PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

Your users access a third-party Web site to fulfill purchase orders.

The Web site is updated.

Users receive the following error message when they access the updated Web site:

"Internet Explorer has blocked this site from using an ActiveX control in an unsafe manner. As a result, this page may not display correctly."

You need to ensure that users can access the Web site and that the Web site content is displayed correctly.

What should you do?

What are two possible ways to achieve this goal?

Users in branch office 1 report that they fail to access the company’s intranet Web site located on Web1.

They also fail to access Web sites on the Internet.

A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot.
(Exhibit)

You need to resolve the network connectivity issue.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you recommend?

11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory ConfigurationThe network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram. The relevant Group Policy objects (GPOs) in the domain are configured as shown in the following table.
Applications
The relevant applications on the network are shown in the following table.
Server Configuration
The relevant servers are configured as shown in the following table.
Client Configuration
Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. PrintersThe marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A

shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. End of repeated scenario The Office1 network link is brought offline for emergency maintenance. Users in Office2 and Office3 report that they cannot connect to the wireless network. You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails. What should you recommend?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.

Wireless NetworkA wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario A. Datum hires several consultants to work at the main office for six months. The consultants require Internet access. The help desk reports that the consultants cannot access the companys wireless network. You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to the corporate security policy. What should you request?

Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com).

What are two possible ways to achieve this goal?

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario Users in branch office 1 report that they fail to access the companys intranet Web site located on Web1. They also fail to access Web sites on the Internet. A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot. You need to resolve the network connectivity issue. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)