70-688 exam is also known as Microsoft Microsoft 70-688 exam which is any Microsoft certification exam. Microsoft 70-688 certification is a passport to be able to related professions. Having a 70-688 certification within hand, you may enjoy any promising future. It can be a crucial step to be able to choose an effective preparation materials. Actualtests is a premier choice for you to be able to lay a good foundation to the Microsoft 70-688 preparation.
Q51. You have a client computer that runs Windows 8 Enterprise.
The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data.
You need to prevent any data from being written to the fixed disk.
What should you do?
A. Run the Disable-BitLocker cmdlet.
B. Run the manage-bde command and specify the -pause switch.
C. Run the Lock-BitLocker cmdlet.
D. Run the manage-bde command and specify the -off switch.
Answer: B
Q52. You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature.
Some employees work from home.
You need to ensure that employees can log on to their laptops when they work from home.
What should you do?
A. Provide employees their BitLocker PINs.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network.
Answer: A
Q53. You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune.
Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune.
You need to ensure that file and program activity is always monitored on this computer.
What should you do?
A. Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.
B. In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that uses the recommended settings.
C. Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.
D. Create and deploy a custom policy in the Windows Intune Center Settings template.
Answer: B
Q54. You support Windows 8.1 desktop computers and tablets that are members of an Active Directory domain. The domain includes Active Directory Certificate Services. All users use virtual smart cards to log on to their computers.
A domain user wants to log on to both his desktop computer and his tablet computer by using the same domain user account.
You need to configure the desktop and tablet computers to support two-factor authentication for the same domain user account.
What should you do?
A. Enroll the user for two separate certificates based on the Smartcard Logon template. Install one certificate in a virtual smart card on each of the user's computers.
B. Export the private key from the desktop computer. Import the private key to the tablet.
C. After the user has logged on to one computer, disable the Trusted Platform Module (TPM) on the second computer. Run the tpmvscmgr.exe utility on each of the computers.
D. Issue a temporary physical smart card. Use this smart card for an initial logon on each computer, then disconnect the tablet from the office network and destroy the temporary smart card.
Answer: D
Q55. You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory.
You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members.
You need to ensure that users that meet the membership criteria are added to the Windows Intune group.
What should you do?
A. Force Active Directory replication within the domain.
B. Ensure that all user accounts are identified as synchronized users.
C. Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory.
D. Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.
Answer: B
Q56. HOTSPOT
Your company has client computers that run Windows 8 Enterprise and Windows RT.
The company has a subscription to Windows Intune.
You plan to deploy line-of-business (LOB) Windows Store apps to all of the computers by using Windows Intune. The LOB apps will be signed by using a certificate issued by a trusted certification authority (CA).
You need to prepare all of the computers for the deployment of the LOB Windows Store apps.
In the table below, identify on which operating system each task should be performed. Make only one selection in each row. Each correct selection is worth one point.
Answer:
Q57. DRAG DROP
You administer laptops and virtual desktop computers that run Windows 8 and are joined to an Active Directory domain.
Your company provides virtual desktop computers to all users. Employees in the sales department also use laptops, sometimes connected to the company network and sometimes disconnected from the company network.
You want sales department employees to have the same personal data, whether they are using their virtual desktop computers or their laptops.
You need to configure the network environment to meet the requirements.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q58. You are a systems administrator for Contoso; Ltd. All client computers run Windows 8 and are members of the contoso.com Active Directory domain. Users log on to their computers by using domain user accounts.
Contoso develops an internal line of business (LOB) Windows Store app. You want to deploy the LOB app to the client computers and configure the app to access various resources in the domain.
You need to enable all users to run the LOB app and access the required resources from the LOB app.
What should you do?
A. Certify the LOB app with Windows Store. Ask users to log on to their computers by using a Microsoft Account. Install the LOB app from Windows Store. Ask users to log off, and then log back on in by using their domain accounts.
B. Restart each computer by using WinPE. From WinPE, copy all of the LOB app executable files in the Program Files folder. Restart into Windows 8 and ask users to log on by using their domain accounts.
C. Use the DISM utility to include the LOB app in a new Windows 8 image. Reimage the computers with the new image. Join the computers to a new workgroup. Ask each user to log on to the computer by using a new Microsoft Account that ends with @contoso.com.
D. Configure the Allow all trusted apps to install policy settings for all computers. Ask users to log on by using their domain accounts, and then execute a PowerShell script that includes the add-appxpackage cmdlet.
Answer: A
Q59. You support computers that run Windows 8 Enterprise and are members of a workgroup.
Users are able to download and install any app from Windows Store.
You need to ensure that only approved apps can be installed from Windows Store.
What should you do?
A. Configure a Software Restriction Policy Certificate rule.
B. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option.
C. Configure an AppLocker Packaged app rule.
D. Configure an AppLocker Publisher rule.
Answer: C
Q60. You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager.
You enable Microsoft System Center 2012 Endpoint Protection on the computers.
You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers.
What should you configure form the System Center 2012 Endpoint Protection settings?
A. Advanced
B. MAPS
C. Real-time protection
D. Default actions
Answer: B