70-685 v57.1 (70-685)

Page:    1 / 13   
Total 191 questions

Users at the Manufacturing site must have a secondary method of decrypting their existing files if they lose access to their certificate and private key or if the EFS Admin's certificate is not available.
You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them.
What should you recommend that the users do?
A. From the command line, run the cipher.exe /e command.
B. From the command line, run the certutil.exe /backupKey command.
C. Enroll for a secondary EFS certificate.
D. Export their EFS certificates with private keys to an external location.



Answer : D Topic 13, Enterprise Company Background You are the desktop support technician for an enterprise company. The company offices, sizes, and platforms are shown in the following table.

The Beijing office has been experiencing remote access issues. The companys client computers run Windows Vista and Windows 7. The company is in the process of upgrading the Windows Vista client computers to Windows 7. All client computers have two volumes, as shown in the following table.
The company's password policy is shown in the following table.
The companys account lockout policy is shown in the following table.
Software Environment ? The company has a single Active Directory Domain Services (AD DS) forest with one domain. All domain controllers run Windows Server 2008 R2. The forest and domain functional levels are set to Windows Server 2008 R2. ? The company outsources sales support to a third party. ? Each member of the Sales Support team has an AD DS user account in a global security group named Sales. ? The Sales security group and the AD DS user accounts for the Sales Support team reside in an organizational unit (OU) named Sales Support. ? Members of the Sales Support team do not use domain-joined client computers. ? With the exception of the Sales Support team, all user accounts reside in an OU named Employees. ? All client computers reside in an OU named Client Computers. ? A global security group named Accounting contains users with domain accounts. They use portable computers running Windows 7 that are joined to the domain. ? The company uses DirectAccess for remote access connectivity. Windows 7 domain-joined computers have been configured to use DirectAccess. ? The company uses Microsoft Exchange and Outlook Web App (OWA) for email and

Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked.
You need to recommend a solution to ensure that user accounts for members of the Sales
Support team are automatically unlocked 10 minutes after becoming locked.
What should you recommend?

  • A. Create a new Group Policy object with a different account lockout policy and link it to the domain.
  • B. Modify the Unlock Account options for the members of the Sales security group.
  • C. Create a fine-grained password policy with a different account lockout policy and apply it to the Sales security group.
  • D. Modify the Account Properties Options properties for the members of the Sales security group.


Answer : C

Explanation:
http://www.adaxes.com/tutorials_ActiveDirectoryManagement_ManageFineGrainedPasswo rdPolicies.htm

You are expanding the wireless functionality by creating a guest wireless network based on the new company requirements.
You need to ensure that users can connect automatically without providing credentials.
Which security type should you use?

  • A. No Authentication (Open)
  • B. WEP
  • C. WPA
  • D. Shared
  • E. WPA2 Enterprise


Answer : A

The company's help desk technicians spend a significant amount of time researching whether remote access issues are related to the corporate network or to Accounting group users' Internet connectivity.
You need to recommend a solution that minimizes time spent indentifying the cause of the remote access issues.
What should you recommend?

  • A. Deploy the DirectAccess Connectivity Assistant on the Accounting group's portable computers.
  • B. Deploy the DirectAccess Connectivity Assistant on the help desk technicians' computers.
  • C. Enable Windows Firewall logging on DirectAccess servers.
  • D. Enable Windows Firewall logging on the portable computers.


Answer : A

Explanation:
http://technet.microsoft.com/en-us/library/ff384241.aspx
http://technet.microsoft.com/en-us/library/gg313782.aspx

You need to troubleshoot the remote access issues in the Beijing office.
What should you configure? (Choose all that apply.)

  • A. the network test resources for DirectAccess Connectivity Assistant (DCA)
  • B. the external DNS servers to use for name resolution
  • C. the internal DNS servers to use for name resolution
  • D. the IPv6 addresses of all DirectAccess servers
  • E. the IPv4 addresses of all DirectAccess servers


Answer : A,C,D

You plan to join Athens client computers to the AD DS domain.
The Athens client computers connect to the network via a wireless connection.
You need to ensure that the Athens client computers can be joined to the domain.
What should you recommend?

  • A. Create a bootstrap wireless profile for the client computers.
  • B. Configure Windows Deployment Services with PXE.
  • C. Create a domain wireless profile for the client computers.
  • D. Configure Remote Installation Services with PXE.


Answer : A

Explanation:
http://technet.microsoft.com/en-us/library/ff919501(WS.10).aspx

One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company's corporate image.
What should you do next?

  • A. Modify the System Protection properties for the C volume
  • B. Create a new system restore point
  • C. Modify the Shadow Copies properties for the C volume
  • D. Create a new critical volume backup


Answer : A

After you modify Corp GPO, users cannot log on to their computers.
You need to ensure that users can log on to their computers.
What should you do? (Choose all that apply.)

  • A. Modify Corp GPO so that the default rules are created
  • B. Log off the client computers and log back on
  • C. Restart the client computers
  • D. Modify Corp GPO so that all rules are deleted


Answer : A,C

Explanation:
Might be related to Exam B Question 12 Topic 13, Enterprise Company no sure about answer

You install an application on one of the company's test computers.
The application fails to run and is affecting other applications. You are unable to uninstall the application successfully.
You need to remove the application from the test computer without modifying user documents.
What should you do?

  • A. Restart the test computer by using in Last Known good Configuration
  • B. Use Windows Backup to restore the test computer
  • C. Use System Restore to restore the test computer
  • D. Restart the test computer in Safe Mode


Answer : C

Explanation:
changed the answer from A. to C.

Chapter 9 Lesson 2 p 356 -
Sometimes installing a program or driver can make Windows run slowly or unpredictably.
System Restore can return your PC's system files and programs to a time when everything was working fine, potentially preventing hours of troubleshooting headaches. It won't affect your documents, pictures, or other data.
Windows 7 System Restore utilityhas nowmerged with the Windows Backup utility. You can now use System
Restore with Advance recovery to restore thesystem using previously created System
Images or evenrestore your computer to its original settings. http://windows.microsoft.com/en-US/windows7/products/features/system-restore http://www.windows7news.com/2009/09/25/how-to-use-windows-7-system-restore/

You deploy a WAP in the company's Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.IX authentication server that is used to authenticate wireless connections.
You need to ensure that the wireless authentication meets the company's requirements.
Which security option should you configure the wireless connections to use?

  • A. WPA-Enterprise
  • B. WEP
  • C. WPA2-Personal
  • D. No authentication (Open)


Answer : A

Explanation:

Chapter 2 Lesson 3 p 86 90 -
http://www.youtube.com/watch?v=g-0MM_tK-Tk

You are deploying a WAP in one of the company's locations.
You need to ensure that wireless connectivity meets the company's requirements.
What should you recommend? (Choose all that apply.)

  • A. Link the GPO to an OU that contains all client computer accounts.
  • B. Create a GPO and define an IP Security policy.
  • C. Create a GPO and define a Wireless Network (IEEE 802.IX) policy.
  • D. Create a GPO and define a Network List Manager policy.
  • E. Link the GPO to an OU that contains all user accounts.


Answer : A,C

Explanation:
Might be related to Exam B Question 12 Topic 13, Enterprise Company no sure about answers

You deploy a WAP in one of the company locations. Client computers connect to it by using the WiFi GPO.
You need to ensure that users cannot change the network location for the connection.
Which policy should you define?

  • A. Wireless Network (IEEE 802.11)
  • B. IP Security
  • C. Network List Manager
  • D. Windows Firewall with Advanced Security


Answer : C

Explanation:

Chapter 7 p 346 348 -

Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application.
What should you do?

  • A. Modify the Account Expires options for the Sale Support team user accounts.
  • B. Instruct the users to reset their passwords by using OWA (Outlook Web Access).
  • C. Instruct the users to reset their passwords by using the Local Users and Groups snap-in.
  • D. Modify the Logon Hours options for the Sales Support team user accounts.


Answer : B

Explanation:
B. The pc's are not part of the domain so the users need a way to reset their AD password.

Topic 14, Mixed Questions -

Your company has an Active Directory Domain Services domain named contoso.com. All client computers run Windows 7 and are members of the contoso.com domain.
All computers are configured to use a proxy server as shown in the exhibit. (Click the
Exhibit button.)


An internal SSL Web application named Webapp1 does not run properly when it is accessed through a proxy server.
Employees type https://Webapp1.contoso.com into their browsers and attempt to run the
Web application. They are still unable to run the application.
You need to ensure that employees can run the Web application.
What should you do?

  • A. Add https: //Webapp1 to the Exceptions list.
  • B. Clear the Bypass proxy server for local addresses check box.
  • C. Instruct employees to type https: //Webapp1 into their browsers.
  • D. Instruct employees to type http: //Webapp1.contoso.com into their browsers.


Answer : C

A company has client computers that run Windows 7 Enterprise.
Malicious files have caused a client computer to become unresponsive. You delete the suspicious files. On reboot, the suspicious files reappear.
You need to ensure that the malicious files are removed from the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




Answer :

Page:    1 / 13   
Total 191 questions