aiotestking uk

70-685 Exam Questions - Online Test


70-685 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You deploy a WAP in the company's Beijing office. Client computers connect to it by using the WiFi GPO. You deploy an 802.IX authentication server that is used to authenticate wireless connections.

You need to ensure that the wireless authentication meets the company's requirements.

Which security option should you configure the wireless connections to use?

A. WPA-Enterprise

B. WEP

C. WPA2-Personal

D. No authentication (Open)

Answer: A

Q2. All client computers on your company network are members of an Active Directory Domain Services domain.

The Finance team uses Remote Desktop to access Windows 7 virtual machines that are hosted on a Windows Server 2008 Hyper-V server.

The team members receive the following error message when they attempt to log on to the virtual machines:

"The trust relationship between this workstation and the primary domain failed."

You discover that the Hyper-V server was recently restored from a backup.

You need to ensure that the team members can log on to the virtual machines.

You log on to the virtual machines as local administrator. 

What should you do next?

A. Modify the computer name of each virtual machine.

B. Run the netdom join command on each virtual machine.

C. Restore each virtual machine by using the System Restore tool.

D. Make each virtual machine a member of a workgroup and join them back to the domain.

Answer: D

Q3. A corporate environment includes client computers running Windows 7 Enterprise. The client computers are joined to an Active Directory Domain Services (AD DS) domain. A member server named SERVER01 hosts shared folders and a website. DNS is the primary name-resolution protocol in use. There have been no recent changes to the DNS entries.

The user of a client computer named PC01 can access the shared folders, but cannot access the website by using Windows Internet Explorer. Users of other client computers can access the shared folders and the website.

You need to recommend an approach for ensuring that the user can access the website from PC01.

What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. Clear the proxy server setting from Internet Explorer on PC01.

B. Run the ipconfig /registerdns command from SERVER01.

C. Run the ipconfig /flushdns command from PC01.

D. Restart the World Wide Web Publishing service on SERVER01.

Answer: C

Q4. One of the company's client computers is configured with the company's System Protection settings. That computer becomes unresponsive. You run a system restore on the computer.

The system restore does not restore the computer system settings.

You need to ensure that all future system restores for the computer include system settings.

You reimage the client computer with the company's corporate image.

What should you do next?

A. Modify the System Protection properties for the C volume

B. Create a new system restore point

C. Modify the Shadow Copies properties for the C volume

D. Create a new critical volume backup

Answer: A

Q5. Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise.

A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry.

The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings.

You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1. 

What should you do?

A. Instruct the help desk to modify the Windows Defender settings.

B. Instruct the help desk to remove all users from the Administrators group on all local computers.

C. Request that a domain administrator create a Group Policy object (GPO) that uses a custom administrative template.

D. Request that an administrator create a Group Policy object (GPO) that configures a software restriction policy.

Answer: C

Q6. All client computers on your company network run Windows 7. Each computer has four 1-GB RAM modules and a single physical disk.

When the employees run a three-dimensional (3-D) design application that extensively uses the RAM, they experience slow performance on their computers.

You discover that the swap files on the computers are extensively used.

You need to improve the performance of the computers.

What should you do?

A. Disable the hardware acceleration setting on the computers.

B. Replace the four 1-GB RAM modules on the computers with two 2-GB RAM modules.

C. Move the page file to the same directory that contains the executable file for the 3-D design application.

D. Configure the virtual memory on the computers so that the initial size of the virtual memory is equal to the maximum size of the virtual memory.

Answer: D

Q7. Five users from the main office travel to the branch office. The users bring their portable computers.

The help desk reports that the users are unable to access any network resources from the branch office.

Branch office users can access the network resources.

You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines.

What should you instruct the help desk to do on the portable computers?

A. Create a new VPN connection.

B. Add the users to the local Administrators group.

C. Add the users to the Network Configuration Operators group.

D. Configure the alternate configuration for the local area connection.

Answer: D

Q8. All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.

You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).

You need to ensure that the following requirements are met:

     All BitLocker recovery keys are stored in a central location.

     Data is encrypted only after a backup of the recovery key is available.

What should you do?

A. Run the manage-bde -on -ForceRecovery command.

B. Enable the Choose default folder for recovery password setting.

C. Enable the Store BitLocker recovery information in Active Directory Domain Services setting.

D. Enable the Choose how users can recover BitLocker encrypted drives setting. Set the 256-bit recovery key to Require recovery password.

Answer: C

Q9. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.

Topic 11, Baldwin Museum of Science

Scenario:

You are an enterprise desktop support technician for the Baldwin Museum of Science.

The Baldwin Museum of Science is located in Dublin. The museum has 2,000 employees. All employees have laptop computers that have cellular connections.

The museum has a main office and three satellite offices.

Active Directory Configuration

The network contains an Active Directory forest. The forest contains a domain named Baldwinmuseumofscience.com.

The relevant group policy information is shown in the following table:

Users access the network remotely by using a DirectAccess connection.

Client Computer Information

All client computers run Windows 7 Enterprise (x86). The client computers are configured to receive Windows Updates from http://WSUS.

Application Configuration

All users run Microsoft Office Outlook 2010 and use Outlook Anywhere. Users access the intranet Web site by using the URL http://intranet.

The museum hosts several Web sites that use the domain suffix fineartschool.net.

Corporate Security Policy

The corporate security policy states that all updates on client computers must be installed from the internal WSUS server.

Users report that they can only access the fineartschool.net Web servers by entering the full URL to the servers.

You need to recommend a solution that allows users to access the Web servers by using single label names. 

Your solution must ensure that users can access the intranet Web server by using the URL http://intranet.

What should you recommend?

Users report that they can only access the fineartschool.net Web servers by entering the full URL to the servers.

You need to recommend a solution that allows users to access the Web servers by using single label names. Your solution must ensure that users can access the intranet Web server by using the URL http://intranet.

What should you recommend?

A. the DHCP server option for the DNS domain name be removed

B. fineartschool.net be added as the primary DNS suffix in the Default Domain Policy

C. fineartschool.net be added to the DNS Search Suffix list in the Default Domain Policy

D. the Allow DNS Suffix Appending to unqualified Multi-Label Name Queries setting be enabled in the Default Domain Policy

Answer: C

Q10. All client computers on your company network run Windows 7.

The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors.

You need to capture only the relevant data to generate a report.

What should you do?

A. Open Event Viewer and sort by Source.

B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.

C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.

D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.

Answer: B