Want to know Examcollection 70-688 Exam practice test features? Want to lear more about Microsoft Managing and Maintaining Windows 8 certification experience? Study Download Microsoft 70-688 answers to Up to date 70-688 questions at Examcollection. Gat a success with an absolute guarantee to pass Microsoft 70-688 (Managing and Maintaining Windows 8) test on your first attempt.
Q101. You have a client computer that runs Windows 8 Enterprise.
The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data.
You need to prevent any data from being written to the fixed disk.
What should you do?
A. Run the Disable-BitLocker cmdlet.
B. Run the manage-bde command and specify the -pause switch.
C. Run the Lock-BitLocker cmdlet.
D. Run the manage-bde command and specify the -off switch.
Answer: B
Q102. Your network contains an Active Directory domain. The domain contains Windows 8.1 Enterprise client computers.
You need to a recommend a solution to ensure that help desk users can repair remotely a corrupt registry on a Windows 8.1 computer. The solution must minimize administrative effort.
What should you recommend?
A. Windows To Go
B. Microsoft Diagnostics and Recovery Toolset (DaRT)
C. Windows Recovery Environment {Windows RE)
D. Windows Preinstallation Environment (Windows PE)
Answer: B
Q103. DRAG DROP
You use a desktop computer and a laptop, both of which run windows 8. You use a Microsoft account to log on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined to the HomeGroup and the laptop is a member of a workgroup.
When you access a frequently visited website from your laptop, Internet Explorer saves your password. When you visit the website from your desktop computer, you are prompted to enter your password.
You need to sync your saved password from your laptop to your desktop computer.
Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q104. You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is stored locally on the tablets.
Access to the application is protected with extra logon credentials, in addition to a
standard domain account used by users.
The application utilizes the least amount of network bandwidth.
The application must maintain access to the current desktop.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
Answer: E
Q105. DRAG DROP
You support a computer that runs Windows 8 Enterprise.
You want to create a dual-boot configuration by using the native boot virtual hard disk
(VHD) method.
You need to create an alternate Windows 8 installation.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q106. You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user's computer to prevent possible user data loss in the future.
What should you do?
A. Configure the user's documents library to include folders from network shares.
B. Remove the .man extension from the user profile name.
C. Add the .dat extension to the user profile name.
D. Configure Folder Redirection by using the domain group policy.
Answer: D
Q107. DRAG DROP
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q108. You have client computers that run Windows 8 Enterprise.
The network contains a network printer. Users connect to the printer by using a local TCP/IP port.
A network administrator changes the IP address of the printer.
You need to create a script to update the IP address used by the local TCP/IP port on the computers.
Which two Windows PowerShell cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Add-PrinterPort
B. Add- PrinterD river
C. Set-PrinterConfiguration
D. Add-Printer
E. Set-Printer
Answer: A,E
Q109. You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain.
The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts.
You need to enforce these security policy requirements on the computers.
What should you do?
A. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add or log on with Microsoft accounts.
C. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add Microsoft accounts.
D. From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.
Answer: B
Q110. You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature.
Some employees work from home.
You need to ensure that employees can log on to their laptops when they work from home.
What should you do?
A. Provide employees their BitLocker PINs.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network.
Answer: A