CCNA Exam Certification Guide is a best-of-breed Microsoft 070-685 exam study guide that has been completely updated to focus specifically on the objectives.Senior instructor and best-selling author Wendell Odom shares preparation hints andMicrosoft 070-685 tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge.Microsoft 070-685 Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
Question: 1
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staffs are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?
A. Create an Audit only restriction based on the version of the software.
B. Create an Audit only restriction based on the publisher of the software.
C. Create an Enforce rule restriction based on the version of the software.
D. Create an Enforce rule restriction based on the publisher of the software.
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/ee619725(WS.10).aspx http://sourcedaddy.com/windows-7/applocker-rule-types.html
Question: 2
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. AppLocker is configured to allow only approved applications to run. Employees with standard user account permissions are able to run applications that install into the user profile folder. You need to prevent standard users from running unauthorized applications. What should you do?
A. Create Executable Rules by selecting the Create Default Rules option.
B. Create Windows Installer Rules by selecting the Create Default Rules option.
C. Create the following Windows Installer Rule:
Deny Everyone -%OSDRIVE%\Users\<user name>\Downloads\*
D. Create the following Executable Rule:
Deny -Everyone -%OSDRIVE%\Users\<user name>\Documents\*
Answer: A
Explanation:
A. Create Executable Rules by selecting the Create Default Rules option.
Many organizations are implementing standard user policies, which allow users to log on to their
computers only as a standard user. With Windows Vista., this task became easier. However, more
independent software vendors (ISVs) are creating per-user applications that do not require
administrative rights to be installed and that are installed and run in the user profile folder. As a
result, standard users can install many applications and circumvent the application lockdown policy.
With AppLocker, you can prevent users from installing and running per-user applications.
To prevent standard users from running per-user:
To open the Local Security Policy MMC snap-in, click Start, type secpol.msc in the Search programs
and files box, and then press ENTER.
In the console tree, double-click Application Control Policies, and then double-click AppLocker.
Right-click Executable Rules, and then click Create Default Rules.
http://technet.microsoft.com/en-us/library/dd723685(WS.10).aspx
Question: 3
All client computers on your company network were recently upgraded from Windows Vista to windows 7. Several employees use a scanner to import document images into a database. They install a new scanning application on their computers. The application updates the device driver for the scanners as part of the installation process. Employees report that the application can no longer connect to the scanner. You need to ensure that the employees can use the scanner. What should you do?
A. Roll back the device driver to the previous version.
B. Reinstall the application in Windows Vista compatibility mode.
C. Set the application compatibility properties to run the application as an administrator.
D. Restart the computer by using the System Configuration tool to load only basic devices and services.
Answer: A
Explanation: Chapter 1 Lesson 1 p 17 Appendix C p 485 / 486 Chapter 5 p 275 / 276
Device Driver Roll Back reinstalls the driver you were using previously and restores any driver
settings that were changed when you added the new driver. To roll back a device driver to a
previous version:
Log on to the computer by using an account with administrative privileges.
Click Start, and then click Control Panel.
Under Pick a category, click Performance and Maintenance.
Under or pick a Control Panel icon, click System.
On the Hardware tab, click Device Manager.
In the device list, expand the device type branch that you want to work with. For example, Display
adapters.
Right-click the device that you want to work with, and then click Properties.
On the Driver tab, click Roll Back Driver. Click Yes when you receive the following message:
Are you sure you would like to roll back to the previous driver?
The previous device driver is restored. Click Close.
10. Quit Device Manager, and then click OK.
Note: that you cannot restore printer drivers with Device Driver Roll Back.
Driver Roll Back only allows you to roll back a driver once. In other words, Windows 7 only keeps a
copy of the very last driver installed. It does not keep an archive of all previously installed drivers for
the device.
http://pcsupport.about.com/od/windows7/ht/roll-back-driver-windows-7.htm
Question: 4
All client computers on your company network run Windows 7. A standard Windows 7 image is loaded on all new computers on the network. A department in your company purchases several tablet computers. Employees report that the pen interface does not work on the tablet computers. You need to ensure that employees can use the pen interface. What should you do?
A. Turn on the Media Features.
B. Turn on the Tablet PC Components.
C. Start the WMI Performance Adapter service and set it to Automatic.
D. Start the Human Interface Device Access service and set it to Automatic.
Answer: B
Explanation: Chapter 6 p 296 -298 Start > Control Panel > Programs > Programs and Features > Turn Windows features on or off
To turn a Windows feature on, select the check box next to the feature. Click OK. To turn a Windows feature off, clear the check box. Click OK.
Question: 5
All client computers on your company network run Windows 7.
The preview displayed in the Content view of Windows Explorer and the Search box is considered a
security risk by your company. You need to ensure that documents cannot be previewed in the
Content view. What should you do?
A. Change the Windows Explorer view to the List view and disable all Search indexes.
B. Set Group Policy to enable the Remove See More Results/Search Everywhere link setting.
C. Set Group Policy to enable the Turn off the display of snippets in Content view mode setting.
D. Set Group Policy to enable the Turn off display of recent search entries in the Windows Explorer search box setting.
Answer: C
Explanation: Location: User Configuration > Administrative Templates > Windows Components > Windows Explorer This policy lets you disable the display of file content snippets when Content view is turned on. Content view is the default view returned when a search is executed and shows snippets of content of returned files. Default configuration: Snippets are displayed in Content view Purpose: This policy should be enabled if you want to disable showing snippets of file contents by default when a search is returned. This helps users avoid displaying sensitive data accidentally through Windows Explorer searches while in a non-secure environment. http://technet.microsoft.com/en-us/library/dd744697(WS.10).aspx http://technet.microsoft.com/en-us/library/dd744697(WS.10).aspx#WS_TurnOffDisplayofSnippets
Question: 6
All client computers on your company network were recently migrated from Windows XP to Windows 7.Employees use Internet Explorer 8. Each time employees access a Web application, they are prompted to install an add-on. After each installation, the application restarts and prompts the employees to install the add-on again. You need to ensure that employees can run the application. What should you do?
A. Use a script to install the add-on in Windows XP Mode.
B. Use a script to run the application in Windows XP Compatibility Mode.
C. Add the class identifier of the add-on to the Add-on list in Group Policy.
D. Set the Deny all add-ons unless specifically allowed in the Add-on list Group Policy setting to Disabled.
Answer: C
Explanation:
Chapter 4 Lesson 2 p 149
Microsoft 070-685 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism. The main purpose of Microsoft 070-685 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification
Question: 7
Your network contains an Active Directory domain. All client computers run Windows 7 Enterprise. A custom application named App1 is installed on the computers. All settings for App1 are stored in the user portion of the registry. The help desk reports a high volume of calls from users who have incorrectly configured the App1 settings. You need to recommend a solution to minimize the number of help desk calls about the incorrect App1 configurations. Users must be able to use App1. What should you do?
A. Instruct the help desk to modify the Windows Defender settings.
B. Instruct the help desk to remove all users from the Administrators group on all local computers.
C. Request that a domain administrator create a Group Policy object (GPO) that uses a custom administrative template.
D. Request that an administrator create a Group Policy object (GPO) that configures a software restriction policy.
Answer: C
Question: 8
All client computers on your company network run Windows 7. A software application that monitors Internet usage is installed on each of the computers. You plan to collect all Critical and Error events generated by the application and review them on your computer. You perform the following tasks on your computer:
.
Create an event subscription by using Event Viewer.
.
Create a query filter and select Critical and Error events from the Application event log. You need to ensure that the following requirements are met:
.
Only Critical and Error events from the Application event log are forwarded to your computer.
.
The Application event log can be viewed from your computer and the computers that
generated the errors.
What should you do first?
A.
Set the Subscription type property to Collector initiated by using a Windows Remote Shell Group Policy.
B.
Set the Subscription type property to Source initiated by using a Windows Remote Management Service Group Policy.
C.
Set the Subscription type and source computers property to Source computer initiated by using a Windows Remote Shell Group Policy.
D.
Set the Subscription type and source computers property to Collector initiated by using a Windows Remote Management Client Group Policy.
Answer: B
Explanation: http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973(v=vs.85).aspx
Question: 9
All client computers on your company network were recently migrated from Windows XP to Windows 7. Your company uses a proprietary software program that is installed by using a Windows Installer (.msi) file. Employees who require the application must install it on their computers. Employees are unable to install the software due to compatibility issues. You need to ensure that the application can be installed. What should you do?
A. Disable UAC prompts.
B. Add the user to the local Administrators group.
C. Run the .msi file from an elevated command prompt.
D. Modify the properties of the .msi file to run in compatibility mode.
Answer: D
Explanation:
Chapter 9 Lesson 2 p 360
http://windows.microsoft.com/en-US/windows-vista/Make-older-programs-run-in-this-version-of-Windows
Question: 10
All client computers on your company network run Windows 7. The event logs contain errors from an application source and the Kernel-Power source. You plan to track the errors. You need to capture only the relevant data to generate a report. What should you do?
A. Open Event Viewer and sort by Source.
B. Open Event Viewer and create a Custom View. Include the application and system logs and include the event sources. Save the filter results as an XML file.
C. Open Performance Monitor and save the template from EventLog-System Event Trace Session.
D. Open Performance Monitor and save the template from EventLog-Application Event Trace Session.
Answer: B
The VVJHV contains more than 400 practice questions for the Microsoft 070-685 exams, including simulation-based questions. Also contains hands-on exercises and a customized copy of the Microsoft 070-685 exams network simulation software.