PrepAway - Latest Free Exam Questions & Answers

Category: 70-682

Exam 70-682: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table. All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table.
Security ConfigurationThe relevant security settings for the domain are configured as shown in the following table.
The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table.
All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravelWireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario You have two external consultants. The consultants use their own personal portable computers. The consultants report that they are unable to connect to your wireless network. You need to give the consultants wireless access to the Internet. The solution must prevent external consultants from accessing internal resources. What should you do?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two offices. Active Directory ConfigurationThe network contains a single Active Directory domain. An Active Directory site exists for each office. The network contains the organizational units (OUs) that are shown in the following table.
The network contains an enterprise root certification authority (CA). Certificate autoenrollement is enabled for all users. Network ConfigurationEach office has a wireless network. You control access to the wireless network in office 1 by using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1 configures the NAP settings for the computers in office 1. Resource AccessThe Documents folders of all users are encrypted by using Encrypting File System (EFS). The Documents folders of all users are backed up daily. A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to WebSite1 from the Internet by using the URL http.//website1.wingtiptoys.com. The domain name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each client computer. Users frequently work from home. Home users connect to the internal network by using SSTP-based VPN connections. Line of Business ApplicationsYour company has a line-of-business application named App1. App1 is installed only on computers that run Windows XP. You test App1 by using the Microsoft Application Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on Windows 7. End of repeated scenario A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report that they are unable to connect to the wireless network in office 1 from their portable computers. A help desk administrator manually provides the users with access to the wireless network. You need to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless network in office 1. What should you request?

which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of
repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.
Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). previous version of App1. End of repeated scenario The help desk reports that several users use the previous version of App1, which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the previous version of App1. What should you recommend?

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.
Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1. End of repeated scenario Portable computer users report that they can use Internet Explorer to browse Internet Web sites only when they are connected to the company network. You need to ensure that portable computer users can access Internet Web sites from wherever they connect. What should you do?

What should you request a domain administrator to do?

Start of repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.

Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1. End of repeated scenario The sales users that were part of the VPN server pilot project report that they can no longer establish VPN connections to the internal network. You need to ensure that all authorized users can establish VPN connections to the internal network. What should you request a domain administrator to do?

What should you do?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Margies Travel. Margies Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees. Active Directory ConfigurationThe network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table.
All sites connect to each other by using high-speed WAN links. Server ConfigurationThe relevant servers are configured as shown in the following table.
Security Configuration
The relevant security settings for the domain are configured as shown in the following table. The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table.
All wireless access points are configured to use 802.1X and RADIUS authentication. All RADIUS authentication requests are sent to NPAS1 and NPAS2. User InformationAll client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. All portable computers are members of the MargiesTravelWireless group. Application ConfigurationCall center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies. End of repeated scenario The company hires an additional 100 users. The users are unable to install the custom application. You need to ensure that the users can install the custom application. What should you do?

What should you do?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Consolidated Messenger. Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Network ConfigurationThe company has three offices named Office1, Office2, and Office3. The offices connect to each other over the Internet by using VPN connections. Each office has an 802.11g wireless access point. All wireless access points are configured to use Radius01 for authentication. Active Directory ConfigurationThe network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram. The relevant Group Policy objects (GPOs) in the domain are configured as shown in the following table.
Applications
The relevant applications on the network are shown in the following table.
Server Configuration
The relevant servers are configured as shown in the following table. S Client Configuration
Each office has 500 desktop computers that run Windows 7 Enterprise. There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise. To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices. PrintersThe marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures. End of repeated scenario The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1. Users in the Marketing OU report that they can run FinanceApp1. You need to ensure that only users in the Finance OU can run FinanceApp1. What should you do?

What should you instruct help desk to do?

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit. (Refer to the Exhibit.) You need to resolve the network connectivity issue. The solution must adhere to the company policy. What should you instruct help desk to do?

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for City Power & Light. City Power & Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees. Active Directory ConfigurationThe network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2. Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Server ConfigurationAll servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table.
All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses. User InformationAll user accounts are standard user accounts.All client computers run Windows 7 Enterprise.Each portable computer has a PPTP-based VPN connection to the internal network. Corporate Security GuidelinesAll users must be granted the least privileges possible.All locally stored documents must be encrypted by using Encrypting File System (EFS).The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).All encryption certificates must be stored on smart cards. End of repeated scenario Users report that their DirectAccess connections fail. You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter. The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function. You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly. What should you do?


Page 2 of 912345...Last »