Q1. A corporate environment includes client computers running Windows 7 Enterprise. The hard drives of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating system of a client computer is not found. You are unable to repair the operating system. You need to recommend an approach for salvaging data from the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Use the BitLocker Active Directory Recovery Password Viewer.
B. Use the BitLocker Drive Encryption Recovery Console.
C. Use a data recovery agent.
D. Use the BitLocker Repair Tool.
Answer: D
Q2. All client computers on your company network run Windows 7. Each computer has four 1-GB RAM modules and a single physical disk.
When the employees run a three-dimensional (3-D) design application that extensively uses the RAM, they experience slow performance on their computers.
You discover that the swap files on the computers are extensively used.
You need to improve the performance of the computers.
What should you do?
A. Disable the hardware acceleration setting on the computers.
B. Replace the four 1-GB RAM modules on the computers with two 2-GB RAM modules.
C. Move the page file to the same directory that contains the executable file for the 3-D design application.
D. Configure the virtual memory on the computers so that the initial size of the virtual memory is equal to the maximum size of the virtual memory.
Answer: D
Q3. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 2, City Power & Light
Scenario:
You are an enterprise desktop support technician for City Power & Light.
City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees.
Active Directory Configuration
The network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2.
Server Configuration
All servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table:
All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses.
User Information
All user accounts are standard user accounts.
All client computers run Windows 7 Enterprise.
Each portable computer has a PPT P-based VPN connection to the internal network.
Corporate Security Guidelines
All users must be granted the least privileges possible.
All locally stored documents must be encrypted by using Encrypting File System (EFS).
The hard disk drives on all port able computers must be encrypted by using Windows BitLocker Drive
Encryption (BitLocker).
All encryption certificates must be stored on smart cards.
The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines.
What should you recommend?
A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.
Answer: A
Q4. A new client computer was joined recently to the company domain. However, it does not have the latest Windows updates installed.
You need to ensure that the client computer uses the company's enterprise update distribution servers to install the latest Windows updates immediately.
What should you do?
A. Start the Windows Installer service.
B. Run the wuauclt.exe /resetauthorization command.
C. Run the wuauclt.exe /detectnow command.
D. Run the net start Trustedlnstaller command.
Answer: C
Q5. All client computers on your company network run Windows 7.
After the installation of a third-party defragmentation tool, several employees are unable to start their portable computers in normal or safe modes.
The Original Equipment Manufacturer (OEM) recovery partition is not installed on the computers. The Boot Configuration Database (BCD) has also been corrupted.
You need to repair the BCD so that the computers can start.
What should you do?
A. Create a new system repair disc and run the System Image Recovery tool on the employee computers.
B. Create a new system repair disc and run the Startup Repair recovery tool on the employee computers.
C. Start each computer from the installation DVD. Select the Last Known Good Configuration advanced boot option.
D. Start each computer from the installation DVD. In the System Recovery Options dialog box, select the System Restore recovery tool.
Answer: B
Q6. All client computers on your company network run Windows 7.
The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors.
You need to capture only the relevant data to generate a report.
What should you do?
A. Open Event Viewer and sort by Source.
B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.
C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.
D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.
Answer: B
Q7. You install an application on one of the company's test computers.
The application fails to run and is affecting other applications. You are unable to uninstall the application successfully.
You need to remove the application from the test computer without modifying user documents.
What should you do?
A. Restart the test computer by using in Last Known good Configuration
B. Use Windows Backup to restore the test computer
C. Use System Restore to restore the test computer
D. Restart the test computer in Safe Mode
Answer: C
Q8. Users report that their DirectAccess connections fail.
You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter.
The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function.
You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly.
What should you do?
A. Instruct the help desk to enable IPv6 on the users' computers.
B. Instruct the help desk to modify the users' Windows Firewall settings.
C. Request that the domain administrator configure the Teredo State Group Policy setting.
D. Request that the domain administrator configure the Corporate Website Probe URL Group Policy setting.
Answer: D
Q9. Users in branch office 2 map drives to shared folders on SRV1.
The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access.
You need to ensure that the users can access the shared folders if the WAN link fails.
What should you do?
A. Instruct a desktop support technician to configure Offline Files on the Windows 7 computers.
B. Instruct a desktop support technician to configure BranchCache on the Windows 7 computers.
C. Request that a domain administrator deploy a domain controller in branch office 2.
D. Request that a domain administrator enable Universal Group Membership Caching for branch office 2.
Answer: B
Q10. Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise.
A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry.
The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings.
You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1.
What should you do?
A. Instruct the help desk to modify the Windows Defender settings.
B. Instruct the help desk to remove all users from the Administrators group on all local computers.
C. Request that a domain administrator create a Group Policy object (GPO) that uses a custom administrative template.
D. Request that an administrator create a Group Policy object (GPO) that configures a software restriction policy.
Answer: C