★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-688-dumps.html


Q51. You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager. 

You enable Microsoft System Center 2012 Endpoint Protection on the computers. 

You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers. 

What should you configure form the System Center 2012 Endpoint Protection settings? 

A. Advanced 

B. MAPS 

C. Real-time protection 

D. Default actions 

Answer:


Q52. You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1. 

Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker. 

You need to make changes to the Configure MBAM Services Group Policy settings. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set MBAM Recovery and Hardware service endpoint to MBAM1. 

B. Set Enter status reporting frequency (in minutes) to 120. 

C. Set MBAM Status reporting endpoint to MBAM1. 

D. Set Select Bitlocker Recovery Information to store to Recovery password and key package. 

E. Set Select Bitlocker Recovery Information to store to Recovery password only. 

F. Set Enter client checking status frequency (in minutes) to 120. 

Answer: B,F 


Q53. Your company has a main office that has a connection to the Internet. 

The company has 100 Windows 8.1 Pro client computers that run Microsoft Office 2010. 

You purchase a subscription to Office 365 for each user. You download the Office 

Deployment Tool for Click-to-Run, 

You need to deploy Office 365 ProPlus to the computers. The solution must minimize the 

amount of traffic over the Internet connection. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. On a file server, run setup.exe and specify the /download parameter. 

B. On each client computer, run setup.exe and specify the /configure parameter. 

C. On a file server, run setup.exe and specify the /configure parameter. 

D. On each client computer, run setup.exe and specify the /download parameter, 

Answer: C,D 


Q54. Your network contains an Active Directory domain named contoso.com. All client computers in the domain run Windows 8.1 Pro. All domain users have roaming user profiles. 

You need to prevent a user named User2 from being able to save changes to his roaming user profile. 

Which file you modify? 

A. registry.pol 

B. ntuser.pol 

C. ntuser.dat 

D. system.dat 

Answer:


Q55. You support laptops that run Windows 8 Pro and are members of an Active Directory domain. 

The domain is configured with user folder redirection by using a Group Policy Object (GPO). Loopback group policies are not used. 

Your company has decided to deploy tablets to all managers, for use as secondary computers. 

Tablets will be added to the domain. 

You need to ensure that the folder redirection settings are applied only to laptops. 

What should you do? 

A. Apply one GPO to the managers' laptops and another GPO to the tablets. 

B. Assign the msDS-Primary Computer attribute for the managers' user domain accounts. 

C. Assign the msDS-Primary Computer attribute for the computer domain accounts on the managers' laptops. 

D. Block the managers' tablets from receiving the GPO. 

Answer:


Q56. You have 100 client computers that run Windows 8 Pro. Each computer has a single local hard disk drive, a DVD drive, and an external USB drive. 

Each computer has a different set of line-of-business (LOB) desktop applications that are installed locally. All of the applications store their configurations in the HKEY_Local_Machine\Software registry hive. 

You need to design a recovery solution to ensure that you can restore the initial state of the locally installed LOB desktop applications if an application is misconfigured. The solution must preserve the existing locally stored user data. 

What should you do? 

A. Enable File History. Restore files by using File History. 

B. Create a Microsoft Diagnostics and Recovery Toolset (DaRT) recovery image. Start the computer from the DaRT image and perform a file restore. 

C. Run recimg.exe. Perform a system refresh. 

D. Create a system repair disk by using Windows 7 File Recovery. Start the computer from the Windows 8 Enterprise installation media and perform an automatic repair, 

Answer:


Q57. Your network contains a web server named testweb.contoso.com that is used for testing. 

You have a Windows 8.1 Pro laptop. 

After a network administrator changes the IP address of the web server, you discover that 

you can no longer connect to testweb.contoso.com. 

You need to resolve immediately the issue that prevents you from connecting to the server. 

Which command line tool should you run? 

A. Set-DnsClient 

B. Netstat 

C. Ipconfig 

D. Netcfg 

Answer:


Q58. You have a desktop computer that runs Windows 8 Enterprise. 

You add three new 3-terabyte disks. 

You need to create a new 9-terabyte volume. 

Which two actions should you perform? (Each correct answer presents part of the solution. 

Choose two.) 

A. From Disk Management, create a new spanned volume. 

B. From Disk Management, convert all of the 3-terabyte disks to GPT. 

C. From PowerShell, run the New-VirtualDisk cmdlet. 

D. From Disk Management, bring all disks offline. 

E. From Diskpart, run the Convert MBR command. 

F. From PowerShell, run the Add-PhysicalDisk cmdlet. 

Answer: A,B 


Q59. Your network contains an Active Directory domain. All client computers run Windows 8 Enterprise. 

Your company uses virtual smart cards. 

A user named User1 requires a virtual smart card on a new client computer named Computer1. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Enroll User1 for a certificate. 

B. Run the Enable-BitLocker cmdlet. 

C. Run the tpmvscmgr.exe command. 

D. Enroll Computer1 for a certificate. 

Answer: A,C 


Q60. Your network contains an Active Directory domain and 100 Windows 8.1 client computers. 

All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. 

Users are NOT configured as local administrators, 

Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus. 

You need to create an App-V package for Office 365 ProPlus. 

What should you do? 

A. Run the Office Customization Tool (OCT), run the App-V Sequencer and then run Setup /Packager. 

B. Download the Office Deployment Tool for Click-to-Run, run the App-V Sequencer and then run Setup /Ad mm. 

C. Download the Office Deployment Tool for Click-to-Run, run Setup /Download and then run Setup /Packager. 

D. Run the Office Customization Tool (OCT), run Setup /Download and then run the App-V Sequencer. 

Answer: