The Secret of 70-685 study guide

Proper study guides for Leading Microsoft Pro: Windows 7, Enterprise Desktop Support Technician certified begins with Microsoft 70-685 preparation products which designed to deliver the High quality 70-685 questions by making you pass the 70-685 test at your first time. Try the free 70-685 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-685 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-685 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-685-exam-dumps.html

Q51. The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers.

The new technician reports that the DHCP snap-in is unavailable on his computer.

You need to ensure that the technician can view the configurations of the DHCP servers.

What should you do?

A. Instruct the technician to customize the Start menu to display the administrative tools.

B. Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.

C. Request that the technician be added to the Server Operators group in Active Directory.

D. Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.

Answer: B


Q52. You need to troubleshoot the remote access issues in the Beijing office.

What should you configure? (Choose all that apply.)

A. the network test resources for DirectAccess Connectivity Assistant (DCA)

B. the external DNS servers to use for name resolution

C. the internal DNS servers to use for name resolution

D. the IPv6 addresses of all DirectAccess servers

E. the IPv4 addresses of all DirectAccess servers

Answer: ACD


Q53. A shared client computer running Windows 7 is responding and loading applications slowly. Windows Task Manager indicates that available memory is low and that several applications, which are not running on the desktop, are using a large amount of memory. You need to recommend an approach for optimizing the performance of the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. Use Task Manager to end unknown processes and processes that are not associated with the currently active user account

B. Log off all users other than the currently active user from the client computer

C. Restart Windows Explorer

D. In the Services Management console, stop unnecessary services

Answer: D


Q54. All client computers on your company network run Windows 7.

An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message:

"Logon failure: unknown user name or bad password."

You need to ensure that the service runs successfully.

What should you do?

A. Add the dedicated account to the local Administrators group.

B. Add the employee user account to the local Administrators group.

C. Reset the employee password and configure it to never expire.

D. Reset the service account password and configure it to never expire.

Answer: D


Q55. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.

The system restore does not restore the computer system settings.

You need to ensure that all future system restores for the computer include system settings.

You reimage the client computer with the company's corporate image.

What should you do next?

A. Modify the System Protection properties for the C volume

B. Create a new system restore point

C. Modify the Shadow Copies properties for the C volume

D. Create a new critical volume backup

Answer: A


Q56. All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 R2 domain.

You need to ensure that data stored on removable drives is encrypted.

What should you do?

A. Set the Removable Disks:Deny write access option by using Group Policy.

B. Set the Control use of BitLocker on removable drives option to Allow users to apply BitLocker on removable drives by using Group Policy.

C. Set the Configure use of passwords for removable data drives option to Require password for removable data drive by using Group Policy.

D. Enable the Deny write access to removable drives not protected by BitLocker option by using Group Policy.

Answer: D


Q57. All client computers on your company network run Windows 7.

A computer is unable to connect to network resources.

The configuration of the computer is as shown in the following table.

You need to ensure that the computer is able to connect to network resources.

What should you do?

A. Change the IP address to 131.107.3.254.

B. Change the subnet mask to 255.255.248.0.

C. Change the default gateway to 131.107.0.1.

D. Change the preferred DNS server to 131.107.3.1.

Answer: C


Q58. An administrator modifies the external IP address of Web1 and creates a Hosts (A) record for website1.wingtiptoys.com on the external DNS servers.

Your users report that they can no longer connect to website1.wingtiptoys.com from the Internet.

You need to ensure that users can connect to website1.wingtiptoys.com from the Internet.

What should you do?

A. Instruct the users to modify the DNS client settings on their computers.

B. Instruct the users to remove an entry from the Hosts file that is located on their computers.

C. Request that an administrator create a Pointer (PTR) resource record for the new IP address of Web1.

D. Request that an administrator create an alias (CNAME) resource record for website1.wingtiptoys.com .

Answer: B


Q59. All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.

You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).

You need to ensure that the following requirements are met:

     All BitLocker recovery keys are stored in a central location.

     Data is encrypted only after a backup of the recovery key is available.

What should you do?

A. Run the manage-bde -on -ForceRecovery command.

B. Enable the Choose default folder for recovery password setting.

C. Enable the Store BitLocker recovery information in Active Directory Domain Services setting.

D. Enable the Choose how users can recover BitLocker encrypted drives setting. Set the 256-bit recovery key to Require recovery password.

Answer: C


Q60. You are troubleshooting recurring performance issues on a Windows 7 client computer.

Each time a performance issue occurs, an associated event log entry is written to the Application event log.

You need to recommend ways to query the Application event log from the command line.

Which commands should you recommend? (Choose all that apply.)

A. wevtutil qe application / rd:true / f:text

B. eventvwr / happlication.evtx

C. wevtutil gl application

D. Get-Event - Eventldentifier =2

E. eventvwr \\localhost

F. Get- WmiObject Win32_NTLogEvent -filter- LogFile 'Application'"

Answer: AEF