Want to know Exambible 70-685 Exam practice test features? Want to lear more about Microsoft Pro: Windows 7, Enterprise Desktop Support Technician certification experience? Study Accurate Microsoft 70-685 answers to Replace 70-685 questions at Exambible. Gat a success with an absolute guarantee to pass Microsoft 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) test on your first attempt.
Q41. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 9, Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table:
The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily.
A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the hosts file that is located on each client computer.
Users frequently work from home. Home users connect to the internal network by using SSTP- based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7.
You deploy App1 on a test Windows 7 computer and notice that it fails to run.
You need to ensure that App1 runs on Windows 7 computers.
What should you do?
A. D. the system protection settings Answer: C Q44. Users in branch office 2 map drives to shared folders on SRV1. The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access. You need to ensure that the users can access the shared folders if the WAN link fails. What should you do? A. Instruct a desktop support technician to configure Offline Files on the Windows 7 computers. B. Instruct a desktop support technician to configure BranchCache on the Windows 7 computers. C. Request that a domain administrator deploy a domain controller in branch office 2. D. Request that a domain administrator enable Universal Group Membership Caching for branch office 2. Answer: B Q45. You deploy Microsoft Office 2007 to a pilot group in the main office. Users in the pilot group report that all of the Office 2007 applications run successfully. You deploy Office 2007 to users in the New York call center. The call center users report that they are unable to launch the Office 2007 applications. You need to ensure that the call center users can run all of the Office 2007 applications. What should you do? A. Modify the AppLocker rule. B. Disable User Account Control (UAC). C. Deploy the 2007 Office system Administrative Template files. D. Configure the Office 2007 applications to run in Windows Vista compatibility mode. Answer: A Q46. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series. Topic 1, Consolidated Messenger Scenario: You are an enterprise desktop support technician for Consolidated Messenger. Network Configuration The company has three offices named Office1, Office2, and Office3. The offices connect to each other over the Internet by using VPN connections. Each office has an 802.11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory Configuration The network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram: Client Configuration Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. Printers The marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. The chief financial officer (CFO) releases new guidelines that specify that only users from Finance are allowed to run FinanceApp1. Users in the Marketing OU report that they can run FinanceApp1. You need to ensure that only users in the Finance OU can run FinanceApp1. What should you do? A. In the AllComputers GPO, create a new AppLocker executable rule. B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule. C. In the AllComputers GPO, create a software restriction policy and define a new hash rule. D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule. Answer: A Q47. The motherboard on a portable computer fails. The data on the computer's hard disk drive cannot be recovered. You need to recommend a solution to ensure that the data on hard disks can be recovered if the motherboard on other portable computers fail Which two configurations should you recommend? (Each correct answer presents part of the solution. Choose two.) A. Disable BitLocker on all portable computers. B. Convert the hard disks on all portable computers to dynamic disks. C. Export and securely store the computer certificates on all portable computers. D. Configure the BitLocker settings on all portable computers by using Group Policy. Answer: AD Q48. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series. Topic 2, City Power & Light Scenario: You are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory Configuration The network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Server Configuration All servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table: All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User Information All user accounts are standard user accounts. All client computers run Windows 7 Enterprise. Each portable computer has a PPT P-based VPN connection to the internal network. Corporate Security Guidelines All users must be granted the least privileges possible. All locally stored documents must be encrypted by using Encrypting File System (EFS). The hard disk drives on all port able computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). All encryption certificates must be stored on smart cards. The company is deploying a new application. When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it. You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend? A. Publish the application by using a Group Policy. B. Disable User Account Control (UAC) by using a Group Policy. C. Add all domain users to the local Power Users group by using Restricted Groups. D. Add the current users to the local Administrators group by using Group Policy preferences. Answer: A Q49. Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create? A. Event Trace Data Collector Set B. Performance Counter Data Collector Set C. Performance Counter Alert Data Collector Set D. System Configuration Information Data Collector Set Answer: B Q50. Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do? A. Configure a Windows Connect Now Group Policy. B. Configure a Wireless Network (IEEE 802.11) Policy. C. Delete the rogue network from the Network and Sharing Center on each computer. D. Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users. Answer: B