Q1. All client computers on your company network are members of an Active Directory Domain Services domain.
The Finance team uses Remote Desktop to access Windows 7 virtual machines that are hosted on a Windows Server 2008 Hyper-V server.
The team members receive the following error message when they attempt to log on to the virtual machines:
"The trust relationship between this workstation and the primary domain failed."
You discover that the Hyper-V server was recently restored from a backup.
You need to ensure that the team members can log on to the virtual machines.
You log on to the virtual machines as local administrator.
What should you do next?
A. Modify the computer name of each virtual machine.
B. Run the netdom join command on each virtual machine.
C. Restore each virtual machine by using the System Restore tool.
D. Make each virtual machine a member of a workgroup and join them back to the domain.
Answer: D
Q2. The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN.
You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue.
What should you recommend?
A. Deploy a Network Policy Server (NPS).
B. Replace the SSTP-based VPN with a PPTP-based VPN.
C. Issue computer certificates from a trusted root certification authority (CA) to all remote users.
D. Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.
Answer: D
Q3. All client computers on your company network run Windows 7.
A computer is unable to connect to network resources.
The configuration of the computer is as shown in the following table.
You need to ensure that the computer is able to connect to network resources.
What should you do?
A. Change the IP address to 131.107.3.254.
B. Change the subnet mask to 255.255.248.0.
C. Change the default gateway to 131.107.0.1.
D. Change the preferred DNS server to 131.107.3.1.
Answer: C
Q4. When visiting certain websites, users receive a message in Internet Explorer.
The message is shown in the exhibit:
You need to ensure that the Internet Explorer settings for all client computers follow company requirements.
What should you modify in Group Policy?
Exhibit:
A. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Turn on Protected Mode setting.
B. Disable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
C. Enable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
D. Disable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
E. Enable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
F. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Do not prompt for client certificate selection when no certificate or only one certificate setting.
Answer: C
Q5. Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed.
A help desk technician reports that the problem is related to installed applications.
You need to recommend a solution that identifies the applications that run during the startup process.
What should you recommend?
A. Event Forwarding
B. MSConfig.exe
C. Problem Steps Recorder
D. Reliability Monitor
Answer: B
Q6. Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked.
You need to recommend a solution to ensure that user accounts for members of the Sales Support team are automatically unlocked 10 minutes after becoming locked.
What should you recommend?
A. Create a new Group Policy object with a different account lockout policy and link it to the domain.
B. Modify the Unlock Account options for the members of the Sales security group.
C. Create a fine-grained password policy with a different account lockout policy and apply it to the Sales security group.
D. Modify the Account Properties Options properties for the members of the Sales security group.
Answer: C
Q7. A new print device is installed on Floor 1 and shared on Print1.
Users report that when they search Active Directory for printers on Floor 1, the new shared printer is missing. All other shared printers on Floor 1 appear.
The help desk reports that users can manually connect to the shared printer.
You need to ensure that the new shared printer is displayed when users search for printers on Floor 1.
What should you do?
A. Modify the permissions of the printer.
B. Configure a network location for the printer.
C. Request that a domain administrator modify the Active Directory site configuration.
D. Request that a domain administrator modify the GPO that is linked to each departmental OU.
Answer: B
Q8. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 4, Margie's Travel
Scenario:
You are an enterprise desktop support technician for Margie's Travel.
Margie's Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table:
User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers.
All portable computers are members of the MargiesTravel\Wireless group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies.
The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application.
What should you do?
A. Disable User Account Control (UAC).
B. Add the users to the local Administrators group.
C. Request that the application package be re-signed.
D. Request that the user certificates be issued to the new users.
Answer: C
Q9. Remote users report that after they renew their smart card certificates, they are unable to log on to their computers by using their smart cards.
You need to ensure that users can log on by using their smart cards.
What should you instruct the users to do?
A. Change their smart card PINs.
B. Request a new smart card certificate.
C. Log on by using their user names and passwords, and then lock and unlock their computers.
D. Establish a VPN connection from the logon screen and use their smart cards for authentication.
Answer: D
Q10. All client computers on your company network run Windows 7 and all servers on your company network run Windows Server 2008. The computers and the servers are members of an Active Directory Domain Services domain. A network administrator moves the Internet Information Services (IIS) server to a different network segment and configures the appropriate network settings.
Employees are unable to connect to the IIS server.
You confirm that the network settings are appropriate.
You need to ensure that all employees are able to connect to the IIS server.
What should you do?
A. Restart the DNS Client service on the DNS servers.
B. Restart the DNS Server service on the DNS servers.
C. Run the nbtstat r command on the employees' computers.
D. Run the ipconfig /flushdns command on the employees' computers.
Answer: D
Q11. All computers on your company network run Windows 7.
Several support requests have been made by employees who have recently had hardware upgrades to their computers. Each request states that the employee's computer restarts automatically at random times.
You examine one of the computers and verify the following information:
Only approved applications and processes are run on the computer.
All updates to the operating system and applications have been applied to the computer.
No malicious software is found on the computer.
You need to find out why the computers are restarting automatically.
What should you do?
A. Run the Windows Memory Diagnostic tool.
B. Run the fixmbr command from the Recovery Console.
C. Run the fixboot command from the Recovery Console.
D. Run the Check for performance issues Control Panel tool.
Answer: A
Q12. Your company has a main office and a branch office. The branch office is configured as shown in the exhibit:
The branch office contains the following wireless devices:
A phone system that uses the 5.8 GHz wireless spectrum
A wireless access point that uses 802.11b
Printers that are compatible with 802.11b and 802.11g
100 portable computers that use 802.11b and 802.11g
Users report that they have an intermittent connection to the wireless access point.
You need to recommend a solution that ensures that users can connect to the wireless access point at all times.
What should you recommend?
A. Move the wireless printers to the reception area.
B. Move the wireless access point to another location.
C. Replace the phone system with a DECT 6.0 phone system.
D. Replace the wireless access point with an 802.11g wireless access point.
Answer: B
Q13. All client computers on your company network run Windows 7.
The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors.
You need to capture only the relevant data to generate a report.
What should you do?
A. Open Event Viewer and sort by Source.
B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.
C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.
D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.
Answer: B
Q14. A corporate environment includes 10,000 client computers running Windows 7 Enterprise. The client computers are joined to an Active Directory Domain Services (AD DS) domain named contoso.com. DNS is the preferred name-resolution protocol. There have been no recent changes to the DNS entries. WINS is not running in the environment. When most users attempt to connect to pc01.contoso.com from their client computers, the URL resolves to the incorrect IP address. The URL resolves correctly from only one client computer. On the client computers experiencing the issue, the HOSTS file does not include an entry for pc01.contoso.com. You need to recommend an approach for resolving pc01.contoso.com correctly from all client computers. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Run the ipconfig /flushdns command from the client computers experiencing the issue.
B. Add a pc01 entry pointing to the correct IP address to the LMHOSTS file on each of the client computers experiencing the issue.
C. Add a pc01.contoso.com entry pointing to the correct IP address to the HOSTS file on each of the client computers experiencing the issue.
D. Run the ipconfig /registerdns command from PC01.
Answer: C
Q15. You have a development network that you use for testing purposes. The development network contains an Active Directory domain.
Users have computers that run Windows 7. The users have several virtual machines that run Windows 7. The virtual machines are joined to Active Directory.
Several users report that when they discard changes on the virtual machines, and then attempt to log on to the machines, they sometimes receive the following error message:
You need to prevent this error from recurring.
What should you do?
A. Create a Password Setting object (PSO) in Active Directory.
B. Modify the security settings by using a Group Policy object (GPO).
C. On the virtual machines, create a password reset disk.
D. On the virtual machines, modify the User Account Control (UAC) settings.
Answer: B