MCSA 70-685 Flashcards
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7
and all servers run Windows Server 2008 R2.
All ABC.com uses use an in-house application. The users in the Finance Department are local
administrators on their respective computers. The ABC.com developers have created a new beta
version of the application. You want to prevent the Finance users uABCrading to the new version
of the application while it is still being tested by the developers. You create a global security group
named Finance Users and add the users in the Finance department to the group.
How can you prevent the Finance Users uABCrading to the new version of the application?
A. You should configure Applocker with an Enforce rule restriction created based on the version of
the application.
B. You should configure Applocker with an Enforce rule restriction created based on the publisher
of the application.
C. You should configure a Software Restriction policy with a hash rule with the default setting
configured to Disallowed.
D. You should configure a Software Restriction policy with a hash rule with the default setting
configured to Unrestricted.
A. You should configure Applocker with an Enforce rule restriction created based on the version of
the application.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
All client computers are members of the ABC.com domain.
ABC.com has an AppLocker policy that requires all applications to be approved. However,
ABC.com users with standard user accounts are allowed to run applications installed in user
profile folders. You discover that this is allowing the users to run unauthorized applications from
their user profile folders.
How can you ensure that ABC.com users with standard user accounts are not able to run
unauthorized applications?
A. You should configure a Software Restriction Policy with a path rule and the default security
level set to Basic User.
B. You should configure a Software Restriction Policy with a Hash rule and the default security level set to Disallowed.
C. You should configure Applocker by selecting the Create Default Rules option to create
Executable Rules.
D. You should configure Applocker by selecting the Create Default Rules option to create
Windows Installer Rules.
C. You should configure Applocker by selecting the Create Default Rules option to create
Executable Rules.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. The client computers on the ABC.com network run a mix of
Windows XP and Windows Vista. All client computers are members of the ABC.com domain.
You uABCrade all the client computers to Windows 7 by using a single Windows 7 deployment
image. After the image deployment, users of portable Tablet PC computers report that the stylus
interface doesn’t work.
How can you enable the stylus interface on the tablet PCs?
A. You need to install the stylus interface drivers on the tablet PCs.
B. You need to use the Deployment Image Servicing and Management (DISM) utility to install the
stylus interface drivers in the deployment image. Then redeploy the image.
C. You need to use the ImageX utility to install the stylus interface drivers in the deployment
image. Then redeploy the image
D. You need to enable the Tablet PC components on the tablet PCs.
D. You need to enable the Tablet PC components on the tablet PCs.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
All client computers are members of the ABC.com domain.
ABC.com wants you to configure Windows Explorer to not display previews of documents in the
results of a search.
What is the best way to disable the preview of documents in the Search results?
A. You should create a Group Policy linked to the client computers that enables the Turn off the
display snippets in Content view mode option.
B. You should create a Group Policy linked to the client computers that disables the Preview Pane
in Windows Explorer.
C. You should create a Group Policy linked to the client computers that disables the Content View
in Windows Explorer.
D. You should create a Group Policy linked to the client computers with the Turn on Classic Shell
option.
A. You should create a Group Policy linked to the client computers that enables the Turn off the
display snippets in Content view mode option.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7. During the day you discovered that the event logs show errors from an application
source and Windows Kernel source. ABC.com wants you to monitor these errors to generate a
report that will capture and display only the relevant data.
How can you display only the relevant data?
A. You should open Event Viewer. Right click on the Security log and select Clear Log.
B. You should create a Custom View using the Event Viewer.
You should then add the application and security logs with the event sources and save the filter
results as an XML file.
C. You should open Event Viewer and sort events by Source.
D. You should create a Custom View using the Event Viewer.
You should then add the application and system logs with the event sources and save the filter
results as an XML file.
D. You should create a Custom View using the Event Viewer.
You should then add the application and system logs with the event sources and save the filter
results as an XML file.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7. ABC.com currently makes use of applications are accessible via Microsoft Windows
XP Mode (XPM). During the course of the day you receive complaints from the network users that
the Start menu shortcuts for these applications are not accessible.
How would you ensure that all the network client computers can access the Start menu shortcuts
for the legacy applications?
A. You should have the applications configured as Default Programs on the Microsoft Windows 7
client computers.
B. You should have the Auto Publish option enabled for Virtual Machine Settings on the Microsoft
Windows 7 client computers.
C. You should have a Group Policy configured with the Start Menu Redirection setting configured.
D. You should have the legacy applications re-installed on the Windows XP Mode (XPM)
computers.
E. You should have the legacy applications re-installed using the Repair option on the Windows
XP Mode (XPM) computers
B. You should have the Auto Publish option enabled for Virtual Machine Settings on the Microsoft
Windows 7 client computers.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows XP Professional. All client computers must be upgraded to Microsoft Windows 7. All
the installed applications including a legacy application currently in use must be reinstalled on the
client computers. Since the legacy application is not compatible with Microsoft Windows 7, you
created a shim to mitigate compatibility issues.
The vendor of the legacy application has recently released an updated version of the software
which should be tested. When deploying the updated legacy application in a test environment you
discovered that you are unable to install the application on the client computer. You want to run
the legacy application on the Windows 7 computers
Which two of the following options would enable you to install the updated application on a test
computer? Choose two.
A. You should have the shim modified to apply to all the versions of the software application.
B. You should have a new shim created to apply to the updated version of the software
application.
C. You should have a Virtual Hard Disk (VHD) created that runs Windows XP. Boot from the test
computer from the VHD to run the application.
D. You should run the application in Windows XP Mode on the test computer.
A. You should have the shim modified to apply to all the versions of the software application.
B. You should have a new shim created to apply to the updated version of the software
application.
You are the newly appointed enterprise administrator at ABC.com. The ABC.com network consists
of a single Active Directory domain named ABC.com. ABC.com contains a client workstation named ABC-WS123 that is running Windows 7. A
ABC.com user named Mia Hamm complained that she cannot log on to ABC-WS123. She
received an error message indicating that ABC-WS123’s computer account in its primary domain
is missing or the password on that account is incorrect. She was able to log on to the domain with
ABC-WS123 last week.
Which two of the following options will enable Mia Hamm to log on to the domain with ABCWS123?
A. You should create a computer account named ABC-WS123 using Active Directory Users and
Computers.
B. You should join ABC-WS123 to a workgroup.
C. You should join ABC-WS123 to the domain.
D. You should disable the computer account for ABC-WS123 using Active Directory Users and
Computers.
E. You should enable the computer account for ABC-WS123 using Active Directory Users and
Computers.
B. You should join ABC-WS123 to a workgroup.
C. You should join ABC-WS123 to the domain.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All computers are members of the ABC.com domain.
ABC.com currently makes use of a computer named ABC-SR01 which hosts Microsoft Windows
Server 2008 Hyper-V server.
ABC.com users use Remote Desktop connections to access Microsoft Windows 7 virtual
machines hosted on ABC-SR01. The users have recently reported that they receive an error
message stating that the trust relationship between their client computers the ABC.com domain
failed when trying to access the virtual machines.
You discovered the error message is due to ABC-SR01 recently being restored from a backup.
How can you ensure that the network users are able to log on to the virtual machines?
A. You should reset the computer accounts for the virtual machines in Active Directory.
B. You should log in as local administrator on each virtual machine and remove the virtual machines from the domain by adding them to a workgroup.
Then you should join the virtual machines to the domain again.
C. You should log in as local administrator on each virtual machine and have the domain
passwords for the virtual machines changed.
D. You should enable the computer accounts for the virtual machines in Active Directory.
B. You should log in as local administrator on each virtual machine and remove the virtual machines from the domain by adding them to a workgroup.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7.
The ABC.com network contains a web server named ABC-Web1. ABC-Web1 hosts the company
intranet web site. The intranet web site contains a web application that is dependent on a service
that runs on ABC-Web1. The service uses a dedicated domain service account named
ABC\WebApp.
When addressing a complaint by network users that the web application stopped working, you
discover that the event log has an entry displayed below:
“Logon failure: unknown user name or bad password.”
What can you do to ensure the web application runs successfully?
A. You should reset the password for the ABC\WebApp account then restart the intranet web site.
B. You should reset the password for the ABC\WebApp account and configure the password to
never expire. Then configure the service properties with the new password.
C. You should enable the ABC\WebApp account in Active Directory.
D. You should add the ABC\WebApp account to the local Administrators group on ABC-Web1.
E. You should add ABC-Web computer account to the Domain Computers group in Active
Directory.
B. You should reset the password for the ABC\WebApp account and configure the password to
never expire. Then configure the service properties with the new password.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7. Users report that a new client computer named ABC-WS52 is unable to access internet web sites.
ABC-WS52 can however access local network servers. You run the ipconfig /all command on
ABC-WS52 and receive the following output:
• IP address: 192.168.6.251
• Subnet mask: 255.255.240.0
• Default gateway: 192.168.15.255
• Preferred DNS server: 192.168.15.251
How can you enable ABC-WS52 to access internet web sites?
A. You should change the default gateway IP address to 192.168.15.1.
B. You should change the preferred DNS server IP address to 192.168.6.1.
C. You should run the Ipconfig /renew command on ABC-WS52.
D. You should change the default gateway IP address to 192.168.16.1.
A. You should change the default gateway IP address to 192.168.15.1.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
The network includes a proxy server named ABC-SR12. All client computers are configured to use
http://ABC-sr12 as their proxy server on port 8080. The option to bypass proxy server for local
addresses is enabled on all client computers.
The company Intranet website has been configured to require SSL connections and now uses the
URL https://intranet.ABC.com.
Users report that the company Intranet website doesn’t function correctly when accessed through
the proxy server.
ABC.com has requested that you make sure that the network users are able to access and
company Intranet.
What should you do?
A. You should instruct the network users to access the Intranet using https://intranet.
B. You should instruct the network users to access the Intranet using https://ABC-sr12.
C. You should instruct the network users to add https://intranet.ABC.com to the Local Intranet
zone in Internet Explorer.
D. You should instruct the network users to add https://intranet to the Local Intranet zone in
Internet Explorer.
A. You should instruct the network users to access the Intranet using https://intranet.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run either
Windows XP Professional or Microsoft Windows 7.
The Network Discovery Feature on the Windows 7 client computers has been enabled.
Consequently all Windows 7 client computers are displayed on the network map. However, you
discover that the Windows XP client computers do not appear on the map.
How can you ensure that the network map displays all the client computers?
A. You should have the Link Layer Topology Discovery (LLTD) Responder installed on the user
computers running Windows XP Professional.
B. You should have the Link Layer Topology Discovery (LLTD) Responder installed on the user
computers running Windows 7.
C. You should enable the Computer Browser service on the Windows XP Professional computers.
D. You should enable the Server service on the Windows XP Professional computers.
A. You should have the Link Layer Topology Discovery (LLTD) Responder installed on the user
computers running Windows XP Professional.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
During the day, the IP address of the file server was changed by another ABC.com administrator.
Some network users immediately started reporting that they are cannot access the file server.
Other network users are able to access the file server.
What is the easiest way to ensure that all users can access the file server so that productivity is not affected?
A. By having a remote Windows PowerShell script run to flush the client computers’ DNS resolver
cache.
B. By having a remote Windows PowerShell script run which reboots the client computers.
C. By logging in to each client computer and running the ipconfig /flushdns command.
D. By running the ipconfig /registerdns command on the file server.
A. By having a remote Windows PowerShell script run to flush the client computers’ DNS resolver
cache.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
The ABC.com network users currently use the URL http://intranet.ABC.com to access the
company intranet website. The ABC.com Development team is currently working on a new version
of the company intranet website. The Development team needs to be able to access the new
version on the intranet website using the URL http://intranet.ABC.com to test the new website.
How would you enable the Development team to access the new version of the website without
affecting the other network users’ access to the current site?
A. You should create a CNAME record in DNS to point to the new website.
B. You should have the Hosts file modified on the Development team computers to include an
entry which specifies intranet.ABC.com and the IP address of the test server.
C. You should modify the intranet.ABC.com DNS host record to specify the IP address of the test
server.
D. You should create an additional DNS zone with a host record for intranet.ABC.com. Modify the
permissions to allow only the Development team to query the DNS zone.
E. Install the DNS server service on the test server and configure a DNS zone for ABC.com.
Configure the Development team computers to use the test server as their DNS server.
B. You should have the Hosts file modified on the Development team computers to include an
entry which specifies intranet.ABC.com and the IP address of the test server.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Microsoft
Windows 7. ABC.com has recently decided to deploy network printers and requested that you make sure that all network users are able to locate the network printers from their machines. You
also want to ensure that all future shared printers can be located by the network users.
What should you do?
A. You should configure a Group Policy to enable the Automatically publish new printers in Active
Directory policy.
B. You should assign the Domain Users group the Mange Printers permission on the shared
printers.
C. You should configure the shared printers to be published in Active Directory.
D. You should configure a Group Policy to enable Web Based Printing.
A. You should configure a Group Policy to enable the Automatically publish new printers in Active
Directory policy.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7.
A ABC.com user reports that his Windows 7 client computer takes a long time to boot. You
discover that the user has multiple new applications on his computer.
How could you reduce the time it takes the client computer to boot?
A. You should use Task Manager to increase the priority of the new applications.
B. You should stop the new applications with Task Manager.
C. You should use the Microsoft Configuration Utility (msconfig) tool to prevent the applications
running at startup.
D. You should disable the new applications using the Services console.
E. You should start the computer in Safe Mode.
C. You should use the Microsoft Configuration Utility (msconfig) tool to prevent the applications
running at startup.
You work as a desktop technician at ABC.com. The network contains 1,000 client computers. All
client computers on the ABC.com network run Windows 7. ABC.com has recently hired two new
employees to troubleshoot a hardware related performance issue. ABC.com is aware that the two
employees make use of different User Defined Data Collector Sets. This sometimes causes them
to receive different results. During the course of the day you receive instruction from ABC.com to have a standardized Data
Collector Set created for the two employees to use.
How can you provide the employees with access to a standardized Data Collector Set?
A. You should consider having a Performance Counter Alert Data Collector Set created on a
network share that is accessible to the two employees.
B. You should consider having a Performance Counter Alert Data Collector Set created on each
client computer.
C. You should consider having a Performance Counter Data Collector Set created on a network
share that is accessible to the two employees.
D. You should consider having a Performance Counter Data Collector Set created on each client
computer.
C. You should consider having a Performance Counter Data Collector Set created on a network
share that is accessible to the two employees.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7.
Testing.com contains a Design department. The users in the Design department frequently use
memory intensive graphics applications. The client computers in the Design department are
equipped with four 1-GB RAM modules. You deploy a new graphics application to the Design
department computers. The Design department users complain that the new application runs
slowly on their computers.
How could you improve the performance of the Design department computers?
A. You should have the initial size of the virtual memory and the maximum size of the virtual
memory on the client computers configured to be 6GB.
B. You should have the initial size of the virtual memory on the client computers configured to be
1GB and the maximum size of the virtual memory configured to be 6GB.
C. You decrease the size of the page file.
D. You should have the four 1-GB RAM modules replaced with a single 4-GB RAM module.
A. You should have the initial size of the virtual memory and the maximum size of the virtual
memory on the client computers configured to be 6GB.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7. All client computers contain a single quad-core processor, 4 GB of RAM and a 100
GB hard disk drive. The 100 GB hard drives are partitioned into two separate drives namely Drive
C and Drive D. Drive C will host the operating system and Drive D: will host user data.
The ABC.com network users make use of an application which generates reports. The network
users complain that the reports take a long time to run and their computers become unresponsive
while the reports are running.
You open Task Manager on a computer running a report and discover that memory and processor
usage are within acceptable limits.
ABC.com wants you to determine why the reports are generating slowly by creating a User
Defined Data Collector Set.
What should monitor in the Data Collector Set?
A. You should monitor the Physical Disk\ Avg. Disk Read Queue Length for Disk0 of the client
computers.
B. You should monitor the Physical Disk\ Avg. Disk Write Queue Length for Disk0 of the client
computers.
C. You should monitor the Memory\Available Mbytes counters in the Data Collector Set.
D. You should monitor the Process\% Privileged Time counters in the Data Collector Set for each
processor core.
B. You should monitor the Physical Disk\ Avg. Disk Write Queue Length for Disk0 of the client
computers.
You work as a network administrator at ABC.com. All client computers on the ABC.com network
run Windows 7. The network contains a Windows Server 2008 Web server that hosts multiple
websites for ABC.com customers.
A user named Mia Hamm has a Web Statistics application running on her client computer. The
application analyzes the web server logs every day between 3pm and 5pm.
Mia Hamm reports that her computer runs slowly between 3pm and 5pm. You discover that the
processor usage on her computer is between 90 and 100 percent while the Web Statistics
application is analyzing the web server logs. How can you reduce the impact of the web server log analysis on Mia Hamm’s computer?
A. You should add more RAM to Mia’s computer.
B. You should configure the application to run with Elevated Privileges.
C. You should change the priority setting of the application to Low.
D. You should change the priority setting of the application to High.
E. You should increase the size of the virtual memory on Mia’s computer.
C. You should change the priority setting of the application to Low.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7.
The Sales manager named Mia Hamm has just installed a third-party defragmentation tool on her
computer.
Mia Hamm now reports that she is unable to start her computer. You discover that you are unable
to start her computer normally or using any of the safe modes. You attempt to recover her
computer using the recovery partition but you discover that no recovery partition is installed.
You suspect that the Boot Configuration Database (BCD) is corrupted.
Which two of the following options are possible ways repair the BCD and start Mia Hamm’s
computer? Choose two.
A. You should start the computer using the installation DVD. Go into the command prompt and run
the bootrec.exe utility.
B. You should start the computer using the installation DVD. You should then have the System
Restore Recovery tool selected in the System Recovery Options dialog box.
C. You should start the computer using the installation DVD. Go into the command prompt and run
the fixmbr command.
D. You should start the computer using the installation DVD. Go into the command prompt and run
the fixboot command
E. You should start the computer using the installation DVD. You should then run the Startup
Repair recovery tool.
A. You should start the computer using the installation DVD. Go into the command prompt and run
the bootrec.exe utility.
E. You should start the computer using the installation DVD. You should then run the Startup
Repair recovery tool.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. During routine maintenance you discovered that the memory
usage on some of the client computers is unusually high.
How can you determine the cause of the high memory usage?
A. You should run the systeminfo command on the affected computers.
B. You should open the Troubleshooting section in Action Center on the affected computers.
C. You should run the Microsoft Configuration utility (msconfig) on the affected computers.
D. You should review the content in the Memory tab in the Resource Monitor tool on the affected
computers.
D. You should review the content in the Memory tab in the Resource Monitor tool on the affected
computers.
You work as a desktop technician at ABC.com. All client computers on the ABC.com network run
Windows 7. The ABC.com network client computers hardware has recently been uABCraded.
After the uABCrade, the network users started reporting that their client computers automatically
reboot occasionally.
You have ruled out the possibility of a virus or other malicious software. What should you do next
to determine the cause of the reboots?
A. You should boot the client computers to the Recovery Console and run the fixboot and fixmbr
commands.
B. You should run the Network Diagnostics on the client computers.
C. You should have the Windows Memory Diagnostic tool run on the client computers.
D. You should increase the size of the virtual memory paging file on the client computers.
E. You should run BCEdit on the client computers.
C. You should have the Windows Memory Diagnostic tool run on the client computers.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
The ABC.com network policy currently states that no client computer is allowed to run unnecessary services.
ABC.com has supplied the Sales users with new portable computers. The Sales computers have
disabled all services that are not required. The Sales users have also been issued with mobile
broadband adapters that plug into their laptops. The broadband adapters use the Global System
for Mobile Communications (GSM) technology.
ABC.com wants you to make sure that the portable computers are able to connect to the GSM
network.
What service needs to be enabled on the laptops to enable to the broadband adapters to work?
A. You should enable the Internet Connection Sharing (ICS) service on the portable computers.
B. You should Remote Access Connection Manager service on the portable computers
C. You should enable the WLAN AutoConfig service on the portable computers on the portable
computers.
D. You should enable the Secondary Logon service on the portable computers on the portable
computers
E. You should enable the WWAN AutoConfig service on the portable computers
E. You should enable the WWAN AutoConfig service on the portable computers.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
During the course of the day the ABC.com network users with portable computers reported that
their computers are connecting to a nearby shopping center wireless network when they are in the
ABC.com seminar room. ABC.com wants you to ensure that the portable computers connect to
the company network by default when they are in range of the company wireless network.
How should you configure the wireless settings?
A. You should have a Wireless Network Policy applied to automatically connect to the company
wireless network.
B. You should have a Wireless Network Policy applied where the company wireless network is set
as the preferred network.
C. You should configure the company wireless network as an Ad Hoc network.
D. You should configure the Network authentication for the company wireless network to Open.
E. You should enable SSID broadcasting for the company wireless network.
B. You should have a Wireless Network Policy applied where the company wireless network is set
as the preferred network.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7.
The ABC.com network has several portable computers which connect to the 802.1X-authenticated
wireless network. All portable computers have wireless connection settings applied by a Group
policy.
ABC.com recently purchased 10 new portable computers. You attempt to join the computers to the
domain but you are unsuccessful.
Which three of the following options would enable you to join the portable computers to the
domain?
A. You should connect the portable computers to the wired Ethernet network.
B. You should manually configure the wireless network settings on the portable computers.
C. You should configure the network location on the portable computers to Private.
D. You should connect the portable computers to the wireless network using a Bootstrap Profile.
E. You should configure the network location on the portable computers to Public.
F. You should enable Network Discovery on the portable computers.
A. You should connect the portable computers to the wired Ethernet network.
B. You should manually configure the wireless network settings on the portable computers.
D. You should connect the portable computers to the wireless network using a Bootstrap Profile.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7
and all servers run Windows Server 2008 R2. The ABC.com network contains an IIS Web server
named ABC-SR01. ABC-SR01 hosts the company Intranet web site.
ABC.com has recently opened a new branch office. There are currently no servers in the new
branch office. ABC.com users in the new branch office connect to the ABC.com network using a
cellular network to access data on the company Intranet. The pay per bandwidth usage cost is
excessive due to the amount of data downloaded from the Intranet web site. During the course of
the day you receive instruction from ABC.com to ensure the network bandwidth usage cost of
accessing the data is decreased.
How can you minimize the traffic over the WAN link?
A. You should configure a VPN between the branch office and the main office using the cellular
network.
B. You should have Branch Cache mode configured in Distributed Mode.
C. You should install a Windows Server 2008 computer in the branch office and configure DFS to
replicate data between the new server and ABC-SR01.
D. You should have Branch Cache mode configured in Hosted Mode.
B. You should have Branch Cache mode configured in Distributed Mode.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the ABC.com network run Windows 7
and all servers run Windows Server 2008 R2.
The ABC.com sales users make use of Wireless Wide Area Network (WWAN), Wireless Local
Area Network (WLAN), and wired network connections to connect to the ABC.com network when
they are out of the office.
You receive complaints from the sales users who report that when they connect to the network
from remote locations, their portable computers frequently drop a secure connection so they have
to reestablish the connection and restart their applications.
Which two of the following options would ensure that the secure connections do not cause
unnecessary interruptions for remote users?
A. You should consider implementing the VPN Reconnect feature on the portable computers.
B. You should consider implementing PPTP VPN connections on the portable computers.
C. You should consider implementing Direct Access connections on the portable computers.
D. You should consider implementing Preferred Wireless Connections on the portable computers.
E. You should consider configuring separate VPN connections for WWAN, WLAN and Wired
network connections.
A. You should consider implementing the VPN Reconnect feature on the portable computers.
C. You should consider implementing Direct Access connections on the portable computers.
You work as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com has its headquarters in Miami and a branch office in
Toronto. All client computers on the ABC.com network run Windows 7 and all servers run
Windows Server 2008 R2. The Toronto office is connected to the Miami office by a slow WAN link
with high latency.
The Miami office contains a Windows Server 2008 R2 file server named ABC-SR01. The Toronto
office contains a Windows Server 2008 R2 server named ABC-SR02.
The ABC.com Toronto office users access files on a network share located on ABC-SR01. You
receive instruction from ABC.com to improve response times for users that access files on ABCSR01
whilst ensuring that the network traffic over the WAN link is minimized.
Which two of the following options would solve the problem?
A. You should configure Branch Cache in Hosted Mode on ABC-SR02.
B. You should configure Branch Cache in Distributed Mode on ABC-SR02.
C. You should configure Branch Cache in Hosted Mode on the branch office client computers.
D. You should configure Branch Cache in Distributed Mode branch office client computers.
A. You should configure Branch Cache in Hosted Mode on ABC-SR02
D. You should configure Branch Cache in Distributed Mode branch office client computers.