70-685 - Pro: Windows 7, Enterprise Desktop Support Technician

Go back to Microsoft

Exam FAQ

How much does the 70-685 exam cost? What is the best way to study for the 70-685 exam?

Example Questions

All client computers on your company network run Windows 7.An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message: "Logon failure: unknown user name or bad password." You need to ensure that the service runs successfully. What should you do? All client computers on your company network run Windows 7. A computer is unable to connect to network resources. The configuration of the computer is as shown in the following table. IP address 131.107.4.254 Subnet mask 255.255.240.0 Default gateway 131.107.15.255 Preferred DNS server 131.107.3.2 You need to ensure that the computer is able to connect to network resources. What should you do? Members of the Sales Support team must contact the help desk to have their AD DS user accounts unlocked. You need to recommend a solution to ensure that user accounts for members of the Sales Support team are automatically unlocked 10 minutes after becoming locked. What should you recommend? All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do? All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. All portable computers connect only to the 802.1X-authenticated wireless network. Wireless settings are set through the domain's Group Policy. You discover that new portable computers cannot be joined to the domain. You need to ensure that new portable computers can be joined to the domain. What should you do? Your company has a main office and a branch office. The network contains a single Active Directory domain. All servers and client computers are members of the domain. A print server is located in the branch office. All other servers are located in the main office. All servers run Windows Server 2008 R2. All client computers run Windows 7. Users in the branch office report poor performance when they access an intranet Web site in the main office. You need to recommend changes to the network to improve the performance of intranet access by computers in the branch office. What should you recommend implementing? All client computers on your company network run Windows 7. The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors. You need to capture only the relevant data to generate a report. What should you do? You are a systems administrator for an enterprise network. You need to install several Windows Installer packages from a script, in sequence. Some of the packages require that the computer be restarted. However, you want to restart the computer only once. Which of the following scripts installs the App1.msi, App2.msi, and App3.msi packages without prompting the user and then restarts only once, after all packages have been installed? You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. During the course of the day you discover that the client computers are infected with malicious software from removable storage devices. ABC.com wants you to prevent malicious software on the removable devices from running automatically on the client computers. How can you prevent the malicious software from running automatically? Alpine Ski House. Your users access a third-party Web site to fulfill purchase orders. The Web site is updated. Users receive the following error message when they access the updated Web site: ' Internet Explorer has blocked this site from using an ActiveX control in an unsafe manner. As a result, this page may not display correctly.' You need to ensure that users can access the Web site and that the Web site content is displayed correctly. What should you do? All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do? All client computers on your company network run Windows 7. All servers in your company run Windows Server 2008 R2. Employees use a VPN connection to connect to the company network from a remote location. Employees remain connected to the VPN server to browse the Internet for personal use. You need to ensure that employees are unable to use the VPN connection for personal use. What should you do? Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise. A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry. The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings. You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1. What should you do? Users at the Manufacturing site must have a secondary method of decrypting their existing files if hey lose access to their certificate and private key or if the EFSAdmin' s certificate is not available. You need to recommend a solution to ensure that a secondary method is available to users. The solution must not require accessing or altering the existing encrypted files before decrypting them. What should you recommend that the users do? You deploy a WAP in the company' s Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.1X authentication server that is used to authenticate wireless connections. You need to ensure that the wireless authentication meets the company' s requirements. Which security option should you configure the wireless connections to use? You have a laptop that runs the Windows 7 operating system. You have made several image backups of your computer to an external drive. You created an image backup of your laptop two days ago to the same external drive. Today you notice that several folders of music files, documents, and photos under the C:\My Files directory were inadvertently deleted last week. What should you do to restore folders of music files, documents, and photos that were deleted? Which of the following services must be running on the client computer to use event forwarding? (Each correct answer presents part of the solution. Choose two.) All client computers on your company network run Windows 7. An application has stopped working. The application is dependent on a service that runs automatically and logs on to the domain by using a dedicated service account. You also discover that an entry in the event log has the following message: "Logon failure: unknown user name or bad password." You need to ensure that the service runs successfully. What should you do? All client computers on your company network were recently upgraded from Windows Vista to Windows Several employees use a scanner to import document images into a database. They install a new scanning application on their computers. The application updates the device driver for the scanners as part of the installation process. Employees report that the application can no longer connect to the scanner. You need to ensure that the employees can use the scanner. What should you do? The Office1 network link is brought offline for emergency maintenance. Users in Office2 and Office3 report that they cannot connect to the wireless network. You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails. What should you recommend? A corporate environment includes client computers running Windows 7 Enterprise. The hard drives of all client computers are encrypted by using Windows BitLocker Drive Encryption. The operating system of a client computer is not found. You are unable to repair the operating system. You need to recommend an approach for salvaging data from the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.) A company has computers that run Windows 7 Enterprise. When trying to open a file on a local hard disk, a user receives an _ error reading file_ message. The user also hears clicking noises when accessing the disk. You need to access the data on the disk. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) All client computers on your company network run Windows 7. Your company has a Windows Server 2008 domain. You plan to use Group Policy to enable BitLocker Drive Encryption (BDE). You need to ensure that the following requirements are met: ·All BitLocker recovery keys are stored in a central location. ·Data is encrypted only after a backup of the recovery key is available. What should you do? All client computers on your company network run Windows 7. You discover that memory usage on the computers is high. You need to find the cause of the issue. What should you do? Margie´s Travel. Users access a third-party Web site. The Web site is updated to use Microsoft Silverlight . After the update, the help desk receives a high volume of phone calls from users who report that the Web site fails to function. You need to ensure that the Web site functions properly for the users. What should you do? All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do? All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain. A network administrator changes the IP address of a file server. Employees are unable to connect to the file server. You need to ensure that the employees are able to connect to the file server immediately. Which command should you instruct the employees to run? A shared client computer running Windows 7 is responding and loading applications slowly. indows Task Manager indicates that available memory is low and that several applications, which are not running on the desktop, are using a large amount of memory. You need to recommend an approach for optimizing the performance of the client computer. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.) You have an Active Directory domain. All client computers run Windows 7 and are joined to the domain. The help desk reports that several users recently downloaded and installed malware. You discover that the users modified the Windows Defender settings on their computers. You need to recommend a solution to prevent users from modifying their Windows Defender settings. What should you recommend? All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain. Malicious software is spreading automatically from removable drives. You need to ensure that malicious software does not automatically run on the computers. What should you do? All client computers on your network have identical hardware. Your network adapter vendor releases a new driver. Several users install the new driver. The help desk technicians report that several users are unable to connect to network resources. The technicians instruct the users to restart their computers. When the users log on to their computers, they are still unable to connect to network resources. You need to recommend a solution to ensure that users can connect to network resources. What should you instruct the users to do? All client computers on your company network run Windows 7. A standard Windows 7 image is loaded on all new computers on the network. A department in your company purchases several tablet computers. Employees report that the pen interface does not work on the tablet computers. You need to ensure that employees can use the pen interface. What should you do? You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7 and all servers run Windows Server 2008. ABC.com is planning to enable BitLocker Drive Encryption (BDE) through the use of a Group Policy. To prevent the risk of encrypted data being unrecoverable, you want to centralize the storage of the BitLocker recovery keys and to ensure that data is only encrypted once the backup of the recovery key is available. How should you implement Bitlocker Drive Encryption? Your company has a main office and a branch office. The network contains a single Active Directory domain. All computers are members of the domain. Five users in the branch office report that their Windows 7 computer is slow when it runs multiple applications. From your computer, you need to identify the application that uses the most processor on the computers. Which tool should you use? You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. All client computers are members of the ABC.com domain. ABC.com wants you to configure Windows Explorer to not display previews of documents in the results of a search. What is the best way to disable the preview of documents in the Search results? You are a help desk operator at a support center. You are working with the IT department to assess the changes required as it upgrades to Windows 7 and begins running all users with standard user privileges instead of administrative privileges. Which of the following tasks require administrative privileges? (Each correct answer presents a complete solution. Choose three.) Users in the ERPApp1 pilot project report intermittent application issues. You need to consolidate all application events for the users in a central location. What should you do? You are a systems administrator for an enterprise network. You need to install a Windows Installer package from the command line. Which tool should you use? Your company has a main office and a branch office. A user from the branch office reports that he receives stop errors on his desktop computer. A help desk technician reports that the errors are caused by a defective internal smart card reader. You plan to remove the smart card reader next week. You need to recommend a solution that prevents the stop errors from re-occurring when the computer is restarted. What should you recommend? You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7 and all servers run Windows Server 2008 R2. All ABC.com uses use an in-house application. The users in the Finance Department are local administrators on their respective computers. The ABC.com developers have created a new beta version of the application. You want to prevent the Finance users from upgrading to the new version of the application while it is still being tested by the developers. You create a global security group named Finance Users and add the users in the Finance department to the group. How can you prevent the Finance Users from upgrading to the new version of the application? A. Datum Corporation. Users in the research department report that they cannot run App1 or Windows XP Mode. You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? You install an application on one of the company_ s test computers. The application fails to run and is affecting other applications. You are unable to uninstall the application successfully. You need to remove the application from the test computer without modifying user documents. What should you do? You are a systems administrator for an enterprise network that uses Active Directory Domain Services to manage client computers. You are in the process of configuring event forwarding on a client computer. Your user name is Admin1, the computer name from which you are performing monitoring tasks is Monitor, and your domain name is Contoso.com. Which of the following security changes do you need to make on the client computer to enable event forwarding? All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7 What should you do? You are a systems administrator planning an automated deployment of Windows 7. You need to configure a script to run automatically after installation completes. Which tool would you use to configure this? You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7. During the course of the day you discover that malicious software has infected the ABC.com network and is causing ABC.com users to receive User Account Control (UAC) prompts for elevated privileges. ABC.com wants you to prevent users from allowing the malicious software to run with elevated privileges. How can you accomplish this task? All client computers on your company network were recently migrated from Windows XP to Windows 7. Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7_ compatible version is developed. A security update is made for this application. The update must be tested and then deployed as a new version of the application. During testing you are unable to install the application. You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment. What should you do? All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows What should you do? A company' s environment includes an Active Directory Domain Services (AD DS) domain. The rint server runs Windows Server 2008 R2 and all printers are networked by using TCP/IP. Only omain users have permissions to access the print server and printers published in AD DS. A visitor is connected to the network with a computer running Windows 7 Professional. The computer is not joined to the company domain. The user does not have a domain user account. You have a copy of the printer drivers on a USB flash drive because the drivers are not included with Windows 7. These drivers have never been installed on the visitor' s computer. The visitor wants to print to a network printer. You need to install the printer on the visitor' s computer. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain.A network administrator changes the IP address of a file server.Employees are unable to connect to the file server.You need to ensure that the employees are able to connect to the file server immediately.What should you do?

Study Guides