It is impossible to pass Microsoft 70-685 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft 70-685 practice questions. You will get a surprising result by our Refresh Pro: Windows 7, Enterprise Desktop Support Technician practice guides.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-685 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-685 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-685-exam-dumps.html
Q61. All client computers on your company network were recently migrated from Windows XP to Windows 7.
Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7-compatible version is developed.
A security update is made for this application. The update must be tested and then deployed as a new version of the application.
During testing you are unable to install the application.
You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment.
What should you do?
A. Disable UAC prompts.
B. Run the .msi file from an elevated command prompt.
C. Modify the shim to apply to all versions of the application.
D. Modify the shim to apply only to the new version of the application.
Answer: D
Q62. Your company has a main office and a branch office.
A user from the branch office reports that he receives stop errors on his desktop computer.
A help desk technician reports that the errors are caused by a defective internal smart card reader. You plan to remove the smart card reader next week.
You need to recommend a solution that prevents the stop errors from re-occurring when the computer is restarted.
What should you recommend?
A. Modify the Data Execution Protection (DEP) settings.
B. From Device Manager, disable the smart card reader.
C. From Device Manager, uninstall the smart card reader.
D. From the Trusted Platform Management (TPM) console, turn off TPM.
Answer: B
Q63. All client computers on your company network run Windows 7 and all servers on your company network run Windows Server 2008. The computers and the servers are members of an Active Directory Domain Services domain. A network administrator moves the Internet Information Services (IIS) server to a different network segment and configures the appropriate network settings.
Employees are unable to connect to the IIS server.
You confirm that the network settings are appropriate.
You need to ensure that all employees are able to connect to the IIS server.
What should you do?
A. Restart the DNS Client service on the DNS servers.
B. Restart the DNS Server service on the DNS servers.
C. Run the nbtstat r command on the employees' computers.
D. Run the ipconfig /flushdns command on the employees' computers.
Answer: D
Q64. Users report that it takes a long time to access resources by using DirectAccess.
You need to provide the network administrator with a network capture of DirectAccess traffic.
Which tool should you use?
A. Netsh.exe
B. Netstat.exe
C. Perfmon.exe
D. Winsat.exe
Answer: A
Q65. A corporate environment includes client computers running Windows 7 Enterprise. The hard drives of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating system of a client computer is not found. You are unable to repair the operating system. You need to recommend an approach for salvaging data from the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Use the BitLocker Active Directory Recovery Password Viewer.
B. Use the BitLocker Drive Encryption Recovery Console.
C. Use a data recovery agent.
D. Use the BitLocker Repair Tool.
Answer: D
Q66. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 9, Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table:
The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily.
A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the hosts file that is located on each client computer.
Users frequently work from home. Home users connect to the internal network by using SSTP- based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7.
You deploy App1 on a test Windows 7 computer and notice that it fails to run.
You need to ensure that App1 runs on Windows 7 computers.
What should you do?
A. Digitally sign App1.
B. Develop and deploy a shim for App1.
C. Configure an AppLocker policy.
D. Configure a Software Restriction Policy.
Answer: B
Q67. All client computers on your company network run Windows 7. A standard Windows 7 image is loaded on all new computers on the network.
A department in your company purchases several tablet computers. Employees report that the pen interface does not work on the tablet computers.
You need to ensure that employees can use the pen interface.
What should you do?
A. Turn on the Media Features.
B. Turn on the Tablet PC Components.
C. Start the WMI Performance Adapter service and set it to Automatic.
D. Start the Human Interface Device Access service and set it to Automatic.
Answer: B
Q68. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 10, Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table:
The corporate security policy states that all domain controllers must have only the following roles:
AD DS
DNS server
DHCP server
Network Configuration
Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application.
Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords.
You need to minimize the number of account lockouts that occur after the users change their passwords.
What should you instruct the users to do?
A. Delete all entries from the Credential Manager vault.
B. Change their passwords and then create a password reset disk.
C. Change their passwords and then configure App2 to log on by using a service account.
D. Change their passwords and then log off and log back on to their computers.
Answer: C
Q69. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain.
The help desk reports that several computers that run Windows 7 Enterprise have bad sectors on their hard disks.
You need to minimize the loss of data on the computers caused by storing data on the bad sectors.
Which command should you run?
A. chkdsk.exe /r
B. chkdsk.exe /f
C. defrag.exe /c
D. defrag.exe /x
Answer: A
Q70. Your company has an Active Directory Domain Services domain named contoso.com. All client computers run Windows 7 and are members of the contoso.com domain.
All computers are configured to use a proxy server as shown in the exhibit:
An internal SSL Web application named Webapp1 does not run properly when it is accessed through a proxy server.
Employees type https://Webapp1.contoso.com into their browsers and attempt to run the Web application.They are still unable to run the application.
You need to ensure that employees can run the Web application.
What should you do?
Exhibit:
A. Add https: //Webapp1 to the Exceptions list.
B. Clear the Bypass proxy server for local addresses check box.
C. Instruct employees to type https: //Webapp1 into their browsers.
D. Instruct employees to type http: //Webapp1.contoso.com into their browsers.
Answer: C