A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network.You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.You need to plan the most efficient method for activating all of the computers.What should you do?
Your company's network is shown in the following diagram.Each office is connected to the Internet through a high-bandwidth connection. The branch offices are connected to the core network through low-bandwidth connections.Microsoft Windows Server Update Services (WSUS) must provide software updates for all offices.You need to design the WSUS infrastructure to minimize traffic over the low-bandwidth connections.Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Your network is configured as shown in the following diagram.You are planning to deploy Windows 7.You have the following requirements:"¢ Use BitLocker on all computers in the isolated network."¢ Provide DirectAccess on all portable computers."¢ Use the Key Management Service (KMS) to activate all client computers.You need to plan a client computer licensing strategy that meets the requirements.What should you do?
Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible withWindows 7.You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) image that includes the custom applications to all Windows 7 client computers.What should you do?
Your company plans to upgrade all client computers to Windows 7.The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application.You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.What should you do?
You are planning to upgrade Internet Explorer.You have the following requirements:✑ Create a report that identifies which computers are successfully upgraded.✑ Do not install additional software on the client computers.You need to design a deployment method that meets the requirements.What should you do?