Q1. Users in branch office 2 map drives to shared folders on SRV1.
The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access.
You need to ensure that the users can access the shared folders if the WAN link fails.
What should you do?
A. Instruct a desktop support technician to configure Offline Files on the Windows 7 computers.
B. Instruct a desktop support technician to configure BranchCache on the Windows 7 computers.
C. Request that a domain administrator deploy a domain controller in branch office 2.
D. Request that a domain administrator enable Universal Group Membership Caching for branch office 2.
Answer: B
Q2. All client computers on your company network run Windows 7 and are members of an
Active Directory Domain Services domain named contoso.com.
Employees access the company intranet site at http://app.contoso.com.
The Test team must be able to access a new version of http://app.contoso.com before the site is in production.
You need to ensure that the Test team can access the new version of the site without affecting other employees' access to the current site.
What should you do?
A. Create a DNS record for app.contoso.com that specifies the IP address of the test server.
B. Create a Windows Firewall rule that blocks access to the IP address of the test server on the employees' computers.
C. Create a Windows Firewall rule that allows access to the IP address of the test server on the Test team's computers.
D. Add an entry to the Hosts file that specifies app.contoso.com and the IP address of the test server on the Test team's computers.
Answer: D
Q3. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain named contoso.com. DNS is the only name-resolution protocol used on the network. A member server named serveri.contoso.com runs Windows Server 2008 R2. You change the IP address of serverl.contoso.com.
When users attempt to connect to serverl.contoso.com from their client computers, the URL resolves to the incorrect IP address.
You need to recommend an approach for resolving serverl.contoso.com correctly from all client computers.
What should you do?
A. Run the ipconfig /registerdns command from the client computers that are experiencing the issue.
B. Add a serverl.contoso.com entry pointing to the fully qualified domain name (FQDN) to the LMHOSTS file on each client computer that is experiencing the issue.
C. Add a serverl.contoso.com entry pointing to the correct IP address to the LMHOSTS file on each client computer that is experiencing the issue.
D. Run the ipconfig /registerdns command from serverl.contoso.com.
Answer: D
Q4. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company's corporate image.
What should you do next?
A. Modify the System Protection properties for the C volume
B. Create a new system restore point
C. Modify the Shadow Copies properties for the C volume
D. Create a new critical volume backup
Answer: A
Q5. All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain.
Malicious software is spreading automatically from removable drives.
You need to ensure that malicious software does not automatically run on the computers.
What should you do?
A. Disable the Windows Installer by using Domain Group Policy.
B. Disable the Autoplay function by using Domain Group Policy.
C. Disable the ActiveX installation policy by using Domain Group Policy.
D. Prevent the installation of unsigned drivers by using Domain Group Policy.
Answer: B
Q6. Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application.
What should you do?
A. Modify the Account Expires options for the Sale Support team user accounts.
B. Instruct the users to reset their passwords by using OWA (Outlook Web Access).
C. Instruct the users to reset their passwords by using the Local Users and Groups snap-in.
D. Modify the Logon Hours options for the Sales Support team user accounts.
Answer: B
Q7. A company has computers running the 64-bit version of Windows 7 Enterprise. All computers are joined to an Active Directory Domain Services (AD DS) domain. All users are part of the local Administrators group.
A user is trying to install a legacy 32-bit application that requires administrative permissions to install. The user reports that the inst.exe installer does not run. Instead, it shows an "access denied" error message and closes. The user does not see a prompt to grant the application permission to make changes to the computer.
You need to ensure that inst.exeruns successfully and can install the application.
What should you do? (Choose all that apply.)
A. Run Disk Defragmenteron the hard disk and then run inst.exe.
B. Modify the properties for inst.exeto run as Administrator.
C. Run the Troubleshoot compatibility wizard for inst.exe.
D. Enable the Administrator account, log on, and then run inst.exe.
E. Advise the user that inst.exe cannot be installed on this system because it is not compatible with 64-bit operating systems.
F. Advise the user that inst.exe cannot be installed on this system because it is not compatible with Windows 7.
Answer: BCD
Q8. All client computers on your company network run Windows 7.
You discover that memory usage on the computers is high.
You need to find the cause of the issue.
What should you do?
A. Run the Windows Memory Diagnostic tool on each computer.
B. Run the Resource Monitor tool and review the content in the Memory tab.
C. Open Action Center and run the Hardware and Devices troubleshooting program.
D. Open Performance Information and Tools and view the Windows Experience Index.
Answer: B
Q9. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 10, Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table:
The corporate security policy states that all domain controllers must have only the following roles:
AD DS
DNS server
DHCP server
Network Configuration
Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application.
Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords.
You need to minimize the number of account lockouts that occur after the users change their passwords.
What should you instruct the users to do?
A. Delete all entries from the Credential Manager vault.
B. Change their passwords and then create a password reset disk.
C. Change their passwords and then configure App2 to log on by using a service account.
D. Change their passwords and then log off and log back on to their computers.
Answer: C
Q10. A corporate environment includes client computers running Windows 7 Enterprise and a DNS server named DNS01. A member server named SERVER01 hosts a website. The client computers are joined to an Active Directory Domain Services (AD DS) domain named contoso.com. DNS is the primary name-resolution protocol in use. There have been no recent changes to the DNS entries. The user of a client computer named PC01 can connect to websites.
However, when the user attempts to connect to server01.contoso.com, the URL resolves to the incorrect IP address. The URL resolves correctly from other client computers. You need to recommend an approach for ensuring that server01.contoso.com resolves correctly from PC01. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Remove the server01.contoso.com entry from the HOSTS file on PC01.
B. Run the ipconfig /flushdns command from PC01.
C. Run the ipconfig /flushdns command from DNS01.
D. Run the ipconfig /registerdns command from SERVER01.
Answer: A
Q11. All client computers on your company network run Windows 7.
Each computer has the following components:
Single quad-core processor
8 GB of RAM
250-GB hard disk drive
The hard disk drive is partitioned into drive C for the operating system and drive D for the user data.
Employees run an application that generates large reports. These reports take too long to generate on the computers. You confirm that processor time and memory are acceptable.
You need to identify why these reports are generating slowly.
You create a User Defined Data Collector Set.
What should you include in this set?
A. Memory\Available Mbytes and Memory\% Committed Bytes In Use counters
B. Process\% Privileged Time and Process\% User Time counters for each processor core
C. Physical Disk\ Avg. Disk Queue Length and Physical Disk\% Disk Time counters for Disk0 of the computers
D. Logical Disk\Free Megabytes and Logical Disk\% Free Space counters for the user data drives of the computers
Answer: C
Q12. Your company has a main office and a branch office.
The network contains an Active Directory forest. All users on the network access the Internet from their computers.
The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network.
When the employee attempts to join the computer to the domain, the connection fails.
A help desk technician reports the following about the employee:
He has a domain user account.
His computer can access Internet Web sites.
His computer can contact domain controllers by using the domain controllers' IP addresses.
You need to ensure that the employee's computer can join the domain. The solution must ensure that the computer can access resources on the Internet.
What should you do?
A. Modify the time zone for the computer.
B. Modify the IPv4 settings on the computer.
C. Create an A record for the computer in an internal DNS zone.
D. Request that an administrator create a prestaged computer account in the domain.
Answer: B
Q13. Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked.
You need to recommend a solution to ensure that user accounts for members of the Sales Support team are automatically unlocked 10 minutes after becoming locked.
What should you recommend?
A. Create a new Group Policy object with a different account lockout policy and link it to the domain.
B. Modify the Unlock Account options for the members of the Sales security group.
C. Create a fine-grained password policy with a different account lockout policy and apply it to the Sales security group.
D. Modify the Account Properties Options properties for the members of the Sales security group.
Answer: C
Q14. Users in the branch office report slow network performance when they connect to the file shares in the main office.
You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs.
What should you recommend implementing?
A. BranchCache
B. DirectAccess
C. Distributed File System Replication (DFSR)
D. Universal Group Membership Caching
Answer: A
Q15. An administrator modifies the external IP address of Web1 and creates a Hosts (A) record for website1.wingtiptoys.com on the external DNS servers.
Your users report that they can no longer connect to website1.wingtiptoys.com from the Internet.
You need to ensure that users can connect to website1.wingtiptoys.com from the Internet.
What should you do?
A. Instruct the users to modify the DNS client settings on their computers.
B. Instruct the users to remove an entry from the Hosts file that is located on their computers.
C. Request that an administrator create a Pointer (PTR) resource record for the new IP address of Web1.
D. Request that an administrator create an alias (CNAME) resource record for website1.wingtiptoys.com .
Answer: B