Want to Pass 70-688 Exam In Next HOURS? Download Now →
March 6, 2017

What Does 70-688 practice test Mean?


Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on: https://www.certshared.com/exam/70-688/


It is more faster and easier to pass the Microsoft 70-688 exam by using Free Microsoft Managing and Maintaining Windows 8 questuins and answers. Immediate access to the Up to date 70-688 Exam and find the same core area 70-688 questions with professionally verified answers, then PASS your exam with a high score now.

2017 Mar 70-688 exam prep

Q11. Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012. 

You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location. 

What should you run on each client computer? 

A. the Enable-BCLocal cmdlet 

B. the netdom command 

C. the netstat command 

D. the netsh command 

Answer:


Q12. You have client Windows 8.1 Enterprise computers. 

Your company purchases a subscription to Windows Intune. 

You deploy the Windows Intune agent to all of the computers. 

You need to uninstall a Microsoft update that was installed before the Windows Intune 

agent was installed. The solution must minimize administrative effort. 

What should you do? 

A. Create a Group Policy object (GPO) that runs wusa.exe by using a startup script. 

B. From Windows Intune, create a new automatic approval rule. 

C. From Windows Intune, click New updates to approve. 

D. Create a Group Policy object (GPO) that runs msiexec.exe by using a startup script. 

Answer:


Q13. You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. 

Your company wants to deploy a new application to the tablets. 

The deployment solution must meet the following requirements: 

The application is stored locally on the tablets. 

Access to the application is protected with extra logon credentials, in addition to a 

standard domain account used by users. 

The application utilizes the least amount of network bandwidth. 

The application must maintain access to the current desktop. 

You need to deploy the new application to the tablets. 

What should you do? 

A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets. 

B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets. 

C. Install the application on a local drive on the tablets. 

D. Install the application in a Windows To Go workspace. 

E. Install Hyper-V on tablets. Install the application on a virtual machine. 

F. Publish the application to Windows Store. 

G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot. 

H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot. 

Answer:


Q14. Your network contains client computers that run Windows 8 Enterprise. The computers are 

members of an Active Directory domain. 

Your company purchases a subscription to Windows Intune. 

Synchronization between Active Directory and Windows Intune is not configured. 

You enroll all of the computers in Windows Intune. 

You plan to create groups that contain the computers by using dynamic membership. 

You need to identify which criteria you can use to populate the groups dynamically. Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.) 

A. organizational unit (OU) 

B. manager 

C. security group 

D. device type 

E. domain 

Answer: A,B,C 


Q15. You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1. 

Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker. 

You need to make changes to the Configure MBAM Services Group Policy settings. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set MBAM Recovery and Hardware service endpoint to MBAM1. 

B. Set Enter status reporting frequency (in minutes) to 120. 

C. Set MBAM Status reporting endpoint to MBAM1. 

D. Set Select Bitlocker Recovery Information to store to Recovery password and key package. 

E. Set Select Bitlocker Recovery Information to store to Recovery password only. 

F. Set Enter client checking status frequency (in minutes) to 120. 

Answer: B,F 


Down to date 70-688 exam cram:

Q16. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. 

Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. 

You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. 

What should you do? 

A. Publish the application through a public file transfer protocol (FTP) site. 

B. Publish the application through an intranet web site. 

C. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings. 

D. Publish the application to Windows Store. 

Answer:


Q17. HOTSPOT  

You have a folder that you plan to share. 

You need to configure security for the shared folder to meet the following requirements: 

. Members of a security group named Group1 must be able to modify permissions of files and folders. . Members of a security group named Group2 must be able to read files and folders only. . Members of a security group named Group3 must be able to take ownership of files. 

What should you do? (To answer, select the appropriate options in the answer area.) 

Answer: 


Q18. You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1 has a Trusted Platform Module (TPM) chip installed and the operating system volume is encrypted by using BitLocker Drive Encryption (BitLocker). 

You plan to upgrade the BIOS of Computer1. 

You need to recommend a solution that meets the following requirements: 

Ensures that the drive remains encrypted 

Avoids the need to perform a BitLocker recovery 

Ensures that Windows can start after the BIOS is upgraded 

Minimizes the time required to complete the BIOS upgrade 

What should you include in the recommendation? 

A. From the command prompt, run manage-bde and specify the -protectors parameter and the -disable parameter. 

B. From the command prompt, run manage-bde and specify the -protectors parameter and the -delete parameter. 

C. From the Trusted Platform Module (TPM) Management console, click Turn TPM Off from the Actions menu. 

D. From the command prompt, run tpmvscmgr.exe and specify the destroy parameter. 

Answer:


Q19. You administer computers that run Windows XP Professional. These computers have a wide range of line of business (LOB) applications installed. 

You want to migrate from Windows XP Professional to Windows 8.1 Pro. 

You need to identify which applications will prompt users for elevated privileges. 

What should you do first? 

A. Install the Microsoft Application Compatibility Toolkit (ACT). 

B. Configure the advanced audit setting on the Windows 8.1 Pro computers before you install the LOB applications. 

C. Install the Microsoft Assessment and Planning (MAP) Toolkit. 

D. Install User Experience Virtualization (UE-V) on the Windows 8.1 Pro computers before you install the LOB applications. 

Answer:


Q20. DRAG DROP 

Your company is migrating from Windows 7 to Windows 8.1. 

Before you attempt to migrate a client computer named Computer1. Computer1 fails and can no longer start Windows 7. 

You need to migrate the user profile from Computer1 to a client computer named Computer2 that runs Windows 8.1. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 



see more 70-688 dumps