Question No: 71 – (Topic 13)
You are deploying a WAP in one of the company#39;s locations.
You need to ensure that wireless connectivity meets the company#39;s requirements. What should you recommend? (Choose all that apply.)
Link the GPO to an OU that contains all client computer accounts.
Create a GPO and define an IP Security policy.
Create a GPO and define a Wireless Network (IEEE 802.IX) policy.
Create a GPO and define a Network List Manager policy.
Link the GPO to an OU that contains all user accounts.
Answer: A,C Explanation:
Might be related to Exam B Question 12 Topic 13, Enterprise Company no sure about answers
Question No: 72 – (Topic 13)
You deploy a WAP in one of the company locations. Client computers connect to it by
using the WiFi GPO.
You need to ensure that users cannot change the network location for the connection. Which policy should you define?
Wireless Network (IEEE 802.11)
Network List Manager
Windows Firewall with Advanced Security
Answer: C Explanation:
Chapter 7 p 346 – 348
Question No: 73 – (Topic 13)
Users in the Sales Support team access a web application that uses AD DS for authentication.
Thirty days after their user accounts are created users cannot authenticate to run the application.
You need to ensure that the Sales Support team can continue to use the web application. What should you do?
Modify the Account Expires options for the Sale Support team user accounts.
Instruct the users to reset their passwords by using OWA (Outlook Web Access).
Instruct the users to reset their passwords by using the Local Users and Groups snap-in.
Modify the Logon Hours options for the Sales Support team user accounts.
Answer: B Explanation:
B. The pc#39;s are not part of the domain so the users need a way to reset their AD password.
Topic 14, Mixed Questions
Question No: 74 – (Topic 14)
Your company has an Active Directory Domain Services domain named contoso.com. All client computers run Windows 7 and are members of the contoso.com domain.
All computers are configured to use a proxy server as shown in the exhibit. (Click the Exhibit button.)
An internal SSL Web application named Webapp1 does not run properly when it is accessed through a proxy server.
Employees type https://Webapp1.contoso.com into their browsers and attempt to run the Web application. They are still unable to run the application.
You need to ensure that employees can run the Web application. What should you do?
Add https: //Webapp1 to the Exceptions list.
Clear the Bypass proxy server for local addresses check box.
Instruct employees to type https: //Webapp1 into their browsers.
Instruct employees to type http: //Webapp1.contoso.com into their browsers.
Question No: 75 DRAG DROP – (Topic 14)
A company has client computers that run Windows 7 Enterprise.
Malicious files have caused a client computer to become unresponsive. You delete the suspicious files. On reboot, the suspicious files reappear.
You need to ensure that the malicious files are removed from the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Question No: 76 – (Topic 14)
You are troubleshooting recurring performance issues on a Windows 7 client computer.
Each time a performance issue occurs, an associated event log entry is written to the Application event log.
You need to recommend ways to query the Application event log from the command line. Which commands should you recommend? (Choose all that apply.)
wevtutil qe application / rd:true / f:text
eventvwr / happlication.evtx
wevtutil gl application
Get-Event – Eventldentifier =2
Get- WmiObject Win32_NTLogEvent -filter- LogFile #39;Application#39;quot;
Question No: 77 – (Topic 14)
All client computers on your company network run Windows 7. A software application that monitors Internet usage is installed on each of the computers.
You plan to collect all Critical and Error events generated by the application and review them on your computer.
You perform the following tasks on your computer:
->Create an event subscription by using Event Viewer.
->Create a query filter and select Critical and Error events from the Application event log.
You need to ensure that the following requirements are met:
->Only Critical and Error events from the Application event log are forwarded to your
->The Application event log can be viewed from your computer and the computers that generated the errors.
What should you do first?
Set the Subscription type property to Collector initiated by using a Windows Remote Shell Group Policy.
Set the Subscription type property to Source initiated by using a Windows Remote Management Service Group Policy.
Set the Subscription type and source computers property to Source computer initiated by using a Windows Remote Shell Group Policy.
Set the Subscription type and source computers property to Collector initiated by using a Windows Remote Management Client Group Policy.
Answer: B Explanation:
Question No: 78 – (Topic 14)
A corporate environment includes client computers running Windows 7 Enterprise.
Users are unable to start Windows Internet Explorer after several new ActiveX controls are deployed to their client computers.
You need to recommend an approach for determining whether the issue is caused by the ActiveX controls.
What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)
Start Internet Explorer in InPrivate Browsing mode.
Restart each client computer and select the Safe Mode startup option.
Start Internet Explorer in No Add-ons mode.
Restart each client computer and select the Last Known Good Configuration startup option.
Question No: 79 – (Topic 14)
A company has computers that run Windows 7 Enterprise.
A user#39;s computer has been crashing and showing error messages over the past several days.
You need to gather historical information about the errors. Which tools should you use? (Choose all that apply.)
Troubleshooting in Control Panel
Question No: 80 – (Topic 14)
All client computers on a company#39;s network run Windows 7 and are members of an Active Directory Domain Services (AD DS) domain. Company policy requires that all unnecessary services be disabled on the computers.
The Sales department staff has been provided with new wireless adapters that use the IEEE 802.11n technology.
You need to ensure that portable computers can connect to wireless networks. Which service should be running on the portable computers?
Portable Device Enumerator Service
Answer: D Explanation:
Start and right click Computer. Select and click Manage. Computer Management window will appear.
Under Services and Applications, click on Services. Start gt; Control Panel gt; Administrative Tools gt; Services
100% Dumps4cert Free Download!
–Download Free Demo:70-685 Demo PDF
100% Dumps4cert Free Guaranteed!
–Download 2018 Dumps4cert 70-685 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|