(100 PERCENT PASS) Braindump2go Offers The Latest Microsoft 70-688 Questions and Answers For Free Download (11-25)
Braindump2go Updated Microsdoft 70-688 Practice Exam Dumps Today! All Latest 276 Questions and Answers are all from Micrsoft Exam Center – Many New Question added into 70-688 Exam! Free Download the latest Microsoft 70-688 sample Exam Questions from Braindump2go Now!
Exam Code: 70-688
Exam Name: Supporting Windows 8.1
You have a client Windows 8.1 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed.
You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive.
Which Group Policy object (GPO) setting should you configure?
A. Configure use of hardware-based encryption for operating system drives.
B. Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
C. Require additional authentication at startup.
D. Allow network unlock at startup.
You administer computers that run Windows 8 Pro.
Your company uses credit card readers that require a custom driver supplied by the manufacturer. The readers frequently are moved from computer to computer.
Your company recently purchased five new computers that run Windows 8 Pro.
You want the required drivers to be installed automatically and silently when users connect the readers to the new computers.
You need to pre-stage the credit card reader driver on the new computers.
What should you do?
A. Add a Registry key with a path to a network shared folder that has the driver installation files.
B. Run the pnputil.exe utility.
Specify the document scanner driver.
C. Add a Registry key with a path to a local folder on every computer.
Copy the driver installation files to the folder.
D. Run the dism.exe utility.
Copy the driver files to the C:\Windows\System32\drivers folder in the WIM image.
Pnputil.exe is a command line utility that you can use to manage the driver store.
You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store.
You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home.
You need to ensure that employees can log on to their laptops when they work from home.
What should you do?
A. Provide employees their BitLocker PINs.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company
In addition to the option of creating a startup key, you have the option of creating a startup personal identification number (PIN).
You can create either the startup key or the startup PIN, but not both. The startup PIN can be any number that you choose from 4 to 20 digits in length. The PIN is stored on your computer.
You will have to type the PIN each time you start the computer.
Drag and Drop Questions
You administer computers and printers on your company network.
The computers run Windows 8 Pro.
You need to remove a print job from a print queue by using a remote PowerShell session.
Which three commands should you run in sequence? (To answer, move the appropriate commands from the list of commands in the answer area and arrange them in the correct order.)
* The Get-Printer cmdlet retrieves a list of printers installed on a computer.
You can also use Get- Printer to retrieve the properties of a single printer, and then use that information as input into other cmdlets.
Retrieves a list of print jobs in the specified printer. The Get-PrintJob cmdlet retrieves the current print jobs in the specified printer. Use the PrinterName parameter to list the print jobs from the specified printer.
Removes a print job on the specified printer.
Reference: Get-Printer; Get-PrintJob; Remove-PrintJob
You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft Exchange 2010 with ActiveSync and Outlook Web Access.
Users will be using the tablets outside of the corporate network.
The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password.
You need to ensure an alphanumeric password is required on all Windows 8 tablets.
What should you do?
A. From the Mail app, add the user’s Exchange account.
B. Set up New Partnership in Sync Center.
C. From Sync your Settings, set Password to Off.
D. Create a user profile by using a Microsoft account.
You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user’s computer to prevent possible user data loss in the future.
What should you do?
A. Configure the user’s documents library to include folders from network shares.
B. Remove the .man extension from the user profile name.
C. Add the .dat extension to the user profile name.
D. Configure Folder Redirection by using the domain group policy.
A mandatory user profile is a special type of pre-configured roaming user profile that administrators can use to specify settings for users. With mandatory user profiles, a user can modify his or her desktop, but the changes are not saved when the user logs off. The next time the user logs on, the mandatory user profile created by the administrator is downloaded. There are two types of mandatory profiles: normal mandatory profiles and super-mandatory profiles.
User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive) on the server to NTuser.man.
The .man extension causes the user profile to be a read-only profile.
User profiles become super-mandatory when the folder name of the profile path ends in .man; for example, \\server\share\mandatoryprofile.man\.
Super-mandatory user profiles are similar to normal mandatory profiles, with the exception that users who have super-mandatory profiles cannot log on when the server that stores the mandatory profile is unavailable. Users with normal mandatory profiles can log on with the locally cached copy of the mandatory profile.
Only system administrators can make changes to mandatory user profiles.
Drag and Drop Questions
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers.
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
In which order should you perform the actions? (To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.)
* The Windows Assessment and Deployment Kit (Windows ADK) is a collection of tools and documentation that you can use to customize, assess, and deploy Windows operating systems to new computers.
* Walkthrough: Create a Custom Windows PE Image
Step 1: Set Up a Windows PE Build Environment
Step 2: Mount the Base Windows PE Image
Step 3: Add Boot-Critical Drivers
Step 4: Add Optional Components
Step 5: Add Language Support (Optional)
Step 6: Add More Customization (Optional)
Step 7: Commit Changes
* Walkthrough: Create a Windows RE Recovery Media
Step 1: Create a Windows RE Image
Step 2: Create a bootable media
Walkthrough: Create a Custom Windows PE Image
Walkthrough: Create a Windows RE Recovery Media
You have a computer that runs Windows 8 Enterprise.
You need to ensure that all users can see the history of detected items in Windows Defender. Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.)
Drag and Drop Questions
You administer computers and printers on your company network. The computers run Window 8 Pro. An employee wants to add a separator page to her printer task on a network printer.
You create a separator page file and save it to the C:\Windows\System32 folder on her computer. You need to configure the computer to use the separator page for the print task.
Which three actions should you perform in sequence on the computer? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You are an IT consultant for small and mid-sized businesses. One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards.
You need to verify that the client laptops and tablets support Virtual Smart Cards.
What should you do?
A. Ensure that each laptop and tablet can read a physical smart card.
B. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
C. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2
D. Ensure that the laptops and tablets are running Windows 8 Enterprise edition.
TPM virtual smart cards
Virtual smart cards (VSCs) emulate the functionality of traditional smart cards, but instead of requiring the purchase of additional hardware, they utilize technology that users already own and are more likely to have with them at all times.
Microsoft virtual smart card platform is currently limited to the use of the Trusted Platform Module (TPM) chip onboard most modern computers.
You have a computer that runs Windows 8. The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows:
UserA is a member of both the Everyone group and the Marketing group. UserA must access
C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?
B. Full Control
D. Read and Execute
For example, a user named Dan is directly granted the Allow Read and Execute permission for a folder called Marketing. However, the Dan user account is a member of the group Marketing Users, which is granted the Allow Full Control permission, and the group Everyone, which granted the Allow Read permission.
Based on the cumulative nature of NTFS permissions, the user Dan would be granted the effective permission Allow Full Control. This example is fairly basic, and production environments typically involve a much greater number of groups, with both allowed and denied permissions.
In these cases, the Effective Permissions tab can greatly ease the burden of attempting to determine which permissions will or will not apply for a particular user.
Drag and Drop Questions
You support a desktop computer that runs Windows 8 Pro. The computer is joined to an Active Directory domain. The computer has a folder named C:\Reports. The folder NTFS permissions are shown in Exhibit 1. (Click the Exhibit button.)
The folder is shared over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)
Members of the domain security group named Accountants must have access to the shared folder.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Share Folders From `Users Profile’ Locations & Local Drives
If you want to quickly share a folder residing in local drives or User Profile folders, open Properties dialog from right-click context menu, and then head over to Sharing tab.
From Network File and Folder Sharing section, click Share to open File Sharing dialog.
Now, select Everyone from drop-down menu, and click Add.
This will add Everyone group in File Sharing list, and allow you to change folder access permission. Using Read pull-down menu, you can give read and write permissions to users, and remove Everyonegroup from the File Sharing list.
Once done, click Share to share the folder on the network. It will open a separate dialog, allowing you to email and copy the shared folder link.
Now, you can access the shared folder from any PC connected on the network.
You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled. Some users require access to the internal company database servers while traveling.
You need to configure the requested network connection to the database servers.
What should you configure on the laptops?
A. A DirectAccess connection to the company network
B. A virtual private network (VPN) connection to the company network
C. A metered network connection
D. Out of band management
DirectAccess cannot be used in this case as IPv6 is disabled and DirectAccess requires IPv6 and IPsec.
IPv6 is the cornerstone of DirectAccess communications
The DirectAccess client always uses IPv6 to communicate with the DirectAccess server.
The DirectAccess server will then forward these connections to IPv6-enabled hosts on the corpnet. The corpnet can use native IPv6 infrastructure (where the routers, switches, operating systems, and applications are all IPv6 capable) or it can use IPv6 transition technologies to connect to IPv6 resources on the corpnet.
You have a desktop computer that runs Windows 8 Enterprise.
You add three new 3-terabyte disks.
You need to create a new 9-terabyte volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Disk Management, create a new spanned volume.
B. From Disk Management, convert all of the 3-terabyte disks to GPT.
C. From PowerShell, run the New-VirtualDisk cmdlet.
D. From Disk Management, bring all disks offline.
E. From Diskpart, run the Convert MBR command.
F. From PowerShell, run the Add-PhysicalDisk cmdlet.
Create a Spanned Volume
A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk.
To create a spanned volume using the Windows interface
1. In Disk Management, right click the unallocated space on one of the dynamic disks where you want to create the spanned volume.
2. Click New Spanned Volume.
3. Follow the instructions on your screen.Using GPT Drives
A GPT disk uses the GUID partition table (GPT) disk partitioning system.
A GPT disk offers these benefits:
Allows up to 128 primary partitions.
Master Boot Record (MBR) disks can support up to four primary partitions and an additional 124 partitions inside extended partitions.
Allows a much larger partition size–greater than 2 terabytes (TB), which is the limit for MBR disks.
Provides greater reliability because of replication and cyclical redundancy check (CRC) protection of the partition table.Can be used as a storage volume on all x64-based platforms, including platforms running Windows XP Professional x64 Edition.
Starting with Windows Server 2003 SP1, GPT disks can also be used as a storage volume on x86-based Windows platforms.Can be used as a boot volume on x64-based editions of Windows 7, Windows Vista, and Windows Server 2008.
Starting with Windows Server 2003 SP1, GPT disks can also be used as a boot volume on Itanium-based systems.
Note: Windows only supports booting from a GPT disk on systems that contain Unified Extensible Firmware Interface (UEFI) boot firmware.
You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). Your company decides that access to the company network for all users must be controlled by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?
A. Install smart card readers on all computers. Issue smart cards to all users.
B. Enable the Password must meet complexity requirements policy setting.
Instruct users to log on by using the domain \username format for their username and their
C. Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate
Apply the IPsec policy to the domain.
D. Issue photo identification to all users.
Instruct all users to set up and use PIN Logon.
Smart cards contain a microcomputer and a small amount of memory, and they provide secure, tamper-proof storage for private keys and X.509 security certificates.
A smart card is a form of two-factor authentication that requires the user to have a smart card and know the PIN to gain access to network resources.
Registry certificates cannot be used for two factor authentication. Although certificates are ideal candidates for two-factor authentication, registry certificates – which are protected by a strong private key and are the most appropriate certificates for two-factor authentication – cannot be used. The reason for this is that Windows does not support registry certificates and completely ignores them.
As a result, organizations must deploy and manage complex and expensive smart card solutions rather than using registry based certificates.
Braindump2go promise you a 100% totally pass of 70-688 Exam! Believe us, trying to pass 70-688 exam, we will return your full money back if you cannot pass! We are confident in helping everyone pass any IT Exams one time! Download our latest updated 70-688 Exam Dumps now!