Passed Microsoft 70-685 Exam with Pass4sure and Lead2pass PDF & VCE (51-60)

Topic 2, City Power & Light
QUESTION 51
Several mobile users access the Internet by using cellular connections.
The help desk reports a high volume of calls from mobile users who report the following connection problems:
When their cellular connections fail, their VPN connections also fail.
When their cellular connections are reestablished, they must manually connect to the VPN server.
You need to recommend a solution to ensure that the VPN connections are automatically reestablished.
What should you recommend?

A.    Implement an IKEv2 VPN.
B.    Implement an SSTP-based VPN.
C.    Configure credential roaming.
D.    Configure a Kerberos user ticket lifetime.

Answer: A

Topic 2, City Power & Light
QUESTION 52
Five users from the main office travel to the branch office. The users bring their portable computers.
The help desk reports that the users are unable to access any network resources from the branch office.
Branch office users can access the network resources.
You need to ensure that the main office users can access all network resources by using their portable computers in the branch office. The solution must adhere to the corporate security guidelines.
What should you instruct the help desk to do on the portable computers?

A.    Create a new VPN connection.
B.    Add the users to the local Administrators group.
C.    Add the users to the Network Configuration Operators group.
D.    Configure the alternate configuration for the local area connection.

Answer: D

Topic 2, City Power & Light
QUESTION 53
Users report that their DirectAccess connections fail.
You instruct the help desk to tell the users to run the Connection to a Workplace Using DirectAccess troubleshooter.
The help desk reports that the Connection to a Workplace Using DirectAccess troubleshooter fails to function.
You need to ensure that the Connection to a Workplace Using DirectAccess troubleshooter functions properly.
What should you do?

A.    Instruct the help desk to enable IPv6 on the users’ computers.
B.    Instruct the help desk to modify the users’ Windows Firewall settings.
C.    Request that the domain administrator configure the Teredo State Group Policy setting.
D.    Request that the domain administrator configure the Corporate Website Probe URL Group Policy setting.

Answer: D

Topic 2, City Power & Light
QUESTION 54
The company implements a data recovery agent (DRA) for Bitlocker.
A portable computer fails.
The help desk reports that it is unable to use the DRA to recover the data from the computer’s hard disk drive.
You need to ensure that the DRA can be used to recover data from the hard disk drives of all portable computers.
Which tool should you use?

A.    CertUtil.exe
B.    Cipher.exe
C.    Manage-bde.exe
D.    SDelete.exe

Answer: C

Topic 3, A. Datum Corporation
QUESTION 55
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table:

image
The network contains a single Active Directory domain named adatum.com. Two Group Policy objects (GPOs) are configured as shown in the following table:

image
The relevant servers in the main office are configured as shown in the following table:

image
Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP.
Windows Firewall is disabled on all client computers.
All computers in the research department have Windows XP Mode and Windows Virtual PC installed.
You deploy a custom Windows XP Mode image to the research department computers.
An application named App1 is installed in the image.
Each research department computer has the following hardware:
4-GB of RAM
Intel Core i7 processor
500-GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
Users without domain accounts must be denied access to internal servers.
All connections to the company’s wireless access points must be encrypted.
Only employees can be configured to have user accounts in the Active Directory domain.
The hard disk drives on all portable computers must be encrypted by using Windows BitLocker Drive Encryption (BitLocker).
Users in the research department report that they cannot run App1 or Windows XP Mode.
You need to ensure that all research department users can run App1. You need to achieve this goal by using the minimum amount of administrative effort.
What should you do?

A.    Approve all Windows 7 updates on WSUS1.
B.    Enable hardware virtualization on the research department computers.
C.    Give each member of the research department a computer that has an Intel Core i5 processor.
D.    Request that a domain administrator create a GPO that configures the Windows Remote Management
(WinRM) settings.

Answer: B

Topic 3, A. Datum Corporation
QUESTION 56
Users in branch office 1 report that they fail to access the company’s intranet Web site located on Web1.
They also fail to access Web sites on the Internet.
A desktop support technician restarts a desktop computer in branch office 1 and discovers the IP configuration shown in the following screenshot:

image
You need to resolve the network connectivity issue.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Instruct branch office 1 users to disable IPv6.
B.    Instruct branch office 1 users to run Ipconfig /Renew.
C.    Request that a network administrator configure the DHCP router option for branch office 1.
D.    Request that a network administrator verify DHCP broadcasts are being relayed to the main office.

Answer: BD

Topic 3, A. Datum Corporation
QUESTION 57
Datum hires several consultants to work at the main office for six months. The consultants require Internet access.
The help desk reports that the consultants cannot access the company’s wireless network.
You need to ensure that the consultants have wireless access to the Internet. The solution must adhere to the corporate security policy.
What should you request?

A.    that a wireless access key be given to each consultant
B.    that a user certificate be generated and imported to each consultant’s computer
C.    that a computer certificate be generated and imported to each consultant’s computer
D.    that a network administrator install a wireless access point that is connected directly to the Internet

Answer: D

Topic 3, A. Datum Corporation
QUESTION 58
The motherboard on a portable computer fails. The data on the computer’s hard disk drive cannot be recovered.
You need to recommend a solution to ensure that the data on hard disks can be recovered if the motherboard on other portable computers fail
Which two configurations should you recommend? (Each correct answer presents part of the solution. Choose two.)

A.    Disable BitLocker on all portable computers.
B.    Convert the hard disks on all portable computers to dynamic disks.
C.    Export and securely store the computer certificates on all portable computers.
D.    Configure the BitLocker settings on all portable computers by using Group Policy.

Answer: AD

Topic 3, A. Datum Corporation
QUESTION 59
The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing.
What should you request?

A.    that a WSUS administrator generate a Computer Report from WSUS1
B.    that a domain administrator run the Microsoft Baseline Security Analyzer (MBSA)
C.    that a desktop support technician run a Windows Defender scan on each computer
D.    that a desktop support technician generate a System Configuration report for each computer

Answer: B

Topic 4, Margie’s Travel
QUESTION 60
This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.
Scenario:
You are an enterprise desktop support technician for Margie’s Travel.
Margie’s Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table:

image
All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table:

image
Security Configuration
The relevant security settings for the domain are configured as shown in the following table:

image
The relevant network policies on the NPS servers and the RRAS servers are configured as shown in the following table:

image
User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers.
All portable computers are members of the MargiesTravel\Wireless group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies.
The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application.
What should you do?

A.    Disable User Account Control (UAC).
B.    Add the users to the local Administrators group.
C.    Request that the application package be re-signed.
D.    Request that the user certificates be issued to the new users.

Answer: C

If you want to pass Microsoft 70-685 successfully, do not missing to read latest lead2pass Microsoft 70-685 exam questions.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/70-685.html

         

Why Choose Lead2pass?

If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back

Comments are closed.