which security updates are missing.What should you request?
The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing.
What should you request?
What are two possible ways to achieve this goal?
Users in branch office 1 report that they fail to access the company’s intranet Web site located on Web1.
They also fail to access Web sites on the Internet.
A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot.
(Exhibit)
You need to resolve the network connectivity issue.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which tool should you use?
The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer’s hard disk drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.
Which tool should you use?
What should you do?
The company purchases 500 USB flash drives from a new hardware vendor and distributes them to the users.
The help desk reports that the users are unable to access the new USB flash drives.
You need to ensure that users can save data on the USB flash drives.
What should you do?
Which tools should you use?
A company has computers that run Windows 7 Enterprise.
A user’s computer has been crashing and showing error messages over the past several days.
You need to gather historical information about the errors.
Which tools should you use? (Choose all that apply.)
What should you do?
A company has computers running the 64-bit version of Windows 7 Enterprise. All computers are joined to an Active Directory Domain Services (AD DS) domain. All users are part of the local Administrators group.
A user is trying to install a legacy 32-bit application that requires administrative permissions to install. The user reports that the inst.exe installer does not run. Instead, it shows an "access denied" error message and closes. The user does not see a prompt to grant the application permission to make changes to the computer.
You need to ensure that inst.exeruns successfully and can install the application.
What should you do? (Choose all that apply.)
Which tool should you use?
A company has a main office and a branch office. The network contains a single Active Directory domain. All computers are members of the domain.
Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications.
From your computer, you need to identify the application that consumes the most processor resources on the computers.
Which tool should you use?
What should you recommend?
A company has new portable computers running Windows 7.
On one of the computers, the USB mouse cursor does not move. You connect the mouse to another computer, where it works correctly.
You need to recommend possible solutions to the problem.
What should you recommend? (Choose all that apply.)
which process identifier (PID) is associated with the service.What should you do?
You are troubleshooting performance issues on a Windows 7 Enterprise client computer.
An unfamiliar service is running on the computer.
You need to recommend the solutions that identify which process identifier (PID) is associated with the service.
What should you do? (Choose all that apply.)
Which commands should you recommend?
A company has computers running Windows 7 Enterprise. Connections to the company’s wireless network are filtered by MAC address.
The company purchases a new computer that must be connected to the wireless network.
You need to recommend all the commands that discover the MAC address of the new computer’s wireless network adapter.
Which commands should you recommend? (Choose all that apply.)