Q1. Your company has a main office and a branch office.
The network contains a single Active Directory domain. All computers are members of the domain.
Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications.
From your computer, you need to identify the application that uses the most processor on the computers.
Which tool should you use?
A. Performance Monitor
B. Reliability Monitor
C. Resource Monitor
D. System Information
Answer: A
Q2. A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report that they are unable to connect to the wireless network in office 1 from their portable computers.
A help desk administrator manually provides the users with access to the wireless network. You need to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless network in office 1.
What should you request?
A. Link GPO1 to Office2-Users-OU.
B. Link GPO1 to Office2-Computers-OU.
C. Change the office attribute for the user accounts.
D. Change the location attribute for the computer accounts.
Answer: B
Q3. Twenty new laptop computers are joined to the domain.
Users of the new laptops report that they can access the Exchange server, but they cannot access file shares or internal Web sites when they are outside of the office.
Other remote users can access file shares and internal Web sites when they are outside of the office.
You need to ensure that users of the new laptops can access file shares and Web sites on the internal network when they are outside of the office.
What should you request?
A. new user certificates for the laptop users
B. new computer certificates for the laptops
C. the user accounts for the laptop users be added to the Baldwin\Direct Access group
D. the computer accounts for the laptops be added to the Baldwin\Direct Access group
Answer: D
Q4. All client computers on your company network run Windows 7.
The preview displayed in the Content view of Windows Explorer and the Search box is considered a security risk by your company.
You need to ensure that documents cannot be previewed in the Content view.
What should you do?
A. Change the Windows Explorer view to the List view and disable all Search indexes.
B. Set Group Policy to enable the Remove See More Results/Search Everywhere link setting.
C. Set Group Policy to enable the Turn off the display of snippets in Content view mode setting.
D. Set Group Policy to enable the Turn off display of recent search entries in the Windows Explorer search box setting.
Answer: C
Q5. The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN.
You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue.
What should you recommend?
A. Deploy a Network Policy Server (NPS).
B. Replace the SSTP-based VPN with a PPTP-based VPN.
C. Issue computer certificates from a trusted root certification authority (CA) to all remote users.
D. Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.
Answer: D
Q6. All client computers on your company network run Windows 7.
An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message:
"Logon failure: unknown user name or bad password."
You need to ensure that the service runs successfully.
What should you do?
A. Add the dedicated account to the local Administrators group.
B. Add the employee user account to the local Administrators group.
C. Reset the employee password and configure it to never expire.
D. Reset the service account password and configure it to never expire.
Answer: D
Q7. Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed.
A help desk technician reports that the problem is related to installed applications.
You need to recommend a solution that identifies the applications that run during the startup process.
What should you recommend?
A. Event Forwarding
B. MSConfig.exe
C. Problem Steps Recorder
D. Reliability Monitor
Answer: B
Q8. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 8, Fourth Coffee
Scenario:
You are an enterprise desktop support technician for Fourth Coffee.
The network contains a single domain named fourthcoffee.com.
Physical Environment
The Web1 server is accessible only through the URL http://web1.fourthcoffee.local.
Application Configurations
Fourth Coffee deploys an application named App1 to users in the main office by using a Group Policy Object (GPO) named APP1Deploy.
App1 requires that a drive named M be mapped to \\AppServer1\AppData$.
App1 saves information on a local computer if drive M is unavailable.
All client computers have drive M.
Security Policy
The corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center.
Client Configuration
All users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections.
All client computers receive IP configurations from DHCP.
You recently purchased 100 desktop computers from a new hardware vendor.
The application support team reports that the App1 data of some users is not saved to AppServer1.
The team reports that the users deleted the mapped drive.
You need to prevent the users from deleting the mapped drive.
Which settings should you request be modified in the APP1Deploy GPO?
The application support team reports that the App1 data of some users is not saved to AppServer1. The team reports that the users deleted the mapped drive.
You need to prevent the users from deleting the mapped drive.
Which settings should you request be modified in the APP1Deploy GPO?
A. Administrative Templates
B. AppLocker
C. Group Policy Preferences
D. Software Restriction Policies
Answer: C
Q9. All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain.
Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology.
You need to ensure that portable computers can connect to the broadband GSM network.
Which service should be enabled on the portable computers?
A. WLAN AutoConfig
B. WWAN AutoConfig
C. Computer Browser
D. Portable Device Enumerator Service
Answer: B
Q10. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 1, Consolidated Messenger
Scenario:
You are an enterprise desktop support technician for Consolidated Messenger.
Network Configuration
The company has three offices named Office1, Office2, and Office3. The offices connect to each other over the Internet by using VPN connections. Each office has an 802.11g wireless access point. All wireless access points are configured to use Radius01 for authentication.
Active Directory Configuration
The network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram:
Client Configuration
Each office has 500 desktop computers that run Windows 7 Enterprise.
There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise.
To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices.
Printers
The marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures.
The chief financial officer (CFO) releases new guidelines that specify that only users from Finance are allowed to run FinanceApp1.
Users in the Marketing OU report that they can run FinanceApp1.
You need to ensure that only users in the Finance OU can run FinanceApp1.
What should you do?
A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.
Answer: A