PrepAway - Latest Free Exam Questions & Answers

What should you instruct the users to do?

###BeginCaseStudy###
Case Study: 5
Alpine Ski House Scenario:
You are an enterprise desktop support technician for Alpine Ski House. Alpine Ski House
manages chalets in ski resorts around the world. The main office is located in Vancouver.
Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees.
Active Directory Configuration
The network contains an Active Directory forest. The forest contains a domain named
alpineskihouse.com. The network contains four Active Directory sites. All sites have highspeed Internet connections and connect to each other by using VPNs. The site information is
shown in the following table.
Server Configuration
All servers run Windows Server 2008 R2. The relevant servers are configured as shown in
the following table.

DHCP Configuration
The DHCP servers are configured as shown in the following table.

Computer Information
All corporate computers run Windows 7 Professional and are joined to the
alpineskihouse.com domain. All corporate users can access the internal network remotely by
using a VPN connection. The VPN connection requires the use of a smart card. During the
next year, Alpine Ski House plans to replace the existing VPN with DirectAccess. The
company is running a pilot project to test DirectAccess for users in France. Each chalet
contains five public computers that run Windows 7 Ultimate. Guests use the public
computers to access the Internet. The public computers are members of a workgroup. Every
week, a standard image of Windows 7 Ultimate is re-applied to the computers.
###EndCaseStudy###

Remote users report that after they renew their smart card certificates, they are unable to log on to
their computers by using their smart cards. You need to ensure that users can log on by using their
smart cards. What should you instruct the users to do?

PrepAway - Latest Free Exam Questions & Answers

A.
Change their smart card PINs.

B.
Request a new smart card certificate.

C.
Log on by using their user names and passwords, and then lock and unlock their computers.

D.
Establish a VPN connection from the logon screen and use their smart cards for authentication.


Leave a Reply