Q1. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain named contoso.com. DNS is the only name-resolution protocol used on the network. A member server named serveri.contoso.com runs Windows Server 2008 R2. You change the IP address of serverl.contoso.com.
When users attempt to connect to serverl.contoso.com from their client computers, the URL resolves to the incorrect IP address.
You need to recommend an approach for resolving serverl.contoso.com correctly from all client computers.
What should you do?
A. Run the ipconfig /registerdns command from the client computers that are experiencing the issue.
B. Add a serverl.contoso.com entry pointing to the fully qualified domain name (FQDN) to the LMHOSTS file on each client computer that is experiencing the issue.
C. Add a serverl.contoso.com entry pointing to the correct IP address to the LMHOSTS file on each client computer that is experiencing the issue.
D. Run the ipconfig /registerdns command from serverl.contoso.com.
Answer: D
Q2. Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application.
What should you do?
A. Modify the Account Expires options for the Sale Support team user accounts.
B. Instruct the users to reset their passwords by using OWA (Outlook Web Access).
C. Instruct the users to reset their passwords by using the Local Users and Groups snap-in.
D. Modify the Logon Hours options for the Sales Support team user accounts.
Answer: B
Q3. You have a development network that you use for testing purposes. The development network contains an Active Directory domain.
Users have computers that run Windows 7. The users have several virtual machines that run Windows 7. The virtual machines are joined to Active Directory.
Several users report that when they discard changes on the virtual machines, and then attempt to log on to the machines, they sometimes receive the following error message:
You need to prevent this error from recurring.
What should you do?
A. Create a Password Setting object (PSO) in Active Directory.
B. Modify the security settings by using a Group Policy object (GPO).
C. On the virtual machines, create a password reset disk.
D. On the virtual machines, modify the User Account Control (UAC) settings.
Answer: B
Q4. All client computers on your company network run Windows 7.
The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors.
You need to capture only the relevant data to generate a report.
What should you do?
A. Open Event Viewer and sort by Source.
B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.
C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.
D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.
Answer: B
Q5. Several mobile users access the Internet by using cellular connections.
The help desk reports a high volume of calls from mobile users who report the following connection problems:
When their cellular connections fail, their VPN connections also fail.
When their cellular connections are reestablished, they must manually connect to the VPN server.
You need to recommend a solution to ensure that the VPN connections are automatically reestablished.
What should you recommend?
A. Implement an IKEv2 VPN.
B. Implement an SSTP-based VPN.
C. Configure credential roaming.
D. Configure a Kerberos user ticket lifetime.
Answer: A
Q6. All client computers on a company's network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain. Company policy requires that all unnecessary services be disabled on the computers.
The Sales department staff has been provided with new wireless adapters that use the IEEE 802.11n technology.
You need to ensure that portable computers can connect to wireless networks.
Which service should be running on the portable computers?
A. WWAN AutoConfig
B. Computer Browser
C. Portable Device Enumerator Service
D. WLAN AutoConfig
Answer: D
Q7. All client computers on your company network run Windows 7.
The preview displayed in the Content view of Windows Explorer and the Search box is considered a security risk by your company.
You need to ensure that documents cannot be previewed in the Content view.
What should you do?
A. Change the Windows Explorer view to the List view and disable all Search indexes.
B. Set Group Policy to enable the Remove See More Results/Search Everywhere link setting.
C. Set Group Policy to enable the Turn off the display of snippets in Content view mode setting.
D. Set Group Policy to enable the Turn off display of recent search entries in the Windows Explorer search box setting.
Answer: C
Q8. A new client computer was joined recently to the company domain. However, it does not have the latest Windows updates installed.
You need to ensure that the client computer uses the company's enterprise update distribution servers to install the latest Windows updates immediately.
What should you do?
A. Start the Windows Installer service.
B. Run the wuauclt.exe /resetauthorization command.
C. Run the wuauclt.exe /detectnow command.
D. Run the net start Trustedlnstaller command.
Answer: C
Q9. All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group.
A new version of a business software application is available on the network.
You plan to apply an AppLocker security policy to the R&D group.
You need to ensure that members of the R&D group are not allowed to upgrade the software.
What should you do?
A. Create an Audit only restriction based on the version of the software.
B. Create an Audit only restriction based on the publisher of the software.
C. Create an Enforce rule restriction based on the version of the software.
D. Create an Enforce rule restriction based on the publisher of the software.
Answer: C
Q10. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain.
A network administrator changes the IP address of a file server.
Employees are unable to connect to the file server.
You need to ensure that the employees are able to connect to the file server immediately.
Which command should you instruct the employees to run?
A. ipconfig /showdns
B. ipconfig /registerdns
C. ipconfig /flushdns
D. Ipconfig /renew
Answer: C
Q11. A corporate environment includes client computers running Windows 7 Enterprise. You find an unknown service installed on a client computer. You suspect that the client computer has been infected with malicious software. You need to recommend an approach for identifying and terminating processes the service is running. What is the best approach to achieve the goals? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Run Windows Defender
B. Run Windows Task Manager
C. Run the Services Management console
D. Run Action Center
Answer: A
Q12. A user at the Headquarters site is able to run .bat files on LAPTOP01. However, you notice that the AppLockdown GPO was successfully applied to the computer.
You need to ensure that the user's computer complies with the existing AppLockdown GPO settings.
Which service should you start on LAPTOP01?
A. Application Experience
B. Application Identity
C. Application Management
D. Application Information
Answer: B
Q13. You are expanding the wireless functionality by creating a guest wireless network based on the new company requirements.
You need to ensure that users can connect automatically without providing credentials.
Which security type should you use?
A. No Authentication (Open)
B. WEP
C. WPA
D. Shared
E. WPA2 Enterprise
Answer: A
Q14. A company has computers that run Windows 7 Enterprise.
A user's computer has been crashing and showing error messages over the past several days.
You need to gather historical information about the errors.
Which tools should you use? (Choose all that apply.)
A. Troubleshooting in Control Panel
B. Performance Monitor
C. Disk Defragmenter
D. Event Viewer
E. Reliability Monitor
Answer: DE
Q15. A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report that they are unable to connect to the wireless network in office 1 from their portable computers.
A help desk administrator manually provides the users with access to the wireless network. You need to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless network in office 1.
What should you request?
A. Link GPO1 to Office2-Users-OU.
B. Link GPO1 to Office2-Computers-OU.
C. Change the office attribute for the user accounts.
D. Change the location attribute for the computer accounts.
Answer: B