1.
You are preparing a custom Windows 7 image for deployment.
You need to install a third-party network interface card (NIC) driver in the image.
What should you do?
2.
You have a Windows 7 Windows image (WIM) that is mounted.
You need to view the list of third-party drivers installed in the image.
What should you do?
3.
You have a computer named Computer1 that runs Windows 7.
Computer1 uses an NTFS-formatted USB drive that has ReadyBoost enabled.
You need to modify the amount of space that ReadyBoost reserves on the USB drive.
What should you do?
4.
You have a computer that runs Windows 7.
The computer is configured to use an intranet Microsoft update service location.
You need to view the name of the intranet service location.
What should you do?
5.
You have a computer that runs Windows Vista.
You need to identify whether the computer can be upgraded to Windows 7.
Which tool should you use?
6.
You have a computer that runs Windows 7. You connect to your company's network by using a VPN connection.
You discover that when you establish the VPN connection, you are unable to access Internet Web sites.
When you disconnect the VPN connection, you can access Internet Web sites.
You need to access Internet Web sites while you are connected to the VPN.
What should you do?
7.
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.
You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive.
What should you do?
8.
You install a local printer on a computer. You share the printer.
You need to ensure that only members of a local group named Group1 can print documents on the printer.
Which settings should you modify on the printer?
9.
You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain.
You need to prevent the users from using more than 2 GB of disk space on drive C.
What should you do?
10.
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer by using a local user account named User1.
Users report that they can log on to some secure Web sites by using credentials that were saved by other users.
You need to prevent forms-based credentials from being saved on the computer.
What should you do?