Review 70-686, complete name as Pro: Windows. 70-686 exam can be a remarkable accreditation than it which is ordered to provide by a lot of Them experts for obtaining substantial list along with advanced of experience inside their applicable niche. Qualifications associated with Review 70-686 delivers distinct business opportunities of experiencing excellent work along with career. By permitting Microsoft 70-686 accreditation you can lift up your price along with worth before an individuals organisations.
Q1. You have an image that is used to deploy Windows 7 on client computers.
You need to add drivers to the Windows 7 image.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Use the Deployment Image Servicing and Management (DISM) tool offline.
B. Use INF files for driver packages.
C. Use executable files for driver packages.
D. Use Windows Installer files for driver packages.
E. Use the Deployment Image Servicing and Management (DISM) tool online.
Answer: A,B
Explanation:
Deployment Image Servicing and Management able to attach INF driver file to image at offline mode
Q2. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.
You are planning to deploy Windows 7 and a custom application.
You have the following requirements:
. The application must be available to only a specific group of users.
. You must be able to monitor application usage.
You need to design a deployment method for the custom application that meets the requirements.
Which deployment method should you use in your design?
A. software installation in Group Policy
B. Microsoft Application Virtualization (App-V)
C. baseline Windows 7 image that includes the custom application
D. startup scripts in Group Policy
Answer: B
Explanation:
MS App-V thus allows centralized installation and management of deployed applications. It supports policy based access control; administrators can define and restrict access to the applications by certain users by defining policies governing the usage. App-V can require that applications not be run 'cached' from workstations, or require that 'cached' App-V applications routinely update license information from the App-V server, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and fault tolerance, and also features a tracking interface to track the usage of the virtualized application. http://en.wikipedia.org/wiki/Microsoft_App-V
Q3. You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers.
You need to design a custom image that will enable users to connect to a Telnet server.
What should you do?
A. Create a Network Connection before capturing the image.
B. Turn on the Telnet Server feature in the image.
C. Create a Certificate-Based credential before capturing the image.
D. Turn on the Telnet Client feature in the image.
Answer: D
Q4. Your companys network includes client computers that run Windows 7.
You design a wireless network to use Extensible Authentication ProtocolCTransport Level
Security (EAP-TLS). The Network Policy Server has a certificate installed.
Client computers are unable to connect to the wireless access points.
You need to enable client computers to connect to the wireless network.
What should you do?
A. Install a certificate in the Trusted Root Certification Authorities certificate store.
B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport Layer Security (PEAP-TLS).
C. Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
D. Install a certificate in the Third-Party Root Certification Authorities certificate store.
Answer: A
Q5. Your company plans to upgrade all client computers to Windows 7.
The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7
You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application.
You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.
What should you do?
A. Using MED-V TrimTransfer technology, deploy the VM image over the network
B. In the MED-V console, configure the MED-V workspace to prevent offline operation
C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored
D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory
Answer: B
Q6. Your network has a single domain with 1,000 client computers that run Windows 7.
A large number of software installation scripts are configured to run on the client computers.
You need to recommend a Group Policy setting to allow users to log on to their computers as soon as possible at first boot.
What should you recommend?
A. Configure the Run logon scripts synchronously setting to be Enabled.
B. Configure the Run logon scripts synchronously setting to be Disabled.
C. Configure the Run startup scripts asynchronously setting to be Enabled.
D. Configure the Run startup scripts asynchronously setting to be Disabled.
Answer: C
Explanation:
Run logon scripts synchronously
Description
Directs the system to wait for logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop.
If you enable this policy, Windows Explorer does not start until the logon scripts have finished running. This setting assures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop.
If you disable this policy or do not configure it, the logon scripts and Windows Explorer are not synchronized and can run simultaneously.
Run startup scripts asynchronously
Description
Lets the system run startup scripts simultaneously.
Startup scripts are batch files that run before the user is invited to log on. By default, the system waits for each startup script to complete before it runs the next startup script.
If you enable this policy, the system does not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously.
If you disable this policy or do not configure it, a startup script cannot run until the previous script is complete.
http://msdn.microsoft.com/en-us/library/ms811602.aspx
Q7. You are planning the deployment of a new engineering application in the Chicago office. You need to meet company requirements for application deployment. What should you recommend?
A. MED-V
B. App-V
C. Remote Desktop Session Host
D. Remote Desktop RemoteApp
Answer: B
Q8. You need to recommend a Microsoft Enterprise Desktop Visualization (MED-V) image update strategy to meet company requirements.
What should you recommend?
A. windows Update
B. Windows Intune
C. ConfigMgr
D. Windows Deployment Services (WDS)
Answer: C
Q9. You are planning to deploy Windows 7.
You have a custom line-of-business application that is not compatible with Windows 7.
You need to design a solution that allows the application to run.
What should you do?
A. Use the Windows Compatibility Evaluator.
B. Use the Setup Analysis Tool.
C. Use the Compatibility Administrator.
D. Use the Update Compatibility Evaluator.
Answer: C
Explanation:
The Compatibility Administrator tool can help you to resolve many of your compatibility issues by enabling the creation and the installation of application mitigation packages (shims), which can include individual compatibility fixes, compatibility modes, and AppHelp messages. The flowchart in Figure illustrates the steps required while using the Compatibility Administrator to create your compatibility fixes, compatibility modes, and AppHelp messages.
http://sourcedaddy.com/windows-7/using-the-compatibility-administrator.html
Q10. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS.
You deploy the Key Management Service (KMS) on a Windows 7 computer.
You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.
B. Deploy a Windows Server 2008 KMS host.
C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.
D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.
Answer: A,C
Explanation:
http://technet.microsoft.com/en-us/library/ee939272.aspx
The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days.
Listening on Port:
Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host.