getcertified4sure.com

A Review Of Exact 70-688 practice exam




Exam Code: 70-688 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Managing and Maintaining Windows 8
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-688 Exam.

2021 Mar 70-688 actual test

Q91. You support laptops that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) are deployed on your network on a server named SERVER1. 

Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started. 

You need to make changes to the Configure MBAM Services Group Policy settings. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set Enter status reporting frequency (in minutes) to 120. 

B. Set Enter client checking status frequency (in minutes) to 120. 

C. Set Select Bitlocker Recovery Information to store to Recovery password and key package. 

D. Set MBAM Status reporting endpoint to SERVER1 

E. Set Select Bitlocker Recovery Information to store to Recovery password only. 

F. Set MBAM Recovery and Hardware service endpoint to SERVER1. 

Answer: A,C 


Q92. Your network contains an Active Directory domain. The domain contains Windows 8.1 Enterprise client computers. 

You need to recommend a solution to ensure that help desk users can replace corrupt operating system files. 

Which Microsoft Diagnostics and Recovery Toolset (DaRT) tool should you include in the recommendation? 

A. Standalone System Sweeper 

B. File Restore 

C. Disk Commander 

D. Computer Management 

E. SFC Scan 

Answer:


Q93. Your network contains an Active Directory domain. All client computers run Windows 8 Enterprise. 

Microsoft System Center 2012 Endpoint Protection is deployed to all of the computers by using the default settings contained in the Default Antimalware Policy. 

The users in the research department report that a folder named C:\TestApp must not be scanned by the Endpoint Protection client. 

You need to configure the Endpoint Protection client not to scan the C:\TestApp folder for the computers in the research department only. 

What should you do first? 

A. In the Endpoint Protection client, modify the Excluded files and locations setting for each research department computer. 

B. Create a new antimalware policy and modify the Threat overrides settings. 

C. Create a new antimalware policy and modify the Exclusion settings. 

D. In the Default Antimalware Policy, modify the Exclusion settings. 

Answer:


Q94. Your network contains an Active Directory domain named contoso.com. The domain contains Windows 8.1 Enterprise client computers. 

Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses. 

You need to add a third email address for each user. 

What should you do? 

A. From Windows Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet. 

B. From Active Directory Users and Computers, modify the E-mail attribute for each user. 

C. From Active Directory Domains and Trust add a UPN suffix for each user. 

D. From the Office 365 portal, modify the Users settings of each user. 

Answer:


Q95. DRAG DROP 

You administer 50 laptops that run Windows 7 Professional 32-bit. 

You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. 

You need to ensure that user application settings, Windows settings, and user files are 

maintained after Windows 8 Pro is installed. 

Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Down to date 70-688 rapidshare:

Q96. DRAG DROP 

You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. 

You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q97. DRAG DROP 

You administer computers that run Windows 8. 

The computers on your network are produced by various manufacturers and often require custom drivers. 

You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE). 

In which order should you perform the actions? (To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q98. You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager. 

You enable Microsoft System Center 2012 Endpoint Protection on the computers. 

You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers. 

What should you configure form the System Center 2012 Endpoint Protection settings? 

A. Advanced 

B. MAPS 

C. Real-time protection 

D. Default actions 

Answer:


Q99. You have a Windows 8.1 Enterprise client computer named Computer1 The Storage Spaces settings of Computer1 are configured as shown in the following exhibit. (Click the Exhibit button.) 

You plan to create a three-way mirror storage space in the storage pool and to set the size of the storage space to 50 GB. 

You need to identify the minimum number of disks that must be added to the storage pool for the planned mirror. 

How many disks should you identify? 

A. 1 

B. 3 

C. 4 

D. 5 

Answer:


Q100. You have laptops that run Windows 8. The laptops have Microsoft User Experience Virtualization (UE-V) installed. 

You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network. 

What should you do? 

A. From a command prompt, run sc config PeerDistSvc start=auto. 

B. From Group Policy Management Editor, configure the Windows Connection Manager settings. 

C. From a command prompt, run sc config CscService start=auto. 

D. From Group Policy Management Editor, configure the Network Connections settings. 

Answer: