config.xml
migapp.xml
migdocs.xml
miguser.xml
第1题:
You have two portable computers that run Windows 7. The computers are not connected to a network. Thecomputers are configured as shown in the following table. Computer name Wireless adapter Networkadapter Bluetooth adapter Computer1 Wireless b/g 100/1000 Mbps Version 2.0 Computer2 Wireless a/b10/100 Mbps Version 1.0 You need to transfer a 1- gigabit file from Computer1 to Computer2. What shouldyou do first?()
第2题:
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. Windows Remote Management (WinRM) is enabled on both computers. You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do? ()
第3题:
You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 thatruns Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. You need toidentify how much space is required to complete the migration. What should you do?()
第4题:
Convert a disk.
Rescan the disks.
Import a foreign disk.
Attach a virtual hard disk (VHD).
第5题:
Modify the subnet mask.
Modify the Public folder sharing settings.
Disable network discovery on all computers located in remote subnets.
Modify the properties of the File and Printer Sharing firewall exceptions.
第6题:
certreq.exe retrieve
certreq.exe submit
certutil.exe getkey
certutil.exe pulse
第7题:
On Computer1, create a wireless ad hoc network.
On Computer2, configure the Bluetooth File Transfer Wizard to send files.
On Computer2, create a network profile to connect to a network named Homegroup.
On Computer1, configure the computer to be a member of a workgroup named Homegroup.
第8题:
Wecutil.exe qc
Winrm.exe quickconfig
Winrs r:Computer1
Wmic /aggregate
第9题:
On Computer1, reinstall the printer.
On Computer1, run mstsc /console, and then connect to Computer2.
On Computer2, install the driver from the print device manufacturer.
On Computer1, disable printers in the Remote Desktop Connection configuration.
第10题:
Add the /efs:copyraw switch to the Loadstate command.
Add the /efs:copyraw switch to the Scanstate command.
Generate a new Encrypting File System (EFS)certificate on Computer2.
Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.
第11题:
config.xml
migapp.xml
migdocs.xml
miguser.xml
第12题:
On Computer2, run Winrs and then run Diskpart.
On Computer2, run Winrs and then run Diskmgmt.msc.
On Computer1, install the Telnet Client and then run Diskpart from Computer2.
On Computer1, install the Telnet Client and then use Disk Management from Computer2.
第13题:
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2runs Windows 7. Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. You need to migrate the configuration andapplication data for the custom application from Computer1 to Computer2. What should you do?()
第14题:
You have a portable computer named Computer1 and a desktop computer named Computer2. Bothcomputers run Windows 7. On Computer2, you create a share named Share1 by using the AdvancedSharing feature. You need to ensure that when you connect to Share1 from Computer1, the files that youopen are automatically cached. What should you do?()
第15题:
On Computer1, modify the Offline Files settings.
On Computer1, modify the User Profile settings.
On Computer2, modify the properties of Share1.
On Computer2, modify the file sharing connection settings for the Home or Work network profile.
第16题:
Enable all user accounts.
Modify the default password policy.
Modify the Allow log on locally user right.
Add User1 and User2 to the local Administrators group.
第17题:
Instruct User1 to create a new user certificate on Computer2.
Instruct User1 to take ownership of the encrypted files on Computer2.
Instruct User1 to import the user certificate from Computer1 to Computer2.
Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
第18题:
At the command prompt, run Wecutil.exe es gr.
At the command prompt, run Winrs.exe -environment.
From Windows Firewall with Advanced Security, export the policy.
From the wireless network properties of Network1, copy the network profile to a USB flash drive.
第19题:
Run Winrm.exe quickconfig.
From Windows Firewall with Advanced Security, select Export Policy.
From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.
Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
第20题:
From the Personalization options, change the theme.
From the System properties, modify the Remote settings.
From the Remote Desktop Connection options, modify the Performance setting.
From the Remote Desktop Connection options, modify the Display configuration settings.
第21题:
On Computer2, run Winrs and then run Diskpart.
On Computer2, run Winrs and then run Diskmgmt.msc.
On Computer1, install the Telnet Client and then run Diskpart from Computer2.
On Computer1, install the Telnet Client and then use Disk Management from Computer2.
第22题:
On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe /l:app1.xml.
On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml.
On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe /keyfile:app1.xml.
On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml.
第23题:
On Computer1 run Loadstate c:/store /nocompress.
On Computer1 run Scanstate c:/store /nocompress /p.
On Computer2 run Loadstate //computer1/store /nocompress.
On Computer2 run Scanstate //computer1/store /nocompress /p.
第24题:
Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*.
Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files.
Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files.
Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.