What should you recommend?
You plan to join Athens client computers to the AD DS domain.
The Athens client computers connect to the network via a wireless connection.
You need to ensure that the Athens client computers can be joined to the domain.
What should you recommend?
What should you do?
Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application.
What should you do?
Which security option should you configure the wireless connections to use?
You deploy a WAP in the company’s Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.IX authentication server that is used to authenticate wireless connections.
You need to ensure that the wireless authentication meets the company’s requirements.
Which security option should you configure the wireless connections to use?
What should you do next?
One of the company’s client computers is configured with the company’s System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.
The system restore does not restore the computer system settings.
You need to ensure that all future system restores for the computer include system settings.
You reimage the client computer with the company’s corporate image.
What should you do next?
Which policy should you define?
You deploy a WAP in one of the company locations. Client computers connect to it by using the WiFi GPO.
You need to ensure that users cannot change the network location for the connection.
Which policy should you define?
What should you recommend?
Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked.
You need to recommend a solution to ensure that user accounts for members of the Sales Support team are automatically unlocked 10 minutes after becoming locked.
What should you recommend?
What should you do?
You install an application on one of the company’s test computers.
The application fails to run and is affecting other applications. You are unable to uninstall the application successfully.
You need to remove the application from the test computer without modifying user documents.
What should you do?
Which security type should you use?
You are expanding the wireless functionality by creating a guest wireless network based on the new company requirements.
You need to ensure that users can connect automatically without providing credentials.
Which security type should you use?
What should you recommend?
The company’s help desk technicians spend a significant amount of time researching whether remote access issues are related to the corporate network or to Accounting group users’ Internet connectivity.
You need to recommend a solution that minimizes time spent indentifying the cause of the remote access issues.
What should you recommend?
What should you do?
After you modify Corp GPO, users cannot log on to their computers.
You need to ensure that users can log on to their computers.
What should you do? (Choose all that apply.)