PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \AppServer1AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario VPN users report that they cannot access shared resources in the branch offices. They can access shared resources in the main office. Users in the main office report that they can access shared resources in the branch offices. You need to ensure that the VPN users can access shared resources in the branch offices. What should you request?

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \AppServer1AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario Users in branch office 2 map drives to shared folders on SRV1. The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access. You need to ensure that the users can access the shared folders if the WAN link fails. What should you do?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table.
The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1.
Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Humongous Insurance users who work at Fabrikam report that when they move between different wireless networks, they are prompted to manually reconnect to the VPN. You need to ensure that the users can automatically reconnect to the VPN when they move between wireless networks. What should you request?

What should you recommend?

Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table.
The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Each day, 100 users in Office2 download a 5-MB product catalog file from a share on Server1. The network administrator reports that the downloads cause an excessive load on the WAN link between Office1 and Office2. You need to recommend a solution to minimize WAN utilization. The solution must not require that additional servers be deployed. What should you recommend?

What should you instruct the users to do?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords. You need to minimize the number of account lockouts that occur after the users change their passwords. What should you instruct the users to do?

What should you do?

You are the systems administrator for your company. You are migrating from Windows Small Business Server 2003 to Windows Essential Business Server (EBS) 2008. The network contains a DNS server named DNS1, which has a standard primary zone. You migrate the DNS settings from DNS1 to the Windows EBS servers. You want to ensure that the DNS Server service functions properly on the Windows EBS servers.

What should you do? (Choose all that apply.)

What should you instruct help desk to do?

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit. (Refer to the Exhibit.) You need to resolve the network connectivity issue. The solution must adhere to the company policy. What should you instruct help desk to do?

What should you do?

You are the systems administrator for your company. The company’s network consists of a single Active Directory domain. The network also contains a Windows Essential Business Server (EBS) 2008 computer named EBS1. You manage all computers and devices on the network by using System Center Essentials in Windows EBS.

You add to the domain a new client computer running Windows Vista, which will be managed by EBS1. You run the Computer and Device Management Wizard to discover the new computer. However, the detailed information about the computer is not displayed on the Managed Computers and Devices page. You want to see the detailed information about the computer on the Managed Computers and Devices page.

What should you do?