getcertified4sure.com

Tips for download 70-686 study guide pdf




Realistic of 70-686 exam guide materials and dump for Microsoft certification for consumer, Real Success Guaranteed with Updated 70-686 pdf dumps vce Materials. 100% PASS Pro: Windows exam Today!

2021 Sep microsoft deployment certification exam 70-686:

Q21. You have an image that is used to deploy Windows 7 on client computers. 

You need to modify the image to change the edition of Windows 7. 

What should you do? 

A. Use Windows Setup to service the image. 

B. Service the image online. 

C. Service the image offline. 

D. Use audit mode to service the image. 

Answer: C 

Explanation: 

http://technet.microsoft.com/en-us/library/dd744572(v=ws.10).aspx 

Change the Windows Image to a Higher Edition You can change your Windows image to a higher edition while it is offline by using the DISM commands in the following procedure. You should not use this procedure on an image that has already been changed to a higher edition. 


Q22. You deploy Windows 7 Enterprise in a VDI pool resource group. 

You need to ensure that the visualization strategy meets the company's OSE requirements. 

Which GPO setting should you recommend? 

A. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. 

B. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. 

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. 

D. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. 

Answer: D 


Q23. Your companys network is shown in the following diagram. 


There is a VPN between Branch Officebranch office B and the Core Networkcore network. 

The company plans to deploy Windows 7 to all client computers. 

You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows. 

What should you do? (Each correct answer presents part of the solution. Choose all that apply.) 

A. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network. 

B. Deploy the Key Management Service (KMS) in branch office B. 

C. Deploy the Key Management Service (KMS) in branch office A. 

D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network. 

Answer: A,B 


Q24. You have an AD DS security group named Toronto Users and another named Toronto Computers. 

You are planning the deployment of a new browser by using Group Policy. 

You need to ensure that the computers in each office comply with company requirements. 

What should you recommend? (Choose all that apply.) 

A. Download the Internet Explorer 9 Administrative Kit. 

B. Deploy the Internet Explorer 9 Blocker to the Toronto Users group. 

C. Add all Toronto computers to the Toronto Computers security group. 

D. Deploy the Internet Explorer 9 Admin Kit to the Toronto Users group. 

E. Add all Toronto users to the Toronto Users security group. 

F. Download the Internet Explorer 9 Blocker Toolkit. 

G. Deploy the Internet Explorer 9 Admin Kit to the Toronto Computers group. 

H. Deploy the Internet Explorer 9 Blocker to the Toronto Computers group. 

Answer: C,F,H


Q25. You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom application. 

You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the custom application. 

You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive the new GPO. 

What should you do? 

A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Allow-Apply Group Policy permission for the GPO. 

B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the OU. 

C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Read permission and the Deny-Apply Group Policy permission for the GPO. 

D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain. 

Answer: C 


70-686 practice exam

Updated ms 70-686:

Q26. Your company has 1,000 client computers that run Windows XP Professional x64. 

You are planning to deploy Windows 7 Enterprise x64. 

The company uses an application that is incompatible with Windows 7 Enterprise x64. 

You have the following requirements: 

. Provide all users with access to the application. 

. Deploy and manage the application by using a centralized solution. 

You need to design a solution that meets the requirements. 

What should you do? 

A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab. 

B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode. 

C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer. 

D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V. 

Answer: C 


Q27. Your company is planning to deploy Windows 7 to all client computers. 

You have the following requirements: 

Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use. 

You need to select the appropriate method to detect application compatibility issues. 

What should you do? 

A. Use the Setup Analysis Tool in a virtual environment. 

B. Use the standalone Setup Analysis Tool. 

C. Use the Standard User Analyzer Wizard. 

D. Use the Standard User Analyzer tool. 

Answer: D 

Explanation: 

The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. 

http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx 


Q28. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. 

You are planning to deploy a custom application. 

You need to schedule the deployment to occur outside of business hours and without user interaction. 

Which deployment method should you choose? 

A. Lite Touch Installation 

B. software deployment with Microsoft System Center Configuration Manager 2007 

C. software installation with Group Policy 

D. Microsoft Application Virtualization (App-V) 

Answer: B 

Explanation: 

Microsoft System Center Configuration Manager 2007 able to set schedule to deploy (text book) hints: without user interaction = zero touch 


Q29. A company has an Active Directory Domain Services (AD DS) forest with a single domain. 

Domain controllers are located in the companys offices in New York and Boston. 

You deploy a group policy at the domain level that includes security filtering. 

You discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office. 

You suspect there might be replication problems with the policies. What should you do? 

A. Run a Group Policy Results report against computers in the Boston office. 

B. Run a Group Policy Modeling report against computers in the Boston office. 

C. Use the GpoTool.exe command-line tool. 

D. Use the RepAdmin.exe command-line tool. 

Answer: A 


Q30. You are planning a Windows 7 deployment infrastructure for a new company. 

You have the following requirements: 

Three domains 

10,000 client computers 

No user interaction 

You need to recommend a deployment infrastructure. 

What should you recommend? 

A. Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation. 

B. Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation. 

C. Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. 

D. Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation. 

Answer: A 

Explanation: 

Hints: 

no user interaction = zero touch 


Topic 2, Scenario A 

Background 

You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. 


The address for the SharePoint site is https://intranet.company.com. 

Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. 

You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. 


Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. 


You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table. 


You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. 

Business Requirements 

The deployment of Windows 7 must meet the following business requirements: 

Deployment requirements: 

The deployment must maximize the use of existing client computers. The deployment must 

reduce the amount of time spent updating client computers after deployment. 

Technical Requirements 

The application must meet the following technical requirements: 

Infrastructure requirements: 

The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. 

Application compatibility: 

-All current applications must be supported on Windows 7. 

-All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. 

Migration requirements: 

-The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. 

Image maintenance: 

-You need to minimize the re-arm passes. 

Security 

-Each location has a security group made up of the desktop computer objects in that location. 

-Users must not be able to change their web browser or client computer security settings. 

-Your requirements are as follows: 

 A startup PIN and TPM are required for all BitLocker users. 

 Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. 

 All laptops within the company must have BitLocker enabled. 

 All Madrid desktops must have BitLocker enabled. 

 No other desktops besides Madrid should have Bitlocker enabled. 

-Computers in office lobbies are not permitted to join the domain. 

-You need to block the use of ActiveX controls for all external websites.