Your success in Microsoft 70-686 is our sole target and we develop all our 70-686 braindumps in a way that facilitates the attainment of this target. Not only is our 70-686 study material the best you can find, it is also the most detailed and the most updated. 70-686 Practice Exams for Microsoft Windows Specialist 70-686 are written to the highest standards of technical accuracy.
Q21. You are planning the deployment of a new engineering application in the Chicago office. You need to meet company requirements for application deployment. What should you recommend?
A. MED-V
B. App-V
C. Remote Desktop Session Host
D. Remote Desktop RemoteApp
Answer: B
Q22. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS.
You deploy the Key Management Service (KMS) on a Windows 7 computer.
You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.
B. Deploy a Windows Server 2008 KMS host.
C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.
D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.
Answer: A,C
Explanation:
http://technet.microsoft.com/en-us/library/ee939272.aspx
The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days.
Listening on Port:
Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host.
Q23. You plan to use Windows PowerShell scripts to configure system settings when you deploy
Windows 7.
You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.
What should you do?
A. Set the script execution policy to Restricted.
B. Set the script execution policy to RemoteSigned.
C. Use Group Policy preferences.
D. Set the script execution policy to AllSigned.
Answer: B
Explanation:
I am not sure why the answer is A. i found some information, hope it can help to understand. =) As part of PowerShell's "secure by default" initial setup, scripts are not allowed to be ran by the command interpreter. This behavior can be modified by changing the PowerShell execution policy. There are four execution polices to choose from.
Restricted - The default, allows no scripts to run
AllSigned - All scripts must be Authenticode-signed to run
RemoteSigned - Scripts downloaded from a remote location must be signed
Unrestricted - PowerShell will run any script, works like what you are probably used to now h
ttp://powershellscripts.com/article3_powershell_script_signing.html
Q24. Your company’s network has client computers that run Windows 7.
When a user attempts to log on to the domain from a computer named Client1, she receives the following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect.
You need to ensure that the user can log on to the domain from Client1.
What should you do?
A. Disjoin and rejoin Client1 to the domain.
B. Reset the account password for Client1 through Active Directory Users and Computers.
C. Add the computer account for Client1 to the Domain Computers Active Directory group.
D. Reset the account password for the user through Active Directory Users and Computers.
Answer: A
Explanation:
Re-create the computer account, join a workgroup, and then rejoin the domain.
refer to http://support.microsoft.com/kb/810497
Q25. DRAG DROP
You create a shim database and distribute it to each of a companys client computers through a script. You name the database Shim_Database and give it a filename of shimdatabase.sdb. The database GUID is 18315260-2ecb-43af-945a-56810da33fb4.
The database must be registered on all client computers. The registration process must be invisible to the user.
You need to construct a command to register the shim database.
Which command should you use? To answer, drag the appropriate component from the list of command components to the correct location or locations in the work area.
Answer:
Q26. Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browsers security settings.
What should you do?
A. Reset the Internet Explorer settings
B. Restore the advanced settings in Internet Explorer C. Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode
D. Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode
Answer: D
Explanation:
Normal mode, you can configure IEM settings so that they are refreshed on users'
computers on a periodic basis (or each time the users log in). However, users can
temporarily change these settings between the times scheduled for their setting refresh.
For this reason, these settings in Normal mode behave as "pseudo-policies."
In Preference mode, you can configure IEM settings, but allow users to change these
settings later by using the Internet Explorer 9 user interface.
http://technet.microsoft.com/en-us/library/gg699413.aspx
Q27. Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.
You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.
You have the following requirements:
. Migrate 20 computers at a time.
. Ensure that you conserve network bandwidth.
You need to design a deployment strategy that meets the requirements.
What should you do?
A. Configure multicast transmission on the deployment point.
B. Configure unicast transmission on the deployment point.
C. Distribute the image by using Background Intelligent Transfer Service (BITS).
D. Compress the contents of the distribution folder.
Answer: A
Explanation:
Performing Multicast Deployments In order to deploy an image using multicasting instead of unicasting, you must first create a multicast transmission. Multicast transmissions make the image available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used.
http://technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx
Q28. DRAG DROP
You are the desktop architect for an enterprise organization with computers that run Windows 7 Enterprise.
You need to create a customized WinPE image.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order,)
Answer:
Q29. Your company is planning to deploy Windows 7.
You have an image that is used to deploy Windows 7 on client computers.
You need to add a volume image to the existing Windows image.
What should you do?
A. Service the image online.
B. Use ImageX to append the volume image.
C. Use the Deployment Image Servicing and Management (DISM) tool to mount the image.
D. Use DiskPart to attach a new volume.
Answer: B
Explanation:
ImageX is a command-line tool that enables the creation of Windows image (.wim) files for deployment in a manufacturing or corporate IT environment. The /append option appends a volume image to an existing .wim file. It creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice
http://technet.microsoft.com/en-us/library/cc749603(v=ws.10).aspx
Q30. Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain.
You discover that multiple client computers were automatically shut down because the security log was full.
You need to ensure that client computers are not shut down when the security log becomes full.
What should you do?
A. Increase the maximum log size.
B. Configure an Event Viewer subscription.
C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO).
D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).
Answer: D
Explanation:
Why not Default Domain Controllers Policy Group Policy object??
Default Domain Controllers Policy Group Policy object is set policy to manage domain
controller (domain server)
Default Domain Policy Group Policy object is set of policy to manage client