Installing, Upgrading, and
Migrating to Windows 7 (14 percent)
- Perform a clean installation.
- This objective may include
but is not limited to: identifying hardware requirements; setting up as
the sole operating system; setting up as dual boot; installation
methods; boot from the source of installation, preparing the
installation source: USB, CD, network share, WDS
- Upgrade to Windows 7 from
previous versions of Windows.
- This objective may include
but is not limited to: upgrading from Windows Vista; migrating from
Windows XP; upgrading from one edition of Windows 7 to another edition
of Windows 7
- Migrate user profiles.
- This objective may include
but is not limited to: migrating from one machine to another; migrating
from previous versions of Windows; side-by-side vs. wipe and load
Deploying Windows 7 (13 percent)
- Capture a system image.
- This objective may include
but is not limited to: preparing system for capture; creating a WIM
file; automated capture; manual capture
- Prepare a system image for
deployment.
- This objective may include
but is not limited to: inserting an application into a system image;
inserting a driver into a system image; inserting an update into a
system image; configuring tasks to run after deployment
- Deploy a system image.
- This objective may include
but is not limited to: automated deployment methods; manually deploying
a customized image
- Configure a VHD.
- This objective may include
but is not limited to: creating, deploying, booting, mounting, and
updating VHDs; offline updates; offline servicing
Configuring Hardware and
Applications (14 percent)
- Configure devices.
- This objective may include
but is not limited to: updating, disabling, and uninstalling drivers;
signed drivers; conflicts between drivers; configuring driver settings;
resolving problem device driver
- Configure application
compatibility.
- This objective may include
but is not limited to: setting compatibility mode; implementing shims;
compatibility issues with Internet Explorer
- Configure application
restrictions.
- This objective may include
but is not limited to: setting software restriction policies; setting
application control policies; setting through group policy or local
security policy
- Configure Internet Explorer.
- This objective may include
but is not limited to: configuring compatibility view; configuring
security settings; configuring providers; managing add-ons; controlling
InPrivate mode; certificates for secure Web sites
Configuring Network Connectivity
(14 percent)
- Configure IPv4 network
settings.
- This objective may include
but is not limited to: connecting to a network; configuring name
resolution; setting up a connection for a network; network locations;
resolving connectivity issues; APIPA
- Configure IPv6 network
settings.
- This objective may include
but is not limited to: configuring name resolution; connecting to a
network; setting up a connection for a network; network locations;
resolving connectivity issues; link local multicast name resolution
- Configure networking
settings.
- This objective may include
but is not limited to: adding a physically connected (wired) or
wireless device; connecting to a wireless network; configuring security
settings on the client; set preferred wireless networks; configuring
network adapters; configuring location-aware printing
- Configure Windows Firewall.
- This objective may include
but is not limited to: configuring rules for multiple profiles;
allowing or denying an application; network-profile-specific rules;
configuring notifications; configuring authenticated exceptions
- Configure remote management.
- This objective may include
but is not limited to: remote management methods; configuring remote
management tools; executing PowerShell commands
Configuring Access to Resources
(13 percent)
- Configure shared resources.
- This objective may include
but is not limited to: folder virtualization; shared folder
permissions; printers and queues; configuring HomeGroup settings
- Configure file and folder
access.
- This objective may include
but is not limited to: encrypting files and folders by using EFS;
configuring NTFS permissions; resolving effective permissions issues;
copying files vs. moving files
- Configure user account control
(UAC).
- This objective may include
but is not limited to: configuring local security policy; configuring
admin vs. standard UAC prompt behaviors; configuring Secure Desktop
- Configure authentication and
authorization.
- This objective may include
but is not limited to: resolving authentication issues; configuring
rights; managing credentials; managing certificates; smart cards with
PIV; elevating user privileges; multifactor authentication
- Configure BranchCache.
- This objective may include
but is not limited to: distributed cache mode vs. hosted mode; network
infrastructure requirements; configuring settings; certificate
management
Configuring Mobile Computing (10
percent)
- Configure BitLocker and
BitLocker To Go.
- This objective may include
but is not limited to: configuring BitLocker and BitLocker To Go
policies; managing Trusted Platform Module (TPM) PINs; configuring
startup key storage; data recovery agent support
- Configure DirectAccess.
- This objective may include
but is not limited to: configuring client side; configuring
authentication; network infrastructure requirements
- Configure mobility options.
- This objective may include
but is not limited to: configuring offline file policies; transparent
caching; creating and migrating power policy
- Configure remote connections.
- This objective may include
but is not limited to: establishing VPN connections and authentication;
enabling a VPN reconnect; advanced security auditing; NAP quarantine
remediation; dial-up connections; remote desktop; published apps
Monitoring and Maintaining Systems
that Run Windows 7 (11 percent)
- Configure updates to Windows
7.
- This objective may include
but is not limited to: configuring update settings; determining source
of updates; configuring Windows Update policies; reviewing update history;
checking for new updates; rolling back updates
- Manage disks.
- This objective may include
but is not limited to: managing disk volumes; managing file system
fragmentation; RAID; removable device policies
- Monitor systems.
- This objective may include but
is not limited to: configuring event logging; filtering event logs;
event subscriptions; data collector sets; generating a system
diagnostics report
- Configure performance
settings.
- This objective may include
but is not limited to: configuring page files; configuring hard drive
cache; updated drivers; configuring networking performance; configuring
power plans; configuring processor scheduling; configuring desktop
environment; configuring services and programs to resolve performance
issues; mobile computing performance issues; configuring power
Configuring Backup and Recovery
Options (11 percent)
- Configure backup.
- This objective may include
but is not limited to: creating a system recovery disk; backing up
files, folders, or full system; scheduling backups
- Configure system recovery
options.
- This objective may include
but is not limited to: configuring system restore points; restoring
system settings; last known good configuration; complete restore;
driver rollback
- Configure file recovery
options.
- This objective may include
but is not limited to: configuring file restore points; restoring
previous versions of files and folders; restoring damaged or deleted
files by using shadow copies; restore user profiles
|