★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-686 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-686-dumps.html


Realistic of 70-686 test questions materials and pdf for Microsoft certification for candidates, Real Success Guaranteed with Updated 70-686 pdf dumps vce Materials. 100% PASS Pro: Windows exam Today!

Q1. You plan to upgrade Windows Vista to Windows 7 on a computer named Computer01. You run ScanState and store the results on a remote computer at \\Server01\mystore. After the ScanState command completes, a user customizes a profile and adds mission-critical data. 

You attempt to run ScanState again but it fails. 

You need to overwrite Computer01's existing information on Server01. 

Which command line options should you use to execute the ScanState command? (Choose all that apply.) 

A. /efsxopyraw 

B. /v:13 

C. \\Server01\mystore 

D. /o 

Answer: C,D 


Q2. You are designing a Windows 7 deployment image. You receive a baseline image over the network, from a different geographic location. 

You need to verify that the baseline image is valid. 

Which tool should you use? 

A. ImageX 

B. the Deployment Image Servicing and Management (DISM) tool 

C. Windows Compatibility Evaluator 

D. windows System Image Manager (Windows SIM) 

Answer:

Explanation: 

imagex /append image_path image_file {"description"}{/boot | /check | /config configuration_file.ini | /scroll | /verify}/check 

Checks the integrity of the .wim file. If not provided, existing checks are removed. 

http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx 


Q3. DRAG DROP 

You are the desktop architect for an enterprise organization with computers that run Windows 7. 

You need to create a Group Policy object (GPO) to prevent Windows Explorer from starting until all logon scripts have finished. 

Which setting should you select? To answer, select the appropriate setting in the work area. 

Answer: 


Q4. You are replacing the desktop computers in the Chicago office. 

You need to automate the migration of user profile data to the new computers. 

What should you recommend? (Choose all that apply.) 

A. state migration point 

B. Windows Client Operating System Management Pack 

C. Background Intelligent Transfer Server 

D. Windows Easy Transfer 

E. ConfigMgr custom task sequence 

Answer: A,E 


Q5. You have deployed a ConfigMgr site server at each site. You are planning to use PXE boot to deploy a new Windows 7 image. You need to deploy the image to all office locations. When you attempt to perform a PXE boot, it fails at each office location. 

You need to prepare the infrastructure. 

What should you do? (Choose all that apply.) 

A. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in each office. 

B. Install a single PXE service point in the Los Angeles office. 

C. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in the Los Angeles office. 

D. Install a PXE service point in each office. 

E. Create a single IP helper for PXE that points to the DHCP server in the Los Angeles office. 

F. Create a single IP helper for PXE that points to the DHCP server in each office. 

Answer: C,D 

Explanation: 

This dump's question is not complete. 

MS exam question mention Deployment share is only setup at los Angeles office. 

one of question from testlets 


Q6. Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. 

You plan to use Group Policy to ensure that application installation functions properly. 

You need to design the User Account Control (UAC) policy. 

What should you do? 

A. Configure the User Account Control: Behavior of the elevation prompt for standard users setting to be Prompt for credentials. 

B. Configure the User Account Control: Only elevate executables that are signed and validated setting to be Enabled. 

C. Configure the User Account Control: Detect application installations and prompt for elevation setting to be Disabled. 

D. Configure the User Account Control: Detect application installations and prompt for elevation setting to be Enabled. 

Answer:

Explanation: 

User Account Control: Detect application installations and prompt for elevation The User Account Control: Detect application installations and prompt for elevation policy setting controls the behavior of application installation detection for the computer. 

The options are: 

Enabled. (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. 

Disabled. (Default for enterprise) Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. 

http://technet.microsoft.com/en-us/library/dd851376.aspx 


Q7. You have an AD DS security group named Toronto Users and another named Toronto Computers. 

You are planning the deployment of a new browser by using Group Policy. 

You need to ensure that the computers in each office comply with company requirements. 

What should you recommend? (Choose all that apply.) 

A. Download the Internet Explorer 9 Administrative Kit. 

B. Deploy the Internet Explorer 9 Blocker to the Toronto Users group. 

C. Add all Toronto computers to the Toronto Computers security group. 

D. Deploy the Internet Explorer 9 Admin Kit to the Toronto Users group. 

E. Add all Toronto users to the Toronto Users security group. 

F. Download the Internet Explorer 9 Blocker Toolkit. 

G. Deploy the Internet Explorer 9 Admin Kit to the Toronto Computers group. 

H. Deploy the Internet Explorer 9 Blocker to the Toronto Computers group. 

Answer: C,F,H


Q8. You are installing a new third-party application to all the Windows 7 client workstations that your company has deployed. 

You need to monitor all of the actions taken by the application installer. 

Which application should you use? 

A. Update Compatibility Evaluator 

B. Setup Analysis Tool 

C. Windows Compatibility Evaluator 

D. Compatibility Administrator 

Answer:


Q9. Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with auto enrollment. 

When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. 

You need to ensure that Internet Explorer does not display the error message. What should you do? 

A. Install the Web applications certificate into the computer store on each client computer. 

B. Purchase a commercial certificate and install it on the internal CA. 

C. Issue a certificate from the internal CA and install it on the application server. 

D. Install the Web applications certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer. 

Answer:


Q10. Users with newly deployed Windows 7 computers see a security prompt when they attempt to upload documents to the company's intranet site. 

You need to suppress the prompt without creating a security risk for the company. 

What should you do? (Choose all that apply). 

A. Modify the GPO to set https://intranet.company.com with a value of 1 in the Site to Zone Assignment List. 

B. Modify the default Windows 7 image to add the Internet Explorer Enhanced Security Configuration component. 

C. Modify the default Windows 7 image to change the default Internet Explorer security level to Medium Low. 

D. Modify the default Windows 7 image to disable the Internet Explorer Automatically Detect Intranet Network setting. 

E. Create a GPO and link it to the root of the domain. 

F. Modify the GPO to set the web server's NEtBIOS name with a value of 2 in the Site to Zone Assignment List. 

Answer: A,F