PrepAway - Latest Free Exam Questions & Answers

Category: 70-682

Exam 70-682: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

What should you do?

Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Refer to the Exhibit.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?

What should you do?

Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Refer to the Exhibit.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?

Which tool should you use?

Start of repeated scenarioYou are an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees.

Active Directory ConfigurationThe network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table.
DHCP Configuration
The DHCP servers are configured as shown in the following table. Computer InformationAll corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with DirectAccess. The company is running a pilot project to test DirectAccess for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario Users report that it takes a long time to access resources by using DirectAccess. You need to provide the network administrator with a network capture of DirectAccess traffic. Which tool should you use?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \AppServer1AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario VPN users report that they cannot access shared resources in the branch offices. They can access shared resources in the main office. Users in the main office report that they can access shared resources in the branch offices. You need to ensure that the VPN users can access shared resources in the branch offices. What should you request?

What should you do?

Start of repeated scenarioYou are an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical EnvironmentThe company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application ConfigurationsFourth Coffee deploys an application named App1 to users in the main office by using a Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \AppServer1AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security PolicyThe corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client ConfigurationAll users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario Users in branch office 2 map drives to shared folders on SRV1. The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access. You need to ensure that the users can access the shared folders if the WAN link fails. What should you do?

What should you request?

Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table.
The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1.
Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Humongous Insurance users who work at Fabrikam report that when they move between different wireless networks, they are prompted to manually reconnect to the VPN. You need to ensure that the users can automatically reconnect to the VPN when they move between wireless networks. What should you request?

What should you recommend?

Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table.
The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Each day, 100 users in Office2 download a 5-MB product catalog file from a share on Server1. The network administrator reports that the downloads cause an excessive load on the WAN link between Office1 and Office2. You need to recommend a solution to minimize WAN utilization. The solution must not require that additional servers be deployed. What should you recommend?

What should you instruct the users to do?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Humongous Insurance. Active Directory ConfigurationThe company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server ConfigurationAll servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS serverDHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer ConfigurationAll client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access ConfigurationUsers can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application ConfigurationAll computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Several users in the sales department report that their user accounts are locked out shortly after they change their user passwords. You need to minimize the number of account lockouts that occur after the users change their passwords. What should you instruct the users to do?


Page 4 of 9« First...23456...Last »