★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-688-dumps.html


Microsoft Microsoft certification is regarded because one of the most extremely demanded certifications around the globe. In the field of IT, Microsoft 70-688 certification is something anyone is eager to have. When you try to get promotion or change career, you will have a good advantage over some other workmates or candidates should you have a Microsoft Microsoft certification throughout hand.

2021 Mar 70-688 free exam questions

Q101. You support computers that run Windows 8 Enterprise and are members of a workgroup. 

Users are able to download and install any app from Windows Store. 

You need to ensure that only approved apps can be installed from Windows Store. 

What should you do? 

A. Configure a Software Restriction Policy Certificate rule. 

B. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option. 

C. Configure an AppLocker Packaged app rule. 

D. Configure an AppLocker Publisher rule. 

Answer:


Q102. You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. 

Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. 

You need to ensure that file and program activity is always monitored on this computer. 

What should you do? 

A. Create a new Windows Firewall Setting policy in the Windows Intune Admin Console. 

B. In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that uses the recommended settings. 

C. Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console. 

D. Create and deploy a custom policy in the Windows Intune Center Settings template. 

Answer:


Q103. DRAG DROP 

You support a computer that runs Windows 8 Enterprise. 

You want to create a dual-boot configuration by using the native boot virtual hard disk 

(VHD) method. 

You need to create an alternate Windows 8 installation. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q104. You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). 

Your company decides that access to the company network for all users must be controlled by two-factor authentication. 

You need to configure the computers to meet this requirement. 

What should you do? 

A. Install smart card readers on all computers. Issue smart cards to all users. 

B. Enable the Password must meet complexity requirements policy setting. Instruct users to log on by using the domain \username format for their username and their strong password. 

C. Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate all traffic. Apply the IPsec policy to the domain. 

D. Issue photo identification to all users. Instruct all users to set up and use PIN Logon. 

Answer:


Q105. HOTSPOT  

You have several client computers that run Windows 7. The computers have identical hardware and software. 

The system properties of one of the computers are configured as shown in the following exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. 

Each correct selection is worth one point. 

Answer: 


Avant-garde 70-688 exams:

Q106. You administer Windows 8.1 Enterprise laptops. All of the computers are members of an 

Active Directory domain. 

When traveling, users access the corporate network by using a virtual private network 

(VPN). 

There is an external firewall that allows connections only on TCP ports 80 and 443. You need to establish a VPN connection that is able to pass through the firewall. Which of the following should you use? 

A. EAP-TLS 

B. MS-CHAP v2 

C. 802.1X 

D. RADIUS 

E. PPTP 

F. L2TP/IPSEC 

G. IPSEC/IKEv2 

H. SSTP 

Answer:


Q107. HOTSPOT  

Your company has five hardware builds for client computers. The hardware builds are configured as shown in the following table. 

You plan to provide some users with Windows To Go disks that contain a corporate image of the 64-bit version of Windows 8 Enterprise and several line-of-business (LOB) applications. 

In the table below, identify whether the hardware build is compatible or incompatible with the Windows To Go disks. Make only one selection in each row. Each correct selection is worth one point. 

Answer: 


Q108. HOTSPOT  

Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server. 

All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain. 

The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.) 

In the table below, identify the effective setting for the client computers in each branch office. Make one selection in each column. Each correct selection is worth one point. 

Answer: 


Q109. You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. 

Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. 

You need to provide a BitLocker recovery key to unlock the protected volume. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Ask the user to run the manage-bde -protectors -disable e: command. 

B. Ask the user for a recovery key ID for the protected drive. 

C. Ask the user for his or her logon name. 

D. Ask the user for his or her computer name. 

Answer: B,D 


Q110. HOTSPOT  

You install Windows 8 Pro on a new client computer. 

You sign-in to the computer by using a domain user account. 

You need to synchronize the Personalize settings between your domain account and a 

Microsoft account. 

What should you configure first? (To answer, select the appropriate settings section in the 

answer area.) 

Answer: