Verified of 70-685 torrent materials and training tools for Microsoft certification for customers, Real Success Guaranteed with Updated 70-685 pdf dumps vce Materials. 100% PASS Pro: Windows 7, Enterprise Desktop Support Technician exam Today!
Q1. Twenty new laptop computers are joined to the domain.
Users of the new laptops report that they can access the Exchange server, but they cannot access file shares or internal Web sites when they are outside of the office.
Other remote users can access file shares and internal Web sites when they are outside of the office.
You need to ensure that users of the new laptops can access file shares and Web sites on the internal network when they are outside of the office.
What should you request?
A. new user certificates for the laptop users
B. new computer certificates for the laptops
C. the user accounts for the laptop users be added to the Baldwin\Direct Access group
D. the computer accounts for the laptops be added to the Baldwin\Direct Access group
Answer: D
Q2. A corporate environment includes client computers running Windows 7 Enterprise. Users are unable to start Windows Internet Explorer after several new ActiveX controls are deployed to their client computers. You need to recommend an approach for determining whether the issue is caused by the ActiveX controls. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Start Internet Explorer in InPrivate Browsing mode.
B. Restart each client computer and select the Safe Mode startup option.
C. Start Internet Explorer in No Add-ons mode.
D. Restart each client computer and select the Last Known Good Configuration startup option.
Answer: C
Q3. You are deploying a WAP in one of the company's locations.
You need to ensure that wireless connectivity meets the company's requirements.
What should you recommend? (Choose all that apply.)
A. Link the GPO to an OU that contains all client computer accounts.
B. Create a GPO and define an IP Security policy.
C. Create a GPO and define a Wireless Network (IEEE 802.IX) policy.
D. Create a GPO and define a Network List Manager policy.
E. Link the GPO to an OU that contains all user accounts.
Answer: AC
Q4. Your company has a branch office. The office has two 48-port network switches named Switch1 and Switch2.
The company purchases several new computers that have identical hardware. The new computers run Windows 7.The help desk reports that the new computers that connect to Switch1 are unable to connect to network resources and do not receive IP configurations from the DHCP server.
Existing computers that connect to Switch1 can access network resources. The new computers that connect to Switch2 can also access network resources.
You need to ensure that all computers can connect to network resources.
What should you do?
A. Re-install the network card driver.
B. Disable IPv6 on the network interface.
C. Disable and then enable the network interface.
D. Disable the AutoNegotiation setting on the network interface.
Answer: D
Q5. All client computers on your company network run Windows 7 and are members of an
Active Directory Domain Services domain named contoso.com.
Employees access the company intranet site at http://app.contoso.com.
The Test team must be able to access a new version of http://app.contoso.com before the site is in production.
You need to ensure that the Test team can access the new version of the site without affecting other employees' access to the current site.
What should you do?
A. Create a DNS record for app.contoso.com that specifies the IP address of the test server.
B. Create a Windows Firewall rule that blocks access to the IP address of the test server on the employees' computers.
C. Create a Windows Firewall rule that allows access to the IP address of the test server on the Test team's computers.
D. Add an entry to the Hosts file that specifies app.contoso.com and the IP address of the test server on the Test team's computers.
Answer: D
Q6. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 3, A. Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table:
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP.
Windows Firewall is disabled on all client computers.
All computers in the research department have Windows XP Mode and Windows Virtual PC installed.
You deploy a custom Windows XP Mode image to the research department computers.
An application named App1 is installed in the image.
Each research department computer has the following hardware:
4-GB of RAM
Intel Core i7 processor
500-GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
Users without domain accounts must be denied access to internal servers.
All connections to the company's wireless access points must be encrypted.
Only employees can be configured to have user accounts in the Active Directory domain.
The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).
Users in the research department report that they cannot run App1 or Windows XP Mode.
You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Approve all Windows 7 updates on WSUS1.
B. Enable hardware virtualization on the research department computers.
C. Give each member of the research department a computer that has an Intel Core i5 processor.
D. Request that a domain administrator create a GPO that configures the Windows Remote Management (WinRM) settings.
Answer: B
Q7. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company's corporate image.
What should you do next?
A. Modify the System Protection properties for the C volume
B. Create a new system restore point
C. Modify the Shadow Copies properties for the C volume
D. Create a new critical volume backup
Answer: A
Q8. The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer's hard disk drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.
Which tool should you use?
A. CertUtil.exe
B. Cipher.exe
C. Manage-bde.exe
D. SDelete.exe
Answer: C
Q9. All client computers on your company network run Windows 7.
The preview displayed in the Content view of Windows Explorer and the Search box is considered a security risk by your company.
You need to ensure that documents cannot be previewed in the Content view.
What should you do?
A. Change the Windows Explorer view to the List view and disable all Search indexes.
B. Set Group Policy to enable the Remove See More Results/Search Everywhere link setting.
C. Set Group Policy to enable the Turn off the display of snippets in Content view mode setting.
D. Set Group Policy to enable the Turn off display of recent search entries in the Windows Explorer search box setting.
Answer: C
Q10. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 13, Enterprise Company
Scenario:
Background
You are the desktop support technician for an Enterprise Company. The company offices, sizes, and platforms are shown in the following table:
Software Environment
The company has a single Active Directory Domain Services (AD DS) forest with one domain. All domain controllers run Windows Server 2008 R2. The forest and domain functional levels are set to Windows Server 2008 R2.
The company outsources sales support to a third party.
Each member of the Sales Support team has an AD DS user account in a global security group named Sales.
The Sales security group and the AD DS user accounts for the Sales Support team reside in an organizational unit (OU) named Sales Support.
Members of the Sales Support team do not use domain-joined client computers.
With the exception of the Sales Support team, all user accounts reside in an OU named Employees.
All client computers reside in an OU named Client Computers.
A global security group named Accounting contains users with domain accounts. They use portable computers running Windows 7 that are joined to the domain.
The company uses DirectAccess for remote access connectivity. Windows 7 domain-joined computers have been configured to use DirectAccess.
The company uses Microsoft Exchange and Outlook Web App (OWA) for email and collaboration. The company has enabled password reset through OWA.
The company uses AppLocker to prevent users from running certain programs. AppLocker rules are defined at the domain-level in the Corp Group Policy object (GPO). Corp GPO only contains AppLocker policy settings.
Wireless Requirements
The company has wireless access points (WAPs) that provide wireless connectivity at some locations. The company uses a GPO named WiFi to enforce wireless security. The WiFi GPO is linked to the domain.
The company mandates that all domain-joined computers must connect to corporate WAPs automatically. The company's 802.1 X authentication server must be used for client computer connections to the WAP.
Visitors and contractors are unable to connect to the corporate wireless network.
Management has mandated that a guest wireless network be established that meets the following criteria:
Users should not have to provide credentials.
Maximize wireless network performance.
Minimize administrative overhead.
Data Protection Environment
Full system backups are performed on client computers on Sundays with one week of retention.
All client computers are configured with System Protection settings to restore only previous versions of files.
The company's help desk technicians spend a significant amount of time researching whether remote access issues are related to the corporate network or to Accounting group users' Internet connectivity.
You need to recommend a solution that minimizes time spent indentifying the cause of the remote access issues.
What should you recommend?
A. Deploy the DirectAccess Connectivity Assistant on the Accounting group's portable computers.
B. Deploy the DirectAccess Connectivity Assistant on the help desk technicians' computers.
C. Enable Windows Firewall logging on DirectAccess servers.
D. Enable Windows Firewall logging on the portable computers.
Answer: A