(New Updated) Trying PassLeader Premium 70-688 PDF and VCE Braindumps For 100 Percent Passing Exam (1-15)
BEFORE THE WORDS: PassLeader provide you with the most accurate 70-688 study materials to prepare your Microsoft 70-688 certification exams. Our best 70-688 exam dumps will offer you the newest questions and answers with premium VCE and PDF format to download. And we PassLeader also offer you the latest free version VCE Player!
Exam Code: 70-688
Exam Name: Supporting Windows 8.1
You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro. For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise. You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. What should you do?
A. Start the tablets from the Windows To Go workspace.
B. Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE).
C. Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share.
D. Start the tablets from a customized Windows Recovery Environment (WinRE).
Walkthrough: Create a Custom Windows PE Image.
1. To create a bootable UFD (USB Flash Drive)
2. During a running Windows Vista operation system or a Windows PE session, insert your UFD device.
At a command prompt, use Diskpart to format the device as FAT32 spanning the entire device, setting the partition to active. For example:
select disk 1
create partition primary size=<size of device>
select partition 1
where the value of disk 1 is equal to UFD
3. On your technician computer, copy all the content in the \ISO directory to your UFD device. You can manually create the directory structure or use the xcopy command to automatically build and copy the appropriate files from your technician computer to your UFD device. For example:
xcopy c:\winpe_x86\iso\*.* /s /e /f f:\
where c is the letter of your technician computer hard disk and f is the letter of your UFD device
Drag and Drop Questions
Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed. You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop. You need to create an image and deploy it to the 25 new laptops. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
* You can create a reference computer by deploying Windows, and then removing the computer- specific information from the system.
* On the destination computer, you will create a structure for the partitions where you apply your images. The partition structure on the destination computer must match the partition structure of the reference computer.
* Use the Diskpart tool and the DISM tool to apply Windows images to one or more partitions onto a computer for deployment.
* Use the DISM tool to apply images to your Windows partition.
Reference: How to Capture Images of Hard Disk Partitions by Using DISM
Reference: How to Apply Images by Using DISM
Drag and Drop Questions
You administer computers that run windows 7 and Windows 8. You run an application that saves files that contain local settings unique to each user. You want to allow users to synchronize settings for an application to any enterprise computer when they log on to the enterprise computer. You need to implement a solution that will move a user’s settings files to any computer. You also need to ensure that you can roll back the changes if necessary. Which required task or tasks should you perform with each approach? (To answer, drag the appropriate required task to the corresponding approach. Each required task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
* Microsoft User Experience Virtualization (UE-V) uses settings location templates to roam application settings between user computers. Some standard settings location templates are included with User Experience Virtualization. You can also create, edit, or validate custom settings location templates with the UE-V Generator.
* Settings template catalog. The User Experience Virtualization settings template catalog is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores all the custom settings location templates. The UE-V agent retrieves new or updated templates from this location. The UE-V agent checks this location once each day and updates its synchronization behavior based on the templates in this folder. Templates that were added or updated in this folder since the last time that the folder was checked are registered by the UE-V agent. The UE-V agent deregisters templates that are removed from this folder. By default, templates are registered and unregistered one time per day at 3:30 A.M. local time by the task scheduler.
* The Microsoft Desktop Optimization Pack (MDOP) is a suite of technologies available as a subscription for Software Assurance customers. MDOP virtualization technologies help personalize the user experience, simplify application deployment, and improve application compatibility with the Windows operating system (UE-V/App-V/MED-V). Additionally, MDOP helps manage, monitor, and deploy key Windows features (MBAM/AGPM). Using MDOP shifts desktop repair from reactive to proactive, saving time and removing challenges associated with troubleshooting and repairing system failures (DaRT).
Reference: Create UE-V Settings Location Templates with the UE-V Generator
Drag and Drop Questions
You support a computer that runs Windows 8 Enterprise. You want to create a dual-boot configuration by using the native boot virtual hard disk (VHD) method. You need to create an alternate Windows 8 installation. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Drag and Drop Questions
You support computers that run Windows 8 Enterprise. Company policy requires that Microsoft Internet Explorer be the only browser allowed and supported. You collect software metering data and discover that several users are running other third-party browsers. You need to block other web browsers from running on the computers. All other applications should be allowed. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Drag and Drop Questions
You support computers that run windows 8 Enterprise. AppLocker policies are deployed. Company policy states that AppLocker must be disabled. You need to disable AppLocker. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
* Before you can enforce AppLocker policies, you must start the Application Identity service by using the Services snap-in console.
* The Application Identity service determines and verifies the identity of an application. Stopping this service will prevent AppLocker policies from being enforced.
Drag and Drop Questions
You administer laptops and virtual desktop computers that run Windows 8 and are joined to an Active Directory domain. Your company provides virtual desktop computers to all users. Employees in the sales department also use laptops, sometimes connected to the company network and sometimes disconnected from the company network. You want sales department employees to have the same personal data, whether they are using their virtual desktop computers or their laptops. You need to configure the network environment to meet the requirements. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Folder Redirection and Offline Files are used together to redirect the path of local folders (such as the Documents folder) to a network location, while caching the contents locally for increased speed and availability.
* Folder Redirection enables users and administrators to redirect the path of a known folder to a new location, manually or by using Group Policy. The new location can be a folder on the local computer or a directory on a file share. Users interact with files in the redirected folder as if it still existed on the local drive. For example, you can redirect the Documents folder, which is usually stored on a local drive, to a network location. The files in the folder are then available to the user from any computer on the network.
* Offline Files makes network files available to a user, even if the network connection to the server is unavailable or slow. When working online, file access performance is at the speed of the network and server. When working offline, files are retrieved from the Offline Files folder at local access speeds. A computer switches to Offline Mode when:
— The new Always Offline mode has been enabled
— The server is unavailable
— The network connection is slower than a configurable threshold The user manually switches to Offline Mode by using the Work offline button in Windows Explorer
Reference: Folder Redirection, Offline Files, and Roaming User Profiles overview
You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. You need to enforce these security policy requirements on the computers. What should you do?
A. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts.
C. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts.
D. From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.
Windows 8 Group Policy Settings: Blocking Connected Accounts.
“Connected Accounts”. This is the feature in Windows 8 where you can associate your local or domain user account with your Microsoft account (e.g. Live ID) for the purposes of synchronizing your Windows settings across all of your Windows devices. It’s a nice feature, but not necessarily one that enterprises might find helpful – given the possibility of stuff that may be considered private to the organization such as passwords to websites and apps, being synchronized externally.
You administer a computer that runs Windows 8 Pro. You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer. What should you do?
A. Create a system restore point.
B. Run the bcdedit /export command.
C. Perfom a backup to a shared folder by using the wbadmin command with the -allcritical switch.
D. Create a system recovery drive.
-allCritical. Specifies that all critical volumes (volumes that contain operating system’s state) be included in the backups. This parameter is useful if you are creating a backup for bare metal recovery. It should be used only when -backupTarget is specified, otherwise the command will fail. Can be used with the -include option.
Your network contains an Active Directory domain. The domain contains Windows 8.1 Enterprise client computers. Users frequently use USB drives to store sensitive files that are used on multiple computers. Your corporate security policy states that all removable storage devices, such as USB data drives, must be encrypted. You need to ensure that if a user forgets the password for a USB disk that is encrypted by using BitLocker To Go, the user can resolve the issue themself. What should you do?
A. Implement the BitLocker Network Unlock feature.
B. Publish a data recovery agent certificate by using a Group Policy object (GPO).
C. For each computer, create a USB startup key.
D. Instruct the user to open BitLocker Drive Encryption, select Back up recovery key, and then select Save to a file.
You have a client Windows 8.1 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed. You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive. Which Group Policy object (GPO) setting should you configure?
A. Configure use of hardware-based encryption for operating system drives.
B. Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
C. Require additional authentication at startup.
D. Allow network unlock at startup.
You administer computers that run Windows 8 Pro. Your company uses credit card readers that require a custom driver supplied by the manufacturer. The readers frequently are moved from computer to computer. Your company recently purchased five new computers that run Windows 8 Pro. You want the required drivers to be installed automatically and silently when users connect the readers to the new computers. You need to pre-stage the credit card reader driver on the new computers. What should you do?
A. Add a Registry key with a path to a network shared folder that has the driver installation files.
B. Run the pnputil.exe utility. Specify the document scanner driver.
C. Add a Registry key with a path to a local folder on every computer. Copy the driver installation files to the folder.
D. Run the dism.exe utility. Copy the driver files to the C:\Windows\System32\drivers folder in the WIM image.
Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store.
You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do?
A. Provide employees their BitLocker PINs.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network.
In addition to the option of creating a startup key, you have the option of creating a startup personal identification number (PIN). You can create either the startup key or the startup PIN, but not both. The startup PIN can be any number that you choose from 4 to 20 digits in length. The PIN is stored on your computer. You will have to type the PIN each time you start the computer.
Drag and Drop Questions
You administer computers and printers on your company network. The computers run Windows 8 Pro. You need to remove a print job from a print queue by using a remote PowerShell session. Which three commands should you run in sequence? (To answer, move the appropriate commands from the list of commands in the answer area and arrange them in the correct order.)
* The Get-Printer cmdlet retrieves a list of printers installed on a computer. You can also use Get- Printer to retrieve the properties of a single printer, and then use that information as input into other cmdlets.
* Get-PrintJob. Retrieves a list of print jobs in the specified printer. The Get-PrintJob cmdlet retrieves the current print jobs in the specified printer. Use the PrinterName parameter to list the print jobs from the specified printer.
* Remove-PrintJob. Removes a print job on the specified printer.
Reference: Get-Printer; Get-PrintJob; Remove-PrintJob
You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft Exchange 2010 with ActiveSync and Outlook Web Access. Users will be using the tablets outside of the corporate network. The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password. You need to ensure an alphanumeric password is required on all Windows 8 tablets. What should you do?
A. From the Mail app, add the user’s Exchange account.
B. Set up New Partnership in Sync Center.
C. From Sync your Settings, set Password to Off.
D. Create a user profile by using a Microsoft account.