Master the 70-686 Pro: Windows content and be ready for exam day success quickly with this Ucertify 70-686 braindumps. We guarantee it!We make it a reality and give you real 70-686 questions in our Microsoft 70-686 braindumps.Latest 100% VALID Microsoft 70-686 Exam Questions Dumps at below page. You can use our Microsoft 70-686 braindumps and pass your exam.
Q11. Your company plans to upgrade 1,000 client computers to Windows 7.
The company uses a custom line-of-business application that is frequently updated.
The application is not compatible with Windows 7.
You need to ensure that the company can use the application.
You also need to ensure that the application can be updated with the least amount of administrative effort.
What should you do?
A. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, and distribute the virtual machine image and updates through MED-V TrimTransfer.
B. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, and distribute the virtual machine image and updates through Microsoft System Center Configuration Manager.
C. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machine image and updates through a file share resource.
D. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machine image and updates through Microsoft System Center Configuration Manager.
Answer: B
Q12. You are the desktop architect for an enterprise organization with client computers that run Windows 7.
You need to create a new Windows Firewall rule that will allow you to access the Disk Management snap-in of remote client computers.
Which predefined rule should you select? To answer, select the appropriate setting in the work area.
Answer:
Q13. You run Sysprep on a base image for the company's VDI pool. You plan to use Windows Deployment Services (WDS) for the deployment.
You need to recommend the Sysprep parameters to ensure that the base image is ready for deployment while meeting the company requirements.
Which parameters should you recommend? (Choose all that apply.)
A. /quiet
B. /shutdown
C. /oobe
D. /generalize
E. /quit
F. /audit
G. / unattendiunattend.xml
Answer: B,D,G
Q14. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.
You are planning to deploy Windows 7 Enterprise to the client computers.
You need to design a zero-touch installation strategy.
What should you use in your design?
A. custom Windows 7 image on DVD
B. unattended installation
C. Windows Deployment Services (WDS)
D. Microsoft System Center Configuration Manager 2007 R2
Answer: D
Explanation:
Microsoft Deployment Toolkit (MDT) 2010 is a Microsoft solution accelerator available at no cost for deploying Windows operating systems. Based on the experience of Microsoft employees, partners, and customers, MDT 2010 contains many thousands of lines of code—code that provides a deployment framework so that customers can focus on their business, not on programming. Integrating MDT 2010 with Configuration Manager 2007 R2 helps large organizations use this framework to more easily implement the Zero-Touch, High-Volume
Deployment strategy.
Benefits of integrating MDT 2010 with Configuration Manager 2007 R2 in the Zero-Touch, High-Volume
Deployment strategy include:
-Streamlined deployment, because installation is fully automated without interaction.
-Lower support costs, because configurations are consistent across all client computers.
-Streamlined maintenance, because Configuration Manager 2007 R2 handles applications, device drivers, and updates.
http://technet.microsoft.com/en-us/library/dd919178(v=ws.10).aspx
Q15. You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom application.
You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the custom application.
You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive the new GPO.
What should you do?
A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Allow-Apply Group Policy permission for the GPO.
B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the OU.
C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Deny-Apply Group Policy permission for the GPO.
D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain.
Answer: C
Q16. Your company has 1,000 client computers that run Windows XP Professional x64.
You are planning to deploy Windows 7 Enterprise x64.
The company uses an application that is incompatible with Windows 7 Enterprise x64.
You have the following requirements:
. Provide all users with access to the application.
. Deploy and manage the application by using a centralized solution.
You need to design a solution that meets the requirements.
What should you do?
A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab.
B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode.
C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer.
D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V.
Answer: C
Q17. You have a single Active Directory domain. All domain controllers run Windows Server 2003 with Service Pack 1 (SP1).
You plan to store Windows BitLocker Drive Encryption recovery passwords in Active Directory.
You need to recommend the solution that uses the least amount of administrative effort.
What should you recommend?
A. Upgrade the domain controller that has the role of operations master to Windows Server 2008 R2.
B. Upgrade all domain controllers to Windows Server 2008 R2.
C. Upgrade all domain controllers to Windows Server 2003 SP2.
D. Extend the Active Directory schema.
Answer: D
Explanation:
BitLocker Drive Encryption Configuration Guide: Backing Up BitLocker and TPM Recovery Information to Active Directory
This section provides information about how BitLocker and TPM recovery information can be backed up in Active Directory. By default, no recovery information is backed up. Administrators can configure Group Policy settings to enable backup of BitLocker or TPM recovery information. Before configuring these settings, as a domain administrator you must ensure that the Active Directory schema has been extended with the necessary storage locations and that access permissions have been granted to perform the backup. http://technet.microsoft.com/en-us/library/cc766015(v=ws.10).aspx
Q18. Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.
The company wants to require a secure connection between client computers and the file server.
You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.
What should you do?
A. Create an Isolation rule and specify Request authentication for inbound and outbound connections.
B. Create a Tunnel rule and specify Gateway-to-client as the tunnel type.
C. Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.
D. Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.
Answer: C
Explanation:
The PDC emulator master also serves as the machine to which all domain controllers in the domain will synchronise their clocks. It, in turn, should be configured to synchronise to an external NTP time source http://en.wikipedia.org/wiki/Primary_Domain_Controller
Q19. You are planning a migration to Windows 7.
You need to recommend applications that obtain a list of software installed on client computers.
Which applications should you recommend? (Choose all that apply.)
A. Microsoft Deployment Toolkit (MDT)
B. Sysprep
C. Microsoft Assessment and Planning Toolkit (MAP)
D. Microsoft Application Compatibility Toolkit (ACT)
E. windows User State Migration Tool (USMT)
F. Windows System Image Manager (windows SIM)
Answer: C,D
Q20. All client computers in your network run Windows 7 with default firewall settings.
You have a server-based application that requires an agent to be installed on all client computers.
You need to use Group Policy to allow the application to initiate installation of the agent on all client computers.
What should you do?
A. Create inbound program rules.
B. Create inbound port rules.
C. Create Windows service hardening rules.
D. Create connection security rules.
Answer: B
Explanation:
hints:
software havent install, so unable to block program