###BeginCaseStudy###
Case Study: 9
Wingtip Toys
Scenario:
You are an enterprise desktop support technician for Wingtip Toys. Wingtip Toys has two
offices.
Active Directory Configuration
The network contains a single Active Directory domain. An Active Directory site exists for
each office. The network contains the organizational units (OUs) that are shown in the
following table.
The network contains an enterprise root certification authority (CA). Certificate
autoenrollement is enabled for all users.
Network Configuration
Each office has a wireless network. You control access to the wireless network in office 1 by
using Network Access Protection (NAP). A Group Policy object (GPO) named GPO1
configures the NAP settings for the computers in office 1.
Resource Access
The Documents folders of all users are encrypted by using Encrypting File System (EFS).
The Documents folders of all users are backed up daily.
A Web server named Web1 hosts an internal Web site named WebSite1. Users connect to
WebSite1 from the Internet by using the URL http://website1.wingtiptoys.com. The domain
name website1.wingtiptoys.com is resolved by using the Hosts file that is located on each
client computer. Users frequently work from home. Home users connect to the internal
network by using SSTP-based VPN connections.
Line of Business Applications
Your company has a line-of-business application named App1. App1 is installed only on
computers that run Windows XP. You test App1 by using the Microsoft Application
Compatibility Toolkit (ACT). ACT reports that App1 can be made compatible to run on
Windows 7.
###EndCaseStudy###
The help desk reports that they receive many calls from remote users who cannot access Internet
Web sites while they are connected to the VPN. The help desk instructs the users to manually
configure the VPN connection so that the users can access Internet Web sites while connected to the
VPN. You need to provide a recommendation to reduce the number of calls to the help desk
regarding this issue. What should you recommend?
A.
Deploy a Network Policy Server (NPS).
B.
Replace the SSTP-based VPN with a PPTP-based VPN.
C.
Issue computer certificates from a trusted root certification authority (CA) to all remote users.
D.
Create and distribute Connection Manager Administration Kit (CMAK) profiles to all remote users.