Exam Code: 70-688 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Managing and Maintaining Windows 8
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-688 Exam.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Microsoft 70-688 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/70-688-exam-dumps.html
Q81. Your company has a main office and a branch office. All servers are located in the main office. The branch office contains 20 client computers that are the members of a worlcg roup.
You need to configure the client computers to use BranchCache. The solution must minimize the amount of traffic between the offices.
Which Windows PowerShell cmdlet should you run?
A. Enable-BCHostedServer
B. Enable-BCLocal
C. Enable-BCHostedClient
D. Enable-BCDistributed
Answer: A
Q82. Your network contains an Active Directory domain. The domain contains Windows 8.1 Enterprise client computers.
You need to recommend a solution to ensure that help desk users can replace corrupt operating system files.
Which Microsoft Diagnostics and Recovery Toolset (DaRT) tool should you include in the recommendation?
A. Standalone System Sweeper
B. File Restore
C. Disk Commander
D. Computer Management
E. SFC Scan
Answer: E
Q83. DRAG DROP
You support Windows 8.1 Enterprise computers. AppLocker policies are deployed.
Company policy states that AppLocker must be disabled.
You need to disable AppLocker.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q84. Your network contains an Active Directory domain. The domain contains 100 Windows 8.1 client computers. All of the computers secure all connections to computers on the internal network by using IPSec.
The network contains a server that runs a legacy application. The server does NOT support IPSec.
You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec.
What should you do?
A. Modify the settings of the Domain Profile.
B. Create a connection security rule.
C. Create an inbound firewall rule.
D. Modify the settings of the Private Profile,
Answer: A
Q85. You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account.
You discover new applications on the Start screen of the computers.
You need to restrict access to Windows Store for local user accounts on the computers.
What should you do?
A. From Local Computer Policy, navigate to App Package Deployment and disable All Trusted Apps to Install.
B. From Local Computer Policy, select Store and enable Turn off the Store application.
C. From Local Computer Policy, select Store and disable Turn off Automatic Downloads for Updates.
D. From Local Computer Policy, select Store and disable Allow Store to install apps on Windows To Go workspaces.
Answer: B
Q86. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8.1 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.
What should you do?
A. Publish the application to Windows Store.
B. Publish the application through an intranet web site.
C. Change the default Software Restriction Policies on the client computers.
D. Obtain a public certificate for the web server, and then configure the web site to use SSL
Answer: B
Q87. DRAG DROP
Your network contains an Active Directory domain. The domain contains client computers that run Windows 8 Enterprise.
Your company has a subscription to Windows Intune.
You plan to deploy an application named App1 that is stored on a Web server named Server1.
You need to ensure that all of the computers download the source files of App1 from Server1.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q88. HOTSPOT
You have a client computer that runs Windows 8 Pro. The computer contains a storage pool.
You need to remove a disk named Disk 2 from the storage pool.
What should you configure first? (To answer, select the appropriate option in the answer area.)
Answer:
Q89. HOTSPOT
Your company has several Windows RT 8.1 devices. The devices connect to Exchange Online in Microsoft Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.
You need to identify the effective settings on the Windows RT devices.
What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.)
Answer:
Q90. You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS).
Your company decides that access to the company network for all users must be controlled by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?
A. Install smart card readers on all computers. Issue smart cards to all users.
B. Enable the Password must meet complexity requirements policy setting. Instruct users to log on by using the domain username format for their username and their strong password.
C. Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate all traffic. Apply the IPsec policy to the domain.
D. Issue photo identification to all users. Instruct all users to set up and use PIN Logon.
Answer: A