We provide real 70-686 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70-686 Exam quickly & easily. The 70-686 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70-686 dumps pdf and vce product and material, you can easily pass the 70-686 exam.
Q1. DRAG DROP
Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com.
You deploy a new Group Policy object (GPO) named California Computers GPO as part of the organizational unit (OU) and GPO design shown in the following diagram.
The California Computers GPO contains computer configuration settings and user configuration settings.
User configuration settings are not being applied to users who log on to client computers in the California Computers OU.
Which GPO setting should you select?? (To answer, drag the appropriate setting from the list of settings to the correct location or locations in the work area.)
Answer:
Q2. Your network has 1,000 client computers that run Windows 7.
You plan to deploy a new application.
You need to ensure that the application deploys only during non-business hours.
What should you do?
A. Use Group Policy.
B. Use Microsoft System Center Configuration Manager.
C. Use Windows Deployment Services with a schedule cast.
D. Use a logon script.
Answer: B
Explanation:
Microsoft System Center Configuration Manager able to schedule task (Text Book)
Q3. A company has an Active Directory Domain Services (AD DS) forest with a single domain.
Domain controllers are located in the companys offices in New York and Boston.
You deploy a group policy at the domain level that includes security filtering.
You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.
You suspect there might be replication problems with the policies. What should you do?
A. Run a Group Policy Results report against computers in the Boston office.
B. Run a Group Policy Modeling report against computers in the Boston office.
C. Use the GpoTool.exe command-line tool.
D. Use the RepAdmin.exe command-line tool.
Answer: A
Q4. A company network includes Windows 7 client computers and DirectAccess.
When using DirectAccess, users cannot connect to the companys internal resources.
You need to create a batch file that users can execute to trace all network traffic for
DirectAccess from their home computers.
Which command should you use? To answer, drag the appropriate terms from the list of
terms to the correct location or locations in the work area.
Answer:
Q5. You deploy Windows 7 to the computers that are used by your companys Web developers. All Web developer user accounts are in a single organizational unit (OU).
Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers.
You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications.
What should you do?
A. Enable Compatibility View in Internet Explorer.
B. Add each server to the Intranet zone.
C. Add each server to the Trusted Sites zone.
D. Set the default security setting in Internet Explorer to Medium.
Answer: B
Explanation:
Pop-up Blocker features Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside the viewable desktop area. For more information, see "Windows Restrictions" in this document. When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual manner. Note that sites in the
Trusted Sites and Local
Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet Options.
http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx
hints: internal web , so i choose intranet zones.
Local Intranet Zone
By default, the Local Intranet zone contains all network connections that were established by using a Universal Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, http://local), as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the Local intranet zone.
Trusted Sites Zone
This zone contains Web sites that you trust as safe (such as Web sites that are on your organization's intranet or that come from established companies in whom you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low.
http://support.microsoft.com/kb/174360
Q6. You plan to deploy Windows 7 to client computers.
You have the following requirements:
Deploy Windows 7 over the network.
Do not affect the performance of existing network applications.
You need to design a zero-touch deployment strategy that supports the requirements.
What should you do?
A. Deploy images from a Microsoft System Center Configuration Manager server that runs Windows Server 2008.
B. Deploy images from a dedicated share on a Windows Server 2008 server.
C. Ensure that all computers have the Internet Protocol version 6 (IPv6) protocol disabled prior to deployment.
D. Ensure that all computers have the Internet Protocol version 4 (IPv4) protocol disabled prior to deployment.
Answer: A
Q7. DRAG DROP
You are designing a Windows 7 image creation strategy for a multilingual deployment. You currently have an English language image of Windows 7.
The deployment must meet the following requirements:
. The image must include the German, French, and English languages.
. Users must be able to change the display languages.
You need to recommend an action plan that meets the deployment requirements.
Which two actions should be performed in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q8. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.)
A. Create a collection with the required computers and assign the software to the collection.
B. Create a software installation Group Policy object (GPO).
C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain.
D. Create a software deployment package by using System Center Configuration Manager 2007.
E. Create an unattend.xml file.
F. Create a silent install MSI file.
Answer: A,D,F
Explanation:
hints: without user interaction = silent install MSI file
Q9. Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in the following diagram.
Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO.
A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that are in the Kiosk Computers OU.
You need to ensure that the user configuration settings are correctly applied.
What should you do?
A. Enable loopback processing in Merge mode on the Default Domain Policy GPO.
B. Disable the user configuration settings on the Default Domain Policy GPO.
C. Enable loopback processing in Replace mode on the Kiosk Computers GPO.
D. Disable the user configuration settings on the New York Users GPO.
Answer: C
Explanation:
Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92
Q10. DRAG DROP
You are the desktop architect for an enterprise organization with computers that run Windows 7.
You need to create a Group Policy object (GPO) to prevent Windows Explorer from starting until all logon scripts have finished.
Which setting should you select? To answer, select the appropriate setting in the work area.
Answer: