Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-685
100% Free Download! 100% Pass Guaranteed!

70-685

Question No: 1 – (Topic 1)

The Office1 network link is brought offline for emergency maintenance.

Users in Office2 and Office3 report that they cannot connect to the wireless network.

You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails.

What should you recommend?

  1. that redundant DHCP scopes be created

  2. that additional RADIUS servers be deployed

  3. that universal group caching be implemented

  4. that additional default gateways be configured

Answer: B

Question No: 2 – (Topic 1)

The help desk reports that users in the Marketing OU print draft documents, e-mails, and other miscellaneous documents on Printer2.

You need to recommend a solution so that marketing users print documents to Printer1 by default.

What should you do?

  1. Enable printer pooling.

  2. Configure Group Policy Preferences.

  3. Modify the priorities of the shared printers.

  4. Modify the permissions of the shared printers.

Answer: B Explanation:

http://technet.microsoft.com/en-us/library/cc732092.aspx

Action: This type of preference item provides a choice of four actions: Create, Replace, Update, and Delete.

The behavior of the preference item varies with the action selected and whether the printer connection already exists.

Set this printer as the default printer – Select this check box to make the shared printer connection the default Windows printer for the current user.

Only if a local printer is not present – Select this check box to bypass changing the default printer if there is a local printer configured on the computer. This setting is unavailable until you select the Set this printer as the default printer check box.

Note: A local printer is any printer that is not connected to a shared network printer. This includes physical printers connected to parallel, serial, and USB ports, TCP/IP printers, and virtual printers installed through software.

To create a new Shared Printer preference item

Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit.

In the console tree under User Configuration, expand the Preferences folder, and then expand the Control

Panel Settings folder.

Right-click the Printers node, point to New, and select Shared Printer.

In the New Shared Printer Properties dialog box, select an Action for Group Policy to perform.

Enter shared printer settings for Group Policy to configure or remove.

Click the Common tab, configure any options, and then type your comments in the Description box.

Click OK. The new preference item appears in the details pane.

Question No: 3 – (Topic 1)

The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1.

Users in the Marketing OU report that they can run FinanceApp1.

You need to ensure that only users in the Finance OU can run FinanceApp1. What should you do?

  1. In the AllComputers GPO, create a new AppLocker executable rule.

  2. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.

  3. In the AllComputers GPO, create a software restriction policy and define a new hash rule.

  4. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A Explanation:

Chapter 10 p 467- 468

Understanding the difference between SRP and AppLocker

You might want to deploy application control policies onto Windows operating systems earlier than Windows

Server2008R2 or Windows7. You can use AppLocker policies only on the supported editions of Windows

Server2008R2 and Windows7, but you can use SRP on supported editions of Windows beginning with

Windows Server2003 and WindowsXP. http://technet.microsoft.com/en-us/library/ee460955(WS.10).aspx http://technet.microsoft.com/en-us/library/dd548340(WS.10).aspx

Question No: 4 – (Topic 1)

The company purchases 500 USB flash drives from a new hardware vendor and distributes them to the users.

The help desk reports that the users are unable to access the new USB flash drives. You need to ensure that users can save data on the USB flash drives.

What should you do?

  1. Instruct the help desk to modify the BitLocker settings.

  2. Instruct the help desk to modify the Windows Defender settings.

  3. Request that an administrator modify the driver signing policy.

  4. Request that an administrator modify the device installation restriction policy.

Answer: D Explanation:

Open Group Policy Management and edit the applicable GPO in your Active Directory. Disable autorun:

Computer Configuration \ Administrative Templates \ Windows Components \ AutoPlay Policies

Turn off Autoplay: Enabled

Ensurepass 2018 PDF and VCE

Limit to approved devices:

Computer Configuration \ Administrative Templates \ System gt; Device Installation \ Device Installation Restrictions Allow installation of devices that match any of these device IDs: (add the corporate device)

Prevent installation of devices not described by other policy settings: Enabled

Ensurepass 2018 PDF and VCE

Question No: 5 – (Topic 1)

Users in the ERPApp1 pilot project report intermittent application issues.

You need to consolidate all application events for the users in a central location. What should you do?

  1. Configure event subscriptions.

  2. Configure the Advanced Audit Policy Configuration settings.

  3. Create a custom view in Event Viewer.

  4. Create a user-defined Data Collector Set.

Answer: A Explanation:

Chapter 8 Lesson 1 p 302 – 305

  1. Configure event subscriptions.

    Event Viewer enables you to view events on a single remote computer. However, troubleshooting an issue might require you to examine a set of events stored in multiple logs on multiple computers.

    Windows 7 includes the ability to collect copies of events from multiple remote computers and store them locally. To specify which events to collect, you create an event subscription. Among other details, the subscription specifies exactly which events will be collected and in which log they will be stored locally. Once a subscription is active and events are being

    collected, you can view and manipulate these forwarded events as you would any other locally stored events.

  2. Configure the Advanced Audit Policy Configuration settings. http://technet.microsoft.com/en-us/library/dd408940(WS.10).aspx

  3. Create a custom view in Event Viewer.

    You can create a filter that includes events from multiple event logs that satisfy specified criteria. You can then name and save that filter as a custom view. To apply the filter associated with a saved custom view, you navigate to the custom view in the console tree and click its name.

  4. Create a user-defined Data Collector Set.

You can create a custom Data Collector Set containing performance counters and configure alert activities based on the performance counters exceeding or dropping below limits you define.

After creating the Data Collector Set, you must configure the actions the system will take when the alert criteria are met.

Membership in the local Performance Log Users or Administrators group, or equivalent, is the minimum required to complete these procedures.

Ensurepass 2018 PDF and VCE

http://www.youtube.com/watch?v=4xxKPgT5irU http://www.youtube.com/watch?v=fKelHBve57k

Topic 2, City Power amp; Light Scenario:

You are an enterprise desktop support technician for City Power amp; Light.

City Power amp; Light is a utility company. The company has a main office and a branch office. The main office is located in Toronto. The branch office is located in Boston. The main office has 1,000 employees. The branch office has 10 employees.

Active Directory Configuration

The network contains a single Active Directory domain named cpandl.com. The functional level of the forest is Windows Server 2008 R2.

Server Configuration

All servers run Windows Server 2008 R2. The relevant servers in the main office are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

All computers in the main office are configured to use DHCP. All computers in the branch office are configured to use static IP addresses.

User Information

->All user accounts are standard user accounts.

->All client computers run Windows 7 Enterprise.

->Each portable computer has a PPT P-based VPN connection to the internal network.

Corporate Security Guidelines

->All users must be granted the least privileges possible.

->All locally stored documents must be encrypted by using Encrypting File System (EFS).

->The hard disk drives on all port able computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).

->All encryption certificates must be stored on smart cards.

Question No: 6 – (Topic 2)

The company is deploying a new application.

When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.

You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?

  1. Publish the application by using a Group Policy.

  2. Disable User Account Control (UAC) by using a Group Policy.

  3. Add all domain users to the local Power Users group by using Restricted Groups.

  4. Add the current users to the local Administrators group by using Group Policy preferences.

Answer: A Explanation:

http://magalan.co.uk/install_software_via_group_policy.html

Question No: 7 – (Topic 2)

The company implements a data recovery agent (DRA) for Bitlocker. A portable computer fails.

The help desk reports that it is unable to use the DRA to recover the data from the computer#39;s hard disk drive.

You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.

Which tool should you use?

  1. CertUtil.exe

  2. Cipher.exe

  3. Manage-bde.exe

  4. SDelete.exe

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/dd875513(WS.10).aspx

Question No: 8 – (Topic 2)

Users report that their DirectAccess connections fail.

You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter.

The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function.

You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly.

What should you do?

  1. Instruct the help desk to enable IPv6 on the users#39; computers.

  2. Instruct the help desk to modify the users#39; Windows Firewall settings.

  3. Request that the domain administrator configure the Teredo State Group Policy setting.

  4. Request that the domain administrator configure the Corporate Website Probe URL Group Policy setting.

Answer: D Explanation:

Troubleshooting item in Control Panel

To focus troubleshooting on DirectAccess and collect additional information, you can use the Connection to a

Workplace Using DirectAccess troubleshooter in the Troubleshooting item of Control Panel. To start the DirectAccess troubleshooter:

Click Start, and then click Control Panel.

In System and Security, click Find and fix problems.

Click Network and Internet, and then click Connection to a Workplace Using DirectAccess.

Ensurepass 2018 PDF and VCE

Note: For this troubleshooting tool to work correctly, you must configure the Computer Configuration/

Policies/Administrative Templates/Network/Network Connectivity Status Indicator/Corporate Website

Probe URL Group Policy setting in the Group Policy object for DirectAccess clients. http://technet.microsoft.com/en-us/library/ee624046(WS.10).aspx

Question No: 9 – (Topic 2)

Five users from the main office travel to the branch office. The users bring their portable computers.

The help desk reports that the users are unable to access any network resources from the branch office.

Branch office users can access the network resources.

You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines.

What should you instruct the help desk to do on the portable computers?

  1. Create a new VPN connection.

  2. Add the users to the local Administrators group.

  3. Add the users to the Network Configuration Operators group.

  4. Configure the alternate configuration for the local area connection.

Answer: D

Question No: 10 – (Topic 2)

Several mobile users access the Internet by using cellular connections.

The help desk reports a high volume of calls from mobile users who report the following connection problems:

->When their cellular connections fail, their VPN connections also fail.

->When their cellular connections are reestablished, they must manually connect to the VPN server.

You need to recommend a solution to ensure that the VPN connections are automatically reestablished.

What should you recommend?

  1. Implement an IKEv2 VPN.

  2. Implement an SSTP-based VPN.

  3. Configure credential roaming.

  4. Configure a Kerberos user ticket lifetime.

Answer: A Explanation:

Chapter 6 Lesson 1 p 232 – 233

Internet Key Exchange version 2 (IKEv2) support was added in Windows Server2008R2 and Windows7 to accommodate a new VPN type that supports VPN Reconnect. VPN Reconnect refers to the ability of a VPN connection to survive short interruptions in network connectivity, such as when you move from one wireless access point to another, or when you switch from a wired to a wireless network adapter. By taking advantage of features in IKEv2, even changes in IP address at the client do not drop the VPN connection or require

any user actions. As soon as connectivity to the RRAS VPN server is restored, then the VPN tunnel is automatically reestablished.

Topic 3, A. Datum Corporation Scenario:

You are an enterprise desktop support technician for A. Datum Corporation.

Active Directory Configuration

The company has three offices. The offices are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

The network contains a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

The relevant servers in the main office are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

Wireless Network

A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.

Client Configuration

All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows Firewall is disabled on all client computers.

All computers in the research department have Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP Mode image to the research department computers. An application named

App1 is installed in the image.

Each research department computer has the following hardware:

->4 GB of RAM

->Intel Core i7 processor

->500 -GB hard disk drive

Corporate Security Policy

The corporate security policy includes the following requirements:

->Users without domain accounts must be denied access to internal servers.

->All connections to the company#39;s wireless access points must be encrypted.

->Only employees can be configured to have user accounts in the Active Directory domain.

->The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).

100% Ensurepass Free Download!
70-685 PDF
100% Ensurepass Free Guaranteed!
70-685 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.