getcertified4sure.com

Secrets to microsoft 70 697




Proper study guides for Abreast of the times Microsoft Configuring Windows Devices certified begins with Microsoft 70 697 dump preparation products which designed to deliver the Download 70 697 dump questions by making you pass the 70 697 ebook test at your first time. Try the free mcsa microsoft windows 10 study guide exam 70 697 demo right now.

Q11. You are the desktop administrator for a small company. 

Your workgroup environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used. 

You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S. 

B. Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT. 

C. Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT. 

D. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X. 

Answer: A,B 


Q12. You have a computer named Computer1 that runs Windows 10 Enterprise. 

You need to identify the locations that you can select as a File History drive. 

What are two possible locations? Each correct answer presents a complete solution? 

A. the operating system volume 

B. an unformatted partition 

C. a non-system volume 

D. a network share 

Answer: C,D 


Q13. You have a client Windows 10 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed. 

You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive. 

Which Group Policy object (GPO) setting should you configure? 

A. Allow access to BitLocker-protected fixed data drives from earlier version of Windows. 

B. Require additional authentication at startup. 

C. Allow network unlock at startup. 

D. Configure use of hardware-based encryption for operating system drives. 

Answer:


Q14. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip. 

You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Enable the Require additional authentication at startup policy setting. 

B. Enable the Enforce drive encryption type on operating system drives policy setting. 

C. Enable the option to allow BitLocker without a compatible TPM. 

D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11. 

Answer: A,C 


Q15. You have a Microsoft Intune subscription. 

You have three security groups named Security1, Security2 and Security3. Security1 is the 

parent group of Security2. Security2 has 100 users. 

You need to change the parent group of Security2 to be Security3. 

What should you do first? 

A. Edit the properties of Security1. 

B. Edit the properties of Security2. 

C. Delete security2. 

D. Remove all users from Security2. 

Answer:


Q16. You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise. 

You notice that there are 25 mandatory updates listed in the Intune administration console. 

You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates. 

Which policy template should you use? 

A. Microsoft Intune Agent Settings 

B. Windows Configuration Policy 

C. Microsoft Intune Center Settings 

D. Windows Custom Policy (Windows 10 and Windows 10 Mobile) 

Answer:


Q17. DRAG DROP 

You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise. 

You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users. 

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q18. DRAG DROP 

You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365 ProPlus programs. 

You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation. 

Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order. 

Answer: 


Q19. HOTSPOT 

You administer Windows 10 Enterprise computers in your company network, including a computer named Wst1. Wst1 is configured with multiple shared printer queues. 

Wst1 indicates hardware errors. You decide to migrate the printer queues from Wst1 to a new computer named Client1. 

You export the printers on Wst1 to a file. You need to import printers from the file to Client1. 

From the Print Management console, which Print Management node should you select? To answer, select the appropriate node in the answer area. 

Answer: 


Q20. Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app. 

An employee’s personally owned portable computer is stolen. 

You need to protect the corporate applications and email messages on the computer. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Prevent the computer from connecting to the corporate wireless network. 

B. Change the user’s password. 

C. Disconnect the computer from the management infrastructure. 

D. Initiate a remote wipe. 

Answer: B,D