Tips to Pass 70-685 Exam (41 to 50)

Proper study guides for Renovate Microsoft Pro: Windows 7, Enterprise Desktop Support Technician certified begins with Microsoft 70-685 preparation products which designed to deliver the Accurate 70-685 questions by making you pass the 70-685 test at your first time. Try the free 70-685 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-685 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-685 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-685-exam-dumps.html

Q41. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.

Topic 7, Contoso, Ltd.

Scenario:

You are an enterprise desktop support technician for Contoso, Ltd.

IP Addressing

Contoso has one office. The IP addressing for Contoso is configured as shown in the following table:

A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication.

Printer Configuration

Network printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers.

Client Computer Configuration

Most users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise.

The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain.

All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1.

The help desk reports that several users use the previous version of App1, which causes some data to become corrupt.

You need to recommend a solution to prevent all users from using the previous version of App1.

What should you recommend?

A. that a domain administrator create a GPO linked to the domain and configure AppLocker settings in the GPO

B. that a domain administrator create a GPO linked to the domain and configure Software Installation settings in the GPO

C. that the new version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer

D. that the previous version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer

Answer: A


Q42. The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN.

You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue.

What should you recommend?

A. Deploy a Network Policy Server (NPS).

B. Replace the SSTP-based VPN with a PPTP-based VPN.

C. Issue computer certificates from a trusted root certification authority (CA) to all remote users.

D. Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.

Answer: D


Q43. A corporate environment includes client computers running Windows 7 Enterprise. You find an unknown service installed on a client computer. You suspect that the client computer has been infected with malicious software. You need to recommend an approach for identifying and terminating processes the service is running. What is the best approach to achieve the goals? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. Run Windows Defender

B. Run Windows Task Manager

C. Run the Services Management console

D. Run Action Center

Answer: A


Q44. All client computers on your company network were recently migrated from Windows XP to Windows 7.

Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7-compatible version is developed.

A security update is made for this application. The update must be tested and then deployed as a new version of the application.

During testing you are unable to install the application.

You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment.

What should you do?

A. Disable UAC prompts.

B. Run the .msi file from an elevated command prompt.

C. Modify the shim to apply to all versions of the application.

D. Modify the shim to apply only to the new version of the application.

Answer: D


Q45. Five users from the main office travel to the branch office. The users bring their portable computers.

The help desk reports that the users are unable to access any network resources from the branch office.

Branch office users can access the network resources.

You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines.

What should you instruct the help desk to do on the portable computers?

A. Create a new VPN connection.

B. Add the users to the local Administrators group.

C. Add the users to the Network Configuration Operators group.

D. Configure the alternate configuration for the local area connection.

Answer: D


Q46. A company has a main office and a branch office. The network contains a single Active Directory domain. All computers are members of the domain.

Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications.

From your computer, you need to identify the application that consumes the most processor resources on the computers.

Which tool should you use?

A. Event Viewer

B. Performance Monitor

C. CPU Meter gadget

D. Task Manager

Answer: B


Q47. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.

Topic 3, A. Datum Corporation

Scenario:

You are an enterprise desktop support technician for A. Datum Corporation.

Active Directory Configuration

The company has three offices. The offices are configured as shown in the following table:

Wireless Network

A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.

Client Configuration

All client computers run Windows 7 Enterprise and are configured to use DHCP. 

Windows Firewall is disabled on all client computers.

All computers in the research department have Windows XP Mode and Windows Virtual PC installed. 

You deploy a custom Windows XP Mode image to the research department computers.

An application named App1 is installed in the image.

Each research department computer has the following hardware:

     4-GB of RAM

     Intel Core i7 processor

     500-GB hard disk drive

Corporate Security Policy

The corporate security policy includes the following requirements:

Users without domain accounts must be denied access to internal servers.

All connections to the company's wireless access points must be encrypted.

Only employees can be configured to have user accounts in the Active Directory domain.

The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).

Users in the research department report that they cannot run App1 or Windows XP Mode.

You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort.

What should you do?

A. Approve all Windows 7 updates on WSUS1.

B. Enable hardware virtualization on the research department computers.

C. Give each member of the research department a computer that has an Intel Core i5 processor.

D. Request that a domain administrator create a GPO that configures the Windows Remote Management (WinRM) settings.

Answer: B


Q48. At 08:00 on a Tuesday morning, an administrator in Site 3 takes DC3 offline to update the server.

Users in Site 3 report that they cannot log on to their computers. The users receive the following error message: "Your account has time restrictions that prevent you from logging on at this time. Please try again later."

You need to ensure that all users can log on to their computers when DC3 is offline for maintenance. Your solution must adhere to the corporate security policies.

What should you do?

A. Modify the logon hours for all users in Site 3.

B. Change the time zone settings for all client computers in Site 3 to UTC-05:00.

C. Request that a second domain controller be deployed in Site 3.

D. Request that the time zone settings for DC1 and DC2 be changed to UTC-08:00.

Answer: C


Q49. All client computers on your company network run Windows 7. Employees use Windows Internet Explorer 8 to access Web sites. You discover that some computers are infected with malicious software.

Employees are able to access Web sites that might have been compromised by malicious software.

You need to configure the settings in Internet Explorer 8 to prevent malicious software from being installed on the computers.

What should you do?

A. Configure Popup Blocker.

B. Configure SmartScreen Filter.

C. Add the sites to the Local intranet zone.

D. Add company-approved Web sites to the Compatibility View List.

Answer: B


Q50. All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain.

Malicious software is spreading automatically from removable drives.

You need to ensure that malicious software does not automatically run on the computers.

What should you do?

A. Disable the Windows Installer by using Domain Group Policy.

B. Disable the Autoplay function by using Domain Group Policy.

C. Disable the ActiveX installation policy by using Domain Group Policy.

D. Prevent the installation of unsigned drivers by using Domain Group Policy.

Answer: B