PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you request?

###BeginCaseStudy###
Case Study: 9
Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two
offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for
each office. The network contains the organizational units (OUs) that are shown in the
following table.

The network contains an enterprise root certification authority (CA). Certificate
autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by
using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1
configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS).
The Documents folders of all users are backed up daily.

A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to
WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain
name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each
client computer. Users frequently work from home. Home users connect to the internal
network by using SSTP-based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on
computers that run Windows XP. You test App1 by using the Microsoft Application
Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on
Windows 7.
###EndCaseStudy###

A group of users from office 2 travels to office 1 to work on a project. The users from office 2 report
that they are unable to connect to the wireless network in office 1 from their portable computers. A
help desk administrator manually provides the users with access to the wireless network. You need
to ensure that the next time users from office 2 travel to office 1 they can connect to the wireless
network in office 1. What should you request?

What should you recommend?

###BeginCaseStudy###
Case Study: 9
Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two
offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for
each office. The network contains the organizational units (OUs) that are shown in the
following table.

The network contains an enterprise root certification authority (CA). Certificate
autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by
using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1
configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS).
The Documents folders of all users are backed up daily.

A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to
WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain
name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each
client computer. Users frequently work from home. Home users connect to the internal
network by using SSTP-based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on
computers that run Windows XP. You test App1 by using the Microsoft Application
Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on
Windows 7.
###EndCaseStudy###

The help desk reports that they receive many calls from remote users who cannot access Internet
Web sites while they are connected to the VPN. The help desk instructs the users to manually
configure the VPN connection so that the users can access Internet Web sites while connected to the
VPN. You need to provide a recommendation to reduce the number of calls to the help desk
regarding this issue. What should you recommend?

What should you request?

###BeginCaseStudy###
Case Study: 9
Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two
offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for
each office. The network contains the organizational units (OUs) that are shown in the
following table.

The network contains an enterprise root certification authority (CA). Certificate
autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by
using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1
configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS).
The Documents folders of all users are backed up daily.

A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to
WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain
name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each
client computer. Users frequently work from home. Home users connect to the internal
network by using SSTP-based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on
computers that run Windows XP. You test App1 by using the Microsoft Application
Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on
Windows 7.
###EndCaseStudy###

A user’s computer fails. The help desk provides the user with a new computer. The user’s Documents
folder is restored from the backup. The user reports that he can no longer access his encrypted files.
The help desk recovers the files by using a data recovery agent (DRA). You need to ensure that when
users receive new computers, they can access their encrypted files without administrative
intervention. What should you request?

What should you instruct the users to do?

###BeginCaseStudy###
Case Study: 10
Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An
Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers
are configured as shown in the following table.

The corporate security policy states that all domain controllers must have only the following
roles:
• AD DS
• DNS server
• DHCP server
Network Configuration

Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client
computers are portable computers and some are desktop computers. The computers do not
support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are
supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users
work at the Fabrikam office and access resources on the Humongous Insurance network by
using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a
service and logs on by using the credentials of the user who installed the application.
###EndCaseStudy###

Several users in the sales department report that their user accounts are locked out shortly after
they change their user passwords. You need to minimize the number of account lockouts that occur
after the users change their passwords. What should you instruct the users to do?

What should you recommend?

###BeginCaseStudy###
Case Study: 10
Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An
Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers
are configured as shown in the following table.

The corporate security policy states that all domain controllers must have only the following
roles:
• AD DS
• DNS server
• DHCP server
Network Configuration

Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client
computers are portable computers and some are desktop computers. The computers do not
support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are
supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users
work at the Fabrikam office and access resources on the Humongous Insurance network by
using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a
service and logs on by using the credentials of the user who installed the application.
###EndCaseStudy###

Each day, 100 users in Office2 download a 5-MB product catalog file from a share on Server1. The
network administrator reports that the downloads cause an excessive load on the WAN link between
Office1 and Office2. You need to recommend a solution to minimize WAN utilization. The solution
must not require that additional servers be deployed. What should you recommend?

What should you request?

###BeginCaseStudy###
Case Study: 10
Humongous Insurance
Scenario:
You are an enterprise desktop support technician for Humongous Insurance.
Active Directory Configuration
The company has two offices named Office1 and Office2.
The network contains an Active Directory forest named humongousinsurance.com. An
Active Directory site exists for each office. The sites are named Site1 and Site2.
Server Configuration
All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers
are configured as shown in the following table.

The corporate security policy states that all domain controllers must have only the following
roles:
• AD DS
• DNS server
• DHCP server
Network Configuration

Site1 and Site2 connect to each other by using a WAN link.
Client Computer Configuration
All client computers run Windows 7 Enterprise and are members of the domain. Some client
computers are portable computers and some are desktop computers. The computers do not
support hardware virtualization.
All computers are configured to receive Windows Updates from WSUS1.
Remote Access Configuration
Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are
supported by Windows Server 2008 R2.
Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users
work at the Fabrikam office and access resources on the Humongous Insurance network by
using direct VPN connections to NPAS1. Fabrikam contains several wireless access points.
Application Configuration
All computers in the finance department run a custom application suite named App1.
Several users in the sales department install an application named App2. App2 runs as a
service and logs on by using the credentials of the user who installed the application.
###EndCaseStudy###

Humongous Insurance users who work at Fabrikam report that when they move between different
wireless networks, they are prompted to manually reconnect to the VPN. You need to ensure that
the users can automatically reconnect to the VPN when they move between wireless networks.
What should you request?

What should you recommend?

###BeginCaseStudy###
Case Study: 11
Baldwin Museum of Science
Scenario:
You are an enterprise desktop support technician for the Baldwin Museum of Science. The
Baldwin Museum of Science is located in Dublin. The museum has 2,000 employees. All
employees have laptop computers that have cellular connections. The museum has a main
office and three satellite offices.
Active Directory Configuration
The network contains an Active Directory forest. The forest contains a domain named
Baldwinmuseumofscience.com. The relevant group policy information is shown in the
following table.

Server Configuration
All servers are located in the main office and run Windows Server 2008 R2. The relevant
servers are configured as shown in the following table.

Users access the network remotely by using a DirectAccess connection.

Client Computer Information
All client computers run Windows 7 Enterprise (x86). The client computers are configured to
receive Windows Updates from http://WSUS.
Application Configuration
All users run Microsoft Office Outlook 2010 and use Outlook Anywhere. Users access the
intranet Web site by using the URL http://intranet.
The museum hosts several Web sites that use the domain suffix fineartschool.net.
Corporate Security Policy
The corporate security policy states that all updates on client computers must be installed
from the internal WSUS server.
###EndCaseStudy###

Users report that they can only access the fineartschool.net Web servers by entering the full URL to
the servers. You need to recommend a solution that allows users to access the Web servers by using
single label names. Your solution must ensure that users can access the intranet Web server by using
the URL http://intranet. What should you recommend?

What should you request?

###BeginCaseStudy###
Case Study: 11
Baldwin Museum of Science
Scenario:
You are an enterprise desktop support technician for the Baldwin Museum of Science. The
Baldwin Museum of Science is located in Dublin. The museum has 2,000 employees. All
employees have laptop computers that have cellular connections. The museum has a main
office and three satellite offices.
Active Directory Configuration
The network contains an Active Directory forest. The forest contains a domain named
Baldwinmuseumofscience.com. The relevant group policy information is shown in the
following table.

Server Configuration
All servers are located in the main office and run Windows Server 2008 R2. The relevant
servers are configured as shown in the following table.

Users access the network remotely by using a DirectAccess connection.

Client Computer Information
All client computers run Windows 7 Enterprise (x86). The client computers are configured to
receive Windows Updates from http://WSUS.
Application Configuration
All users run Microsoft Office Outlook 2010 and use Outlook Anywhere. Users access the
intranet Web site by using the URL http://intranet.
The museum hosts several Web sites that use the domain suffix fineartschool.net.
Corporate Security Policy
The corporate security policy states that all updates on client computers must be installed
from the internal WSUS server.
###EndCaseStudy###

A new printer is installed on FP1 and is shared as Printer1. Users report that they receive an error
when they try to connect to \\FP1\Printer1, and that after they click OK they are prompted for a
printer driver. The server administrator confirms that the printer is functioning correctly and that he
can print a test page. You need to ensure that users are able to connect to the new printer
successfully. Your solution must minimize administrative effort. What should you request?

What should you request?

###BeginCaseStudy###
Case Study: 11
Baldwin Museum of Science
Scenario:
You are an enterprise desktop support technician for the Baldwin Museum of Science. The
Baldwin Museum of Science is located in Dublin. The museum has 2,000 employees. All
employees have laptop computers that have cellular connections. The museum has a main
office and three satellite offices.
Active Directory Configuration
The network contains an Active Directory forest. The forest contains a domain named
Baldwinmuseumofscience.com. The relevant group policy information is shown in the
following table.

Server Configuration
All servers are located in the main office and run Windows Server 2008 R2. The relevant
servers are configured as shown in the following table.

Users access the network remotely by using a DirectAccess connection.

Client Computer Information
All client computers run Windows 7 Enterprise (x86). The client computers are configured to
receive Windows Updates from http://WSUS.
Application Configuration
All users run Microsoft Office Outlook 2010 and use Outlook Anywhere. Users access the
intranet Web site by using the URL http://intranet.
The museum hosts several Web sites that use the domain suffix fineartschool.net.
Corporate Security Policy
The corporate security policy states that all updates on client computers must be installed
from the internal WSUS server.
###EndCaseStudy###

Twenty new laptop computers are joined to the domain. Users of the new laptops report that they
can access the Exchange server, but they cannot access file shares or internal Web sites when they
are outside of the office. Other remote users can access file shares and internal Web sites when they
are outside of the office. You need to ensure that users of the new laptops can access file shares and
Web sites on the internal network when they are outside of the office. What should you request?

What should you request?

###BeginCaseStudy###
Case Study: 11
Baldwin Museum of Science
Scenario:
You are an enterprise desktop support technician for the Baldwin Museum of Science. The
Baldwin Museum of Science is located in Dublin. The museum has 2,000 employees. All
employees have laptop computers that have cellular connections. The museum has a main
office and three satellite offices.
Active Directory Configuration
The network contains an Active Directory forest. The forest contains a domain named
Baldwinmuseumofscience.com. The relevant group policy information is shown in the
following table.

Server Configuration
All servers are located in the main office and run Windows Server 2008 R2. The relevant
servers are configured as shown in the following table.

Users access the network remotely by using a DirectAccess connection.

Client Computer Information
All client computers run Windows 7 Enterprise (x86). The client computers are configured to
receive Windows Updates from http://WSUS.
Application Configuration
All users run Microsoft Office Outlook 2010 and use Outlook Anywhere. Users access the
intranet Web site by using the URL http://intranet.
The museum hosts several Web sites that use the domain suffix fineartschool.net.
Corporate Security Policy
The corporate security policy states that all updates on client computers must be installed
from the internal WSUS server.
###EndCaseStudy###

The help desk technicians discover that Windows Defender definitions are not up-to-date on client
computers. The help desk technicians report that other critical updates are applied to the client
computers. You need to ensure that all client computers have the latest Windows Defender
definitions. Your solution must comply with the corporate security policy. What should you request?