Q1. Twenty new laptop computers are joined to the domain.
Users of the new laptops report that they can access the Exchange server, but they cannot access file shares or internal Web sites when they are outside of the office.
Other remote users can access file shares and internal Web sites when they are outside of the office.
You need to ensure that users of the new laptops can access file shares and Web sites on the internal network when they are outside of the office.
What should you request?
A. new user certificates for the laptop users
B. new computer certificates for the laptops
C. the user accounts for the laptop users be added to the Baldwin\Direct Access group
D. the computer accounts for the laptops be added to the Baldwin\Direct Access group
Answer: D
Q2. The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit:
You need to resolve the network connectivity issue. The solution must adhere to the company policy.
What should you instruct help desk to do?
A. Modify Windows Firewall and enable File and Printer Sharing in the public profile.
B. Modify Windows Firewall and enable File and Printer Sharing in the domain profile.
C. Modify the network configuration and define the IPv4 default gateway.
D. Modify the network configuration to automatically obtain an IP address and a DNS server address.
Answer: D
Q3. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain.
Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology.
You need to ensure that portable computers can connect to the broadband GSM network.
Which service should be enabled on the portable computers?
A. WLAN AutoConfig
B. WWAN AutoConfig
C. Computer Browser
D. Portable Device Enumerator Service
Answer: B
Q4. Your company has a main office and a branch office. The network contains a single Active Directory domain. All servers and client computers are members of the domain.
A print server is located in the branch office. All other servers are located in the main office. All servers run Windows Server 2008 R2. All client computers run Windows 7.
Users in the branch office report poor performance when they access an intranet Web site in the main office.
You need to recommend changes to the network to improve the performance of intranet access by computers in the branch office.
What should you recommend implementing?
A. a VPN
B. BranchCache
C. HTTP redirect
D. WebDav
Answer: B
Q5. A new client computer was joined recently to the company domain. However, it does not have the latest Windows updates installed.
You need to ensure that the client computer uses the company's enterprise update distribution servers to install the latest Windows updates immediately.
What should you do?
A. Start the Windows Installer service.
B. Run the wuauclt.exe /resetauthorization command.
C. Run the wuauclt.exe /detectnow command.
D. Run the net start Trustedlnstaller command.
Answer: C
Q6. A corporate environment includes client computers running Windows 7 Enterprise. Users are unable to start Windows Internet Explorer after several new ActiveX controls are deployed to their client computers. You need to recommend an approach for determining whether the issue is caused by the ActiveX controls. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Start Internet Explorer in InPrivate Browsing mode.
B. Restart each client computer and select the Safe Mode startup option.
C. Start Internet Explorer in No Add-ons mode.
D. Restart each client computer and select the Last Known Good Configuration startup option.
Answer: C
Q7. All client computers on your company network run Windows 7. The computers are deployed within an Active Directory Domain Services domain in a Windows Server 2003 environment.
When an employee attempts to log on to the domain from his computer, he receives the following error message:
"System cannot log you on to the domain because the system's computer account in its primary domain is missing or the password on that account is incorrect."
You need to ensure that the employee can log on to the domain from his computer.
What should you do?
A. Change the domain password of the employee.
B. Create a roaming profile for the employee on his computer.
C. Add the user account of the employee to the local Administrators group.
D. Add the computer to a workgroup and then add the computer again to the domain.
Answer: D
Q8. Your company has a main office and a branch office.
The network contains a single Active Directory domain. All computers are members of the domain.
Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications.
From your computer, you need to identify the application that uses the most processor on the computers.
Which tool should you use?
A. Performance Monitor
B. Reliability Monitor
C. Resource Monitor
D. System Information
Answer: A
Q9. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 7, Contoso, Ltd.
Scenario:
You are an enterprise desktop support technician for Contoso, Ltd.
IP Addressing
Contoso has one office. The IP addressing for Contoso is configured as shown in the following table:
A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication.
Printer Configuration
Network printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers.
Client Computer Configuration
Most users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise.
The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain.
All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1.
The help desk reports that several users use the previous version of App1, which causes some data to become corrupt.
You need to recommend a solution to prevent all users from using the previous version of App1.
What should you recommend?
A. that a domain administrator create a GPO linked to the domain and configure AppLocker settings in the GPO
B. that a domain administrator create a GPO linked to the domain and configure Software Installation settings in the GPO
C. that the new version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer
D. that the previous version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer
Answer: A
Q10. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. All servers run Windows Server 2008 R2 and are located in the main office.
A remote office connects to the main office by using a cellular network.
Employees at the remote office frequently download a daily report from an IIS Web server at the main office, which causes them to incur excessive pay per bandwidth usage costs.
You need to decrease the network bandwidth usage costs incurred by the remote office.
What should you do?
A. Implement DirectAccess.
B. Implement VPN with compression.
C. Implement Distributed File System.
D. Configure Branch Cache.
Answer: D
Q11. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 10, Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table:
The corporate security policy states that all domain controllers must have only the following roles:
AD DS
DNS server
DHCP server
Network Configuration
Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application.
Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords.
You need to minimize the number of account lockouts that occur after the users change their passwords.
What should you instruct the users to do?
A. Delete all entries from the Credential Manager vault.
B. Change their passwords and then create a password reset disk.
C. Change their passwords and then configure App2 to log on by using a service account.
D. Change their passwords and then log off and log back on to their computers.
Answer: C
Q12. All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain.
Malicious software is spreading automatically from removable drives.
You need to ensure that malicious software does not automatically run on the computers.
What should you do?
A. Disable the Windows Installer by using Domain Group Policy.
B. Disable the Autoplay function by using Domain Group Policy.
C. Disable the ActiveX installation policy by using Domain Group Policy.
D. Prevent the installation of unsigned drivers by using Domain Group Policy.
Answer: B
Q13. All client computers on your company network run Windows 7. Several legacy software applications are made available on the computers by using Windows XP Mode (XPM).
Employees report that all Start menu shortcuts for the legacy applications are missing from their computers.
You need to ensure that all employees can access the Start menu shortcuts for the legacy applications.
What should you do?
A. Copy the program icons to the Start menu of the Windows 7 computers.
B. Reinstall the applications on the XPM machines and select the repair option.
C. Configure the applications as Default Programs on the Windows 7 computers.
D. Enable the Auto Publish option for Virtual Machine Settings on the Windows 7 computers.
Answer: D
Q14. The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer's hard disk drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.
Which tool should you use?
A. CertUtil.exe
B. Cipher.exe
C. Manage-bde.exe
D. SDelete.exe
Answer: C
Q15. You are deploying a WAP in one of the company's locations.
You need to ensure that wireless connectivity meets the company's requirements.
What should you recommend? (Choose all that apply.)
A. Link the GPO to an OU that contains all client computer accounts.
B. Create a GPO and define an IP Security policy.
C. Create a GPO and define a Wireless Network (IEEE 802.IX) policy.
D. Create a GPO and define a Network List Manager policy.
E. Link the GPO to an OU that contains all user accounts.
Answer: AC