Your companys client computers run Windows 7. User Account Control (UAC) is enabled on the client
computers. A third-party application fails to install on the client computers.
You need to discover which privileges the application requires on Windows 7.
What should you use?
Your company is upgrading its client computers from Windows Vista to Windows 7. You attempt to manually
install a third-party application on a new Windows 7 client computer. However, the installation fails when the
application attempts to modify the registry keys.
You need to identify which registry key is causing the installation to fail.
What should you use?
Your company is upgrading its client computers from Windows Vista to Windows 7. You install a third-party
application on a new Windows7 client computer.
When you start the third-party application, it fails.
You need to ensure that the third-party application can run on Windows 7 client computers. You create a shim
for the application.
What should you do next?
You will use Microsoft Deployment Toolkit (MDT) 2010 to perform a Lite Touch Installation (LTI) of Windows 7
on client computers.
You need to ensure that all computers can locate the LTI deployment shares.
What should you do?
You are using Microsoft Deployment Toolkit (MDT) 2010 to prepare for a Lite Touch Installation (LTI).
You need to ensure that the deployment share allows users to set a unique local administrator password on
their client computers during deployment.
What should you do?
You are preparing for a deployment of Windows 7.
You need to perform this deployment without network connectivity to the client computers.
What should you do?
You are using Windows Deployment Services (WDS) and System Center Configuration Manager 2007 R2 to
perform a Zero Touch Installation (ZTI) of Windows 7 on your company's client computers. A user shuts down
his computer during the deployment process. Before the computer boots, the task sequence is modified.
You need to ensure that this client computer is successfully deployed with the modified task sequence.
What should you do first?
You are preparing for a Zero Touch Installation (ZTI) of Windows 7 using Windows Deployment Services
(WDS) and System Center Configuration Manager 2007 R2. Your network includes branch offices that are
separated by firewalls.
You need to ensure that the necessary protocol is allowed through the firewalls to support the deployment.
Which protocol should you allow?
You have a single-domain Active Directory Domain Services (AD DS) forest. All servers run Windows Server
2008 R2. You use Microsoft Deployment Toolkit (MDT) 2010 and System Center Configuration Manager 2007
R2 to deploy Windows 7 using Zero Touch Installation (ZTI). You have a Windows 7 reference computer that is
encrypted using BitLocker Drive Encryption.
You need to ensure that BitLocker Drive Encryption is disabled on deployed computers.
What should you do?
You have a single-domain Active Directory Domain Services (AD DS) forest. You use System Center
Configuration Manager 2007 R2 to deploy Windows 7. Your current deployment process performs a Light
Touch Installation (LTI) of Windows 7 by using Microsoft Deployment Toolkit (MDT) 2010 with bootable stand-
alone media.
You need to change your deployment process to perform a Zero Touch Installation (ZTI) of Windows 7.
What should you do?