Cause all that matters here is passing the Microsoft 70-686 exam. Cause all that you need is a high score of 70-686 Pro: Windows exam. The only one thing you need to do is downloading Ucertify 70-686 exam study guides now. We will not let you down with our money-back guarantee.
Q31. Your company has 1,000 client computers that run Windows 7 Enterprise.
You need to ensure that users cannot bypass or disable Internet Explorer logging.
What should you do?
A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state to Enabled.
B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state to Enabled.
C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state to Enabled.
D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state to Enabled.
Answer: C
Explanation:
InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, form data, cookies, and usernames and passwords from being retained by the browser, leaving no easily accessible evidence of browsing or search history.
http://en.wikipedia.org/wiki/Internet_Explorer_8
hints:
run IE InPrivate Browsing will not keep any history or logging.
General Page able to clear IE history
untitled
Q32. Your companys network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the Shipping Computers organizational unit (OU).
The network design is shown in the following diagram.
You are planning to deploy an application. The application is packaged as a Microsoft Windows Installer package (MSI).
You need to deploy the application only to computers in the shipping department.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Link the software installation policy to the Workstations OU.
B. Link the software installation policy to the Shipping Computers OU.
C. Create a new Group Policy object (GPO) and add a software installation policy under the User Configuration container.
D. Create a new Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.
Answer: B,D
Explanation:
To specify how and when computers are updated through Group Policy
In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update.
In the details pane of Group Policy Object Editor, configure the appropriate policies. See the following table for examples of the policies you might want to set..
refer to http://technet.microsoft.com/en-us/library/cc708536(v=WS.10).aspx
Hints:
Workstations OU = engineering computer OU + finance computer OU + shipphing computer OU
Q33. A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network.
You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.
You need to plan the most efficient method for activating all of the computers.
What should you do?
A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers.
B. Use the Key Management Service (KMS) for all the computers.
C. Use Multiple Activation Key (MAK) Independent for all the computers.
D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers.
Answer: B
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx
MAK:
If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internet one time. If the users install a MAK using the Slmgr.vbs script, the MAK client does not try to activate itself automatically.
refer to http://technet.microsoft.com/en-us/library/ff793438.aspx
Hints:
The computers do not have access to the internet
Q34. You are designing a Windows 7 deployment image.
You plan to partition the hard disk of each client computer during deployment.
You need to modify the unattended answer file by using a text editor.
Where should you add the disk information?
A. to the Generalize configuration pass
B. to the AuditSystem configuration pass
C. to the WindowsPE configuration pass
D. to the Specialize configuration pass
Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/dd744551(v=ws.10).aspx The windowsPE configuration pass also enables you to specify Windows Setup-related settings, including:
-Partition and format a hard disk.
-Select a specific Windows image to install, the path of that image, and any credentials required to access that image.
-Select a partition on the destination computer where you install Windows.
-Apply a product key and administrator password.
-Run specific commands during Windows Setup.
Q35. You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that
the virtualization strategy meets the companys OSE requirements. Which GPO setting should you recommend?
A. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings
B. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings
C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications
D. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications
Answer: B
Q36. You are designing a Windows 7 deployment image. You receive a baseline image over the network, from a different geographic location.
You need to verify that the baseline image is valid.
Which tool should you use?
A. ImageX
B. the Deployment Image Servicing and Management (DISM) tool
C. Windows Compatibility Evaluator
D. windows System Image Manager (Windows SIM)
Answer: A
Explanation:
imagex /append image_path image_file {"description"}{/boot | /check | /config configuration_file.ini | /scroll | /verify}/check
Checks the integrity of the .wim file. If not provided, existing checks are removed.
http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx
Q37. DRAG DROP
An enterprise organization has computers that run Windows 7. Users log on to the Contoso.com domain from their client computers.
A user is unable to log on to the domain. The user changed his password the previous night and was unable to log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors.
You need to ensure that the user can log on to the domain.
Which command should you run? (To answer, drag the appropriate command and parameter from the list of commands and parameters to the correct location or locations in the work area.)
Answer:
Q38. Your company has client computers that run Windows 7 Enterprise.
Each computer in the company is required to boot into a different Windows 7 application environment without compromising the main Windows 7 Enterprise installation.
You need to create a new Native Boot VHD that will host the alternate Windows 7 environments.
Which command should you use?
A. BCDEdit.exe
B. Bootcfg.exe
C. DiskPart.exe
D. BCDboot.exe
Answer: D
Explanation:
http://www.techexams.net/forums/windows-7-exams/66547-bcdedit-bcdboot-difference.html BCDboot is a tool used to quickly set up a system partition, or to repair the boot environment located on the system partition. The system partition is set up by copying a small set of boot environment files from an installed Windows. image. BCDboot also creates a Boot Configuration Data (BCD) store on the system partition with a new boot entry that enables you to boot to the installed Windows image. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu parameters, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements
Q39. Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available in the Group Policy editing session.
You need to ensure that the ADMX files are available to the GPO Editor. What should you do?
A. Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restart the GPO Editor.
B. Set the network share permissions to grant all Windows 7 users Read access for the share.
C. Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and then restart the GPO Editor.
D. Copy the ADMX files to the central store, and then restart the GPO Editor.
Answer: D
Explanation:
http://support.microsoft.com/kb/929841 To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain.
Q40. You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computers in Toronto by using ConfigMgr.
The deployed image fails to activate.
You need to ensure that the image meets company activation requirements.
What should you do?
A. Run the Sysprep /generalize command.
B. Run the Sysprep /oobe command.
C. Modify the unattend.xml file and enter a MAK key.
D. Modify the unattend.xml file and enter a KMS key.
Answer: A