQL approved.

Term
How do you check there are no other unsigned drivers installed on the computer?
Definition
The Sigverif tool scans the computer and detects any unsigned drivers.
Term

If the problem is not the driver, what tool can you use to determine if there is a resource clash with other hardware?

Definition

The Msinfo32 tool lists the resources and tells you what driver uses what resources.

In particular, you should investigate Conflicts/Sharing under Hardware Resources.

Term

The unsigned driver in question worked fine on your test network. You want to test it

again more thoroughly under stress conditions, such as low resources. What tool can

you use to do this?

Definition
Driver Verifier Monitor tests the device driver under configurable stress conditions.
Term

Which compatibility option should you enable for a program that needs administrative

privileges but that triggers a User Account Control prompt?

Definition

You should enable the Run This Program As An Administrator option because this

allows the application to run using elevated privileges. The user is presented with

a User Account Control prompt prior to elevated privileges being granted.

Term
Application Compatibility Manager
Definition

 

The Application Compatibility Manager allows you to configure, collect, and analyze compatibility data so you can resolve issues prior to deploying Windows 7 in your organization.

 

Term
The Compatibility Administrator
Definition

The Compatibility Administrator, shown in Figure 5-4, allows you to resolve a large number

of application compatibility issues that might occur when you attempt to deploy an existing

application on Windows 7.

Term
Internet Explorer Compatibility Test Tool
Definition

The Internet Explorer Compatibility test tool allows you to test existing Web sites to determine if they have compatibility problems that adversely influence how they will display on Internet Explorer 8, the version of Internet Explorer that ships with Windows 7.

Term
Setup Analysis Tool
Definition

The Setup Analysis Tool monitors the actions taken by application installers and can detect

the following compatibility issues:

n Installation of kernel mode drivers

n Installation of 16-bit components

n Installation of Graphical Identification and Authentication dynamic-link libraries (DLLs)

n Modification of files or registry keys that are guarded by Windows Resource Protection (WRP)

Term
Standard User Analyzer
Definition

The Standard User Analyzer, shown in Figure 5-6, allows you to test applications to determine

if they might have compatibility issues caused by User Account Control. The Standard User

Analyzer provides data about problematic files and APIs, registry keys, .ini files, tokens,

privileges, namespaces, processes, and other related items that the application uses that

might cause problems when running on a computer with Windows 7 installed.

Term

Fact: An application that functions well on a computer that has Windows XP SP3 installed, but

which does not run normally on Windows 7, might run without a problem if you configure it to use the Windows XP SP3 compatibility mode.

Definition
Term

Fact: You can run the Program Compatibility troubleshooter to diagnose common

application compatibility issues.

Definition
Term

Fact: Windows 7 has several compatibility modes that allow the majority of existing software

to execute on it.

Definition
Term

 

Fact: The ACT contains several tools that allow you to analyze potential compatibility problems

prior to deploying Windows 7 in your organization.

 

Definition
Term

Fact: You can use the Compatibility Administrator to search for existing compatibility fixes

and compatibility modes that have already been developed for popular applications.

Definition
Term

Fact: You can use the Internet Explorer Compatibility Test Tool to check existing Web sites

and applications for compatibility problems that might exist when Internet Explorer 8

is used as a browser.

Definition
Term

Windows XP Mode allows you to run applications through a virtualized instance of

Windows XP that runs on Windows 7 Professional, Ultimate, or Enterprise edition.

Definition
Term
Software Restriction Policies
Definition

Software Restriction Policies is a technology available to clients running Windows 7 that is

available in Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008.

You manage Software Restriction Policies through Group Policy. You can find Software

Restriction Policies in the Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies node of a group policy. When you use Software Restriction

Policies, you use the Unrestricted setting to allow an application to execute and the Disallowed

setting to block an application from executing.

Term

Software Restriction Policies are applied in a particular order, with the more explicit rule

types overriding more general rule types. The order of precedence from most specific (hash)

to least specific (default) is as follows:

Definition

1. Hash rules

2. Certificate rules

3. Path rules

4. Zone rules

5. Default rules

Term

Fact: In environments that use both Software Restriction Policies and AppLocker, AppLocker

policies take precedence. If you have an AppLocker policy that specifically allows an

application that is blocked by a Software Restriction Policy, the application executes.

Definition
Term
What is the advantage of using a hash rule over a path rule?
Definition

Hash rules are like digital fingerprints that identify a unique file. A path rule only

works based on a file name and path, which means that malware can be inserted

into locations covered by path rules and executed.

Term

Fact: Software Restriction Policies can be used on computers running Windows XP, Windows

Vista, Windows Server 2003, Windows Server 2008, and Windows 7.

Definition
Term

Fact: You can choose a Software Restriction Policy default rule that blocks all applications

that are not allowed or choose a default rule that allows all applications that are not

subject to any other rules.

Definition
Term

Fact: Software Restriction Policy rules that are more specific override rules that are less specific.

A hash rule that sets an application to unrestricted overrides a path rule that sets the same application to Disallowed.

Definition
Term

Fact: Hash rules are analogous to digital fingerprints of specific files. You must create a new

hash rule if you apply a software update to a file.

Definition
Term
Fact: AppLocker policies are a type of application control policy.
Definition
Term

Fact: AppLocker policies can be used only on computers running Windows 7 Enterprise and Ultimate editions.

Definition
Term

Fact: AppLocker path and hash rules work in the same way that Software Restriction Policy

path and hash rules work.

Definition
Term

Fact: AppLocker publisher rules allow you to create rules based on which vendor digitally

signed an application. You can allow all applications from that vendor, all versions of

a specific application, or just a specific version of a specific application using publisher rules.

Definition
Term

 

Fact: Some AppLocker rule types allow exceptions. Exceptions allow you to exempt a specific

application from the scope of a general AppLocker rule.

 

Definition
Term

Fact: An AppLocker block rule always overrides an AppLocker allow rule. The fallback rule

for AppLocker blocks the execution of any application not explicitly allowed by another

rule.

Definition
Term

Fact: AppLocker overrides Software Restriction Policies when both are applied to the same

computer.

Definition
Term

 

Fact: In AppLocker it is not possible to create

a publisher rule due to the lack of digital signature.

 

Definition
Term
Fact: You can use built-in compatibility modes to allow applications designed for previous
versions of Windows to run on Windows 7. If one of the existing compatibility modes
does not resolve the compatibility issues, you can use the ACT to search a large
database of existing application specific fixes and modes.
Definition
Term

Fact: Software Restriction Policies can be used on all versions of Windows and allow you

to create rules based on a file hash, software path, publisher certificate, or network

zone. Software Restriction Policies are applied from the most specific rules to the least

specific. Rules that are more specific override rules that are less specific.

Definition
Term

Fact: AppLocker policies can only be used on computers running Windows 7 Enterprise and

Ultimate editions. AppLocker policies can be applied on the basis of publisher identity,

file hash, or software path. AppLocker includes wizards that automatically generate

rules. AppLocker block rules override all other AppLocker rules.

Definition
Term
AppLocker Policy
Definition

A type of policy that can be used on

Windows 7 Enterprise and Ultimate editions to restrict the execution of applications based on application identity information.

Term
Compatibility Fix
Definition

Also known as shims, compatibility

fixes are collected together to create compatibility

modes.

Term
Compatibility Mode
Definition

A collection of compatibility fixes,

also known as shims, that allow programs written for

older versions of Windows to run on Windows 7.

Term
Hash Rule
Definition

A rule that uses a digital fingerprint based

on a file’s binary properties.

Term
Path Rule
Definition

A rule that specifies an application or group

of applications by their file location.

Term
Publisher Rule
Definition

A rule that specifies a file or a group of

files based on the digital signature the vendor used to

sign the file.

Term
Software Restriction Policy
Definition

A type of policy that can be used on all versions of Windows to restrict the execution of applications based on application identity information.

Term

You have purchased a secondhand computer and are connecting it to a hybrid

network that obtains its configuration from DHCP provided by a third-party WAP.

The computer is not wireless-enabled, so you plug it into the Ethernet switch on

the WAP and switch it on. It cannot access the Internet. You use the Ipconfig tool

and discover that the computer has an IP address of 10.1.10.231. You know the

WAP is working properly and the Ethernet connection is okay. What should you

check next?

Definition

Check that the computer is set to receive its IPv4 configuration dynamically. It has

not been reconfigured by DHCP on the WAP and its previous owner has probably

configured it statically with the 10.1.10.231 address. You need to reconfigure the

computer to receive its IPv4 settings dynamically.

Term

Fact: IPv4 is responsible for ensuring that a packet sent across an IPv4 network reaches its

destination. DHCP automatically configures computers on a network with their IPv4

configurations. DNS resolves a host name or FQDN to an IP address.

Definition
Term

Fact: An IPv4 address identifies a computer (or other network device) on a subnet. A subnet

mask defines the range of IP addresses on a subnet.

Definition
Term

Fact: A wired small network that contains more than one computer typically implements

Transmission Control Protocol/Internet Protocol (TCP/IP) configuration through ICS.

Computers and other devices on a wireless or hybrid small network obtain their configurations from the WAP.

Definition
Term

Fact: You use the Network And Sharing Center to view computers and devices on a network,

connect to a network, set up a connection or network, and manage network connections.

You can also use the Netsh interface ipv4 command to manage IPv4 networks.

Definition
Term

Fact: You can access the Windows Network Diagnostics tool from the Network And Sharing

Center to troubleshoot a faulty network connection. If you fail to connect to a Web

site, you can access the same tool by clicking Diagnose Connection Problems.

Definition
Term

Fact: You can use the Ping, Tracert, and Pathping commands to troubleshoot network

connectivity. The Netstat command returns network protocol statistics.

Definition
Term
IPv6 Address Type: Unicast
Definition

Identifies a single interface within the scope of the unicast address type. Packets addressed to a unicast address are delivered to a single interface.

RFC 2373 allows multiple interfaces to use the same address, provided that these

interfaces appear as a single interface to the IPv6 implementation on the host. This

accommodates load-balancing systems.

Term
IPv6 Address Type: Multicast
Definition

Identifies multiple interfaces. Packets addressed to a multicast address are delivered to all interfaces that are identified by the address.

Term
IPv6 Address Type: Anycast
Definition

Identifies multiple interfaces. Packets addressed to an anycast address are delivered to the nearest interface identified by the address. The nearest interface is the closest in terms of routing distance, or number of hops. An anycast address is used for

one-to-many communication, with delivery to a single interface.

Term

Fact: IPv6 addresses identify interfaces rather than nodes. A node is identified by any unicast

address that is assigned to one of its interfaces.

Definition
Term
IPv6 Unicast Address: Global
Definition

Global unicast addresses are the IPv6 equivalent of IPv4 public addresses and are globally

routable and reachable on the IPv6 Internet. These addresses can be aggregated to produce

an efficient routing infrastructure and are therefore sometimes known as aggregatable global

unicast addresses. A global unicast address is unique across the entire IPv6 Internet. (The

region over which an IP address is unique is called the scope of the address.)

Term
What type of address is fec0:0:0:eadf::1ff?
Definition
Unicast site-local
Term

Fact: A global unicast address is the IPv6 equivalent of an IPv4 public unicast address, and it

typically starts with a 2. A link-local IPv6 address is equivalent to an IPv4 APIPA address

and it starts with fe8. A site-local IPv6 address is equivalent to an IPv4 private address and

it starts with fec0. The special IPv6 addresses :: and ::1 are equivalent to the IPv4 addresses

0.0.0.0 and 127.0.0.1. Multicast IPv6 addresses start with ff. Anycast addresses are assigned

only to routers and are beyond the scope of the 70-680 examination.

Definition
Term
How many bits are in an IPv4 address?
Definition
32
Term
How many bits are in an IPv6 address?
Definition
128
Term

Fact: The 70-680 examination objectives specifically mention Teredo addresses, which are

supported by Microsoft. However the examination is unlikely to ask you to generate

a Teredo address. You might, however, be asked to identify such an address and work out

its included IPv4 address. Fortunately you have access to a scientific calculator during the

examination. You are more likely to be asked to identify a Teredo or a 6to4 address. Both

are public addresses. A Teredo address starts with 2001; a 6to4 address starts with 2002.

Definition
Term

 

What Netsh command lists site IDs?

 

Definition

 

netsh interface ipv6 show address level=verbose

 

Term

 

What Netsh command could you use to identify the IPv6 address of your default router interface?

 

Definition

 

netsh interface ipv6 show route

 

Term

Fact: IPv6 supports unicast, multicast, and anycast addresses. Unicast addresses can be

global, site-local, link-local, or special.

Definition
Term

Fact: IPv6 is fully supported in Windows 7 and addresses problems such as lack of address

space that are associated with IPv4.

Definition
Term

Fact: IPv6 is designed to be backward-compatible, and you can specify IPV4-compatible

addresses such as Teredo and 6to4 addresses.

Definition
Term

Tools to configure and troubleshoot IPv6 include Ping, Ipconfig, Tracert, Pathping, and Netsh.

Definition
Term

Fact: You can configure IPv6 by using the TCP/IPv6 Properties GUI. You can also use Netsh

interface ipv6 commands to configure IPv6 settings.

Definition
Term

Fact: Several 802.11 standards exist in addition to 802.11a, 802.11b, and 802.11c. However, the

standards described in this lesson are those in common use. If you see any other standard

(for example, 802.11d) given as a possible answer in the examination, that answer is almost

certainly wrong.

Definition
Term

From which dialog box can you add a new protocol, server service, or client service?

Definition
The Local Area Connections Properties dialog box
Term

Fact: Problems with wireless connectivity can occur if a computer is within range of two

preferred networks or two networks that have the same SSID. Interference from domestic

devices can also cause problems. You can change the channel that a WAP uses to reduce interference.

Definition
Term

Fact: Using an unsecured wireless network can create significant security risks. If you

configure a wireless network, always ensure that it is secure.

Definition
Term

You can connect to a wireless network, manage wireless networks, and enable or

disable a wireless adapter through the Network And Sharing Center. You can also use the Netsh wlan command-line utility to mange wireless networks.

Definition
Term

Fact: Windows 7 configures the default printer that you specify on a particular network

to be the default whenever you connect to that network. Thus, when you switch networks,

you seamlessly shift default printers. You can configure location-aware printing

and specify default printers for specific networks.

Definition
Term

Fact: IPv4 routes packets within a subnet and over an intranetwork. IPv6 performs the same

functions as IPv4 but also addresses the problems associated with the earlier protocol,

such as lack of address space.

Definition
Term
Default Gateway
Definition

The IP address to which a host on

a subnet sends a packet (or IP packet) when the packet’s destination IP address is not on the local subnet. The default gateway address is usually an interface belonging to the border router of LAN. In the case of a SOHO or small test network, the default gateway is the static IP address of the WAP or the ICS computer.

Term
Global Address
Definition

An IPv6 address that identifies a device

on the Internet. Global addresses must be unique on

the Internet.

Term
IP Address
Definition

(IPv4 or IPv6) A unique address on

a computer network that devices use in order to

identify and communicate with each other.

Term
IP Packet
Definition

The fundamental unit of information passed

across any IP network. An IP packet contains source and destination addresses along with data and a number of fields that define such things as the length of the packet, the header checksum, and flags that indicate whether the packet can be (or has been) fragmented.

Term
Preferred Wireless Network
Definition

A wireless network

to which a wireless client attempts to connect and

authenticate. Typically, the list of preferred networks

contains networks to which the client has previously

connected listed in order of preference.

Term
Public Address
Definition

An IPv4 address that identifies a

device on the Internet (or is allocated to a LAN). Public addresses must be unique on the Internet.

Term
Subnet
Definition

An identifiably separate part of an

organization’s network. Typically, a subnet might

represent all the computers at one geographic location, in one building, or on the same LAN. An IPv4 address consists of the address of a subnet (subnet address) combined with the address of a device on the subnet (host address).

Term
Subnet Mask
Definition

A number that defines what bits in an

IPv4 address represent the subnet address and what

bits represent the host address.

Term
On what basis can you create rules for Windows Firewall (as opposed to WFAS)?
Definition

You can create rules for Windows Firewall only for programs and Windows 7 features. You cannot create rules for Windows Firewall based on port address or service.

Term
Fact: Windows Firewall and WFAS work together on a client running Windows 7.
Definition
Term

Fact: Windows Firewall allows for the creation of basic rules that apply to programs and

Windows 7 features. You cannot configure rule scope or authentication settings for Windows Firewall rules.

Definition
Term

Fact: Network profiles allow different sets of firewall rules to apply depending on the

properties of the network connection. The three network profiles are Domain, Public,

and Home Or Work (Private).

Definition
Term

Fact: Windows Firewall rules can apply selectively to network profiles. Different network

profiles can apply to different network interfaces at the same time.

Definition
Term

Fact: WFAS allows you to configure inbound and outbound firewall rules for ports, programs, and services.

Definition
Term
Fact: WFAS allows you to configure rule scope and authentication.
Definition
Term

What command do you need to execute on a computer if you want to configure

the Remote Management Service to allow remote management through Windows

PowerShell or WinRS?

Definition

You must run the command WinRM quickconfig from an elevated command prompt.

Term

Fact: Remote Desktop allows you to make a connection to a remote computer and view its

desktop as though you were logged on directly.

Definition
Term

Fact: When Remote Desktop with Network Level Authentication is enabled, only clients

running Windows Vista and Windows 7 can connect. It is possible to connect using a client running Windows XP with SP3, but it requires special configuration and is not supported by default.

Definition
Term

Fact: Standard users must be members of the Remote Desktop Users group before they can

connect to a client running Windows 7 using Remote Desktop.

Definition
Term

Fact: You need to run the command WinRM Quickconfig from an elevated command

prompt on a client that you want to manage remotely using either WinRS or Windows

PowerShell. WinRM Quickconfig configures the Windows Remote Management service

and appropriate firewall rules and enables the WinRM listener.

Definition
Term

Fact: You can use the winrs –r:hostname command to run a command-line command

remotely on the host named hostname.

Definition
Term

Fact: Only Windows PowerShell V2 and later support remote Windows PowerShell. Windows

PowerShell V2 is the default version of Windows PowerShell included with Windows 7.

Definition
Term

Fact: You can use the icm hostname command to run PowerShell Command on computer hostname remotely.

Definition
Term
connection security rule
Definition

A rule that determines connection authentication requirements.

Term
Inbound Rule
Definition

A firewall rule that applies to traffic

directed at the host from an external source.

Term
Outbound Rule
Definition

A firewall rule that applies to traffic

from the host addressed to an external location.

Term
Windows Remote Shell
Definition

A tool that allows command-line commands to be executed on a remote computer.

Term

Which tool can you use to determine which files and folders that users are accessing remotely on a client running Windows 7 configured with shared folders?

Definition

You can use the Shared Folders\Open Files node to determine which files and folders are being accessed remotely on a client running Windows 7.

Term

 

Remember what permissions to assign a group to allow them to manage their own

documents, but not to manage other documents submitted to a shared printer.

 

Definition

 

Read Printer: This permission allows a user to print to the printer and rearrange the documents

that they have submitted to the printer.

 

Term

Fact: HomeGroups can be used on networks that have the Home network location designation. They make it easier to share resources in environments without AD DS.

Definition
Term
Fact: Libraries are collections of folders. You can share libraries with the HomeGroup.
Definition
Term

Fact: Shared folders allow individual folders to be shared. Sharing options for folders are

more detailed than for Libraries.

Definition
Term

Fact: You can manage shared folders through the Computer Management console,

Windows Explorer, and the Net Share command. The Computer Management console allows for the centralized administration of shared folders.

Definition
Term

Fact: The Read printer permission allows users to control their own documents. The Manage

Documents permission allows users to manage all documents submitted to the printer.

The Manage Printers printer permission allows users to control printer settings and

configure printer permissions.

Definition
Term

 

 

If you move a folder to a new location on the same volume, do the folder and its contents retain their original NTFS permissions?

 

Definition

 

Yes. When files or folders are moved to a new location on the same volume, they retain all their original NTFS permissions.

 

Term

Fact: The Icacls.exe utility can be used to manage NTFS permissions from the command line.

You can use this utility to back up and restore current permissions settings.

Definition
Term

Fact: There are six basic NTFS permissions: Read, Write, List Folder Contents, Read & Execute,

Modify, and Full Control. A Deny permission always overrides an Allow permission.

Definition
Term

Fact: You can use the Effective Permissions tool to calculate a user’s effective permissions to

a file or folder when she is a member of multiple groups that are assigned permission

to the same resource.

Definition
Term

Fact: The most restrictive permission applies when attempting to determine the result of

Share and NTFS permissions.

Definition
Term
Fact: Auditing allows you to record which files and folders have been accessed.
Definition
Term
Fact: When a file is copied, it inherits the permissions of the folder it is copied to. When a file is moved within the same volume, it retains the same permissions. When a file is moved to another volume, it inherits the permissions of the folder it is copied to.
Definition
Term

Fact: When you encrypt a file, it generates an EFS certificate and private key. You can encrypt a file to another user’s account only if that user has an existing EFS certificate.

Definition
Term
Which BranchCache mode should you use if there are no servers running Windows Server 2008 R2 at your branch office?
Definition
You should use Distributed Cache mode. Hosted Cache mode requires a server running Windows Server 2008 R2 on the LAN.
Term
Netsh BranchCache reset
Definition

 

This command resets the current BranchCache

configuration, disabling and stopping the service, resetting the registry defaults, deleting any cache files, and setting the service start type to Manual. This command also disables any configured BranchCache firewall rules.

 

Term
Netsh BranchCache show status
Definition

This command displays the current service mode,

including whether that service mode is configured using Group Policy, and displays the

current status of the BranchCache service.

Term
netsh Branchcache set service mode=distributed
Definition

This command sets the client to use the Distributed Cache mode, starts the BranchCache service, and changes thestartup type to Manual . It also enables the BranchCache - Content Retrieval (Uses HTTP) and BranchCache – Peer Discovery (Use WSD) firewall rules 

 

Term
netsh Branchcache set service mode=local
Definition

This command sets the client to use the local cache mode, starts the BranchCache service, and changes the startup type to Manual . It does not enable any firewall rules . When you set the local caching mode, the client stores files retrieved over the WAN in a local cache but does not share the contents of that cache with any other clients on the branch office network . It is only possible to set this mode using Netsh.

 

Term
netsh Branchcache set service mode=hostedclient location=hostedserver
Definition

This command sets the client to use the Hosted Cache mode, specifies the location of the hosted cache server, starts the BranchCache service, and changes its startup type to Manual . It also enables the BranchCache - Content Retrieval (Uses HTTP) and BranchCache – Hosted Cache Client (Uses HTTPS) firewall rules 

 

Term
netsh Branchcache set cachesize
Definition
This policy allows you to set the size of the local cache . You can do this as a percentage of hard disk space or by specifying a number of bytes
Term
netsh Branchcache set localcache
Definition
This policy allows you to set the location of the local cache
Term
Fact: BranchCache is a technology that allows files hosted on remote file servers running Windows Server 2008 R2 to be cached on a branch office network
Definition
Term
Fact: Only Windows 7 Enterprise and Ultimate editions support BranchCache
Definition
Term
Fact: Distributed Cache mode shares the cache among clients running Windows 7
Definition
Term
Fact: Hosted Cache mode requires that a specially configured server running Windows Server 2008 R2 be present on the branch office network
Definition
Term
Fact: When you enable Distributed Cache mode or Hosted Cache mode using Netsh, the BranchCache service and firewall rules are configured automatically
Definition
Term
BranchCache
Definition

 

A technology that allows files hosted on

remote Windows Server 2008 R2 servers to be cached on a branch office LAN.

 

Term
Encrypting File System (EFS)
Definition

A technology that allows the encryption of individual files and folders to specific user accounts.

Term
HomeGroup
Definition

 

A feature that allows resource sharing on

home networks.

 

Term
Library
Definition

A virtualized collection of folders that often

contains similar content.

Term

 

A computer running Windows 7 Enterprise named Waverley has two NTFS-formatted

volumes, volume C and volume D. The folder C:\Share is shared and has 15 subfolders and

hundreds of files. Many of these folders have unique NTFS permissions. You want to move this

folder so that it is hosted on volume D because volume C is running out of space. One of the

users of computer Waverley will be changing to computer Warrandyte. This user has copied

a large number of EFS-encrypted files onto a NTFS-formatted USB flash device. What steps can you take so that the user is able to read the encrypted files on the USB flash device on computer Warrandyte?

 

Definition

 

You need to export the user’s private key from computer Waverley and import it to computer

Warrandyte.

 

Term

A computer running Windows 7 Enterprise named Waverley has two NTFS-formatted

volumes, volume C and volume D. The folder C:\Share is shared and has 15 subfolders and

hundreds of files. Many of these folders have unique NTFS permissions. You want to move this

folder so that it is hosted on volume D because volume C is running out of space. One of the

users of computer Waverley will be changing to computer Warrandyte. This user has copied

a large number of EFS-encrypted files onto a NTFS-formatted USB flash device. What steps can you take to ensure that it is possible to recover all files that are encrypted in future?

Definition

Create a recovery agent certificate using Cipher.exe. Use the Local Group Policy Editor to assign this certificate as a recovery agent.

Term

A computer running Windows 7 Enterprise named Waverley has two NTFS-formatted

volumes, volume C and volume D. The folder C:\Share is shared and has 15 subfolders and

hundreds of files. Many of these folders have unique NTFS permissions. You want to move this

folder so that it is hosted on volume D because volume C is running out of space. One of the

users of computer Waverley will be changing to computer Warrandyte. This user has copied

a large number of EFS-encrypted files onto a NTFS-formatted USB flash device. What steps can you take to move the shared folder to volume D?

Definition
You can use Robocopy.exe or Icacls.exe to move the files from one volume to another while retaining their existing permissions. If you just move the files, the permissions will be lost.
Term

You are trying to make the use of WAN bandwidth between Contoso’s head office in

Melbourne and branch offices in Wangaratta and Traralgon more efficient. All client

computers at Contoso have Windows 7 Enterprise installed. Users turn their computers

on and off during the day. If possible, you want to store any BranchCache data so that it

is always available. There is a Windows Server 2008 R2 RODC at the Traralgon site named

rodc.traralgon.contoso.internal, and there is a Windows Server 2008 RODC named rodc.

wangaratta.contoso.internal at the Wangaratta site. You do not plan on upgrading any server

operating systems in the near future. Which BranchCache mode should you use at the Wangaratta branch office?

Definition

 

You should use Distributed Caching mode in the Wangaratta branch office because you are

unable to deploy a server running Windows Server 2008 R2 to this location and Windows

Server 2008 does not support BranchCache.

 

Term

You are trying to make the use of WAN bandwidth between Contoso’s head office in

Melbourne and branch offices in Wangaratta and Traralgon more efficient. All client

computers at Contoso have Windows 7 Enterprise installed. Users turn their computers

on and off during the day. If possible, you want to store any BranchCache data so that it

is always available. There is a Windows Server 2008 R2 RODC at the Traralgon site named

rodc.traralgon.contoso.internal, and there is a Windows Server 2008 RODC named rodc.

wangaratta.contoso.internal at the Wangaratta site. You do not plan on upgrading any server

operating systems in the near future. Which BranchCache mode should you use at the Traralgon branch office?

Definition

You should configure the Hosted Cache mode at the Traralgon office because this ensures

that a maximum number of files are available in the centralized cache. Hosted Cache allows

the cache to remain online, unlike Distributed Cache, which requires that all clients remain

online. A server running Windows Server 2008 R2 is present at the Traralgon branch office to

support Hosted Cache mode.

Term

You are trying to make the use of WAN bandwidth between Contoso’s head office in

Melbourne and branch offices in Wangaratta and Traralgon more efficient. All client

computers at Contoso have Windows 7 Enterprise installed. Users turn their computers on and off during the day. If possible, you want to store any BranchCache data so that it is always available. There is a Windows Server 2008 R2 RODC at the Traralgon site named rodc.traralgon.contoso.internal, and there is a Windows Server 2008 RODC named rodc. wangaratta.contoso.internal at the Wangaratta site. You do not plan on upgrading any server operating systems in the near future. What steps do you need to take to prepare server rodc.traralgon.contoso.internal to support BranchCache?

Definition
Install the BranchCache feature on the server and configure shared folders to support BranchCache. Run the command set service mode=hostedserver clientauthentication=domain on the server.
Term
What is the difference between the Always Notify Me And Dim My Desktop Until I Respond and Always Notify Me UAC settings?
Definition
The Always Notify Me And Dim My Desktop Until I Respond setting uses Secure Desktop in conjunction with UAC. When the more secure option is in effect, you must respond to the UAC prompt before you can continue to use your computer. If the Always Notify Me setting is enabled, you can continue working without having to respond directly to the UAC prompt.
Term
Fact: You can use the Local Security Policy console or the Local Group Policy Editor to edit security-related group policies
Definition
Term
Fact: When UAC is configured to use Secure Desktop, an administrator must respond directly to the prompt before being able to continue using the computer
Definition
Term
Fact: UAC can be configured to prompt for consent or prompt for credentials . Prompting for consent requires that the administrator simply assents to the elevation . Prompting for credentials requires the administrator to his password to allow elevation
Definition
Term
Fact: By default, Windows 7 does not prompt standard users . You can configure UAC to prompt standard users for credentials . They must then provide the credentials of a user that is a member of the local administrators group
Definition
Term
How can you delete credentials that you stored when using Runas with the /savecred option?
Definition
You can delete the credentials using Credential Manager.
Term
Fact: Credential Manager allows you to manage passwords for Web sites, terminal services and remote desktop sessions, stand-alone network resources, and smart card certificates. You can use Credential Manager to back up and restore these credentials.
Definition
Term

Fact: The Runas utility allows you to run programs using alternate credentials. You can use

the /savecred option to store the password associated with these alternate credentials.

Definition
Term

Fact: You can use Certmgr.msc, Cipher.exe, or the Manage File Encryption Certificates tool to back up EFS certificates

Definition
Term

Fact: Users can create a password reset disk to assist them if they forget their password. Password reset disks must be created before the password is forgotten.

Definition
Term

 

Fact: Members of the local administrators group can reset the passwords of users that have forgotten them.

 

Definition
Term

Fact: Group policies can be configured to enforce multifactor authentication by requiring users to log on with smart cards.

Definition
Term

Fact: You can assign rights to users by adding them to the appropriate built-in local group or by assigning them rights through Group Policy.

Definition
Term
Multifactor Authentication
Definition

Two or more different forms of authentication. On Windows 7, this is usually achieved by requiring a smart card and a password.

Term

Privilege Elevation

Definition

An increase in rights that allows a user to perform a task that require more rights than those assigned to a standard user.

Term
Secure Desktop
Definition

A special desktop where a user is forced to respond to a UAC prompt before being able to continue using the computer. This works as a security measure to ensure that users are not tricked into providing UAC consent when they do not intend to do so.

Term

You are developing UAC policies for the deployment of clients running Windows 7 at Coho

Vineyard. Administrators often have to help out standard users using remote assistance.

At times, it is necessary for administrators to perform actions that require elevation.

Administrators should have to provide their authentication credentials when performing an

act that triggers an elevation prompt. The administrators should be able to continue using

other parts of the operating system and should not have to respond to the elevation prompt

immediately. All approved applications at Coho Vineyard have been digitally signed by the

application publisher. Which policies do you need to configure to support the elevation requirements for

administrators?

Definition

You need to configure the UAC: Behavior Of The Elevation Prompt For Administrators In

Admin Approval Mode policy and set it to Prompt For Credentials. You also need to set

the UAC: Switch To The Secure Desktop When Prompting For Elevation policy to Disabled.

This ensures that administrators are prompted for credentials but do not have to respond

immediately to the prompt.

Term

You are developing UAC policies for the deployment of clients running Windows 7 at Coho Vineyard. Administrators often have to help out standard users using remote assistance. At times, it is necessary for administrators to perform actions that require elevation. Administrators should have to provide their authentication credentials when performing an act that triggers an elevation prompt. The administrators should be able to continue using other parts of the operating system and should not have to respond to the elevation prompt immediately. All approved applications at Coho Vineyard have been digitally signed by the

application publisher. Which policies do you need to configure to support elevation during remote

assistance?

Definition

You need to configure the UAC: Behavior Of The Elevation Prompt For Standard Users policy

to ensure that standard users are prompted for credentials when they perform an act that

requires elevation. You also need to configure the UAC: Allow UIAccess Applications To

Prompt For Elevation Without Using Secure Desktop policy. Doing this allows remote user

interaction with the UAC prompt when connected through UIAccess applications.

Term

You are developing UAC policies for the deployment of clients running Windows 7 at Coho

Vineyard. Administrators often have to help out standard users using remote assistance.

At times, it is necessary for administrators to perform actions that require elevation.

Administrators should have to provide their authentication credentials when performing an

act that triggers an elevation prompt. The administrators should be able to continue using

other parts of the operating system and should not have to respond to the elevation prompt

immediately. All approved applications at Coho Vineyard have been digitally signed by the

application publisher. Which policy do you need to configure to ensure that only approved applications can initiate elevation?

Definition

You need to configure the UAC: Only Elevate Executables That Are Signed And Validated

policy. You can use this policy because all applications that might require elevation at Coho

Vineyard have digital signatures.

Term

Wingtip Toys has 20 people that have stand-alone computers running Windows 7. One of the

users recently had a problem where he forgot his password. You were able to reset this user’s

password, but the user lost access to several important encrypted documents as well as all

his stored Web site credentials. You are in the process of developing a policy to ensure that

this type of data loss does not happen again. You also want to ensure that users do not keep

the same passwords because several appear to have been using the same password for the

last few months without changing it, even though your company policy states that passwords

should be changed every month. What steps can you take to ensure that users do not lose access to encrypted documents or credentials if their password is reset?

Definition

Ensure that users back up their EFS key. This can be done using Cipher.exe, the Manage File Encryption Certificates tool, or through Certmgr.msc. The users should use Credential Manager to back up their stored Web site passwords.

Term

Wingtip Toys has 20 people that have stand-alone computers running Windows 7. One of the

users recently had a problem where he forgot his password. You were able to reset this user’s

password, but the user lost access to several important encrypted documents as well as all

his stored Web site credentials. You are in the process of developing a policy to ensure that

this type of data loss does not happen again. You also want to ensure that users do not keep

the same passwords because several appear to have been using the same password for the

last few months without changing it, even though your company policy states that passwords

should be changed every month. What steps can you take to ensure that users are able to recover their own forgottenpasswords?

Definition

Create a password reset disk for each user

Term

Wingtip Toys has 20 people that have stand-alone computers running Windows 7. One of the

users recently had a problem where he forgot his password. You were able to reset this user’s

password, but the user lost access to several important encrypted documents as well as all

his stored Web site credentials. You are in the process of developing a policy to ensure that

this type of data loss does not happen again. You also want to ensure that users do not keep

the same passwords because several appear to have been using the same password for the

last few months without changing it, even though your company policy states that passwords

should be changed every month. What steps can you take to ensure that users regularly change their passwords and do not use the same small number of passwords?

Definition
Configure the Maximum Password Age policy and configure the Enforce Password History policy.
Term

Fact: DirectAccess allows a client running Windows 7 Enterprise or Ultimate edition to connect automatically to a corporate intranet when an active Internet connection is established without requiring user intervention.

Definition
Term

If a client running Windows 7 has a public IPv6 address, a direct IPv6 connection is

made. If the client has a public IPv4 address, a connection is made using the 6to4

transition technology. If the client has a private IPv4 address, a connection is made

using the Teredo transition technology. If the client has a private IPv4 address and is behind a firewall that restricts most forms of network traffic, a connection using IP-HTTPS is made.

Definition
Term

 

Fact: DirectAccess clients require computer certificates from a CA that is trusted by the

DirectAccess server. The DirectAccess server requires a certificate from a CA trusted by

the DirectAccess client.

 

Definition
Term

Fact: DirectAccess clients must be members of an AD DS domain. DirectAccess clients must

be members of a special domain security group which has been configured during the

setup of the DirectAccess server.

Definition
Term

Fact: A DirectAccess server must run Windows Server 2008 R2. A domain controller running

Windows Server 2008 R2 and a DNS server must also be present on the internal network to support DirectAccess.

Definition
Term
VPN Protocol: PPTP (Point-to-Point Tunneling Protocol)
Definition

 

PPTP VPNs are the least secure form of VPN. Because PPTP VPNs do not require access to a public key infrastructure (PKI), they are also the most commonly deployed type of VPN. PPTP connections can use the MS-CHAP, MS-CHAPv2, EAP, and PEAP authentication protocols. PPTP connections use MPPE to encrypt PPTP data. PPTP connections provide data confidentiality but do not provide data integrity or data origin authentication. Some older NAT devices do not support PPTP. Windows 7 uses PPTP to support incoming VPN connections.

 

Term
VPN Protcol: L2TP /IPsec (Layer 2 Tunneling Protocol)
Definition

L2TP /IPsec L2TP/IPsec VPN connections are more secure than PPTP. L2TP/IPsec provides per-packet data origin authentication, data integrity, replay protection, and data confidentiality. L2TP/IPsec uses digital certificates, so it requires access to

a certificate services infrastructure. Most third-party VPN solutions support L2TP/IPsec. L2TP/IPsec cannot be used behind NAT unless the client and server support IPsec NAT Traversal (NAT-T). Windows 7, Windows Server 2003, and Windows

Server 2008 support NAT-T. You can configure L2TP to use either certificate-based authentication

or a pre-shared key by configuring the advanced properties.

Term
VPN Protocol: SSTP (Secure Socket Tunneling Protocol)
Definition

SSTP VPN tunnels use port 443, meaning that SSTP VPN traffic can pass across almost all firewalls that allow Internet access, something that is not true of the PPTP, L2TP/IPsec, and IKEv2 VPN protocols. SSTP works by encapsulating PPP traffic over

the SSL channel of the HTTPS protocol. SSTP supports data origin authentication, data

integrity, replay protection, and data confidentiality. You cannot use SSTP through

a Web proxy that requires authentication.

Term
VPN Protocol: IKEv2 (Internet Key Exchange v2)
Definition

IKEv2 is a VPN protocol new to Windows 7 and is not present in previous versions of Windows. IKEv2 supports IPv6 and the new VPN Reconnect feature. IKEv2 supports Extensible Application Protocol (EAP) and computer certificates for clientside

authentication. This includes Microsoft Protected EAP (PEAP), Microsoft Secured Password (EAP-MSCHAP v2), and Microsoft Smart Card or Other Certificate, as shown in Figure 10-12. IKEv2 does not support POP, CHAP, or MS-CHAPv2 (without EAP) as authentication protocols. IKEv2 supports data origin authentication, data integrity, replay protection, and data confidentiality. IKEv2 uses UDP port 500. When you configure a new Windows 7 VPN connection with the default settings, Windows 7 attempts to make an IKEv2 connection first.

Term
Which VPN protocol supports automatic reconnection?
Definition
IKEv2 supports automatic reconnection.
Term

Fact: VPN Reconnect uses the IKEv2 tunneling protocol with the MOBIKE extension. The MOBIKE

extension allows VPN clients to change their Internet addresses without having to renegotiate

authentication with the VPN server. Only VPN servers running Windows Server 2008 R2

support IKEv2. You cannot use IKEv2 if your organization has a routing and remote access

server running Windows Server 2003, Windows Server 2003 R2, or Windows Server 2008.

Definition
Term
Fact: Clients running Windows 7 support the PPTP, L2TP/IPsec, SSTP, and IKEv2 VPN protocols.
Definition
Term

Fact: The IKEv2 VPN protocol is required if you want to use the VPN Reconnect feature. VPN Reconnect also requires a VPN server running Windows Server 2008 R2.

Definition
Term

Fact: The SSTP protocol allows users to access VPNs from behind most firewalls because it uses the same port as HTTPS traffic.

Definition
Term

Fact: RD Gateways allow Remote Desktop Connection access to Remote Desktop hosts on

an organization’s internal network without requiring that the external client use a VPN connection. RD Gateway also allows RemoteApp applications to be published to clients on the Internet.

Definition
Term

Fact: EAP-MS-CHAPv2 is the strongest password-based authentication protocol, and it is the only password-based authentication protocol that can be used with IKEv2.

Definition
Term

Fact: You can create a VPN or dial-up connection using the Create New Connection Wizard, which is available from the Network And Sharing Center.

Definition
Term

Fact: Windows 7 can function as a dial-up and VPN server if you configure incoming connections.

Definition
Term

Fact: NAP can be used to block remote access connections made by clients running Windows 7

that do not meet designated health benchmarks. These clients can be redirected to remediation networks that contain resources that allow them to become compliant.

Definition
Term
DirectAccess
Definition

Technology that allows clients running

Windows 7 to establish an always-on remote IPv6

connection to an organization’s internal network.

Term
RemoteApp
Definition

A form of presentation virtualization, where the window of an application that runs on a server is displayed on a client.

Term

Wingtip Toys currently has 40 laptop computers running Windows Vista Business. Wingtip Toys wants to deploy DirectAccess because many of the users of these computers would prefer an automatic connection to the company network when they are in remote locations,

rather than relying on a manual VPN connection. Wingtip Toys wants to replace their existing

server running Windows Server 2003 R2 x64 Routing and Remote Access with a DirectAccess server. This server has two network cards and is assigned two consecutive public IPv4 addresses on the Internet interface. This server is a member of the Wingtiptoys.internal domain. The server has already been assigned the appropriate computer certificates. What steps should Wingtip Toys take to create the DirectAccess server?

Definition

Upgrade the server to Windows Server 2008 R2. The rest of the server’s configuration supports DirectAccess because it is a member of the domain, has two consecutive public IP addresses assigned to its Internet interface, and has the appropriate computer certificates installed. You can install the DirectAccess feature on this server once it has been upgraded to the newer operating system.

Term
What type of group should you create to support DirectAccess?
Definition
You should create a global security group in the Wingtip Toys domain.
Term

Wingtip Toys currently has 40 laptop computers running Windows Vista Business. Wingtip

Toys wants to deploy DirectAccess because many of the users of these computers would

prefer an automatic connection to the company network when they are in remote locations,

rather than relying on a manual VPN connection. Wingtip Toys wants to replace their existing

server running Windows Server 2003 R2 x64 Routing and Remote Access with a DirectAccess

server. This server has two network cards and is assigned two consecutive public IPv4 addresses on the Internet interface. This server is a member of the Wingtiptoys.internal domain. The server has already been assigned the appropriate computer certificates. What steps should you take to prepare client computers to use DirectAccess?

Definition

Upgrade the client computers to Windows 7 Enterprise or Ultimate edition. Add them to the

security group that you have configured to support DirectAccess. Install computer certificates.

Term

Tailspin Toys is deploying Windows 7 Professional to 300 laptop computers. You want to

ensure that future VPN users will be able to stay connected to their VPN sessions if they switch

from using a public Wi-Fi connection to using the cellular modem cards provided to them

by the company. Users should be able to authenticate with their user names and passwords.

Your existing VPN infrastructure uses NAP. The current Routing and Remote Access server is

running the Windows Server 2008 x64 operating system. This system blocks VPN access to

clients running Windows Vista Professional that do not have the most recent software updates

or antivirus definitions installed. Presently, NAP blocks noncompliant clients from accessing

the network. These clients cannot access the VPN until they connect to the corporate network

directly and are able to download antivirus and software updates. You want to upgrade your

quarantine network so that noncompliant clients can undergo remediation while connected

remotely. Tailspin Toys has an Active Directory Certificate Services deployment. What steps do you need to take to support VPN Reconnect at Tailspin Toys?

Definition

Windows 7 Enterprise supports IKEv2 VPNs, though Windows Server 2003 R2 x64 Routing

and Remote Access servers do not. It is necessary to upgrade the Routing and Remote Access

server to Windows Server 2008 R2 to support IKEv2 VPNs.

Term

Tailspin Toys is deploying Windows 7 Professional to 300 laptop computers. You want to

ensure that future VPN users will be able to stay connected to their VPN sessions if they switch

from using a public Wi-Fi connection to using the cellular modem cards provided to them

by the company. Users should be able to authenticate with their user names and passwords.

Your existing VPN infrastructure uses NAP. The current Routing and Remote Access server is

running the Windows Server 2008 x64 operating system. This system blocks VPN access to

clients running Windows Vista Professional that do not have the most recent software updates

or antivirus definitions installed. Presently, NAP blocks noncompliant clients from accessing

the network. These clients cannot access the VPN until they connect to the corporate network

directly and are able to download antivirus and software updates. You want to upgrade your

quarantine network so that noncompliant clients can undergo remediation while connected

remotely. Tailspin Toys has an Active Directory Certificate Services deployment. What additions should you make to the quarantine network so that clients can become compliant?

Definition

Install an antivirus update server and a WSUS server on the quarantine network so that clients

can update themselves to become compliant.

Term

Tailspin Toys is deploying Windows 7 Professional to 300 laptop computers. You want to

ensure that future VPN users will be able to stay connected to their VPN sessions if they switch

from using a public Wi-Fi connection to using the cellular modem cards provided to them

by the company. Users should be able to authenticate with their user names and passwords.

Your existing VPN infrastructure uses NAP. The current Routing and Remote Access server is

running the Windows Server 2008 x64 operating system. This system blocks VPN access to

clients running Windows Vista Professional that do not have the most recent software updates

or antivirus definitions installed. Presently, NAP blocks noncompliant clients from accessing

the network. These clients cannot access the VPN until they connect to the corporate network

directly and are able to download antivirus and software updates. You want to upgrade your

quarantine network so that noncompliant clients can undergo remediation while connected

remotely. Tailspin Toys has an Active Directory Certificate Services deployment. Which authentication protocol should you use for Tailspin Toys?

Definition

You should use the EAP-MS-CHAPv2 authentication protocol because this allows password

authentication.

Term

 

Which policy must you configure to allow a computer that does not have a TPM chip (Trusted Platform Module) to use BitLocker with a startup key stored on a compatible USB device?

 

Definition

 

You must configure the Require Additional Authentication At Startup policy to allow a computer that does not have a TPM chip to use BitLocker with a startup key stored on a compatible USB device.

 

Term

Fact: BitLocker offers full volume encryption and system protection for computers running

the Enterprise and Ultimate editions of Windows 7.

Definition
Term

 

Fact: TPM chips are required for BitLocker boot integrity protection. TPM PINs can be backed up to AD DS.

 

Definition
Term

Fact: BitLocker can use five different modes: TPM-only, TPM with PIN, TPM with startup key,

TPM with PIN and startup key, and startup key without TPM. The startup key without

TPM mode can be enabled only by configuring Require Additional Authentication At

Startup Group Policy.

Definition
Term
Fact: DRAs (Data Recovery Agents) can be configured for the recovery of BitLocker-encrypted volumes.
Definition
Term

Fact: BitLocker To Go provides BitLocker encryption to removable storage devices.

Computers running the Enterprise and Ultimate editions of Windows 7 can configure

removable devices. Computers running other editions of Windows 7 cannot configure

removable devices, but they can read and write data to BitLocker To Go–protected devices.

Definition
Term

Fact: BitLocker To Go–protected removable storage devices can be protected with passwords.

Definition
Term

Fact: BitLocker To Go storage devices can be accessed from computers running Windows

Vista and Windows XP through a utility named BitLocker To Go Reader if Group Policy

is configured to allow this.

Definition
Term

What are some of the differences between transparent caching and BranchCache when it comes to shared folders on remote networks?

Definition

Transparent caching does not require file servers running Windows Server 2008 R2. Transparent caching does not use a shared file cache. Windows 7 Professional supports transparent caching. Transparent caching can be used with computers that are not members of a domain.

Term
Powercfg.exe command for waking computer from sleep with specific hardware devices
Definition
Using administrative privileges, Powercfg.exe devicequery all_devices
Term

Fact: Offline Files is a feature of Windows 7 Professional, Enterprise, and Ultimate editions

that allows a user to manipulate a file that is hosted on a shared folder when he is not

connected to the network that hosts the shared folder.

Definition
Term

Fact: Offline Files creates a cached copy of the file on the local computer that is synchronized automatically with the file server whenever connectivity to the file server is established.

Definition
Term

Fact: Sync Center can be used to perform a manual synchronization of offline files. Sync Center can also be used to resolve synchronization conflicts that occur when an offline file and a shared file are modified during the same period.

Definition
Term

Fact: Transparent caching provides automatic caching of files on shared folders that are on

remote networks. Transparently cached files are available only to the local computer

and are not synchronized as offline files are.

Definition
Term

Fact: Power Plans control how a computer running Windows 7 uses energy. Normal users can select a power plan to meet their needs without having to elevate privileges.

Definition
Term

Fact: The default Windows 7 Power Plan is Balanced. Other plans that ship with Windows 7

include Power Saver and High Performance.

Definition
Term

Fact: Powercfg.exe can be used to import and export power policies, allowing you to migrate them between computers.

Definition
Term
Data Recovery Agent (DRA)
Definition

A data recovery agent is a user account and its associated enrolled certificate that is used for the purposes of data recovery.

Term
Transpartent Caching
Definition

The process where files retrieved from remote file servers that exceed a round-trip threshold are cached automatically on the client to speed up access.

Term
Offline Files
Definition

Allows files on specially configured

shared folders to be accessed when the computer is not connected to the network.

Term
Which Windows Update–related tasks can a user with standard privileges complete?
Definition

A user with standard privileges is able to install updates. A user with standard privileges is unable to hide or uninstall updates. A user with standard privileges cannot change update settings.

Term
What are 3 centralized Windows software update solutions?
Definition
Windows Server Update Services (WSUS), System Center Essentials, System Center Configuration Manager (SCCM)
Term
Explain: Specify Intranet Microsoft Update Service Location
Definition

This policy, shown in Figure 12-16,

allows you to specify the location of an internal update server, such as one running WSUS.

This policy is the only way that you can configure Windows Update to use an alternate

update server. Using this policy, you can specify the update server and the statistics

server. In most cases, these are the same servers. The updates server is where the updates

are downloaded from, and the statistics server is the server where clients report update

installation information.

Term

 

Fact: Windows Update allows software updates to be downloaded automatically to clients running Windows 7 from the Microsoft Update servers or a local update source, such as a WSUS server.

 

Definition
Term

Fact: You can configure Windows Update to automatically download and install updates,

download and notify the logged-on user that updates are available for installation, or notify the logged-on user that updates are available for download and installation.

Definition
Term

Fact: Users with standard privileges are able to install and check for updates using Windows

Update. Only users with administrative privileges are able to change Windows Update settings or change the update source from Microsoft Update to a local WSUS server.

Definition
Term

 

Fact: Users with administrative privileges are able to hide updates. A hidden update is not installed on the computer. A hidden update can be unhidden and installed at a later stage. Users with administrative privileges are able to uninstall previously installed

updates. An uninstalled update becomes available for installation again unless hidden by an administrator.

 

Definition
Term

What steps can users of Internet Explorer take to ensure that there is no record of their browsing session available the next time they open the browser?

Definition

Browsing using InPrivate Browsing mode ensures that no record of a browsing session

is available from within Internet Explorer.

Term

Fact: Compatibility View allows pages that do not render correctly in Internet Explorer 8, but which render correctly in Internet Explorer 7, to be displayed properly in Internet Explorer 8. You can configure Compatibility View manually, use a list of Web sites provided by Microsoft and updated through Windows Update, or manually configure

a list of sites that Internet Explorer should use Compatibility View with.

Definition
Term

Fact: Security settings are configured primarily by assigning sites to zones. Sites that require

elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present

security risks but must be visited.

Definition
Term

Fact: Add-ons enhance the functionality of Internet Explorer. Users with standard permissions

can add, remove, and disable add-ons unless configured Group Policy dictates

otherwise. Accelerators allow users to select text on a Web page and then automatically

perform another function, such as translating the text or forwarding it to their blog.

Providers allow additional search providers to be added to the search window.

Definition
Term

Fact: InPrivate Browsing stops Internet Explorer from storing information about a browsing session. InPrivate Filtering stops third-party Web sites from gaining data when browsing across multiple sites.

Definition
Term

Fact: Internet Explorer provides warnings if a Web site’s address does not match the SSL certificate that it presents to the client, if the certificate has expired, if the certificate has been revoked, or if the certificate has become corrupt.

Definition
Term
InPrivate Browsing
Definition

A special mode of Internet Explorer where browsing history, cookies and cache data is not available after the browsing session ends.

Term
InPrivate Filtering
Definition

A filtering mode that is used to

reduce the amount of data sent to third party providers when browsing the Internet.

Term

On which tab of the Performance Monitor Properties dialog box can you specify how often the graphs update?

Definition

On the General tab, in the Graph Elements group, you can adjust the Sample Every box to change how frequently the graph updates.

Term
Which rights does a user need to be able to monitor performance data remotely?
Definition

At a minimum, the user’s account must be a member of the Performance Log Users group and the Event Log Readers group on the remote computer.

Term

Fact: Data collector sets (DCSs) gather system information, including configuration settings and

performance data, and store it in a data file.

Definition
Term
What would a stability index of 10 indicate?
Definition
The maximum value of the stability index is 10. This value indicates that the computer has been stable over the previous 28 days with no failures or reboots. It also indicates that no software updates and service packs that require a reboot have been applied during that time.
Term
In Windows 7, you right-click a process and click Set Priority to observe or configure its priority level. In Windows Vista, you click Select Priority. Examiners often test this sort of change to determine whether candidates have properly studied the new operating system or whether they are relying on their experience with the previous one.
Definition
Term

Fact: Distinguish between Winrm and Wecutil. Winrm is used to configure WinRM and is typically used on the source computer. Wecutil is used to configure the Windows Event Collector service and is typically used on the collector computer.

Definition
Term

Fact: You can use Performance Monitor to view performance data in real time or performance

counter values captured in DCSs. A system diagnostics report gives you details about the status of hardware resources, system response times, and processes on the local computer, along with system information and configuration data.

Definition
Term

Fact: Reliability Monitor tracks a computer’s stability. It can also tell you when events that

could affect stability (such as the installation of a software application) occurred and whether any restarts were required after these events. Action Center monitors your computer and reports problems with security, maintenance, and related settings. The Windows Experience Index indicates the suitability of your current computer hardware

for running resource-intensive applications.

Definition
Term

Fact: Task Manager gives you a snapshot of resource usage and lets you manage applications, service, and protocols. Resource Monitor allows you to view information about hardware and software resource use in real time. Process Explorer performs the same functions as Task Manager but gives you additional controls and more detailed system information.

Definition
Term

Fact: Event Viewer lets you access and filter event logs and create custom views. You can

attach tasks to events and configure event forwarding and event subscriptions so that

a central computer can store events generated on one or more source computers.

Definition
Term

Fact: It is important to distinguish between managed resource class definitions and automation

objects. Managed resource class definitions reside in the CIM repository (Cim.rep) and

provide the blueprints for the computer resources exposed through WMI. A general-purpose

set of automation objects reside in the WMI scripting library and scripts can use these objects

to authenticate and connect to WMI. After you obtain an instance of a WMI-managed

resource using the WMI scripting library, you can access the methods and properties defined

by the class definition of the managed resource.

Definition
Term

Fact: You can use either Task Manager or System Configuration to start and stop services on a computer running Windows 7 without rebooting the computer.

Definition
Term

Fact: You can write WMI scripts to customize the system information you retrieve from a computer and generate your own performance-measuring tools.

Definition
Term

Fact: The System Configuration Tool modifies which programs run at startup, edits configuration files, and enables you to control Windows services and access Windows Performance and Troubleshooting tools. The Services console lets you manage and configure services and gives you more options than either the Services tab of Task Manager or the Services tab of the System Configuration tool.

Definition
Term

Fact: The Performance Options tool lets you configure visual effects and specify whether the system is adjusted for best performance of applications or background services. It lets you configure page file (virtual memory) settings and DEP.

Definition
Term

Fact: The Windows Performance Analysis tools, downloaded as part of the Windows Server

2008 SDK, analyze a wide range of performance problems including application start

times, boot issues, DPCs, ISRs, system responsiveness issues, application resource

usage,and interrupt storms.

Definition
Term

Fact: Windows 7 tools such as Performance Monitor, Reliability Monitor, the Action Center,

and the Windows Reliability Index let you gauge whether your computer is performing

as it should, whether it needs more resources to do what you want it to do, and where

performance bottlenecks are occurring.

Definition
Term

Fact: Tools such as Task Manager give you a snapshot of how your computer is currently

performing, whereas event logs can store historical events in addition to warning you when problems occur, and DCSs can hold both current and historical counter values so you can compare a computer’s performance with how it was performing at a specified past time.

Definition
Term

Fact: Tools specific to measuring and troubleshooting computer performance include WMI scripts, the System Configuration tool, the Services console, the Performance Options tool, and the Windows Performance Analysis tools.

Definition
Term
Data Collector Set (DCS)
Definition

A DCS is a group of performance

counters that you can monitor over a period

of time so you can gauge a computer’s performance

and compare it to values stored in the same set of counters recorded at an earlier time (known as a baseline).

Term
Event Forwarding
Definition

Event forwarding enables you to transfer events that match specific criteria to an administrative(or collector) computer.

Term
Event Log
Definition

An event log stores events that occurred

during the operation of the computer system, such

as a service or application stopping or starting. Some events store information about normal operations, but others store error indications, such as when an application failed to start a required service. Some events are used to audit access to files and folders, for example.

Term

Event Subscription

Definition

An event subscription is a configuration that permits events to be transferred from a source to a collector computer. Subscriptions can be source-initiated or collector-initiated.

Term
Performance Counter
Definition

A performance counter indicates the usage of a particular resource, for example the percentage of time a processor is being used or the amount of free RAM that is available.

Term

Fact: Remember that libraries are virtual folders. You can add folders to libraries. You cannot

move folders to libraries.

Definition
Term

Fact:Remember that the Backup And Restore utility in Windows 7 writes System Image backups

in VHD format. In Windows 7 Enterprise and Ultimate editions, you can mount a backup in

the Disk Management console by using the Diskpart utility and then use the Bcdedit utility

to make the VHD bootable. The Backup And Restore utility does not store System Image

backups in any other file format, such as ISO, WIM, or BAK.

Definition
Term

All the client computers on your production network run Windows 7 Enterprise. They all have a single internal hard disk. You do not intend to provide an external hard disk for every client computer. You want to perform regular System Image backups. What type of backup destination would you use?

Definition

In this scenario, you would back up to a network share on either a storage network system or a file server.

Term

You want to schedule System Image Backup to run every two weeks. How would you do this?

Definition

You would create a batch file that uses the Wbadmin utility to perform a System Image backup. You would use Task Scheduler in the Computer Management

console to schedule this task to run on a specified day at a specified time every two weeks.

Term

Fact: You can use the Backup And Restore console to schedule a file and folder backup and to start such a backup immediately.

Definition
Term

Fact: You can use the Backup And Restore console to start a System Image backup but not to schedule such a backup. You can, however, start a System Image backup from the command line and schedule a batch file with Task Scheduler to perform such a backup regularly.

Definition
Term
Fact: Whenever a file and folder backup occurs, it creates a backup set.
Definition
Term
Under what circumstances can you undo a system restore?
Definition

If you boot Windows 7 normally or from Last Known Good Configuration (Advanced) and subsequently perform a system restore, this creates a restore

point that enables you to undo the system restore.

Term

You use the Enable Boot Logging option in Advanced Boot Options. What file does this create and what information is stored in this file?

Definition

Enable Boot Logging creates a file named Ntbtlog.txt, which lists all drivers that load during startup, including the last file to load before a failure occurs.

Term

Fact: If system protection is configured on a disk drive, restore points are createdautomatically

when you make significant system changes. You can also manually create a restore point.

Definition
Term
Fact: You can restore your system settings to a selected restore point.
Definition
Term

Fact: You can restore your entire computer from a System Image backup to how it was when the backup was taken.

Definition
Term

Fact: You can boot from the Windows 7 installation DVD-ROM and run a System Repair, or you can access the Advanced Boot Options by pressing the F8 key during a reboot. Both techniques access tools that let you investigate boot and system problems.

Definition
Term

Fact: Remember you can configure system protection only on hard disks (or mounted VHDs) that are formatted using the NTFS file system. You cannot configure system protection or create previous versions on USB flash drives, optical drives, or hard disks (internal or external) that are formatted using the FAT file system.

Definition
Term

Fact: You can recover a previous version of a file or folder from shadow copies created whena restore point was created or from backup sets.

Definition
Term

Fact: You can restore a renamed or deleted file by restoring a previous version of the folder

in which the original file was saved.

Definition
Term

Fact: You can restore user settings and user-related data such as desktop settings, contacts,

and favorites by restoring a user profile.

Definition
Term

Fact: You can configure system protection on internal and external hard drives and VHDs

formatted using the NTFS file system. Previous versions of files and folders are created

when you create a restore point on a drive where system protection is configured.

Definition
Supporting users have an ad free experience!