PrepAway - Latest Free Exam Questions & Answers

Category: 70-682

Exam 70-682: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

What should you do?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network contains a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table. Wireless NetworkA wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario Users in the research department report that they cannot run App1 or Windows XP Mode. You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?

What should you recommend?

11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory ConfigurationThe network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram. The relevant Group Policy objects (GPOs) in the domain are configured as shown in the following table.
Applications
The relevant applications on the network are shown in the following table.
Server Configuration
The relevant servers are configured as shown in the following table.
Client Configuration
Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. PrintersThe marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A

shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. End of repeated scenario The Office1 network link is brought offline for emergency maintenance. Users in Office2 and Office3 report that they cannot connect to the wireless network. You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails. What should you recommend?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.

Wireless NetworkA wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario A. Datum hires several consultants to work at the main office for six months. The consultants require Internet access. The help desk reports that the consultants cannot access the companys wireless network. You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to the corporate security policy. What should you request?

Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com).

What are two possible ways to achieve this goal?

Start of repeated scenarioYou are an enterprise desktop support technician for A. Datum Corporation. Active Directory ConfigurationThe company has three offices. The offices are configured as shown in the following table.
The network consists of a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.
Servers
The relevant servers in the main office are configured as shown in the following table.
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security. Client ConfigurationAll client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers. All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named App1 is installed in the image. Each research department computer has the following hardware. 4 GB of RAMIntel Core i7 processor500-GB hard disk drive Corporate Security PolicyThe corporate security policy includes the following requirements. Users without domain accounts must be denied access to internal servers.All connections to the companys wireless access points must be encrypted.Only employees can be configured to have user accounts in the Active Directory domain.The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker). End of repeated scenario Users in branch office 1 report that they fail to access the companys intranet Web site located on Web1. They also fail to access Web sites on the Internet. A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot. You need to resolve the network connectivity issue. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do next?

All client computers on your company network are members of an Active Directory Domain Services domain. The Finance team uses Remote Desktop to access Windows 7 virtual machines that are hosted on a Windows Server 2008 Hyper-V server. The team members receive the following error message when they attempt to log on to the virtual machines. "The trust relationship between this workstation and the primary domain failed." You discover that the Hyper-V server was recently restored from a backup. You need to ensure that the team members can log on to the virtual machines. You log on to the virtual machines as local administrator. What should you do next?

What should you recommend?

Your company has a main office and a branch office. The branch office is configured as shown in the exhibit. (Refer to the Exhibit.) The branch office contains the following wireless devices.A phone system that uses the 5.8 GHz wireless spectrumA wireless access point that uses 802.11bPrinters that are compatible with 802.11b and 802.11g100 portable computers that use 802.11b and 802.11g Users report that they have an intermittent connection to the wireless access point. You need to recommend a solution that ensures that users can connect to the wireless access point at all times. What should you recommend?

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table. All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table.
Security ConfigurationThe relevant security settings for the domain are configured as shown in the following table.
The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table.
All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravelWireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario At 08.00 on a Tuesday morning, an administrator in Site 3 takes DC3 offline to update the server. Users in Site 3 report that they cannot log on to their computers. The users receive the following error message. Your account has time restrictions that prevent you from logging on at this time. Please try again later. You need to ensure that all users can log on to their computers when DC3 is offline for maintenance. Your solution must adhere to the corporate security policies. What should you do?

What should you recommend?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Server ConfigurationAll servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table.
All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario The company is deploying a new application. When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it. You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?

What should you recommend?

Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table.
The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario The help desk reports that they receive many calls from remote users who cannot access Internet Web sites while they are connected to the VPN. The help desk instructs the users to manually configure the VPN connection so that the users can access Internet Web sites while connected to the VPN. You need to provide a recommendation to reduce the number of calls to the help desk regarding this issue. What should you recommend?


Page 1 of 912345...Last »