we provide Virtual Microsoft 70-685 exam price which are the best for clearing 70-685 test, and to get certified by Microsoft Pro: Windows 7, Enterprise Desktop Support Technician. The 70-685 Questions & Answers covers all the knowledge points of the real 70-685 exam. Crack your Microsoft 70-685 Exam with latest dumps, guaranteed!

Q11. All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group.

A new version of a business software application is available on the network.

You plan to apply an AppLocker security policy to the R&D group.

You need to ensure that members of the R&D group are not allowed to upgrade the software.

What should you do?

A. Create an Audit only restriction based on the version of the software.

B. Create an Audit only restriction based on the publisher of the software.

C. Create an Enforce rule restriction based on the version of the software.

D. Create an Enforce rule restriction based on the publisher of the software.

Answer: C


Q12. A corporate environment includes client computers running Windows 7 Enterprise. The client computers are joined to an Active Directory Domain Services (AD DS) domain named contoso.com. Employees frequently access secure websites that are subsites of an external domain named fabrikam.com. Pop-up windows from the fabrikam.com subsites are being blocked. You need to recommend an approach for ensuring that the pop-up windows from the fabrikam.com subsites are allowed. What is the best approach to achieve the goal? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. Add *.fabrikam.com to the Local Intranet zone in Internet Explorer on each client computer.

B. Add *.fabrikam.com to the Trusted Sites zone in Internet Explorer on each client computer.

C. Set the Pop-up Blocker Blocking Level to Low on each client computer.

D. Disable the Pop-up Blocker on each client computer.

Answer: B


Q13. Remote users report that after they renew their smart card certificates, they are unable to log on to their computers by using their smart cards.

You need to ensure that users can log on by using their smart cards.

What should you instruct the users to do?

A. Change their smart card PINs.

B. Request a new smart card certificate.

C. Log on by using their user names and passwords, and then lock and unlock their computers.

D. Establish a VPN connection from the logon screen and use their smart cards for authentication.

Answer: D


Q14. All client computers on your company network were recently migrated from Windows XP to Windows 7.

Your company uses a proprietary application that is currently not compatible with Windows 7. A shim has been created and applied to mitigate compatibility issues until a Windows 7-compatible version is developed.

A security update is made for this application. The update must be tested and then deployed as a new version of the application.

During testing you are unable to install the application.

You need to ensure that the application can be installed in the test environment before it can be deployed to the production environment.

What should you do?

A. Disable UAC prompts.

B. Run the .msi file from an elevated command prompt.

C. Modify the shim to apply to all versions of the application.

D. Modify the shim to apply only to the new version of the application.

Answer: D


Q15. All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.

You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).

You need to ensure that the following requirements are met:

     All BitLocker recovery keys are stored in a central location.

     Data is encrypted only after a backup of the recovery key is available.

What should you do?

A. Run the manage-bde -on -ForceRecovery command.

B. Enable the Choose default folder for recovery password setting.

C. Enable the Store BitLocker recovery information in Active Directory Domain Services setting.

D. Enable the Choose how users can recover BitLocker encrypted drives setting. Set the 256-bit recovery key to Require recovery password.

Answer: C


Q16. This is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each presents a different goal and answer choices, but the text of the scenario is exactly the same in each in this series.

Topic 4, Margie's Travel

Scenario:

You are an enterprise desktop support technician for Margie's Travel.

Margie's Travel is a company that specializes in booking travel for large corporations. The company has a main office in New York and operates a call center in New York and a call center in Los Angeles. The company has 1,000 employees.

Active Directory Configuration

The network contains an Active Directory forest named margiestravel.com. The functional level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as shown in the following table:

User Information

All client computers run Windows 7 Professional. Sales staff is located in the main office and uses portable computers. 

All portable computers are members of the MargiesTravel\Wireless group.

Application Configuration

Call center staff uses a custom application to book airline tickets. The application is packaged as an MSI file and is signed by using a code signing certificate that was issued by CA3. The application is published by using Group Policies.

The company hires an additional 100 users. The users are unable to install the custom application.

You need to ensure that the users can install the custom application.

What should you do?

A. Disable User Account Control (UAC).

B. Add the users to the local Administrators group.

C. Request that the application package be re-signed.

D. Request that the user certificates be issued to the new users.

Answer: C


Q17. You are expanding the wireless functionality by creating a guest wireless network based on the new company requirements.

You need to ensure that users can connect automatically without providing credentials.

Which security type should you use?

A. No Authentication (Open)

B. WEP

C. WPA

D. Shared

E. WPA2 Enterprise

Answer: A


Q18. All client computers on your network have identical hardware.

Your network adapter vendor releases a new driver. Several users install the new driver.

The help desk technicians report that several users are unable to connect to network resources. The technicians instruct the users to restart their computers. When the users log on to their computers, they are still unable to connect to network resources.You need to recommend a solution to ensure that users can connect to network resources.

What should you instruct the users to do?

A. Roll back the network adapter driver.

B. Restore the last known good configuration.

C. Enable the network boot option in the BIOS.

D. Modify the properties on the Network Location Awareness service.

Answer: A


Q19. You are troubleshooting performance issues on a Windows 7 Enterprise client computer.

An unfamiliar service is running on the computer.

You need to recommend the solutions that identify which process identifier (PID) is associated with the service.

What should you do? (Choose all that apply.)

A. Pun the System Configuration utility (rnsconfig.exe) and view the Services tab.

B. Run the sc query command.

C. Use Windows Task Manager and view the Services tab.

D. Run the sc queryex command.

E. Run the Services management console.

Answer: CD


Q20. You have two external consultants. The consultants use their own personal portable computers.

The consultants report that they are unable to connect to your wireless network.

You need to give the consultants wireless access to the Internet. The solution must prevent external consultants from accessing internal resources.

What should you do?

A. Issue a user certificate to the consultants.

B. Issue a computer certificate to the consultants.

C. Join both portable computers to the domain. Add the computer accounts to the MargiesTravel\Wireless group.

D. Create a domain user account for each consultant. Add the user accounts to the MargiesTravel\Wireless group.

Answer: B