Q1. You are deploying a WAP in one of the company's locations.
You need to ensure that wireless connectivity meets the company's requirements.
What should you recommend? (Choose all that apply.)
A. B. C. Add the class identifier of the add-on to the Add-on list in Group Policy. D. Set the Deny all add-ons unless specifically allowed in the Add-on list Group Policy setting to Disabled. Answer: C
Q6. The help desk technicians discover that Windows Defender definitions are not up-to-date on client computers. The help desk technicians report that other critical updates are applied to the client computers.
You need to ensure that all client computers have the latest Windows Defender definitions. Your solution must comply with the corporate security policy.
What should you request?
A. a firewall exception be added for msascui.exe
B. the WSUS server be configured to download and automatically approve Windows Defender definition updates
C. the Remove access to use all Windows update features setting in the WSUS Policy GPO be set to disabled
D. the Windows Defender\Turn on definition updates through both WSUS and Windows Update setting in the WSUS Policy GPO be set to enabled
Answer: B
Q7. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 2, City Power & Light
Scenario:
You are an enterprise desktop support technician for City Power & Light.
City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees.
Active Directory Configuration
The network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2.
Server Configuration
All servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table:
All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses.
User Information
All user accounts are standard user accounts.
All client computers run Windows 7 Enterprise.
Each portable computer has a PPT P-based VPN connection to the internal network.
Corporate Security Guidelines
All users must be granted the least privileges possible.
All locally stored documents must be encrypted by using Encrypting File System (EFS).
The hard disk drives on all port able computers must be encrypted by using Windows BitLocker Drive
Encryption (BitLocker).
All encryption certificates must be stored on smart cards.
The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines.
What should you recommend?
A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.
Answer: A
Q8. Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed.
A help desk technician reports that the problem is related to installed applications.
You need to recommend a solution that identifies the applications that run during the startup process.
What should you recommend?
A. Event Forwarding
B. MSConfig.exe
C. Problem Steps Recorder
D. Reliability Monitor
Answer: B
Q9. Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians.
Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets.
You need to create a standardized Data Collector Set on a network share that is accessible to your team.
What should you create?
A. Event Trace Data Collector Set
B. Performance Counter Data Collector Set
C. Performance Counter Alert Data Collector Set
D. System Configuration Information Data Collector Set
Answer: B
Q10. All client computers on your company network run Windows 7. Several legacy software applications are made available on the computers by using Windows XP Mode (XPM).
Employees report that all Start menu shortcuts for the legacy applications are missing from their computers.
You need to ensure that all employees can access the Start menu shortcuts for the legacy applications.
What should you do?
A. Copy the program icons to the Start menu of the Windows 7 computers.
B. Reinstall the applications on the XPM machines and select the repair option.
C. Configure the applications as Default Programs on the Windows 7 computers.
D. Enable the Auto Publish option for Virtual Machine Settings on the Windows 7 computers.
Answer: D
Q11. Your company has client computers that run Windows 7 and client computers that run Windows XP Professional.
You enable the Network Discovery feature on the Windows 7 computers.
You discover that the Windows XP computers do not appear on the network map.
You need to ensure that all client computers appear on the network map.
What should you do?
A. Configure the IPv6 protocol on the Windows 7 computers.
B. Configure the network shares on the Windows 7 computers to include the user names of all employees.
C. Configure the network shares on the Windows XP computers to include the user names of all employees.
D. Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.
Answer: D
Q12. When visiting certain websites, users receive a message in Internet Explorer.
The message is shown in the exhibit:
You need to ensure that the Internet Explorer settings for all client computers follow company requirements.
What should you modify in Group Policy?
Exhibit:
A. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Turn on Protected Mode setting.
B. Disable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
C. Enable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
D. Disable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
E. Enable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
F. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Do not prompt for client certificate selection when no certificate or only one certificate setting.
Answer: C
Q13. All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.
You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).
You need to ensure that the following requirements are met:
All BitLocker recovery keys are stored in a central location.
Data is encrypted only after a backup of the recovery key is available.
What should you do?
A. Run the manage-bde -on -ForceRecovery command.
B. Enable the Choose default folder for recovery password setting.
C. Enable the Store BitLocker recovery information in Active Directory Domain Services setting.
D. Enable the Choose how users can recover BitLocker encrypted drives setting. Set the 256-bit recovery key to Require recovery password.
Answer: C
Q14. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 4, Margie's Travel
Scenario:
You are an enterprise desktop support technician for Margie's Travel.
Margie's Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table:
User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers.
All portable computers are members of the MargiesTravel\Wireless group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies.
The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application.
What should you do?
A. Disable User Account Control (UAC).
B. Add the users to the local Administrators group.
C. Request that the application package be re-signed.
D. Request that the user certificates be issued to the new users.
Answer: C
Q15. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain.
The help desk reports that several computers that run Windows 7 Enterprise have bad sectors on their hard disks.
You need to minimize the loss of data on the computers caused by storing data on the bad sectors.
Which command should you run?
A. chkdsk.exe /r
B. chkdsk.exe /f
C. defrag.exe /c
D. defrag.exe /x
Answer: A