70-685 Exam - Pro: Windows 7, Enterprise Desktop Support Technician

certleader.com

Q1. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.

The system restore does not restore the computer system settings.

You need to ensure that all future system restores for the computer include system settings.

You reimage the client computer with the company's corporate image.

What should you do next?

A. Modify the System Protection properties for the C volume

B. Create a new system restore point

C. Modify the Shadow Copies properties for the C volume

D. Create a new critical volume backup

Answer: A

Q2. Your company has a main office and a branch office.

The network contains a single Active Directory domain. All computers are members of the domain.

Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications.

From your computer, you need to identify the application that uses the most processor on the computers.

Which tool should you use?

A. Performance Monitor

B. Reliability Monitor

C. Resource Monitor

D. System Information

Answer: A

Q3. Users report that it takes a long time to access resources by using DirectAccess.

You need to provide the network administrator with a network capture of DirectAccess traffic.

Which tool should you use?

A. Netsh.exe

B. Netstat.exe

C. Perfmon.exe

D. Winsat.exe

Answer: A

Q4. Your network contains a wired network and a wireless network.

Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network.

You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network.

You need to ensure that the users only connect to the internal wireless network.

What should you do?

A. Configure a Windows Connect Now Group Policy.

B. Configure a Wireless Network (IEEE 802.11) Policy.

C. Delete the rogue network from the Network and Sharing Center on each computer.

D. Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

Answer: B

Q5. You have a development network that you use for testing purposes. The development network contains an Active Directory domain.

Users have computers that run Windows 7. The users have several virtual machines that run Windows 7. The virtual machines are joined to Active Directory.

Several users report that when they discard changes on the virtual machines, and then attempt to log on to the machines, they sometimes receive the following error message:

You need to prevent this error from recurring.

What should you do?

A. Create a Password Setting object (PSO) in Active Directory.

B. Modify the security settings by using a Group Policy object (GPO).

C. On the virtual machines, create a password reset disk.

D. On the virtual machines, modify the User Account Control (UAC) settings.

Answer: B

Q6. The help desk reports that several client computers in branch office 1 are missing security updates.

You need to identify which security updates are missing.

What should you request?

A. that a WSUS administrator generate a Computer Report from WSUS1

B. that a domain administrator run the Microsoft Baseline Security Analyzer (MBSA)

C. that a desktop support technician run a Windows Defender scan on each computer

D. that a desktop support technician generate a System Configuration report for each computer

Answer: B

Q7. All client computers on your company network run Windows 7.

The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors.

You need to capture only the relevant data to generate a report.

What should you do?

A. Open Event Viewer and sort by Source.

B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.

C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.

D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.

Answer: B

Q8. You need to recommend a solution to back up BitLocker recovery information based on the company's existing data protection requirements. The solution must include the backup destination and the solution prerequisites.

What should you recommend? (Choose all that apply.)

A. Upgrade all Windows XP client computers to Windows 7.

B. Store the BitLocker recovery information in Active Directory.

C. Create a GPO to enroll users for a Basic EFS certificate automatically.

D. Raise the forest functional level to Windows Server 2008 R2.

E. Store each user's BitLocker recovery information on USB keychain drives.

F. Import the BitLockerTPMSchemaExtension.ldf file to Active Directory.

Answer: BF

Q9. When visiting certain websites, users receive a message in Internet Explorer. 

The message is shown in the exhibit:

You need to ensure that the Internet Explorer settings for all client computers follow company requirements.

What should you modify in Group Policy?

Exhibit:

A. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Turn on Protected Mode setting.

B. Disable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.

C. Enable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.

D. Disable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.

E. Enable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.

F. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Do not prompt for client certificate selection when no certificate or only one certificate setting.

Answer: C

Q10. A company has computers running the 64-bit version of Windows 7 Enterprise. All computers are joined to an Active Directory Domain Services (AD DS) domain. All users are part of the local Administrators group.

A user is trying to install a legacy 32-bit application that requires administrative permissions to install. The user reports that the inst.exe installer does not run. Instead, it shows an "access denied" error message and closes. The user does not see a prompt to grant the application permission to make changes to the computer.

You need to ensure that inst.exeruns successfully and can install the application.

What should you do? (Choose all that apply.)

A. Run Disk Defragmenteron the hard disk and then run inst.exe.

B. Modify the properties for inst.exeto run as Administrator.

C. Run the Troubleshoot compatibility wizard for inst.exe.

D. Enable the Administrator account, log on, and then run inst.exe.

E. Advise the user that inst.exe cannot be installed on this system because it is not compatible with 64-bit operating systems.

F. Advise the user that inst.exe cannot be installed on this system because it is not compatible with Windows 7.

Answer: BCD