PrepAway - Latest Free Exam Questions & Answers

Category: 70-685

Exam 70-685: Pro: Windows 7, Enterprise Desktop Support Technician

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise and a DNS server named DNS01. A member server named SERVER01 hosts a website. The client computers are joined to an Active Directory Domain Services (AD DS) domain named contoso.com. DNS is the primary name-resolution protocol in use. There have been no recent changes to the DNS entries. The user of a client computer named PC01 can connect to websites.
However, when the user attempts to connect to

server01.contoso.com, the URL resolves to the incorrect IP address. The URL resolves correctly from other client computers. You need to recommend an approach for ensuring that server01.contoso.com resolves correctly from PC01. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal.

Select the BEST answer.)

What is the best approach to achieve the goals?

A corporate environment includes client computers running Windows 7 Enterprise. You find an unknown service installed on a client computer. You suspect that the client computer has been infected with malicious software. You need to recommend an approach for identifying and terminating processes the service is running. What is the best approach to achieve the goals? (More than one answer choice may achieve the goal. Select the BEST answer.)

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise. The hard drives of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating system of a client computer is not found. You are unable to repair the operating system. You need to recommend an approach for salvaging data from the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise. Remote access to the corporate network utilizes Network Access Protection (NAP) and

DirectAccess.

You need to recommend an approach for providing support technicians with the ability to easily determine the cause of client-side remote access issues.

What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

What should you do?

All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.

You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).

You need to ensure that the following requirements are met:

All BitLocker recovery keys are stored in a central location.

Data is encrypted only after a backup of the recovery key is available.

What should you do?

What should you recommend?

You have an Active Directory domain. All client computers run Windows 7 and are joined to the domain.

The help desk reports that several users recently downloaded and installed malware.

You discover that the users modified the Windows Defender settings on their computers.

You need to recommend a solution to prevent users from modifying their Windows Defender settings.

What should you recommend?

What should you do?

A client computers on your company network run Windows 7. Employees log on to their computers as Standard users.

There is a zero-day malicious software attack affecting your network. Employees receive User AccountControl (UAC) messages frequently requesting permission to elevate privileges. You know that this malicious software attack is responsible for these UAC prompts.

You need to ensure that employees are unable to provide elevated credentials.

What should you do?

What should you do?

All client computers on your company network run Windows 7. Employees use Windows Internet Explorer 8 to access Web sites. You discover that some computers are infected with malicious software.

Employees are able to access Web sites that might have been compromised by malicious software.

You need to configure the settings in Internet Explorer 8 to prevent malicious software from being installed on the computers.

What should you do?


Page 5 of 16« First...34567...10...Last »