Proper study guides for Renewal Microsoft Managing and Maintaining Windows 8 certified begins with Microsoft 70-688 preparation products which designed to deliver the Highest Quality 70-688 questions by making you pass the 70-688 test at your first time. Try the free 70-688 demo right now.
Q31. HOTSPOT
Your company has five hardware builds for client computers. The hardware builds are configured as shown in the following table.
You plan to provide some users with Windows To Go disks that contain a corporate image of the 64-bit version of Windows 8 Enterprise and several line-of-business (LOB) applications.
In the table below, identify whether the hardware build is compatible or incompatible with the Windows To Go disks. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q32. HOTSPOT
You have 10 client computers that run Windows 8 Pro. The Storage Spaces settings of the computers are configured as shown in the following exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Answer:
Q33. You support laptops that run Windows 8 Pro and are members of an Active Directory domain.
The domain is configured with user folder redirection by using a Group Policy Object (GPO). Loopback group policies are not used.
Your company has decided to deploy tablets to all managers, for use as secondary computers.
Tablets will be added to the domain.
You need to ensure that the folder redirection settings are applied only to laptops.
What should you do?
A. Apply one GPO to the managers' laptops and another GPO to the tablets.
B. Assign the msDS-Primary Computer attribute for the managers' user domain accounts.
C. Assign the msDS-Primary Computer attribute for the computer domain accounts on the managers' laptops.
D. Block the managers' tablets from receiving the GPO.
Answer: B
Q34. HOTSPOT
You have the disk configuration shown in the following exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Answer:
Q35. You administer Windows 8.1 Enterprise computers in an Active Directory domain. You
have purchased a subscription to Windows Intune.
Company security policy requires that Windows Intune track resolved malware for 15 days,
and that a system restore point be created before malware remediation.
You need to meet the requirements specified in the security policy. What should you do?
A. Create a new Windows Intune Mobile Security Policy in the Windows Intune Admin Console with the recommended settings.
B. Connect your Microsoft account to your domain account.
C. Create and deploy a Windows Firewall policy by using a custom policy.
D. Create a new Windows Intune Center Settings policy with custom settings.
E. Create and configure an Endpoint Protection scan.
F. Create a new Windows Intune Agent Settings policy with the recommended settings.
G. Create a new Automatic Approval Update policy.
H. Create a new Windows Intune Agent Settings policy with custom settings.
Answer: E
Q36. DRAG DROP
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.
You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)
You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)
You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q37. You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled.
Some users require access to the internal company database servers while traveling. You need to configure the requested network connection to the database servers.
What should you configure on the laptops?
A. A DirectAccess connection to the company network
B. A virtual private network (VPN) connection to the company network
C. A metered network connection
D. Out of band management
Answer: B
Q38. You support computers that run Windows 8 Enterprise.
Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline.
You need to ensure that the App-V applications are available to users only when they are connected to the company network.
What should you do?
A. Configure mandatory profiles for laptop users.
B. Reset the App-V client FileSystem cache.
C. Disable the Disconnected operation mode.
D. Change user permissions to the App-V applications.
Answer: C
Q39. You have client computers that run Windows 8 Pro.
You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort.
What should you include in the recommendation?
A. File History
B. the Program and Features Control Panel item
C. Windows 7 File Recovery
D. System Restore points
Answer: D
Q40. You have a Windows 8.1 Pro desktop computer and a Windows RT 8.1 mobile device.
You sign in to the computer and the device by using the same Microsoft account.
You discover that the settings are not being synchronized between the Windows 8.1
computer and the Windows RT 8.1 device,
You need to ensure that the settings are synchronized.
What should you do first?
A. Enable the Trusted Hosts Group Policy setting.
B. Enable the Configure Default consent Group Policy setting.
C. From the PC settings page, click Trust this PC.
D. From the PC settings page, modify the Privacy settings.
Answer: C