Q31. You are troubleshooting performance issues on a Windows 7 Enterprise client computer.

An unfamiliar service is running on the computer.

You need to recommend the solutions that identify which process identifier (PID) is associated with the service.

What should you do? (Choose all that apply.)

A.

D.

Answer: C


Q33. Your company has an Active Directory Domain Services domain named contoso.com. All client computers run Windows 7 and are members of the contoso.com domain.

All computers are configured to use a proxy server as shown in the exhibit:

An internal SSL Web application named Webapp1 does not run properly when it is accessed through a proxy server.

Employees type https://Webapp1.contoso.com into their browsers and attempt to run the Web application.They are still unable to run the application.

You need to ensure that employees can run the Web application.

What should you do?

Exhibit:

A. Add https: //Webapp1 to the Exceptions list.

B. Clear the Bypass proxy server for local addresses check box.

C. Instruct employees to type https: //Webapp1 into their browsers.

D. Instruct employees to type http: //Webapp1.contoso.com into their browsers.

Answer: C


Q34. You deploy Microsoft Office 2007 to a pilot group in the main office.

Users in the pilot group report that all of the Office 2007 applications run successfully.

You deploy Office 2007 to users in the New York call center. The call center users report that they are unable to launch the Office 2007 applications.

You need to ensure that the call center users can run all of the Office 2007 applications.

What should you do?

A. Modify the AppLocker rule.

B. Disable User Account Control (UAC).

C. Deploy the 2007 Office system Administrative Template files.

D. Configure the Office 2007 applications to run in Windows Vista compatibility mode.

Answer: A


Q35. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.

Topic 1, Consolidated Messenger

Scenario:

You are an enterprise desktop support technician for Consolidated Messenger.

Network Configuration

The company has three offices named Office1, Office2, and Office3. The offices connect to each other over the Internet by using VPN connections. Each office has an 802.11g wireless access point. All wireless access points are configured to use Radius01 for authentication.

Active Directory Configuration

The network contains one Active Directory domain named consolidatedmessenger.com. The relevant organizational unit structure is shown in the following diagram:

Client Configuration

Each office has 500 desktop computers that run Windows 7 Enterprise.

There are 250 mobile users that travel regularly between all three offices. The mobile users have laptop computers that run Windows 7 Enterprise.

To prevent the spread of malware, the company restricts the use of USB devices and only allows the use of approved USB storage devices.

Printers

The marketing group has several printers that are shared on File01. A shared printer name Printer1 is a high-performance, black-and-white printer. A shared printer named Printer2 is a high-definition, photo-quality, color printer. Printer2 should only be used to print marketing brochures.

The chief financial officer (CFO) releases new guidelines that specify that only users from Finance are allowed to run FinanceApp1.

Users in the Marketing OU report that they can run FinanceApp1.

You need to ensure that only users in the Finance OU can run FinanceApp1.

What should you do?

A. In the AllComputers GPO, create a new AppLocker executable rule.

B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.

C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.

D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A


Q36. Users report that it takes a long time to access resources by using DirectAccess.

You need to provide the network administrator with a network capture of DirectAccess traffic.

Which tool should you use?

A. Netsh.exe

B. Netstat.exe

C. Perfmon.exe

D. Winsat.exe

Answer: A


Q37. A company has computers that run Windows 7 Enterprise.

A user's computer has been crashing and showing error messages over the past several days.

You need to gather historical information about the errors.

Which tools should you use? (Choose all that apply.)

A. Troubleshooting in Control Panel

B. Performance Monitor

C. Disk Defragmenter

D. Event Viewer

E. Reliability Monitor

Answer: DE


Q38. A company has computers running the 64-bit version of Windows 7 Enterprise. All computers are joined to an Active Directory Domain Services (AD DS) domain. All users are part of the local Administrators group.

A user is trying to install a legacy 32-bit application that requires administrative permissions to install. The user reports that the inst.exe installer does not run. Instead, it shows an "access denied" error message and closes. The user does not see a prompt to grant the application permission to make changes to the computer.

You need to ensure that inst.exeruns successfully and can install the application.

What should you do? (Choose all that apply.)

A. Run Disk Defragmenteron the hard disk and then run inst.exe.

B. Modify the properties for inst.exeto run as Administrator.

C. Run the Troubleshoot compatibility wizard for inst.exe.

D. Enable the Administrator account, log on, and then run inst.exe.

E. Advise the user that inst.exe cannot be installed on this system because it is not compatible with 64-bit operating systems.

F. Advise the user that inst.exe cannot be installed on this system because it is not compatible with Windows 7.

Answer: BCD


Q39. Your company uses portable computers that run Windows 7.

The Sales department staff use Wireless Wide Area Network (WWAN), WLAN, and wired network connections to work from a remote location.

The Sales department staff reestablish their secure connections and restart applications frequently.

You need to ensure that the employees are able to work without unnecessary interruptions.

What should you do?

A. Create a Group Policy to configure preferred wireless access points

B. Configure Group Policy preferences to create multiple VPN connections

C. Configure each portable computer to use the VPN Reconnect feature

D. Configure each portable computer to use the Extensible Authentication Protocol

Answer: C


Q40. The help desk reports that users receive a security warning message when they try to access the internal Web site shown in the exhibit:

The help desk confirms that users never received this security warning message before.

You need to provide a solution to prevent users from receiving the security warning when they try to access the internal Web site.

What should you do?

Exhibit:

A. Instruct the users to download the certificate of the Web server.

B. Instruct the users to download a new certificate revocation list (CRL).

C. Request that a domain administrator renew the Web server SSL certificate.

D. Request that a domain administrator renew the user authentication certificates for all users.

Answer: C