which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the previous version of App1. What should you recommend?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of
repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.
Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). previous version of App1. End of repeated scenario The help desk reports that several users use the previous version of App1, which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the previous version of App1. What should you recommend?

This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of
repeated scenarioYou are an enterprise desktop support technician for Contoso, Ltd. IP AddressingContoso has one office. The IP addressing for Contoso is configured as shown in the following table.
Active Directory ConfigurationYou have an Active Directory forest that contains one domain named contoso.com. All domain controllers run Windows Server 2008 R2. An OU exists for each department in the company. The MainOffice Users and Computers OU contains the OUs for each department in the company. The Users OUs contains the user accounts for each department. The Computers OUs contain the computer accounts for each department. The Domain Controllers OU contains the computer accounts for all domain controllers. The Servers OU contains the computer accounts for all other servers. Custom Group Policy objects (GPOs) are linked to each departmental OU, the Domain Controllers OU, and the Servers OU. Server ConfigurationThe relevant servers are configured as shown in the following table. A year ago, a Windows Server 2008 R2 VPN server was deployed. Ten sales users participated in a pilot project to test the new VPN. The pilot project lasted two months. After the pilot project, the VPN server was put into production. The VPN server allows L2TP/IPSec-based VPN connections only. The VPN server requires certificate authentication. Printer ConfigurationNetwork printers are located in a single room on each floor. Users can search Active Directory to find printers that are nearby. Print1 is the print server for all printers. Client Computer ConfigurationMost users have desktop computers. Several users in the sales and management departments have portable computers because they travel frequently. All client computers run Windows 7 Enterprise. The Windows Internet Explorer proxy settings are configured on all client computers by using a GPO named GPO-IE. GPO-IE is linked to the domain. All users in the company use a custom application named App1. App1 is manually installed on all client computers. A new version of App1 is available. Some features in the new version of App1 are incompatible with the Changed with the DEMO VERSION of CAD-KAS PDF-Editor (http://www.cadkas.com). previous version of App1. End of repeated scenario The help desk reports that several users use the previous version of App1, which causes some data to become corrupt. You need to recommend a solution to prevent all users from using the previous version of App1. What should you recommend?

A.
that a domain administrator create a GPO linked to the domain and configure AppLocker settings in the GPO

B.
that a domain administrator create a GPO linked to the domain and configure Software Installation settings in the GPO

C.
that the new version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer

D.
that the previous version of App1 be added to the Data Execution Prevention (DEP) settings on each client computer



Leave a Reply 0

Your email address will not be published. Required fields are marked *