IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 덤프자료

MCITP: MS 서버 관련 자격증

 

 

 

 

IT자격증을 많이 취득하여 IT업계에서 자신만의 단단한 자리를 보장하는것이 여러분들의 로망이 아닐가 싶습니다. Pass4Test의 완벽한 MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 덤프는 IT전문가들이 자신만의 노하우와 경험으로 실제 MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 시험문제에 대비하여 연구제작한 완벽한 작품으로서 100%시험통과율을 보장합니다.Pass4Test의 완벽한 MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 덤프는 고객님이  MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 시험을 패스하는 지름길입니다. 시간과 돈을 적게 들이는 반면 효과는 십점만점에 십점입니다. Pass4Test의 MCITP 70-685 (Pro: Windows 7, Enterprise Desktop Support Technician) 덤프를선택하시면 고객님께서 원하시는 시험점수를 받아 자격증을 쉽게 취득할수 있습니다.

 

 

 

 

NO.1 You deploy Microsoft Office 2007 to a pilot group in the main office.
Users in the pilot group report that all of the Office 2007 applications run successfully.
You deploy Office 2007 to users in the New York call center. The call center users report that they are
unable to launch the Office 2007 applications.
You need to ensure that the call center users can run all of the Office 2007 applications.
What should you do?
A. Modify the AppLocker rule.
B. Disable User Account Control (UAC).
C. Deploy the 2007 Office system Administrative Template files.
D. Configure the Office 2007 applications to run in Windows Vista compatibility mode.
Answer: A

NO.2 The chief financial officer (CFO) releases new guidelines that specify that only users from finance are
allowed to run FinanceApp1.
Users in the Marketing OU report that they can run FinanceApp1.
You need to ensure that only users in the Finance OU can run FinanceApp1.
What should you do?
A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path
rule.
Answer: A

NO.3 Users report that their DirectAccess connections fail.
You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess
troubleshooter.
The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to
function.
You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions
properly.
What should you do?
A. Instruct the help desk to enable IPv6 on the users' computers.
B. Instruct the help desk to modify the users' Windows Firewall settings.
C. Request that the domain administrator configure the Teredo State Group Policy setting.
D. Request that the domain administrator configure the Corporate Website Probe URL Group Policy
setting.
Answer: D

NO.4 Datum hires several consultants to work at the main office for six months. The consultants require
Internet access.
The help desk reports that the consultants cannot access the company's wireless network.
You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to
the corporate security policy.
What should you request?
A. that a wireless access key be given to each consultant
B. that a user certificate be generated and imported to each consultant's computer
C. that a computer certificate be generated and imported to each consultant's computer
D. that a network administrator install a wireless access point that is connected directly to the Internet
Answer: D

NO.5 Several mobile users access the Internet by using cellular connections.
The help desk reports a high volume of calls from mobile users who report the following connection
problems:
- When their cellular connections fail, their VPN connections also fail.
- When their cellular connections are reestablished, they must manually connect to the VPN server.
You need to recommend a solution to ensure that the VPN connections are automatically reestablished.
What should you recommend?
A. Implement an IKEv2 VPN.
B. Implement an SSTP-based VPN.
C. Configure credential roaming.
D. Configure a Kerberos user ticket lifetime.
Answer: A

NO.6 Users in the research department report that they cannot run App1 or Windows XP Mode.
You need to ensure that all research department users can run App1. You need to achieve this goal by
using the minimum amount of administrative effort.
What should you do?
A. Approve all Windows 7 updates on WSUS1.
B. Enable hardware virtualization on the research department computers.
C. Give each member of the research department a computer that has an Intel Core i5 processor.
D. Request that a domain administrator create a GPO that configures the Windows Remote Management
(WinRM) settings.
Answer: B

NO.7 The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application.
What should you do?
A. Disable User Account Control (UAC).
B. Add the users to the local Administrators group.
C. Request that the application package be re-signed.
D. Request that the user certificates be issued to the new users.
Answer: C

NO.8 The company purchases 500 USB flash drives from a new hardware vendor and distributes them to the
users.
The help desk reports that the users are unable to access the new USB flash drives.
You need to ensure that users can save data on the USB flash drives.
What should you do?
A. Instruct the help desk to modify the BitLocker settings.
B. Instruct the help desk to modify the Windows Defender settings.
C. Request that an administrator modify the driver signing policy.
D. Request that an administrator modify the device installation restriction policy.
Answer: D

NO.9 Users in the ERPApp1 pilot project report intermittent application issues.
You need to consolidate all application events for the users in a central location.
What should you do.?
A. Configure event subscriptions.
B. Configure the Advanced Audit Policy Configuration settings.
C. Create a custom view in Event Viewer.
D. Create a user-defined Data Collector Set.
Answer: A

NO.10 Users in branch office 1 report that they fail to access the company's intranet Web site located on
Web1.
They also fail to access Web sites on the Internet.
A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP
configuration shown in the following screenshot.
You need to resolve the network connectivity issue.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
A. Instruct branch office 1 users to disable IPv6.
B. Instruct branch office 1 users to run Ipconfig /Renew.
C. Request that a network administrator configure the DHCP router option for branch office 1.
D. Request that a network administrator verify DHCP broadcasts are being relayed to the main office.
Answer: BD

NO.11 Users access a third-party Web site.
The Web site is updated to use Microsoft Silverlight.
After the update, the help desk receives a high volume of phone calls from users who report that the Web
site fails to function.
You need to ensure that the Web site functions properly for the users.
What should you do?
A. Modify the Windows Internet Explorer AJAX settings by using a Group Policy object (GPO).
B. Modify the Windows Internet Explorer add-ons settings by using a Group Policy object(GPO).
C. Add the Web site to the Windows Internet Explorer Compatibility View list by using a Group Policy
object (GPO).
D. Add the Web site to the Windows Internet Explorer Restricted sites by using a Group Policy object
(GPO).
Answer: B

NO.12 Five users from the main office travel to the branch office. The users bring their portable computers.
The help desk reports that the users are unable to access any network resources from the branch office.
Branch office users can access the network resources.
You need to ensure that the main office users can access all network resources by using their portable
computers in the branch office. The solution must adhere to the corporate security guidelines.
What should you instruct the help desk to do on the portable computers?
A. Create a new VPN connection.
B. Add the users to the local Administrators group.
C. Add the users to the Network Configuration Operators group.
D. Configure the alternate configuration for the local area connection.
Answer: D

NO.13 The help desk reports that users in the Marketing OU print draft documents, e-mails, and other
miscellaneous documents on Printer2.
You need to recommend a solution so that marketing users print documents to Printer1 by default.
What should you do?
A. Enable printer pooling.
B. Configure Group Policy Preferences.
C. Modify the priorities of the shared printers.
D. Modify the permissions of the shared printers.
Answer: B

NO.14 You have two external consultants. The consultants use their own personal portable computers.
The consultants report that they are unable to connect to your wireless network.
You need to give the consultants wireless access to the Internet. The solution must prevent external
consultants from accessing internal resources.
What should you do?
A. Issue a user certificate to the consultants.
B. Issue a computer certificate to the consultants.
C. Join both portable computers to the domain. Add the computer accounts to the MargiesTravel\Wireless
group.
D. Create a domain user account for each consultant. Add the user accounts to the
MargiesTravel\Wireless group.
Answer: B

NO.15 The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer's hard disk
drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable
computers.
Which tool should you use?
A. CertUtil.exe
B. Cipher.exe
C. Manage-bde.exe
D. SDelete.exe
Answer: C

NO.16 The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing.
What should you request?
A. that a WSUS administrator generate a Computer Report from WSUS1
B. that a domain administrator run the Microsoft Baseline Security Analyzer (MBSA)
C. that a desktop support technician run a Windows Defender scan on each computer
D. that a desktop support technician generate a System Configuration report for each computer
Answer: B

NO.17 The Office1 network link is brought offline for emergency maintenance.
Users in Office2 and Office3 report that they cannot connect to the wireless network.
You need to recommend changes to ensure that users in all offices can connect to the wireless network if
a WAN link fails.
What should you recommend?
A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured
Answer: B

NO.18 At 08:00 on a Tuesday morning, an administrator in Site 3 takes DC3 offline to update the server.
Users in Site 3 report that they cannot log on to their computers. The users receive the following error
message: "Your account has time restrictions that prevent you from logging on at this time.
Please try again later."
You need to ensure that all users can log on to their computers when DC3 is offline for maintenance. Your
solution must adhere to the corporate security policies.
What should you do?
A. Modify the logon hours for all users in Site 3.
B. Change the time zone settings for all client computers in Site 3 to UTC-05:00.
C. Request that a second domain controller be deployed in Site 3.
D. Request that the time zone settings for DC1 and DC2 be changed to UTC-08:00.
Answer: C

NO.19 The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need
administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must
adhere to the corporate security guidelines. What should you recommend?
A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.
Answer: A

NO.20 The motherboard on a portable computer fails. The data on the computer's hard disk drive cannot be
recovered.
You need to recommend a solution to ensure that the data on hard disks can be recovered if the
motherboard on other portable computers fail
Which two configurations should you recommend? (Each correct answer presents part of the solution.
Choose two.)
A. Disable BitLocker on all portable computers.
B. Convert the hard disks on all portable computers to dynamic disks.
C. Export and securely store the computer certificates on all portable computers.
D. Configure the BitLocker settings on all portable computers by using Group Policy.
Answer: AD
Posted 2013/5/15 7:38:20  |  Category: 미분류  |  Tag: