REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Steve
 
 

Braindumps of 70-685
Pro: Windows 7, Enterprise Desktop Support Technician

 

These are some latest questions for 70-663 exam. I only used www.exams.ws guide and i was through.


Q: 1 You work as the desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com.
A Abc.com user named Mia Hamm recently copied an encrypted file from her Windows 7 client computer to a folder located on a Windows Server 2003 file server. Mia Hamm now reports that the copied file is not encrypted, but it is compressed. Which of the following is the task that you should carry out to make sure that the Mia Hamm's file remains encrypted on the file server?
A. Instruct the user to move the file to the file server, rather than copying it.
B. Instruct the user to modify the properties of the copied file by selecting the attribute for file encryption.
C. Ask an administrator to grant the user the Full Control share permission to the folder on the network.
D. Ask an administrator to grant the user the Full Control permission on the copied file.
Answer: B
Explanation:
Because of the unique nature of encrypted files, different results can occur when moving or copying encrypted files between locations. For example, when copying an encrypted file from a local machine to a server on the network, different results of the copy operation will occur depending on the operating system being used on the server. In general, copying a file will inherit the EFS properties of the target meaning that the user has to encrypt the copied file in its new location.


Q: 2 You work as a desktop technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. All client computers on the Abc.com network run Windows 7 and are configured to download and install software updates automatically. You add a new network segment to the Abc.com network and connect the segment to the Internet through a proxy server. You do not implement Web Proxy Auto-Discovery (WPAD) on the network. A few weeks later notice that software updates are not installed on the client computers on the new network segment. Abc.com wants you to configure the client computers on the new network segment to download and install updates automatically. What should you do?
A. You should consider having the Background Intelligent Transfer Service configured to run in the context of the Network Service account.
B. You should consider having an Internet Explorer proxy configured on the client computers on the new network segment.
C. You should consider having the proxycfg.exe utility run on the client computers on the new network segment.
D. You should consider having the Background Intelligent Transfer Service configured to run in the context of a domain user account.
Answer: C


Q: 3 You work as a desktop support technician at Abc.com. The Abc.com network consists of a single workgroup named ABC. All client computers on ABC workgroup run Windows 7. You need to allow Abc.com users to install software on their client computers without having access to any other administrative functions. You also need to ensure that Abc.com users are able to install software in the most secure manner. What should you do?
A. You should make all Abc.com users members of the local administrators group.
B. You should disable 'User Account Control' from the 'User Accounts Control Panel' tool.
C. You should configure 'Parental Controls' to prevent Abc.com users from downloading unapproved software.
D. You should configure the user account control to not prompt during software installation from the Security Options section of the Local Security Policy.
Answer: D
Explanation:
You need to edit the Local Security Policy to not prompt during installs by disabling the Detect application installations and prompt for elevation setting. This will allow applications to be installed without prompting for the administrative credentials.


Q: 4 You work as a desktop technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. All client computers on the Abc.com network run Windows 7. All client computers are members of the Abc.com domain. Abc.com has an AppLocker policy that allows for the running of approved applications only. In addition, Abc.com users with standard user accounts are allowed to run applications installed in user profile folders. You need to ensure that Abc.com users with standard users accounts are not able to run unauthorized applications. What should you do?
A. You should consider having the Windows Installer Rule below created:
Deny - Everyone - %OSDRIVE%\Users\<user name>\Downloads\*.
B. You should consider having the Windows Installer Rule below created: Deny - Everyone - %OSDRIVE%\Users\<user name>\Documents\*.
C. You should consider having the Create Default Rules option to create Executable Rules. D. You should consider having the Create Default Rules option to create Windows Installer Rules.
Answer: C


Q: 5 You work as a desktop technician at Abc.com. All client computers on the Abc.com network run Windows 7 which was installed using an image. During the course of the day Abc.com acquired new tablet computers for the network users. The Abc.com users recently started reporting that the pen interface of the tablet computers is not functioning. Abc.com has requested that you ensure the Abc.com users are able to use the pen interface of the tablet computers. What should you do?
A. You should consider having the Windows Management Instrumentation (WMI) performance adapter started and set to Automatic.
B. You should consider having the Human Interface Device Access service started and set to Automatic.
C. You should consider having the tablet computer Media Features turned on.
D. You should consider having the tablet computer components turned on.
Answer: D


Q: 6 You work as a desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. All client computers on the Abc.com network run Windows 7. You have received instructions to ensure that no Abc.com user can copy unencrypted files to removable drives. What should you do?
A. You should consider changing the BitLocker Drive Encryption settings from the local Group Policy.
B. You should consider initializing the TPM from the Trusted Platform Module (TPM) snap-in.
C. You should consider changing the Trusted Platform Module (TPM) settings in the local Group Policy.
D. You should consider changing the BitLocker Drive Encryption settings from the Control Panel.
Answer: A


Q: 7 You work as a desktop technician at Abc.com. All client computers on the Abc.com network run Windows 7. Abc.com currently makes use of legacy software applications. These applications are accessible via Microsoft Windows XP Mode (XPM). During the course of the day you receive complaints from the network users that the legacy applications Start menu shortcuts are not accessible. Abc.com requested that you make sure all the network client computers can access the Start menu shortcuts for the legacy applications. What should you do?
A. You should consider having the applications configured as Default Programs on the Microsoft Windows 7 client computers.
B. You should consider having the Auto Publish option enabled for Virtual Machine Settings on the Microsoft Windows 7 client computers.
C. You should consider having the legacy program icons copied to the Start menu of the Microsoft Windows 7 client computers.
D. You should consider having the legacy applications re-installed on the Windows XP Mode (XPM) computers.
You should then have the repair option selected.
Answer: B


Q: 8 You work as a desktop technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. Abc.com network contains 1,500 workstations that are running Windows 7. The Abc.com workstations have a number of custom Internet Explorer add-ons installed on it. You have recently received reports that when certain Web applications are used, the Internet Explorer closes. What should you do to troubleshoot the problem?
A. The best option is to use the No Add-ons mode in the Internet Explorer.
B. The best option is to use the default levels in the Internet Explorer.
C. The best option is to turn on Internet Explorer 7 Standards mode by using a Group Policy.
D. The best option is to disable the Programs tab in Internet Explorer by using a Group Policy.
Answer: A


Q: 9 You work as a desktop technician at Abc.com. All client computers on the Abc.com network run Windows 7. During the day you discovered that the event logs shows errors from an application source and Kernel-Power source. The Abc.com wants you to monitor these errors to generate a report that will capture and display only the relevant data. What should you do?
A. You should consider saving the template from EventLog-System Event Trace Session using the Performance Monitor.
B. You should consider saving the template from EventLog-Application Event Trace Session using the Performance Monitor.
C. You should consider sorting events by Source using the Event Viewer.
D. You should consider creating a Custom View using the Event Viewer. You should then have the application and system logs with the event sources included and save the filter results as an XML file.
Answer: D

70-685


 

 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend