Users at the Manufacturing site must have a secondary method of decrypting their existing files if they lose access to their certificate and private key or if the EFS Admin's certificate is not available.
You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them.
What should you recommend that the users do?
A. From the command line, run the cipher.exe /e command.
B. From the command line, run the certutil.exe /backupKey command.
C. Enroll for a secondary EFS certificate.
D. Export their EFS certificates with private keys to an external location.
Answer :
D
Topic 13, Enterprise Company
Background
You are the desktop support technician for an enterprise company. The company offices,
sizes, and platforms are shown in the following table.
Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked.
You need to recommend a solution to ensure that user accounts for members of the Sales
Support team are automatically unlocked 10 minutes after becoming locked.
What should you recommend?
Answer : C
Explanation:
http://www.adaxes.com/tutorials_ActiveDirectoryManagement_ManageFineGrainedPasswo rdPolicies.htm
You are expanding the wireless functionality by creating a guest wireless network based on the new company requirements.
You need to ensure that users can connect automatically without providing credentials.
Which security type should you use?
Answer : A
The company's help desk technicians spend a significant amount of time researching whether remote access issues are related to the corporate network or to Accounting group users' Internet connectivity.
You need to recommend a solution that minimizes time spent indentifying the cause of the remote access issues.
What should you recommend?
Answer : A
Explanation:
http://technet.microsoft.com/en-us/library/ff384241.aspx
http://technet.microsoft.com/en-us/library/gg313782.aspx
You need to troubleshoot the remote access issues in the Beijing office.
What should you configure? (Choose all that apply.)
Answer : A,C,D
You plan to join Athens client computers to the AD DS domain.
The Athens client computers connect to the network via a wireless connection.
You need to ensure that the Athens client computers can be joined to the domain.
What should you recommend?
Answer : A
Explanation:
http://technet.microsoft.com/en-us/library/ff919501(WS.10).aspx
One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company's corporate image.
What should you do next?
Answer : A
After you modify Corp GPO, users cannot log on to their computers.
You need to ensure that users can log on to their computers.
What should you do? (Choose all that apply.)
Answer : A,C
Explanation:
Might be related to Exam B Question 12 Topic 13, Enterprise Company no sure about answer
You install an application on one of the company's test computers.
The application fails to run and is affecting other applications. You are unable to uninstall the application successfully.
You need to remove the application from the test computer without modifying user documents.
What should you do?
Answer : C
Explanation:
changed the answer from A. to C.
Chapter 9 Lesson 2 p 356 -
Sometimes installing a program or driver can make Windows run slowly or unpredictably.
System Restore can return your PC's system files and programs to a time when everything was working fine, potentially preventing hours of troubleshooting headaches. It won't affect your documents, pictures, or other data.
Windows 7 System Restore utilityhas nowmerged with the Windows Backup utility. You can now use System
Restore with Advance recovery to restore thesystem using previously created System
Images or evenrestore your computer to its original settings. http://windows.microsoft.com/en-US/windows7/products/features/system-restore http://www.windows7news.com/2009/09/25/how-to-use-windows-7-system-restore/
You deploy a WAP in the company's Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.IX authentication server that is used to authenticate wireless connections.
You need to ensure that the wireless authentication meets the company's requirements.
Which security option should you configure the wireless connections to use?
Answer : A
Explanation:
Chapter 2 Lesson 3 p 86 90 -
http://www.youtube.com/watch?v=g-0MM_tK-Tk
You are deploying a WAP in one of the company's locations.
You need to ensure that wireless connectivity meets the company's requirements.
What should you recommend? (Choose all that apply.)
Answer : A,C
Explanation:
Might be related to Exam B Question 12 Topic 13, Enterprise Company no sure about answers
You deploy a WAP in one of the company locations. Client computers connect to it by using the WiFi GPO.
You need to ensure that users cannot change the network location for the connection.
Which policy should you define?
Answer : C
Explanation:
Chapter 7 p 346 348 -
Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application.
What should you do?
Answer : B
Explanation:
B. The pc's are not part of the domain so the users need a way to reset their AD password.
Topic 14, Mixed Questions -
Your company has an Active Directory Domain Services domain named contoso.com. All client computers run Windows 7 and are members of the contoso.com domain.
All computers are configured to use a proxy server as shown in the exhibit. (Click the
Exhibit button.)
Answer : C
A company has client computers that run Windows 7 Enterprise.
Malicious files have caused a client computer to become unresponsive. You delete the suspicious files. On reboot, the suspicious files reappear.
You need to ensure that the malicious files are removed from the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer :