Cbt nuggets microsoft 70 685 windows 7




















Therefore, we will cover common desktop usage scenarios as well as how best to deploy Group Policy to accomplish our management goals. Exam objectives: Design standard system settings.

Defining Client Security Standards We continue to use Group Policy in this Nugget, this time shifting our focus to client-side security. Exam objectives: Define client security standards. By the end of this Nugget you will fully understand how to apply privacy settings, security zones, compatibility features, and Accelerators to improve the security and user experience with IE 8. Exam objectives: Define Windows Internet Explorer settings; Identify and resolve Internet Explorer issues; Identify and resolve authentication and authorization issues.

Choosing Appropriate Deployment Methods In this Nugget we undertake a high-level overview of the four Windows 7 desktop deployment methods offered to us by Microsoft: the in-place deployment, the side-by-side deployment, the Lite-Touch deployment, and the Zero-touch deployment. We will compare and contrast these deployment methods to help you discover which method is best for your organization.

Exam objectives: Analyze the environment and choose appropriate deployment methods. Here we will consider how to plan for LTI, as well as how to implement previously mentioned Microsoft tools to actually perform Lite-Touch installations of Windows 7. Exam objectives: Design a lite-touch deployment strategy. Exam objectives: Design a zero-touch deployment strategy. Designing a User State Migration Strategy Installing a "loaded" Windows 7 operating system with standard applications and settings is one thing--migrating the user's documents and settings from their previous environment is another.

Exam objectives: Design a user state migration strategy. Specifically, we examine the client lifecycle, the hardware lifecycle, and the desktop deployment lifecycle. In this nugget we shift our attention away from software and turn to how to resolve hardware-related issues in Windows 7 systems.

To wit, we start with an overview of built-in hardware troubleshooting tools. Next we examine hard drive issues, learn the whys and hows of updating the system BIOS, and finish by learning how to use the slick Windows 7 Memory Diagnostic tool.

Relevant Exam Objectives: Identify and resolve hardware failure issues. Managing Data Encryption. Using Wireless Profiles. Group Policy Management.

More than ever before in business, IEEE Therefore, as DSTs we need to learn the proverbial ins and outs of client-side wireless connection management, understand wireless data encryption protocols, as well as how to set up and manage wireless profiles both manually and with the help of Windows Server R2 domain Group Policy.

Relevant Exam Objectives: Identify and resolve wireless connectivity issues. Managing Access and Authentication. Troubleshooting Client Connectivity. In this nugget we review the remote access connection methods that are supported by Windows 7 and Windows Server R2 Network Policy Server.

Finally, we learn how to troubleshoot client remote access connections. This nugget also provides an overview of the Connection Manager Administration Kit CMAK , a tool for simplifying the deployment of remote access profiles to several Windows 7 client computers.

Relevant Exam Objectives: Identify and resolve remote access issues. Accessing Advanced Options. Managing Add-ins. Administering Digital Certificates. Group Policy Restrictions. Any revision to the Microsoft Internet Explorer Web browser is bound to introduce both a new learning curve as well as new opportunities for troubleshooting. In this nugget we review how IE security zones work. Malware Protection Tools.

In this nugget we cover practical approaches to resolving malicious software infections on Windows 7 systems, with an eye toward preventing their reoccurrence.

Relevant Exam Objectives: Identify and resolve issues due to malicious software. Understanding BitLocker. Introducing BitLocker to Go.

We also spend some time looking at a new addition to the BitLocker technology: BitLocker To Go, which offers full volume protection for removable media, such as USB flash drives. Relevant Exam Objectives: Identify and resolve encryption issues. Configuring Automatic Update. Troubleshooting Update incompatibilities. Specifically, we learn how to verify software update status in Windows 7, configure Automatic Update, and troubleshoot update compatibilities.

The motherboard on a portable computer fails. The data on the computer's hard disk drive cannot be recovered. You need to recommend a solution to ensure that the data on hard disks can be recovered if the motherboard on other portable computers fail.

Which two configurations should you recommend? Each correct answer presents part of the solution. Choose two. Disable BitLocker on all portable computers.

Convert the hard disks on all portable computers to dynamic disks. Export and securely store the computer certificates on all portable computers. Configure the BitLocker settings on all portable computers by using Group Policy.

All client computers on your company network were recently upgraded from Windows Vista to windows 7. Several employees use a scanner to import document images into a database. They install a new scanning application on their computers.

The application updates the device driver for the scanners as part of the installation process. Roll back the device driver to the previous version. Reinstall the application in Windows Vista compatibility mode. Set the application compatibility properties to run the application as an administrator. Restart the computer by using the System Configuration tool to load only basic devices and services.

The branch office is configured as shown in the exhibit:. You need to recommend a solution that ensures that users can connect to the wireless access point at all times. Move the wireless printers to the reception area.

Move the wireless access point to another location. Replace the phone system with a DECT 6. Replace the wireless access point with an Application Experience B. Application Identity C. Application Management D. Application Information Answer: B Q What should you do? Answer: A Q



0コメント

  • 1000 / 1000