70-685 - Pro: Windows 7, Enterprise Desktop Support Technician
Go back to
Microsoft
Example Questions
All client computers on your company network run Windows 7.An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message: "Logon failure: unknown user name or bad password." You need to ensure that the service runs successfully. What should you do?
Reset the service account password and configure it to never expire.
All client computers on your company network run Windows 7. A computer is unable to connect to network resources. The configuration of the computer is as shown in the following table. IP address 131.107.4.254 Subnet mask 255.255.240.0 Default gateway 131.107.15.255 Preferred DNS server 131.107.3.2 You need to ensure that the computer is able to connect to network resources. What should you do?
Change the default gateway to 131.107.0.1.
Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked. You need to recommend a solution to ensure that user accounts for members of the Sales Support team are automatically unlocked 10 minutes after becoming locked. What should you recommend?
Create a fine-grained password policy with a different account lockout policy and apply it to the Sales security group.
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?
Create an Enforce rule restriction based on the version of the software.
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. All portable computers connect only to the 802.1X-authenticated wireless network. Wireless settings are set through the domain's Group Policy. You discover that new portable computers cannot be joined to the domain. You need to ensure that new portable computers can be joined to the domain. What should you do?
Connect the portable computers to the wireless network by using a Bootstrap Profile.
Your company has a main office and a branch office. The network contains a single Active Directory domain. All servers and client computers are members of the domain. A print server is located in the branch office. All other servers are located in the main office. All servers run Windows Server 2008 R2. All client computers run Windows 7. Users in the branch office report poor performance when they access an intranet Web site in the main office. You need to recommend changes to the network to improve the performance of intranet access by computers in the branch office. What should you recommend implementing?
BranchCache
All client computers on your company network run Windows 7. The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors. You need to capture only the relevant data to generate a report. What should you do?
Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.
You are a systems administrator for an enterprise network. You need to install several Windows Installer packages from a script, in sequence. Some of the packages require that the computer be restarted. However, you want to restart the computer only once. Which of the following scripts installs the App1.msi, App2.msi, and App3.msi packages without prompting the user and then restarts only once, after all packages have been installed?
Msiexec /package App1.msi /quiet /norestart Msiexec /package App2.msi /quiet /norestart Msiexec /package App3.msi /quiet /forcerestart
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. During the course of the day you discover that the client computers are infected with malicious software from removable storage devices. ABC.com wants you to prevent malicious software on the removable devices from running automatically on the client computers. How can you prevent the malicious software from running automatically?
You should configure a Group Policy Object (GPO) to disable the Autoplay function.
Alpine Ski House. Your users access a third-party Web site to fulfill purchase orders. The Web site is updated. Users receive the following error message when they access the updated Web site: ' Internet Explorer has blocked this site from using an ActiveX control in an unsafe manner. As a result, this page may not display correctly.' You need to ensure that users can access the Web site and that the Web site content is displayed correctly. What should you do?
Modify the Internet Explorer Internet zone settings.
All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?
Set the VPN server to Layer 2 Tunneling Protocol.
All client computers on your company network run Windows 7. All servers in your company run Windows Server 2008 R2. Employees use a VPN connection to connect to the company network from a remote location. Employees remain connected to the VPN server to browse the Internet for personal use. You need to ensure that employees are unable to use the VPN connection for personal use. What should you do?
Use Group Policy to disable the Use default gateway on remote network setting on each client computer.
Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise. A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry. The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings. You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1. What should you do?
Request that a domain administrator create a Group Policy object (GPO) that uses a custom administrative template.
Users at the Manufacturing site must have a secondary method of decrypting their existing files if hey lose access to their certificate and private key or if the EFSAdmin' s certificate is not available. You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them. What should you recommend that the users do?
Export their EFS certificates with private keys to a ernal location.
You deploy a WAP in the company' s Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.1X authentication server that is used to authenticate wireless connections. You need to ensure that the wireless authentication meets the company' s requirements. Which security option should you configure the wireless connections to use?
WPA-Enterprise
You have a laptop that runs the Windows 7 operating system. You have made several image backups of your computer to an external drive. You created an image backup of your laptop two days ago to the same external drive. Today you notice that several folders of music files, documents, and photos under the C:\My Files directory were inadvertently deleted last week. What should you do to restore folders of music files, documents, and photos that were deleted?
Attach the external drive, boot from a System Repair Disc, and choose System Image Recovery from the System Recovery Options
Which of the following services must be running on the client computer to use event forwarding? (Each correct answer presents part of the solution. Choose two.)
Windows Remote Management
Windows Event Collector
All client computers on your company network run Windows 7. An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message: "Logon failure: unknown user name or bad password." You need to ensure that the service runs successfully. What should you do?
Reset the service account password and configure it to never expire.
All client computers on your company network were recently upgraded from Windows Vista to Windows Several employees use a scanner to import document images into a database. They install a new scanning application on their computers. The application updates the device driver for the scanners as part of the installation process. Employees report that the application can no longer connect to the scanner. You need to ensure that the employees can use the scanner. What should you do?
Roll back the device driver to the previous version.
The Office1 network link is brought offline for emergency maintenance. Users in Office2 and Office3 report that they cannot connect to the wireless network. You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails. What should you recommend?
that additional RADIUS servers be deployed
A corporate environment includes client computers running Windows 7 Enterprise. The hard drives of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating system of a client computer is not found. You are unable to repair the operating system. You need to recommend an approach for salvaging data from the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
Use the BitLocker Repair Tool.
A company has computers that run Windows 7 Enterprise. When trying to open a file on a local hard disk, a user receives an _ error reading file_ message. The user also hears clicking noises when accessing the disk. You need to access the data on the disk. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Run Disk Cleanup.
All client computers on your company network run Windows 7. Your company has a Windows Server 2008 domain. You plan to use Group Policy to enable BitLocker Drive Encryption (BDE). You need to ensure that the following requirements are met: ·All BitLocker recovery keys are stored in a central location. ·Data is encrypted only after a backup of the recovery key is available. What should you do?
Enable the Store BitLocker recovery information in Active Directory Domain Services setting.
All client computers on your company network run Windows 7. You discover that memory usage on the computers is high. You need to find the cause of the issue. What should you do?
Run the Resource Monitor tool and review the content in the Memory tab.
Margie´s Travel. Users access a third-party Web site. The Web site is updated to use Microsoft Silverlight . After the update, the help desk receives a high volume of phone calls from users who report that the Web site fails to function. You need to ensure that the Web site functions properly for the users. What should you do?
Modify the Windows Internet Explorer add-ons settings by using a Group Policy object (GPO).
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?
Apply a Wireless Network Policy to set the company wireless network as the preferred network.
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain. A network administrator changes the IP address of a file server. Employees are unable to connect to the file server. You need to ensure that the employees are able to connect to the file server immediately. Which command should you instruct the employees to run?
ipconfig /flushdns
A shared client computer running Windows 7 is responding and loading applications slowly. indows Task Manager indicates that available memory is low and that several applications, which are not running on the desktop, are using a large amount of memory. You need to recommend an approach for optimizing the performance of the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
Log off all users other than the currently active user from the client computer.
You have an Active Directory domain. All client computers run Windows 7 and are joined to the domain. The help desk reports that several users recently downloaded and installed malware. You discover that the users modified the Windows Defender settings on their computers. You need to recommend a solution to prevent users from modifying their Windows Defender settings. What should you recommend?
Modify the membership of the local Administrators group.
All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain. Malicious software is spreading automatically from removable drives. You need to ensure that malicious software does not automatically run on the computers. What should you do?
Disable the Autoplay function by using Domain Group Policy.
All client computers on your network have identical hardware. Your network adapter vendor releases a new driver. Several users install the new driver. The help desk technicians report that several users are unable to connect to network resources. The technicians instruct the users to restart their computers. When the users log on to their computers, they are still unable to connect to network resources. You need to recommend a solution to ensure that users can connect to network resources. What should you instruct the users to do?
Roll back the network adapter driver.
All client computers on your company network run Windows 7. A standard Windows 7 image is loaded on all new computers on the network. A department in your company purchases several tablet computers. Employees report that the pen interface does not work on the tablet computers. You need to ensure that employees can use the pen interface. What should you do?
Turn on the Tablet PC Components.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7 and all servers run Windows Server 2008. ABC.com is planning to enable BitLocker Drive Encryption (BDE) through the use of a Group Policy. To prevent the risk of encrypted data being unrecoverable, you want to centralize the storage of the BitLocker recovery keys and to ensure that data is only encrypted once the backup of the recovery key is available. How should you implement Bitlocker Drive Encryption?
You should configure a Group Policy Object with the Store BitLocker recovery information in Active Directory Domain Services option enabled.
Your company has a main office and a branch office. The network contains a single Active Directory domain. All computers are members of the domain. Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications. From your computer, you need to identify the application that uses the most processor on the computers. Which tool should you use?
Performance Monitor
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. All client computers are members of the ABC.com domain. ABC.com wants you to configure Windows Explorer to not display previews of documents in the results of a search. What is the best way to disable the preview of documents in the Search results?
You should create a Group Policy linked to the client computers that enables the Turn off the display snippets in Content view mode option.
You are a help desk operator at a support center. You are working with the IT department to assess the changes required as it upgrades to Windows 7 and begins running all users with standard user privileges instead of administrative privileges. Which of the following tasks require administrative privileges? (Each correct answer presents a complete solution. Choose three.)
Writing a file to the %SystemRoot% folder
Installing a program for one user
Installing a program for all users
Users in the ERPApp1 pilot project report intermittent application issues. You need to consolidate all application events for the users in a central location. What should you do?
Configure event subscriptions.
You are a systems administrator for an enterprise network. You need to install a Windows Installer package from the command line. Which tool should you use?
Msiexec.exe
Your company has a main office and a branch office. A user from the branch office reports that he receives stop errors on his desktop computer. A help desk technician reports that the errors are caused by a defective internal smart card reader. You plan to remove the smart card reader next week. You need to recommend a solution that prevents the stop errors from re-occurring when the computer is restarted. What should you recommend?
From Device Manager, disable the smart card reader.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7 and all servers run Windows Server 2008 R2. All ABC.com uses use an in-house application. The users in the Finance Department are local administrators on their respective computers. The ABC.com developers have created a new beta version of the application. You want to prevent the Finance users from upgrading to the new version of the application while it is still being tested by the developers. You create a global security group named Finance Users and add the users in the Finance department to the group. How can you prevent the Finance Users from upgrading to the new version of the application?
You should configure Applocker with an Enforce rule restriction created based on the version of the application.
A. Datum Corporation. Users in the research department report that they cannot run App1 or Windows XP Mode. You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?
Enable hardware virtualization on the research department computers.
You install an application on one of the company_ s test computers. The application fails to run and is affecting other applications. You are unable to uninstall the application successfully. You need to remove the application from the test computer without modifying user documents. What should you do?
Use System Restore to restore the test computer.
You are a systems administrator for an enterprise network that uses Active Directory Domain Services to manage client computers. You are in the process of configuring event forwarding on a client computer. Your user name is Admin1, the computer name from which you are performing monitoring tasks is Monitor, and your domain name is Contoso.com. Which of the following security changes do you need to make on the client computer to enable event forwarding?
Add the Monitor computer account to the client computer's Event Log Readers group.
All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7 What should you do?
Set the VPN server to Layer 2 Tunneling Protocol.
You are a systems administrator planning an automated deployment of Windows 7. You need to configure a script to run automatically after installation completes. Which tool would you use to configure this?
Windows System Image Manager
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. During the course of the day you discover that malicious software has infected the ABC.com network and is causing ABC.com users to receive User Account Control (UAC) prompts for elevated privileges. ABC.com wants you to prevent users from allowing the malicious software to run with elevated privileges. How can you accomplish this task?
You should configure the Group Policy User Account Control: Behavior of the elevation prompt for standard users option set to Automatically deny elevation requests.
All client computers on your company network were recently migrated from Windows XP to Windows 7. Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7_ compatible version is developed. A security update is made for this application. The update must be tested and then deployed as a new version of the application. During testing you are unable to install the application. You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment. What should you do?
Modify the shim to apply to all versions of the application.
All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows What should you do?
Set the VPN server to Layer 2 Tunneling Protocol.
A company' s environment includes an Active Directory Domain Services (AD DS) domain. The rint server runs Windows Server 2008 R2 and all printers are networked by using TCP/IP. Only omain users have permissions to access the print server and printers published in AD DS. A visitor is connected to the network with a computer running Windows 7 Professional. The computer is not joined to the company domain. The user does not have a domain user account. You have a copy of the printer drivers on a USB flash drive because the drivers are not included with Windows 7. These drivers have never been installed on the visitor' s computer. The visitor wants to print to a network printer. You need to install the printer on the visitor' s computer. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
From the Add a Printer dialog box, choose Add a network, wireless or Bluetooth printer. Add a printer using a TCP/IP address or host name.
From the Install the printer driver window, choose Have Disk.
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain.A network administrator changes the IP address of a file server.Employees are unable to connect to the file server.You need to ensure that the employees are able to connect to the file server immediately.What should you do?
Run a remote Windows PowerShell script to flush the DNS resolver cache on each computer.
Study Guides