This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ]
Export date: Fri Jul 19 12:59:06 2019 / +0000 GMT

Microsoft 70-685 New Updated Exam Questions Download From Braindump2go Freely (51-60)



2015 Microsoft 70-685 Certification Exam is coming! Getting a Laest 70-685 Practice Test is very important for an Exam Candiate! Braindump2go New Updated 70-685 Exam Questions Well Formatted in PDF and VCE versions, providing you convenience and excellence both at the same time! Free Questions and Answer are provided Following:

Vendor: Microsoft
Exam Code: 70-685
Exam Name: Pro: Windows 7, Enterprise Desktop Support Technician

QUESTION 51
Several mobile users access the Internet by using cellular connections.
The help desk reports a high volume of calls from mobile users who report the following connection problems:
- When their cellular connections fail, their VPN connections also fail.
- When their cellular connections are reestablished, they must manually connect to the VPN server.
You need to recommend a solution to ensure that the VPN connections are automatically reestablished.
What should you recommend?

A.    Implement an IKEv2 VPN.
B.    Implement an SSTP-based VPN.
C.    Configure credential roaming.
D.    Configure a Kerberos user ticket lifetime.

Answer: A
Explanation:
Internet Key Exchange version 2 (IKEv2) support was added in Windows Server2008R2 and Windows7 to accommodate a new VPN type that supports VPN Reconnect. VPN Reconnect refers to the ability of a VPN connection to survive short interruptions in network connectivity, such as when you move from one wireless access point to another, or when you switch from a wired to a wireless network adapter. By taking advantage of features in IKEv2, even changes in IP address at the client do not drop the VPN connection or require any user actions. As soon as connectivity to the RRAS VPN server is restored, then the VPN tunnel is automatically reestablished.

QUESTION 52
The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer's hard disk drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.
Which tool should you use?

A.    CertUtil.exe
B.    Cipher.exe
C.    Manage-bde.exe
D.    SDelete.exe

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd875513(WS.10).aspx

QUESTION 53
Five users from the main office travel to the branch office.
The users bring their portable computers.
The help desk reports that the users are unable to access any network resources from the branch office.
Branch office users can access the network resources.
You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines.
What should you instruct the help desk to do on the portable computers?

A.    Create a new VPN connection.
B.    Add the users to the local Administrators group.
C.    Add the users to the Network Configuration Operators group.
D.    Configure the alternate configuration for the local area connection.

Answer: D
Explanation:


QUESTION 54
Users report that their DirectAccess connections fail.
You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter.
The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function.
You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly.
What should you do?

A.    Instruct the help desk to enable IPv6 on the users' computers.
B.    Instruct the help desk to modify the users' Windows Firewall settings.
C.    Request that the domain administrator configure the Teredo State Group Policy setting.
D.    Request that the domain administrator configure the Corporate Website Probe URL Group Policy setting.

Answer: D
Explanation:
Troubleshooting item in Control Panel
To focus troubleshooting on DirectAccess and collect additional information, you can use the Connection to a
Workplace Using DirectAccess troubleshooter in the Troubleshooting item of Control Panel.
To start the DirectAccess troubleshooter:
Click Start, and then click Control Panel.
In System and Security, click Find and fix problems.
Click Network and Internet, and then click Connection to a Workplace Using DirectAccess.

Note: For this troubleshooting tool to work correctly, you must configure the Computer Configuration/Policies/Administrative Templates/Network/Network Connectivity Status Indicator/Corporate Website
Probe URL Group Policy setting in the Group Policy object for DirectAccess clients. http://technet.microsoft.com/en-us/library/ee624046(WS.10).aspx

Case Study 3 - A.Datum Corporation (QUESTION 55 - QUESTION 59)
Scenario
You are an enterprise desktop support technician for A.Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table:

The network contains a single Active Directory domain named adatum.com.
Two Group Policy objects (GPOs) are configured as shown in the following table:

The relevant servers in the main office are configured as shown in the following table:

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP.
Windows Firewall is disabled on all client computers.
All computers in the research department have Windows XP Mode and Windows Virtual PC installed.
You deploy a custom Windows XP Mode image to the research department computers.
An application named App1 is installed in the image.
Each research department computer has the following hardware:
- 4-GB of RAM
- Intel Core i7 processor
- 500-GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
- Users without domain accounts must be denied access to internal servers.
- All connections to the company's wireless access points must be encrypted.
- Only employees can be configured to have user accounts in the Active Directory domain.
- The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).

QUESTION 55
Users in the research department report that they cannot run App1 or Windows XP Mode.
You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort.
What should you do?

A.    Approve all Windows 7 updates on WSUS1.
B.    Enable hardware virtualization on the research department computers.
C.    Give each member of the research department a computer that has an Intel Core i5 processor.
D.    Request that a domain administrator create a GPO that configures the Windows Remote Management
(WinRM) settings.

Answer: B
Explanation:
Using WindowsXP Mode, you can run programs that were designed for WindowsXP on computers running: Windows7 Professional, Enterprise, or Ultimate editions.
Requirements:
Download and install Windows Virtual PC
Download and install Wind0ws XP Mode
CPU with Intel-VT or AMD-V technology enabled in the BIOS - hardware virtualization

QUESTION 56
Users in branch office 1 report that they fail to access the company's intranet Web site located on Web1.
They also fail to access Web sites on the Internet.
A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot:

You need to resolve the network connectivity issue.
What are two possible ways to achieve this goal?
(Each correct answer presents a complete solution. Choose two.)

A.    Instruct branch office 1 users to disable IPv6.
B.    Instruct branch office 1 users to run Ipconfig /Renew.
C.    Request that a network administrator configure the DHCP router option for branch office 1.
D.    Request that a network administrator verify DHCP broadcasts are being relayed to the main office.

Answer: BD

QUESTION 57
Datum hires several consultants to work at the main office for six months.
The consultants require Internet access.
The help desk reports that the consultants cannot access the company's wireless network.
You need to ensure that the consultants have wireless access to the Internet.
The solution must adhere to the corporate security policy.
What should you request?

A.    that a wireless access key be given to each consultant
B.    that a user certificate be generated and imported to each consultant's computer
C.    that a computer certificate be generated and imported to each consultant's computer
D.    that a network administrator install a wireless access point that is connected directly to the Internet

Answer: D
Explanation:
Because of the "users without domain accounts" policy.

QUESTION 58
The motherboard on a portable computer fails.
The data on the computer's hard disk drive cannot be recovered.
You need to recommend a solution to ensure that the data on hard disks can be recovered if the motherboard on other portable computers fail
Which two configurations should you recommend?
(Each correct answer presents part of the solution. Choose two.)

A.    Disable BitLocker on all portable computers.
B.    Convert the hard disks on all portable computers to dynamic disks.
C.    Export and securely store the computer certificates on all portable computers.
D.    Configure the BitLocker settings on all portable computers by using Group Policy.

Answer: AD

QUESTION 59
The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing.
What should you request?

A.    that a WSUS administrator generate a Computer Report from WSUS1
B.    that a domain administrator run the Microsoft Baseline Security Analyzer (MBSA)
C.    that a desktop support technician run a Windows Defender scan on each computer
D.    that a desktop support technician generate a System Configuration report for each computer

Answer: B
Explanation:
Microsoft Baseline Security Analyzer (MBSA): to detect common security miss-configurations and missing security updates on your computer systems.

Case Study 4 - Margie's Travel (QUESTION 60 - QUESTION 64)
Scenario
You are an enterprise desktop support technician for Margie's Travel.
Margie's Travel is a company that specializes in booking travel for large corporations.
The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2.
The Active Directory sites are configured as shown in the following table:

All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table:

Security Configuration
The relevant security settings for the domain are configured as shown in the following table:

The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table:

User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers.
All portable computers are members of the MargiesTravelWireless group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies.

QUESTION 60
The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application.
What should you do?

A.    Disable User Account Control (UAC).
B.    Add the users to the local Administrators group.
C.    Request that the application package be re-signed.
D.    Request that the user certificates be issued to the new users.

Answer: A


Braindump2go Promises All our customers: 100% All Exams Pass Or Full Money Back! Our experts have complied the fail proof 70-685 Exam content to help all candidates pass your 70-685 certification exam easily in the first attempt and score the top possible grades too.Do you want to sucess? Come to Braindump2go and our experts team will tell you what you need to do! 70-685 Exam Dumps Full Version Download:

http://www.braindump2go.com/70-685.html

 

 


Post date: 2015-03-26 01:52:01
Post date GMT: 2015-03-26 01:52:01
Post modified date: 2015-03-26 01:52:01
Post modified date GMT: 2015-03-26 01:52:01

Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com