getcertified4sure.com

The Secret of 70-686 braindumps




we provide Approved Microsoft 70-686 latest exam which are the best for clearing 70-686 test, and to get certified by Microsoft Pro: Windows. The 70-686 Questions & Answers covers all the knowledge points of the real 70-686 exam. Crack your Microsoft 70-686 Exam with latest dumps, guaranteed!

Q101. Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copy data from their computers to removable drives. You need to ensure that data that is copied to removable drives is protected. What should you do? 

A. Use Encrypting File System (EFS) 

B. Enable Trusted Platform Module (TPM) hardware on all client computers 

C. Use Active Directory Rights Management Services 

D. Configure a Group Policy to enforce the use of BitLocker To Go 

Answer:

Explanation: 

BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restricted with a passphrase. In addition to having control over passphrase length and complexity, IT administrators can set a policy that requires users to apply BitLocker protection to removable drives before being able to write to them. 

http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-7/features.aspx#bitlocker 


Q102. You use Microsoft Application Compatibility Manager to produce a report that lists a company's applications and their compatibility status with Windows 7. 

You need to add your ratings of the compatibility of the applications to the report. 

Which Microsoft Application Compatibility Manager action should you select? To answer, select the appropriate setting or settings in the work area. 

Answer: 


Q103. Your company uses Windows Update to download and install security updates on client computers. 

When Microsoft releases a security update, you have the following requirements: 

Establish which client computers require the security update. 

Identify what changes will occur as a result of the security update. 

Identify which applications might be affected by the security update. 

You need to select the appropriate tool to detect application-compatibility issues. 

What should you do? 

A. Use the Inventory Collector 

B. Use the Setup Analysis Tool 

C. Use the Update Compatibility Evaluator. 

D. Use the Windows Compatibility Evaluator 

Answer:

Explanation: 

The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows. update, and looks for potential conflicts due to changes in the registry, application files, or application file properties. 

You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager. 

http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx 


Q104. Your network includes the client computer hardware configurations shown in the following table. 

You need to deploy Windows 7 by using the fewest images. 

How many images are needed? 

A. 2 

B. 3 

C. 4 

D. 8 

Answer:

Explanation: 

One for 32bit image and one for 64bit image 


Q105. HOTSPOT 

All portable computers on a company's wireless network run windows 7 Enterprise. 

You need to ensure that users can connect only to the predefined SSID shown in the work area. 

Which Group Policy object (GPO) settings should you select? To answer, select the appropriate setting or settings in the work area. 

Answer: 


Q106. Your company is planning to deploy Windows 7 to all client computers. 

You have the following requirements: 

Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use. 

You need to select the appropriate method to detect application compatibility issues. 

What should you do? 

A. Use the Setup Analysis Tool in a virtual environment. 

B. Use the standalone Setup Analysis Tool. 

C. Use the Standard User Analyzer Wizard. 

D. Use the Standard User Analyzer tool. 

Answer:

Explanation: 

The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. 

http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx 


Q107. Your company plans to upgrade all client computers to Windows 7. 

The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7 

You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application. 

You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server. 

What should you do? 

A. Using MED-V TrimTransfer technology, deploy the VM image over the network 

B. In the MED-V console, configure the MED-V workspace to prevent offline operation 

C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored 

D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory 

Answer:


Q108. Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you do? 

A. Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD). 

B. Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu. 

C. Use Bootcfg to modify the boot parameters. 

D. Use BCDboot to modify the system partition. 

Answer:

Explanation: 

BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder. http://technet.microsoft.com/library/cc731662.aspx 


Q109. Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP. Nine hundred of the computers are on the local area network. One hundred computers are portable computers that connect to the main office only once every few months. 

You are planning to deploy Windows 7. 

You need to generate a report of the software that is installed on all client computers. You need this information as soon as possible. 

What should you use? 

A. Microsoft System Center Data Protection Manager 

B. Microsoft Desktop Optimization Pack 

C. Microsoft System Center Essentials 

D. Microsoft System Center Operations Manager 

Answer:


Q110. Your network has client computers that run Windows XP. Users do not have administrative rights to their local computers. You use Windows Server Update Services (WSUS) to manage software updates. 

You are planning to deploy Windows 7. Your company uses a custom application that is not compatible with Windows 7. 

You need to ensure that all users are able to run the custom application. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Install and register a shim on the WSUS server. 

B. Install and register a shim on the client computers by using Group Policy. 

C. Deploy and register the compatibility-fix database file to the client computers by using a computer startup script. 

D. Deploy and register the compatibility-fix database file to the client computers by using a user startup script. 

Answer: B,C