PrepAway - Latest Free Exam Questions & Answers

Category: 70-685 (v.2)

Exam 70-685: Pro: Windows 7, Enterprise Desktop Support Technician (update March 18th, 2016)

You need to ensure that employees are unable to use the VPN connection for personal use

All client computers on your company network run Windows 7. All servers in your company run
Windows Server 2008 R2. Employees use a VPN connection to connect to the company network
from a remote location. Employees remain connected to the VPN server to browse the Internet for
personal use. You need to ensure that employees are unable to use the VPN connection for personal
use. What should you do?

You need to configure the settings in Internet Explorer 8 to prevent malicious software from being installed o

All client computers on your company network run Windows 7. Employees use Windows Internet
Explorer 8 to access Web sites. You discover that some computers are infected with malicious
software. Employees are able to access Web sites that might have been compromised by malicious
software. You need to configure the settings in Internet Explorer 8 to prevent malicious software
from being installed on the computers. What should you do?

You need to ensure that malicious software does not automatically run on the computers

All client computers on your company network run Windows 7. The computers are members of a
Windows Server 2008 Active Directory Domain Services domain. Malicious software is spreading
automatically from removable drives. You need to ensure that malicious software does not
automatically run on the computers. What should you do?

You need to ensure that employees are unable to provide elevated credentials

A client computers on your company network run Windows 7. Employees log on to their computers
as Standard users. There is a zero-day malicious software attack affecting your network. Employees
receive User AccountControl (UAC) messages frequently requesting permission to elevate privileges.
You know that this malicious software attack is responsible for these UAC prompts. You need to
ensure that employees are unable to provide elevated credentials. What should you do?

What should you recommend?

You have an Active Directory domain. All client computers run Windows 7 and are joined to the
domain. The help desk reports that several users recently downloaded and installed malware. You
discover that the users modified the Windows Defender settings on their computers. You need to
recommend a solution to prevent users from modifying their Windows Defender settings. What
should you recommend?

You need to ensure that the following requirements are met: ·All BitLocker recovery keys are stored in a

All client computers on your company network run Windows 7. Your company has a Windows
Server2008 domain. You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).
You need to ensure that the following requirements are met:
·All BitLocker recovery keys are stored in a central location.
·Data is encrypted only after a backup of the recovery key is available.
What should you do?

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise. Remote access
to the corporate network utilizes Network Access Protection (NAP) and DirectAccess. You need to
recommend an approach for providing support technicians with the ability to easily determine the
cause of client-side remote access issues. What is the best approach to achieve the goal? (More than
one answer choice may achieve the goal. Select the BEST answer.)

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise. The client
computers are joined to an Active Directory Domain Services (AD DS) domain. After returning from
an extended leave of absence, an employee attempts to log on to her client computer. The logon
attempt is unsuccessful. The following error message appears: The trust relationship between the
workstation and the primary domain failed. You need to recommend an approach for ensuring that
the user can log on to the domain from her client computer. What is the best approach to achieve
the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

What is the best approach to achieve the goal?

A corporate environment includes client computers running Windows 7 Enterprise. The hard drives
of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating
system of a client computer is not found. You are unable to repair the operating system. You need to
recommend an approach for salvaging data from the client computer. What is the best approach to
achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)


Page 6 of 20« First...45678...20...Last »