Do you know that? 37% - I began freelancing to earn supplemental income next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Upwork (oDesk) test answers << Operating Systems category

Test answers for Windows Vista Administration Test 2016

(2 / 87) Last updated: October 25
Upwork (oDesk) • Operating Systems
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

2 Answered Test Questions:

1. You need to instruct a user on a remote network to enable Remote Assistance on a Windows Vista computer. Where can you enable Remote Assistance?

Answers:

• Internet Options > Advanced tab

• System Properties > Remote tab

• Connection Properties > Remote tab

• Network Properties > Advanced tab

2. A client needs to enable the Internet Explorer Protected mode in Internet Explorer 7 to prevent scripted actions. What steps should he take?

Answers:

• Enable the protected mode from the Security tab.

• Enable the User Access Control; then enable the protected mode.

• The protected mode is not available in Windows Vista.

• None of the above


87 NOT Answered Yet Test Questions:

(hold on, will be updated soon)
3. Which tools in Windows Vista are used to detect the routing loops in the network?

Answers:

• PathPing

• Tracert

• Ping

• ARP

4. What is the generic name of the Windows Vista answer file used for storing custom settings during automated installation?

Answers:

• Unattend.xml

• Unattend.txt

• Winbom.ini

• Winnt.txt

5. An administrator wants that when any user of netschool.com logs on to its domain, he should get the same Desktop environment on every client machine in the network, but that profile should be read-only. Which kind of profile would the administrator prefer?

Answers:

• Roaming profile

• Mandatory profile

• Local profile

• All of the above

6. What types of possible threats does Windows Firewall effectively block?

Answers:

• Unauthorized access from the Internet

• Unauthorized access from a local network

• Unauthorized access from program to program on the local computer

• Unauthorized access to a Windows domain controller from the local computer

7. A user complains to you that his machine's performance is not up to par. You find that an application runs on the system startup that is degrading the performance of that machine. Which tool would you use to troubleshoot this?

Answers:

• Disk Defragment

• Windows Defender

• CHKDSK

• None of the above

8. A Windows Vista Machine is on the subnet of 192.168.1.0/255.255.255.0, and it is unable to access another machine which is on the subnet of 192.168.2.0/255.255.255.0. Using which tool could you troubleshoot this problem?

Answers:

• Use the Ping tool.

• Use the Task manager.

• Use the route command.

• Use PathPing.

9. Disk Quota is implemented on the C drive The administrator wants to inspect it from the Command Prompt. Which command could he use?

Answers:

• fdisk quota query C:

• diskpart quota query C:

• fsutil quota query C:

• None of the above

10. Which the following data integrity algorithms are supported for IPSec in Windows Vista?

Answers:

• SHA-1

• MD5

• Both

• None of the above

11. You have two sites: Atlanta and Dallas. Clients are using a VPN connection to connect remotely. Two VPN servers are deployed to connect both sites. The IP address of Atlanta's VPN Server is 10.0.0.254 and that of Dallas's VPN server is 11.0.0.254. At Atlanta, each client's IP address was given statically. All the clients are able to connect with remote machines. Only one machine is not able to connect. The configuration of that machine is:
IP address: 10.0.0.22
Subnet mask: 255.0.0.0
Default gateway: 11.0.0.254
What is the problem with the machine?

Answers:

• The IP address is not correct.

• The subnet mask is wrong.

• The default gateway is wrong.

• All of the above.

12. An application is being run on Windows Vista Business edition by a user. The administrator wants to take the backup of those files which are used by that application without shutting down that application. What is the best way to do it?

Answers:

• Ntbackup

• Volume shadow copy

• Normal file backup

• None of the above

13. In a Windows Vista WORKGROUP environment, a shared folder on a machine named MC001 is not accessible from other machines. The administrator has checked the Windows Firewall. All ports are open to access SMB Services, but a third-party firewall is installed on that machine. What should the administrator do?

Answers:

• Uninstall the third-party firewall.

• Close all ports on the third-party firewall.

• Open the SMB ports on the third-party firewall.

• Open all ports on the third-party firewall.

14. You use Windows Vista Business to create many Word and Excel documents for your company. Over the past few months, you have noticed that your computer seems to be getting slower and slower when opening Word and Excel documents. What could you do to resolve this performance
problem?

Answers:

• Create a performance monitor counter.

• Use System Restore.

• Run Disk Defragmenter.

• None of the above.

15. After the Installation of Windows Vista, a user needs to use the Windows Aero interface. What is required to run it?

Answers:

• 2 GB RAM

• Minimum 64 MB graphic memory

• 2.0 GHz CPU

• All of the above

16. A user is using Windows Vista on his laptop from a remote location and he wants to connect to his office network to share some files. He has only an Internet connection over there. What kind of connection would he prefer to connect to his office network?

Answers:

• Wireless LAN

• Ethernet LAN

• VPN connection

• Dial-up connection

17. On a Windows Vista computer, the IP address is defined as 10.0.0.1 with the subnet mask 255.255.0.0 and the default gateway address is defined as 10.1.0.254/255.255.0.0. When a user tries to connect a machine that is not in the Local Area Network, he gets the network unreachable error. You check the physical network connectivity, which checks out perfectly OK. What could the problem be?

Answers:

• The subnet mask of the host is incorrect.

• the network address is not correct.

• The default gateway is not correct.

• All of above

18. Which statement is true?

Answers:

• For Windows Vista Home Premium, the computer requires 256 MB of system memory (RAM).

• For Windows Vista Home Basic, the computer requires 512 MB of system memory (RAM).

• Windows Vista Home Premium requires 40 GB of hard drive capacity with 2 GB free space.

• Windows Vista Home Premium requires 1 GB of system memory (RAM).

19. Which encryption algorithm provides the strongest security support for IPSec in Windows Vista?

Answers:

• 3DES

• DES

• AES-256

• AES-128

20. What is name for the default folder specifically designed for file sharing in Windows Vista that has replaced the Shared Documents folder in Windows XP?

Answers:

• Network

• Distributed

• Public

• Private

21. A new machine has been installed with Windows Vista Business edition. The computer's name is MP0012. A first full-file backup taken on 12 January 2008 at 22:00:15 is on the external drive, which is the E: drive. What will be the name of the backup set folder by default?

Answers:

• E:\MP0012\Backup Set 2008-01-12 220015

• E:\MP0012\Backup Set 01-2008-12 220015

• E:\MP0012\Backup Set 220015

• E:\MP0012\Backup Set 12-01-2008

22. A Windows Vista machine is connected to a private LAN. You just enabled Windows Firewall on the machine and you found that other machines are facing difficulties in connecting  to your machine. What step(s) would you take?

Answers:

• Make an Allow rule for trusted (LAN) inbound traffic.

• Make a Block rule for trusted inbound (LAN) traffic.

• Make a Block rule for all inbound traffic.

• All of the above

23. In which type of profile does Windows Firewall allow the Network Discovery protocol for file sharing by default?

Answers:

• Public profile

• Private profile

• Domain profile

• Standard profile

24. Windows Vista is installed on a machine. The read performance of the hard disk drive of this machine is not good. A user has a 1 GB Flash drive. What should the user do to improve the read performance of the disk?

Answers:

• Use Ready Boost.

• Use BitLocker.

• Use a Volume Shadow copy.

• All of the above.

25. Which category of the Group Policy controls reading data from and writing data to USB/Memory Stick drives?

Answers:

• Storage Devices

• Removable Storage

• Storage

• USB Storage

26. In Windows Firewall with Advanced Security in Vista, what kind of feature is added for filtering direction?

Answers:

• Inbound

• Block

• Inbound and Outbound

• None of the above

27. A user is having problems with connecting to a particular Web site. You run the portqry command and the output is:
Querying target system called:
www.microsoft.com
Attempting to resolve name to IP address...
Name resolved to 10.209.68.190
TCP port 80 (http service): FILTERED
What does it show?

Answers:

• The service is available.

• The service is not available.

• The service is delayed.

• None of the above.

28. You have a user on your network who has configured Windows Update to let him choose what updates to install on Windows Vista. The user reports that one update keeps appearing. How could he remove this update without installing it?

Answers:

• Hide the update.

• Right-click the update and click Remove.

• Run System Restore.

• Select the Do Not Report radio button in Windows Update.

29. What is the extension of Image files created by the ImageX tool?

Answers:

• .wim

• .sif

• .bat

• .txt

30. Sysprep.exe is located in

Answers:

• %WINDIR%\system32\

• %WINDIR%\system32\sysprep\

• %WINDIR%\sysprep\

• %WINDIR%\system\

31. The Windows Firewall with Advanced Security is available on both Windows Vista and Windows XP, and it operates much the same on both operating systems. (True or false)?

Answers:

• True

• False

32. A standard user is accessing the network machine by Run>\\MC001\C$
In the Authentication dialog box, he writes his username and password, and he gets an Access Denied error. What he should do to access that network share?

Answers:

• Give administrator credentials of the remote host.

• Give administrator credentials of the local host.

• Give guest credentials of the remote host.

• Give guest credentials of the local host.

33. You have a Windows Vista Ultimate computer that seems to lose performance from time to time. You would like a real time look at memory and CPU usage during these times of performance loss so you can determine which component is the likely problem. What is the easiest way to gain this information?

Answers:

• To use the Windows Task Manager.

• To use the Event Viewer.

• To use the System Information.

• To use the Performance Monitor.

34. Windows Update has installed an update that you do not want. How could you remove the update?

Answers:

• Updates cannot be removed.

• Access programs in the Control Panel.

• View Update History and click Installed Updates.

• Use System Restore.

35. Which feature of Windows Vista protects Vista from malicious applications?

Answers:

• User Access Control

• Windows Defender

• Both a,b

• BitLocker

36. On which of the following editions of Windows Vista is a scheduled backup feature available?

Answers:

• Windows Vista Home Premium edition

• Windows Vista Business edition

• Windows Vista Home Basic edition

• Windows Vista Ultimate edition

37. What is the default extension of the backup files (with a maximum size of 200 MB each) in the backup set folder in Windows Vista?

Answers:

• .txt

• .bkf

• .bac

• .zip

38. The Backup and Restore utility in Windows Vista is far more configurable than the Windows Backup utility that was installed in Windows 95 to XP. For example, you can pick and choose the exact files that you want backed up (True or False)?

Answers:

• True

• False

39. Which type of Key Exchange Algorithm (KEA) is the strongest in Windows Vista while using IPSec?

Answers:

• Elliptic Curve Diffie-Hellman P-384

• Diffie-Hellman Group 1

• Diffie-Hellman Group 2

• Diffie-Hellman Group 14

40. You want to change the default Search option in IE to a different search site. How can you do this?

Answers:

• Tools > Internet Options > General tab > Settings button under Search.

• Tools > Internet Options > Content tab > Settings button under Search.

• Tools > Internet Options > Security tab > Settings button under Search.

• Tools > Internet Options > Advanced tab > Settings button under Search.

41. You have a 3GB flash drive. You want to use the flash drive with Windows ReadyBoost. Assuming all of the flash drive is fast memory, what is the Microsoft recommended amount of memory you can gain if your computer's physical RAM is 1GB?

Answers:

• 1GB

• 2GB

• 3GB

• Flash drives cannot be over 2GB to work with ReadyBoost.

42. You have a laptop computer configured with the balanced power option. You want to configure the power option so that when you close the lid of the laptop, the laptop sleeps. How could you do this?

Answers:

• Create a custom plan.

• Access Advanced power settings.

• Choose the Sleep option for the power button.

• Open Edit Plan Settings and adjust the setting.

43. You want to send a remote assistance invitation using Outlook. However, you want the invitation to expire in three days. What do you need to do?

Answers:

• Nothing. Invitations automatically expire after three days.

• On the Remote tab of System Properties, click the Advanced button under Remote Assistance and change the expiration time to three days.

• On the Remote tab of Internet Options, click the advanced button under Remote Assistance and change the expiration time to three days.

• Edit the e-mail invitation from 30 days to three days.

44. In Windows Vista, which type of file in the Group Policy has replaced the ADM Template files?

Answers:

• AMD

• GDM

• ADMX/ADML

• MDA

45. You need to configure a new computer to dual boot Microsoft Windows XP Professional and Microsoft Windows Vista. What should be the right steps?

Answers:

• Boot the machine with the Windows XP CD/DVD. Create one partition. Install Windows XP. From Windows XP, run Windows Vista Setup. Install Windows Vista on the same partition.

• Boot the machine with the Windows XP CD/DVD. Create two partitions. Install Windows XP. From Windows XP, run Windows Vista Setup. Install Windows Vista on the second partition.

• Boot the machine with the Windows Vista DVD. Create two partitions. Install Windows Vista. Boot the machine with the Windows XP CD/DVD. Install Windows XP on the second partition.

• All of above

46. On Windows Vista, a user is having problem in getting email in his Outlook because of a wrong configuration of the mail server's IP address. What tool would you use to check the correct IP address of the mail server?

Answers:

• Netsh

• Nestat

• IPConfig

• NSLookup

47. A Windows Vista machine is hosting an FTP site. You have to allow FTP access to all except 192.168.1.59/255.255.255.0. Which filtering direction will you choose?

Answers:

• Outbound

• Inbound

• Both

• None of the above

48. An organization wants its confidential data to be secure from being stolen. Even if a user's mobile-PC is stolen, the attacker should not be able to extract data from the system volume. Which security feature has to be used for this purpose in Windows Vista?

Answers:

• Windows Defender

• Windows Firewall

• BitLocker

• EFS

49. Which of the following are the three new layers of Local Group Policy Objects?

Answers:

• Local Computer Policy, Administrator and Non-Administrator Policy, User-Specific Policy

• Local Computer Policy, User Policy, Computer Policy

• Domain Policy, Site Policy, OU Policy

• Local Computer Policy, Local User Policy, Local Machine Policy

50. APIPA assigns IP addresses in the 169.254.0.0???169.254.255.255 range. What default gateway address is assigned when APIPA is used?

Answers:

• 169.254.1.1

• 131.107.2.200

• 10.0.0.1

• The default gateway is not assigned.

51. A standard user in Windows Vista Business edition wants to share a folder named Accounts on the D: drive. The user does not have administrator credentials. How would it be possible to share the folder?

Answers:

• The user doesn't need administrator credentials to share the folder.

• He should move that folder into his own profile folder and then share it.

• He should move the folder on %System Drive% and then share it.

• Standard users cannot share folders in Windows Vista.

52. You are the network administrator and handling a local area network of 100 desktops. Suddenly, all users begin to complain that they are having a lot of delay in sending or receiving files from or to the network. As an administrator, how would you troubleshoot this?

Answers:

• By using the Network Monitor tool.

• By using Netsh.

• By using Tracert.

• By using Ping.

53. Windows Vista Home edition is installed on a laptop. The user wants to share some files and folders with another user who has his own laptop and Ethernet LAN is not available to them. What type of connection should they prefer?

Answers:

• VPN connection

• Wireless ad-hoc connection

• Wireless access point connection

• Dial-up connection

54. Which IE security zone will run most content without prompts but still not allow unsigned ActiveX controls?

Answers:

• High

• Medium

• Medium-low

• Low

55. As an administrator, you are using Windows Vista from a remote location to access the  server in the office with a dial-up connection and you need to set the IP address on the second LAN card of the server remotely. How could you do that?

Answers:

• Telnet to server. Then use the netsh command.

• Make a Remote Desktop Connection. Then configure the IP address.

• Give a netsh command locally.

• None of the above

56. A user has a laptop that he uses in the office network and in public hot spots also. Which kind of profile should he use on Windows Vista?

Answers:

• Domain

• Public

• Workgroup

• Private

57. A PC installed with Windows Vista crashes after a particular application installation. The administrator is trying to recover it by the System Recovery tool by booting the system through the Windows Vista DVD. Which tool should the administrator choose to repair it?

Answers:

• Startup Repair

• System Restore

• Windows Memory Diagnostics tool

• Command Prompt

58. A machine installed with Windows Vista Home Premium has two hard drives: disk0 and disk1. The system partition is on disk0, and disk1 is in the dynamic state and it has two simple volumes. A user wants to convert disk1 from an MBR (Master Boot Record) disk to a GPT (Globally Unique Identifier Partition Table) disk. What would be the steps to convert disk1 after its data was moved or backed up?

Answers:

• Open the Disk-Management snap-in. Right click on disk1. Convert to GPT Disk.

• Open the Disk-Management snap-in. Right click on disk1. Convert to basic disk. Convert to GPT Disk.

• Open the Disk-Management snap-in. Right click on disk1. Convert to basic disk. Delete partitions on disk1. Right click on disk1. Click Convert to GPT Disk.

• All of the above.

59. A machine is running Windows XP SP2 and a new Windows Vista machine is deployed in the network. A user wants his files and all his settings to migrate from Windows XP to Windows Vista. Which of these could be helpful?

Answers:

• Windows Easy Transfer wizard

• User State Migration Tool (USMT)

• Roaming profiles

• All of the above

60. You set up the Wi-Fi network in your office one week ago. Everything was running fine, but today you found there are many unauthorized users using your network and accessing the Internet through it. What steps should you take?

Answers:

• Apply WEP or PRESHARED KEY.

• Use a wired network.

• It doesn't affect your network. There is no need to do anything.

• None of the above

61. You are working on a Windows Vista machine in a domain environment and you find that too many telnet sessions are being established to your machine with different-source IP addresses. In view of the company's security policies, you should not allow everybody to telnet to all your local machines. What action will you take?

Answers:

• Make a rule in Windows Firewall to block the request to port number 23 on that local machine.

• Make a rule in Windows Firewall to block the request to port number 23 in the Group Policy.

• Make a rule in Windows Firewall to block the request to port number 22 in the Group Policy.

• Make a rule in Windows Firewall to block the request to port number 21 on that local machine.

62. You have four tabs open in IE. You want to ensure that the browser opens next time with these four tabs open. What do you need to do?

Answers:

• Access the General tab and click Restore All Tabs.

• Access the Advanced tab and click Restore All Tabs.

• Close IE and you'll receive a dialog box asking if you want to restore the tabs when IE opens the next time.

• Tabs cannot be restored after closing IE.

63. A desktop installed Windows Vista Business on its boot drive. In addition to the boot drive, it has two other hard drives, disk0 and disk1. Both those disks are dynamic, and spanned partitions are on the disks. A user found that the read and write operations to and from the disks are not up to par. What should the administrator do?

Answers:

• Use striped partitions (RAID 0).

• Use RAID 5.

• Use simple partitions.

• All of the above.

64. On a Windows Vista computer, you want to ensure that any spyware that is found is reported automatically to Microsoft. What should you do?

Answers:

• Configure Windows Defender to run automatically.

• Make sure Windows Update is turned on.

• Set up a Windows Live account.

• Become a member of Microsoft SpyNet.

65. On a GPT Disk, which partition contains the windows boot manager files?

Answers:

• Microsoft Reserved Partition (MSR)

• EFI System Partition (ESP)

• Data Partition

• None of the above

66. When Windows Defender locates spyware on your computer, you want to make sure that the software is moved to an area of your computer where it cannot run. What option should you use?

Answers:

• Remove

• Ignore

• Quarantine

• Always Allow

67. Windows Vista Business edition is newly installed on a desktop. A user enables automatic backup. What type of backup will be taken regularly by Backup and Restore Center?

Answers:

• The first backup is incremental, and subsequent backups are full.

• The first two backups are full, and subsequent backups are incremental.

• All backups are full.

• Only the first backup is full, and subsequent backups are incremental.

68. During the boot process, a Windows Vista machine gave a Stop message. After you restart the machine in the Safe Mode, which file would you check to get to the root cause of that Stop message?

Answers:

• %systemroot%\memory.dmp

• %systemroot%\system32\mem.dmp

• %systemroot%\system\memory.dmp

• %systemroot%\mem.dmp

69. As an administrator, you find that some unknown IP addresses are trying to make remote desktop connections to your machine and trying to attack it. How will you find out which IP addresses are trying to do so?

Answers:

• Command > ping

• Command > netstat ???a ???n -o

• Command > netsh

• Command > tracert

70. Which IE security zone disables all downloads?

Answers:

• High

• Medium

• Medium-low

• Low

71. What two kinds of protocols could you allow using the Add a Port utility in Windows Firewall?
(Choose two.)

Answers:

• TCP

• ICMP

• RDP

• UDP

72. Which answer option is not a reporting feature that is available in the Performance Monitor?

Answers:

• Graph

• Scale

• Histogram

• Report

73. A Windows 2003 server is hosting an application database. All users are using the NetBIOS name to connect to the server. The users complain that they are unable to access the database on Windows Vista clients. What tool would you use to troubleshoot the problem?

Answers:

• NBLookup

• NBTStat

• NSLookup

• ARP

74. On which drive can you not create a backup file using Windows Backup and Restore Center?

Answers:

• A USB flash drive

• A CD or DVD drive

• A local drive on your PC

• A network drive

75. You want to delete all browsing history for Internet Explorer 7 on a Windows Vista computer as quickly as possible. What is the fastest way to do this?

Answers:

• Click Tools > Delete Browsing History... > Delete history... under History.

• Click Page > Delete Browsing History... > Delete history... under History.

• Change the Security zone to Low.

• Access the General tab of Internet Options and delete the history.

76. You work in a WAN environment. You verify that the clients and the server both have network connectivity. Clients report some problem accessing a remote server. You want to test the connection over a time period of several minutes and then have statistics generated on the success and failure of packets. What tool will help you do this?

Answers:

• Nbtstat

• Tracert

• IPConfig

• PathPing

77. You have an FTP server in the network. You have come to know that some unauthorized people are accessing the FTP sites of other users. You run the Network monitor tool on your server to capture the traffic. You find that the FTP data is in plain text. How would you secure the FTP data?

Answers:

• Use IPSec with Windows Firewall.

• Use inbound rules in Windows Firewall.

• Both of the above

• None of the above

78. Which service enables Windows Firewall to switch between profiles as needed when a laptop on a corporate network is connected to any Wi-Fi hot spot?

Answers:

• NLA

• NMB

• NBT

• TCP

79. You are working as a system engineer in an organization. On a Windows Vista machine, you have to enable Remote Desktop, but you also have to implement security so that not everyone is able to connect remotely to your machine except some authorized machines. Which port number will you block in the rule in Windows Firewall?

Answers:

• 443

• 389

• 3389

• 80

80. A user is using a Windows Vista machine to access the Internet, You are the administrator and the user complains that he is unable to open sites, but the sites which start with https are running fine. What would you do?

Answers:

• Open port 21 on the firewall.

• Open port 81 on the firewall.

• Open port 80 on the firewall.

• Open port 22 on the firewall.

81. A particular WINS server seems to have the wrong "NetBIOS name to IP" mapping for your computer in its database. You need to issue a command so that the computer can release name mappings and perform a refresh. What do you need to do?

Answers:

• netstat -t

• nslookup

• nbtstat -RR

• ipconfig /all

82. You are the administrator of an organization, and you have a domain environment. The clients get their IP address configurations from the DHCP server. When you try to connect the clients to the domain, they are unable to connect. What should you do?

Answers:

• Use NSLookup to check DNS.

• Use netstat.

• Use the network monitor.

• None of the above

83. A user is copying a file from another machine from a shared folder, and it is taking a long time to copy. The administrator opens the Reliability and Performance Monitor on that machine. Which graph should he notice?

Answers:

• CPU

• Memory

• Network

• Disk

84. Which of these features is not available in Windows Vista Business edition?

Answers:

• Encrypting File System (EFS)

• Network and Sharing Center

• Aero user interface

• Windows Media Center

85. On a Windows Vista machine, the IP address configuration is set automatically from the DHCP Server, but the machine is set on the APIPA range. Which command will you use to detect the DHCP server again?

Answers:

• ipconfig

• ipconfig /release

• ipconfig /renew

• netsh

86. You need to restore your entire computer, which you backed up previously using the Complete PC Backup feature in the Windows Backup and Restore Center. How do you start the Recovery Center?

Answers:

• Click Restore in the Backup and Restore Center.

• Restart the computer and press the F8 key.

• Start System Restore.

• Enter the Safe Mode.

87. As an administrator, you configure two Windows Vista machines so that they may be able to communicate with each other but everything should be encrypted by IPsec. Which kind of rule would you select in Windows Firewall?

Answers:

• Inbound rule

• Outbound rule

• Connection Security rule

• Block

88. You are running the Windows Memory Diagnostics tool. You want to perform advanced tests.
Which of the following is not a configurable option when you choose the advanced option?

Answers:

• Parameters

• Test Mix

• Cache

• Pass Count

89. Which tool is used to create distribution shares and editing answer files?

Answers:

• Windows Setup (WS)

• Windows System Image Manager (WSIM)

• Sysprep

• Windows Preinstallation Environment (WPE)