A user reports that he is unable to start his computer. He provides the following information:
– The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
– The user cannot locate his BitLocker recovery key.
You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort. What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 7 installation media and select Repair your computer.
C. Start the computer from the Windows 7 installation media, press SHIFT + F10, and then run chkdsk.
D. Start the computer from the Windows 7 installation media and select Install now.
No recovery key = no recovery. Time to install.
Any other option defeats the whole point of encrypting it. Encrypted volumes are locked when the encryption key is not available. When the operating system volume is locked, you can boot only to recovery mode. In recovery mode, you can enter the BitLocker password or you can attach the USB device that has the recovery key stored and restart the computer. Once you enter the recovery password or key, you can boot your computer normally.
The following events trigger recovery mode:
* The boot environment changes. This could include one of the boot files being modified.
* TPM is disabled or cleared.
* An attempt is made to boot without the TPM, PIN, or USB key being provided.
* You attach a BitLocker-encrypted operating system volume to another computer.
You support Windows 7 client computers used by Marketing department employees. The computers have dual-core CPUs for generating rich media advertisements. The Marketing department employees are reporting CPU performance issues while rendering the rich media advertisements. You need to configure the wmplayer.exe process to use only a single CPU core. What should you do? (To answer, select the appropriate option or options in the answer area.)
A company has client computers that run Windows Vista.
You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista.
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
A company is upgrading its client computers from Windows XP to Windows 7.
You add an application to the Windows 7 base image. Large fonts are interfering with the appearance of the application. You need to ensure that the application is displayed correctly on client computers that run Windows 7.
Which option should you select? (To answer, select the appropriate check box in the dialog box.)
You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server 2008 R2.
The server requires the use of a pre-shared key. You need to create a VPN connection to connect to the network. Which type of VPN connection should you create?
Your company’s chief accountant consults you with a QUESTION about a financial spreadsheet.
She needs to recover the version of this particular spreadsheet that existed six months ago because it is needed for a financial audit. Using Restore Previous Versions, you find that the oldest version stored is dated three months ago. How can you recover the required file?
A. Edit the System Protection properties for the volume that hosts the file. Use the Max Usage slider to
increase the maximum proportion of the hard disk capacity used for system protection to 70 percent.
B. Perform a system restore. Select a system restore point that was created six months ago.
C. Edit the System Protection properties for the volume that hosts the file. Select the Only Restore Previous
Versions Of Files setting.
D. Use the Backup And Restore console to recover the file from a backup set generated six months ago.
Which of the following Windows 7 utilities was used to create the output shown in the exhibit. (Click the Exhibit button.)
Not the real exhibit (exhibit):
German Output (exhibit):
D. Performance Monitor
Which of the following is used to control when the security pop-up notifications are used?
A. Security Control Manager
B. User Account Control
C. User Access Control Panel
D. Notification Control Settings Manager
The Aero Shake feature will work if which of the following conditions are met? Choose Two.
A. A display adapter compatible with WDDM is installed.
B. Aero features are downloaded from Microsoft.
C. The windows experience index is at least 2.
D. The Windows Experience Index is 3 or greater.
You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User1 uses Encrypting File System (EFS) to encrypt a file. User1 tries to grant User2 access to the file as shown in the exhibit. (Click the Exhibit button.)
You have to make sure that User1 is able to grant User2 access to the file. What action should you perform to make sure of this?
A. Instruct User2 to log on to the computer and take ownership of the file.
B. Instruct User2 to log on to the computer and encrypt a file.
C. Instruct User1 to export his certificate to a certificate (.cer) file.
D. Instruct User1 to move the file to a shared folder on the computer.