★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-685 Exam Dumps (PDF & VCE):
Available on:
https://www.certleader.com/70-685-dumps.html
Act now and download your Microsoft 70-685 test today! Do not waste time for the worthless Microsoft 70-685 tutorials. Download Avant-garde Microsoft Pro: Windows 7, Enterprise Desktop Support Technician exam with real questions and answers and begin to learn Microsoft 70-685 with a classic professional.
2021 Aug free 70-685 study guide:
Q81. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.
Topic 7, Contoso, Ltd.
Scenario:
You are an enterprise desktop support technician for Contoso, Ltd.
IP Addressing
Contoso has one office. The IP addressing for Contoso is configured as shown in the following table:
A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication.
Printer Configuration
Network printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers.
Client Computer Configuration
Most users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise.
The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain.
All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the previous version of App1.
The help desk reports that several users use the previous version of App1, which causes some data to become corrupt.
You need to recommend a solution to prevent all users from using the previous version of App1.
What should you recommend?
A. that a domain administrator create a GPO linked to the domain and configure AppLocker settings in the GPO
B. that a domain administrator create a GPO linked to the domain and configure Software Installation settings in the GPO
C. that the new version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer
D. that the previous version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer
Answer: A
Q82. A user's computer fails. The help desk provides the user with a new computer. The user's Documents folder is restored from the backup.
The user reports that he can no longer access his encrypted files. The help desk recovers the files by using a data recovery agent (DRA).
You need to ensure that when users receive new computers, they can access their encrypted files without administrative intervention.
What should you request?
A. credential roaming be enabled
B. BitLocker be enabled on all computers
C. user accounts be trusted for delegation
D. the CA be configured for key archival and recovery
Answer: A
Q83. All client computers on your company network run Windows 7. The Finance department staff run an application that collects data from 09:30 hours to 15:00 hours everyday. After data collection, the application generates reports that contain data aggregation for the day and the previous week.
During report generation, the Finance department staff experience slow performance on their computers.
You discover that the usage of the processor on these computers is between 90 and 100 percent. You need to reduce the impact of report generation on the Finance computers.
What should you do?
A. Set the priority of the application to Low.
B. Set the priority of the application to Real-time.
C. Configure the processor affinity mask to ensure that the application uses all the available processors.
D. Modify the memory settings of the computers to optimize the performance of the background applications.
Answer: A
Q84. All client computers on your network have identical hardware.
Your network adapter vendor releases a new driver. Several users install the new driver.
The help desk technicians report that several users are unable to connect to network resources. The technicians instruct the users to restart their computers. When the users log on to their computers, they are still unable to connect to network resources.You need to recommend a solution to ensure that users can connect to network resources.
What should you instruct the users to do?
A. Roll back the network adapter driver.
B. Restore the last known good configuration.
C. Enable the network boot option in the BIOS.
D. Modify the properties on the Network Location Awareness service.
Answer: A
Q85. A client computers on your company network run Windows 7. Employees log on to their computers as Standard users.
There is a zero-day malicious software attack affecting your network. Employees receive User AccountControl (UAC) messages frequently requesting permission to elevate privileges. You know that this malicious software attack is responsible for these UAC prompts.
You need to ensure that employees are unable to provide elevated credentials.
What should you do?
A. Configure the Group Policy User Account Control: Only elevate executables that are signed and validated setting to Disabled.
B. Configure the Group Policy User Account Control: Switch to the secure desktop when prompting for elevation setting to Disabled.
C. Configure the Group Policy User Account Control: Behavior of the elevation prompt for standard users setting to Automatically deny elevation requests.
D. Configure the Group Policy User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to Prompt for consent for non-Windows binaries.
Answer: C
Abreast of the times vce 70-685:
Q86. VPN users report that they cannot access shared resources in the branch offices. They can access shared resources in the main office.
Users in the main office report that they can access shared resources in the branch offices.
You need to ensure that the VPN users can access shared resources in the branch offices.
What should you request?
A. that a change be made to the routing table on VPN1
B. that VPN1 be configured to support PPTP-based VPN connections
C. that the routers between the main office and the branch offices be reconfigured
D. that a DNS record for servers in the branch offices be added to the Internet DNS zone for fourthcoffee.com
Answer: A
Q87. When visiting certain websites, users receive a message in Internet Explorer.
The message is shown in the exhibit:
You need to ensure that the Internet Explorer settings for all client computers follow company requirements.
What should you modify in Group Policy?
Exhibit:
A. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Turn on Protected Mode setting.
B. Disable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
C. Enable the Internet Explorer\Internet Control Panel\Prevent ignoring certificate errors setting.
D. Disable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
E. Enable the Windows Components\Windows Error Reporting\Disable Windows Error Reporting setting.
F. Enable the Internet Explorer\Internet Control Panel\Security Page\Internet Zone\Do not prompt for client certificate selection when no certificate or only one certificate setting.
Answer: C
Q88. The company purchases 500 USB flash drives from a new hardware vendor and distributes them to the users.
The help desk reports that the users are unable to access the new USB flash drives.
You need to ensure that users can save data on the USB flash drives.
What should you do?
A. Instruct the help desk to modify the BitLocker settings.
B. Instruct the help desk to modify the Windows Defender settings.
C. Request that an administrator modify the driver signing policy.
D. Request that an administrator modify the device installation restriction policy.
Answer: D
Q89. All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group.
A new version of a business software application is available on the network.
You plan to apply an AppLocker security policy to the R&D group.
You need to ensure that members of the R&D group are not allowed to upgrade the software.
What should you do?
A. Create an Audit only restriction based on the version of the software.
B. Create an Audit only restriction based on the publisher of the software.
C. Create an Enforce rule restriction based on the version of the software.
D. Create an Enforce rule restriction based on the publisher of the software.
Answer: C
Q90. Remote users report that after they renew their smart card certificates, they are unable to log on to their computers by using their smart cards.
You need to ensure that users can log on by using their smart cards.
What should you instruct the users to do?
A. Change their smart card PINs.
B. Request a new smart card certificate.
C. Log on by using their user names and passwords, and then lock and unlock their computers.
D. Establish a VPN connection from the logon screen and use their smart cards for authentication.
Answer: D