MCITP Microsoft

Microsoft 70-682 PDF-Answers, Helpful Microsoft 70-682 Answers For Sale

Important Info: These new valid Microsoft 70-682 exam questions were updated in recent days by Flydumps,please visit our website to get the full version of new Microsoft 70-682 exam dumps with free version of new VCE Player,you can pass the exam easily by training it!

This question is the first in a series of questions that all present the same scenario. For your convenience, the
scenario is repeated in each Question: Each question presents a different goal and answer choices, but the
text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an
enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a
main office and a branch office. The main office hosts all of the companys servers. The main office connects
to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500
users. The domain contains three domain controllers and an enterprise root certification authority (CA). All
servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees.
The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for
all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using
Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users
have desktop computers. All computers are members of the domain. All desktop computers use wired
connections to connect to the network. All portable computers use wireless connections to connect to the
network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers
must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use
SSL encryption and to require client certificates. All company users can access the internal Web site. End of
repeated scenario The company hires a new desktop support technician. The technician is added to the
Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new
technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the
technician can view the configurations of the DHCP servers. What should you do?

A.Instruct the technician to customize the Start menu to display the administrative tools .
B.Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows
Features .
C.Request that the technician be added to the Server Operators group in Active Directory .
D.Request that the technician be added to the Network Configuration Operators group in Active Directory
and modify the Windows Features.

Answer: B

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The help desk reports that all newly installed desktop computers cannot access the companys file server. The help desk sends you the screen capture shown in the exhibit. (Click the Exhibit button.) You need to resolve the network connectivity issue. The solution must adhere to the company policy. What should you instruct help desk to do?
83455c8df9f94173b188525f8e918388
A. Modify the network configuration and define the IPv4 default gateway.
B. Modify Windows Firewall and enable File and Printer Sharing in the public profile .
C. Modify Windows Firewall and enable File and Printer Sharing in the domain profile.
D. Modify the network configuration to automatically obtain an IP address and a DNS server address .
Answer: D

Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?
A. Branch Cache
B. Direct Access
C. Distributed File System Replication (DFSR)
D. Universal Group Membership Caching

Answer: A

All client computers on your company network were recently migrated from Windows XP to Windows 7. Employees use Internet Explorer 8. Each time employees access a Web application, they are prompted to install an add-on. After each installation, the application restarts and prompts the employees to install the add-on again. You need to ensure that employees can run the application. What should you do?
A. Use a script to install the add-on in Windows XP Mode.
B. Use a script to run the application in Windows XP Compatibility Mode.
C. Add the class identifier of the add-on to the Add-on list in Group Policy.
D. Set the Deny all add-ons unless specifically allowed in the Add-on list Group Policy setting to Disabled.

Answer: C

All client computers on your company network were recently upgraded from Windows Vista to Windows 7. Several employees use a scanner to import document images into a database. They install a new scanning application on their computers. The application updates the device driver for the scanners as part of the installation process. Employees report that the application can no longer connect to the scanner. You need to ensure that the employees can use the scanner. What should you do?
A. Roll back the device driver to the previous version.
B. Reinstall the application in Windows Vista compatibility mode.
C. Set the application compatibility properties to run the application as an administrator.
D. Restart the computer by using the System Configuration tool to load only basic devices and services.

Answer: A

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?
A. Modify the time zone for the computer.
B. Modify the IPv4 settings on the computer.
C. Create an A record for the computer in an internal DNS zone.
D. Request that an administrator create a prestaged computer account in the domain.

Answer: B

Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?
A. Configure the IPv6 protocol on the Windows 7 computers.
B. Configure the network shares on the Windows 7 computers to include the user names of all employees.
C. Configure the network shares on the Windows XP computers to include the user names of all employees.
D. Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

Answer: D

All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?
A. Create an Audit only restriction based on the version of the software.
B. Create an Audit only restriction based on the publisher of the software.
C. Create an Enforce rule restriction based on the version of the software.
D. Create an Enforce rule restriction based on the publisher of the software.

Answer: C

All client computers on your company network run Windows 7. A computer is unable to connect to network
resources. The configuration of the computer is as shown in the following table.
You need to ensure that the computer is able to connect to network resources. What should you do?
A. Change the IP address to 131.107.3.254.
B. Change the subnet mask to 255.255.248.0.
C. Change the default gateway to 131.107.0.1.
D. Change the preferred DNS server to 131.107.3.1.

Answer: C

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?
A. Configure the Network authentication (Shared mode) setting.
B. Apply a Wireless Network Policy to set the network type to WPA-PSK.
C. Apply a Wireless Network Policy to automatically connect to the company wireless network.
D. Apply a Wireless Network Policy to set the company wireless network as the preferred network.

Answer: D

All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?
A. Set the VPN server to Layer 2 Tunneling Protocol.
B. Set the VPN server to Secure Socket Tunneling Protocol.
C. Set the VPN server to Internet Key Exchange version 2.
D. Configure the Direct Access feature on the VPN server.

Answer: A

Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?
A. Configure a Windows Connect Now Group Policy.
B. Configure a Wireless Network (IEEE 802.11) Policy.
C. Delete the rogue network from the Network and Sharing Center on each computer.
D. Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

Answer: B

Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need
to recommend a solution that identifies the applications that run during the startup process. What should you recommend?
A. Event Forwarding
B. MSConfig.exe
C. Problem Steps Recorder
D. Reliability Monitor

Answer: B

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. App Locker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?
A. Create Executable Rules by selecting the Create Default Rules option.
B. Create Windows Installer Rules by selecting the Create Default Rules option.
C. Create the following Windows Installer Rule.Deny C Everyone -%OSDRIVE%\Users\<user name>\Downloads\*
D. Create the following Executable Rule.Deny -Everyone -%OSDRIVE%\Users\<user name>\Documents\*

Answer: A
Question: 15.

All client computers on your company network run Windows 7. The Finance department staffs run an application that collects data from 09.30 hours to 15.00 hours every day. After data collection, the application generates reports that contain data aggregation for the day and the previous week. During report generation, the Finance department staff experience slow performance on their computers. You discover that the usage of the processor on these computers is between 90 and 100 percent. You need to reduce the impact of report generation on the Finance computers. What should you do?
A. Set the priority of the application to Low.
B. Set the priority of the application to Real-time.
C. Configure the processor affinity mask to ensure that the application uses all the available processors.
D. Modify the memory settings of the computers to optimize the performance of the background applications.

Answer: A

Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?
A. Event Trace Data Collector Set
B. Performance Counter Data Collector Set
C. Performance Counter Alert Data Collector Set
D. System Configuration Information Data Collector Set

Answer: B

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?
A.WLAN Auto Config B.WWAN Auto Config
C. Computer Browser
D. Portable Device Enumerator Service

Answer: B

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each Question: Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenario you are an enterprise desktop support technician for Humongous Insurance. Active Directory Configuration the Company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server Configuration All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS server DHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer Configuration All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access Configuration Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application Configuration All computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario several users in the sales department report that their user accounts are locked out shortly after they change their user passwords. You need to minimize the number of account lockouts that occur after the users change their passwords. What should you instruct the users to do?

A. Delete all entries from the Credential Manager vault.
B. Change their passwords and then create a password reset disk.
C. Change their passwords and then configure App2 to log on by using a service account.
D. Change their passwords and then log off and log back on to their computers.

Answer: C

Start of repeated scenarioYou is an enterprise desktop support technician for Humongous Insurance. Active Directory Configuration the Company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server Configuration All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS server DHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer Configuration All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access Configuration Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application Configuration All computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario each day, 100 users in Office2 download a 5-MB product catalog file from a share on Server1. The network administrator reports that the downloads cause an excessive load on the WAN link between Office1 and Office2. You need to recommend a solution to minimize WAN utilization. The solution must not require that additional servers be deployed. What should you recommend?

A. Branch Cache in distributed cache mode
B. Branch Cache in hosted cache mode
C. Distributed File System Replication (DFSR)
D. File Server Resource Management (FSRM)

Answer: A

Start of repeated scenarioYou is an enterprise desktop support technician for Humongous Insurance. Active Directory Configuration the Company has two offices named Office1 and Office2. The network contains an Active Directory forest named humongousinsurance.com. An Active Directory site exists for each office. The sites are named Site1 and Site2. Server Configuration All servers run Windows Server 2008 R2 and are joined to the domain. The relevant servers are configured as shown in the following table. The corporate security policy states that all domain controllers must have only the following roles. AD DSDNS server DHCP server Network ConfigurationSite1 and Site2 connect to each other by using a WAN link. Client Computer Configuration All client computers run Windows 7 Enterprise and are members of the domain. Some client computers are portable computers and some are desktop computers. The computers do not support hardware virtualization. All computers are configured to receive Windows Updates from WSUS1. Remote Access Configuration Users can connect to NPAS1 from the Internet by using all of the VPN protocols that are supported by Windows Server 2008 R2. Fabrikam, Inc. is a customer of Humongous Insurance. Several Humongous Insurance users work at the Fabrikam office and access resources on the Humongous Insurance network by using direct VPN connections to NPAS1. Fabrikam contains several wireless access points. Application Configuration All computers in the finance department run a custom application suite named App1. Several users in the sales department install an application named App2. App2 runs as a service and logs on by using the credentials of the user who installed the application. End of repeated scenario Humongous Insurance users who work at Fabrikam report that when they move between different wireless networks, they are prompted to manually reconnect to the VPN. You need to ensure that the users can automatically reconnect to the VPN when they move between wireless networks. What should you request?

A. that a network administrator creates a CNAME record named AUTODISCOVER in the humongousinsurance.com DNS zone
B. that a network administrator enables Network Load Balancing on NPAS1
C. that users use only IKEv2-based VPN connections
D. that users use only SSTP-based VPN connections

Answer: C

Start of repeated scenarioYou is an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical Environment the Company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application Configurations Fourth Coffee deploys an application named App1 to users in the main office by using a Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \\AppServer1\AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security Policy The corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client Configuration All users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario Users in branch office 2 map drives to shared folders on SRV1. The users report that they cannot access files in the shared folders when the WAN link between branch office 2 and the main office is unavailable. When they attempt to access the files, they are prompted to enter their credentials but are denied access. You need to ensure that the users can access the shared folders if the WAN link fails. What should you do?
A. Instruct a desktop support technician to configure Offline Files on the Windows 7 computers.
B. Instruct a desktop support technician to configure Branch Cache on the Windows 7 computers.
C. Request that a domain administrator deploy a domain controller in branch office 2.
D. Request that a domain administrator enable Universal Group Membership Caching for branch office 2.

Answer: A

Start of repeated scenarioYou is an enterprise desktop support technician for Fourth Coffee. The network contains a single domain named fourthcoffee.com. Physical Environment The company has three offices. The offices are configured as shown in the following table. The relevant servers are configured as shown in the following table. The Web1 server is accessible only through the URL http.//web1.fourthcoffee.local. Application Configurations Fourth Coffee deploys an application named App1 to users in the main office by using a Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be mapped to \\AppServer1\AppData$. App1 saves information on a local computer if drive M is unavailable. All client computers have drive M. Security Policy The corporate security policy states that domain controllers can only be deployed in secure data centers. Branch office 2 does not have a secure data center. Client Configuration All users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based VPN connections. All client computers receive IP configurations from DHCP. You recently purchased 100 desktop computers from a new hardware vendor. End of repeated scenario VPN users report that they cannot access shared resources in the branch offices. They can access shared resources in the main office. Users in the main office report that they can access shared resources in the branch offices. You need to ensure that the VPN users can access shared resources in the branch offices. What should you request?
A. that a change be made to the routing table on VPN1
B. that VPN1 be configured to support PPTP-based VPN connections
C. that the routers between the main office and the branch offices be reconfigured D .that a DNS record for servers in the branch offices be added to the Internet DNS zone for fourthcoffee.com

Answer: A

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each Question: Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou is an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees. Active Directory Configuration The network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP Configuration the DHCP servers are configured as shown in the following table. Computer Information All corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with Direct Access. The company is running a pilot project to test Direct Access for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario The help desk reports that remote desktop connections are not enabled on the public computers in the chalets. Consequently, the help desk must instruct local staff to enable remote desktop connections on each public computer. You need to ensure that remote desktop connections are enabled when public computers are deployed in the chalets. What should you do?

A. Enable Remote Desktop Connection in the standard computer image.
B. Instruct the help desk to enable Windows Remote Management (WinRM) on the public computers.
C. Request that a network administrator create a logon script for the domain.
D. Request that a network administrator create a new Group Policy to enable remote desktop connections. Link the new Group Policy to each site.

Answer: A

Start of repeated scenarioYou is an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees. Active Directory Configuration The network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP Configuration the DHCP servers are configured as shown in the following table. Computer Information All corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with Direct Access. The company is running a pilot project to test Direct Access for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario Remote users report that after they renew their smart card certificates, they are unable to log on to their computers by using their smart cards. You need to ensure that users can log on by using their smart cards. What should you instruct the users to do?

A. Change their smart card PINs.
B. Request a new smart card certificate.
C. Log on by using their user names and passwords, and then lock and unlock their computers.
D. Establish a VPN connection from the logon screen and use their smart cards for authentication.

Answer: D

Start of repeated scenarioYou is an enterprise desktop support technician for Alpine Ski House. Alpine Ski House manages chalets in ski resorts around the world. The main office is located in Vancouver. Chalets are located in Japan, France, and Australia. Alpine Ski House has 500 employees. Active Directory Configuration The network contains an Active Directory forest. The forest contains a domain named alpineskihouse.com. The network contains four Active Directory sites. All sites have high-speed Internet connections and connect to each other by using VPNs. The site information is shown in the following table. DHCP Configuration the DHCP servers are configured as shown in the following table. Computer Information All corporate computers run Windows 7 Professional and are joined to the alpineskihouse.com domain. All corporate users can access the internal network remotely by using a VPN connection. The VPN connection requires the use of a smart card. During the next year, Alpine Ski House plans to replace the existing VPN with Direct Access. The company is running a pilot project to test Direct Access for users in France. Each chalet contains five public computers that run Windows 7 Ultimate. Guests use the public computers to access the Internet. The public computers are members of a workgroup. Every week, a standard image of Windows 7 Ultimate is re-applied to the computers. End of repeated scenario Users report that it takes a long time to access resources by using Direct Access. You need to provide the network administrator with a network capture of Direct Access traffic. Which tool should you use?

A.Netsh.exe B.Netstat.exe C.Perfmon.exe D.Winsat.exe

Answer: A

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?
A. from Credential Manager, add a Windows credential.
B. from Credential Manager, add a certificate-based credential.
C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Answer: C

You have a computer that runs Windows 7. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first?
A. Run Sdbinst.exe.
B. Run Msiexec.exe.
C. Right-click the application executable files and modifies the compatibility settings.
D. Right-click the application executable files and modifies the advanced security settings.

Answer: A

You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
A.Msconfig.exe B.Slui.exe
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter

Answer: C

You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy?
A. Enable the Prevent redirection of USB devices setting.
B. Enable the Prevent installation of removable devices setting.
C. Disable the WPD Devices. Deny read access setting.
D. Disable the Allow administrators to override Device Installation Restriction policies setting.

Answer: B

You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What should you do?
A. Run Winrm quickconfig on Computer1 .
B. Run Winrm quickconfig on Computer2 .
C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

Answer: B

You have a computer that runs Windows 7. A user installs a third-party media player on the computer. You discover that all media files automatically open by using the third-party media player. You need to ensure that all media files open automatically by using Windows Media Player. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Select a media file. Right-click the file and select open with.
B. Select a media file. Right-click the file and select Restore previous versions .
C. From Control Panel, modify the Set your default programs settings.
D. From Control Panel, modify the Set program access and computer defaults settings.

Answer: C

You start a computer by using Windows Pre installation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?
A. Run Peimg.exe and specify the device driver path.
B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the Initialize Network command.

Answer: B

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request?
A.A B.AAAA C.HINFO D.NAPTR

Answer: B

You have a computer that runs Windows 7. You connect to your company’s network by using a VPN connection. You discover that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites. You need to access Internet Web sites while you are connected to the VPN. What should you do?
A. Configure the VPN connection to use only PPTP.
B. Configure the VPN connection to use only L2TP/IPSec.
C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting.
D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

Answer: D

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You need to start the computer from the VHD. What should you do?
A. from Diskpart.exe runs Select disk.
B. from Disk Management modifies the active partition.
C. Run Bootcfg.exe and specify the /default parameter.
D. Run Bcdedit.exe and modify the Windows Boot Manager settings.

Answer: D

You have a computer that runs Windows XP and a USB drive that is protected by using Bit Locker to Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do?
A. From a computer that runs Windows 7, change the file system of the USB drive.
B. From a computer that runs Windows 7, disable Bit Locker to go for the USB drive.
C. Log on to Windows XP as member of the Administrators group.
D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

Answer: B

Your network contains 100 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. You must achieve this goal by using the minimum amount of administrative effort. What should you install?
A. Microsoft Application Compatibility Toolkit (ACT)
B. Microsoft Assessment and Planning (MAP) Toolkit
C. Microsoft Deployment Toolkit (MDT)
D. Windows Automated Installation Kit (AIK)

Answer: A

Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) Other users on the network receive an IPv6 address for ISATAP. You need to ensure that your computer receives an IPv6 address for ISATAP. What should you do?

A. Run Ipconfig /renew6 .
B. Run Ipconfig /setclassid6 .
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.

Answer: D

You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C

Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables Branch Cache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.) You need to ensure that other computers in the branch office can access the cached content on your computer. What should you do?

A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the Branch Cache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.

Answer: D

You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.
C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.

Answer: C

Your network consists of an Active Directory domain and a Direct Access infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish Direct Access connections. What should you do?
A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.

Answer: A

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All client computers are configured to use Branch Cache. At the branch office, a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers from retrieving cached content from Computer1. What should you do on Computer1?
A. At the command prompt, run Netsh branch cache flush.
B. At the command prompt, run Netsh branch cache dump.
C. Modify the Configure Branch Cache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

Answer: A

You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must achieve this goal by using the least amount of administrative effort. What should you do?
A. from Software Restriction Policies creates a path rule.
B. from Software Restriction Policies creates a hash rule.
C. from Application Control Policies creates the default rules.
D. from Application Control Policies creates an executable rule.

Answer: D

You have a computer that runs Windows 7. You log on to the computer by using a user account that is a member of Administrators group. From Windows Explorer you open C.\windows\system32\drivers\etc\hosts in Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that you can save changes to C.\windows\system32\drivers\etc\hosts. What should you do?
A. Stop the Windows Search service.
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the User Account Control (UAC) settings to Notify me only when program try to make changes to my computer.

Answer: C

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?
A. Start the Problem Steps Recorder.
B. from Event Viewer modifies the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.

Answer: C

You have an answer file for a Windows 7 installation. You need to perform an unattended installation of Windows 7 by using the answer file. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Name the answer files autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.
B. Name the answer files autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD.
C. Name the answer files unattend.xml and save it to a USB disk. Start the computer from the Windows Pre installation Environment (Windows PE).
D. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Pre installation Environment (Windows PE).

Answer: A

You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-box-experience (OOBE) portion of the setup. What should you do?
A. Copy install.wim from the Windows 7 installation media to the VHD.
B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.
C. Start the computer by using the Windows 7 installation media and then select Install now.
D. Start the computer by using the Windows Pre installation Environment (Windows PE) and then run Diskprep.exe.

Answer: B

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do?
A. At the command prompt, run Winrs Cr.computer2 query.
B. At the command prompt, run Winrm id Cremote.computer2.
C. from Windows Power Shell, run Get-PSSession Computer2.
D. from Windows Power Shell, run Get-PSSession Configuration Computer2.

Answer: B

You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.

Answer: C

You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C

You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run?
A.Msconfig.exe B.Slui.exe
C. Slmgr.vbs and specify the dli parameter
D. Winrm.vbs and specify the id parameter

Answer: C
Question: 53.

You start a computer by using Windows Pre installation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do?
A. Run Peimg.exe and specify the device driver path.
B. Run Drvload.exe and specify the device driver path.
C. Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D. Run Wpeutil.exe and specify the Initialize Network command.

Answer: B

You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.

Answer: C

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do?
A. from Credential Manager, add a Windows credential.
B. from Credential Manager, add a certificate-based credential.
C. From the local computer policy, add a data recovery agent.
D. From the local computer policy, modify the Restore files and directories setting.

Answer: C
Question: 56.

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?
A. Start the Problem Steps Recorder.
B. from Event Viewer modifies the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.

Answer: C

You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.
C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.

Answer: C

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request?
A.A B.AAAA C.HINFO D.NAPTR

Answer: B

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do?
A. At the command prompt, run Winrs Cr.computer2 query.
B. At the command prompt, run Winrm id Cremote.computer2.
C. from Windows Power Shell, run Get-PSSession Computer2.
D. from Windows Power Shell, run Get-PSSession Configuration Computer2.

Flydumps Microsoft 70-682 exam questions which contain almost 100% correct answers are tested and approved by senior lecturers and experts.The Microsoft-technet – Implementing Microsoft 70-682 VCE and PDF give you the knowledge and the know how to affectively prepare for the Microsoft-technet that you will be tested on for Microsoft 70-682 exam.

microdess
We are a team that focuses on tutoring Microsoft series certification exams and is committed to providing efficient and practical learning resources and exam preparation support to candidates. As Microsoft series certifications such as Azure, Microsoft 365, Power Platform, Windows, and Graph become more and more popular, we know the importance of these certifications for personal career development and corporate competitiveness. Therefore, we rely on the Pass4itsure platform to actively collect the latest and most comprehensive examination questions to provide candidates with the latest and most accurate preparation materials. MICROSOFT-TECHNET not only provides the latest exam questions, but also allows candidates to find the required learning materials more conveniently and efficiently through detailed organization and classification. Our materials include a large number of mock test questions and detailed analysis to help candidates deeply understand the test content and master the answering skills, so as to easily cope with the test. In addition, we have also specially launched exam preparation materials in PDF format to facilitate candidates to study and review anytime and anywhere. It not only contains detailed analysis of exam questions, but also provides targeted study suggestions and preparation techniques so that candidates can prepare more efficiently. We know that preparing for exams is not just about memorizing knowledge points, but also requires mastering the correct methods and techniques. Therefore, we also provide a series of simulation questions so that candidates can experience the real examination environment in the simulation examination and better adapt to the examination rhythm and atmosphere. These simulation questions can not only help candidates test their preparation results, but also help candidates discover their own shortcomings and further improve their preparation plans. In short, our team always adheres to the needs of candidates as the guide and provides comprehensive, efficient and practical test preparation support to candidates. We believe that with our help, more and more candidates will be able to successfully pass the Microsoft series certification exams and realize their career dreams.