###BeginCaseStudy###
Case Study: 8
Fourth Coffee
Scenario:
You are an enterprise desktop support technician for Fourth Coffee. The network contains a
single domain named fourthcoffee.com.
Physical Environment
The company has three offices. The offices are configured as shown in the following table.
The relevant servers are configured as shown in the following table.
The Web1 server is accessible only through the URL http://web1.fourthcoffee.local
Application Configurations
Fourth Coffee deploys an application named App1 to users in the main office by using a
Group Policy object (GPO) named APP1Deploy. App1 requires that a drive named M be
mapped to
\\AppServer1\AppData$. App1 saves information on a local computer if drive M is
unavailable. All client computers have drive M.
Security Policy
The corporate security policy states that domain controllers can only be deployed in secure
data centers. Branch office 2 does not have a secure data center.
Client Configuration
All users connect remotely through VPN1. VPN1 is configured to accept only SSTP-based
VPN connections. All client computers receive IP configurations from DHCP. You recently
purchased 100 desktop computers from a new hardware vendor.
###EndCaseStudy###
The help desk reports that the new computers experience intermittent failures that generate stop
errors. You need to collect all the critical errors from the new computers. What should you
configure?
A.
a boot configuration data (BCD) store
B.
debugging information
C.
event subscriptions
D.
the system protection settings