getcertified4sure.com

Get Smart with 70 697 pdf download




Act now and download your Microsoft microsoft exam 70 697 test today! Do not waste time for the worthless Microsoft 70 697 ebook tutorials. Download Renovate Microsoft Configuring Windows Devices exam with real questions and answers and begin to learn Microsoft mcp 70 697 with a classic professional.

Q21. You have an Active Directory domain named contoso.com that contains a deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1). You have a Microsoft Intune subscription that is synchronized to contoso.com by using the Microsoft Azure Active Directory Synchronization Tool (DirSync.) 

You need to ensure that you can use Configuration Manager to manage the devices that are registered to your Microsoft Intune subscription. 

Which two actions should you perform? Each correct answer presents a part of the solution. 

A. In Microsoft Intune, create a new device enrollment manager account. 

B. Install and configure Azure Active Directory Synchronization Services (AAD Sync.) 

C. In Microsoft Intune, configure an Exchange Connector. 

D. In Configuration Manager, configure the Microsoft Intune Connector role. 

E. In Configuration Manager, create the Microsoft Intune subscription. 

Answer: D,E 


Q22. You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch. 

From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1. 

What should you do? 

A. Run the winrm.exe command and specify the –s parameter. 

B. Run the Powershell.exe command and specify the –Command parameter. 

C. Run the Receive-PSSession cmdlet and specify the –Name parameter. 

D. Run the Invoke-Command cmdlet and specify the –VMName parameter. 

Answer:


Q23. Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app. 

An employee’s personally owned portable computer is stolen. 

You need to protect the corporate applications and email messages on the computer. 

Which two actions should you perform? Each correct answer presents part of the solution. 

A. Prevent the computer from connecting to the corporate wireless network. 

B. Change the user’s password. 

C. Disconnect the computer from the management infrastructure. 

D. Initiate a remote wipe. 

Answer: B,D 


Q24. You manage a network that includes Windows 10 Enterprise computers. All of the computers on the network are members of an Active Directory domain. 

The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. 

You need to enforce these security policy requirements on the computers. 

What should you do? 

A. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts. 

B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts. 

C. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off. 

D. From each computer, navigate to Change Sync Settings and set the Sync Your Setting s option to Off. 

Answer:


Q25. A company has 10 portable client computers that run Windows 10 Enterprise. 

The portable client computers have the network connections described in the following table. 

None of the computers can discover other computers or devices, regardless of which connection they use. 

You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. 

What should you do on the client computers? 

A. For the CorpWifi connection, select Yes, turn on sharing and connect to devices. 

B. Turn on network discovery for the Public profile. 

C. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the HotSpot connection, select No, don’t turn on sharing or connect to devices. 

D. For the CorpWired connection, select Yes, turn on sharing and connect to devices. 

E. Turn on network discovery for the Private profile. 

Answer:


Q26. A company has 100 client computers that run Windows 10 Enterprise. 

A new company policy requires that all client computers have static IPv6 addresses. 

You need to assign static IPv6 addresses to the client computers. 

Which Network Shell (netsh) command should you run? 

A. add address 

B. set interface 

C. set global 

D. set address 

Answer:


Q27. DRAG DROP 

You have a desktop computer and a tablet that both run Windows 10 Enterprise. 

The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are deployed to all desktop computers. 

The tablet is located at your home and is a member of a workgroup. Both locations have Internet connectivity. 

You need to be able to access all applications that run on the desktop computer from you tablet. 

Which actions should you perform on each computer? To answer, drag the appropriate action to the correct computer. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: 


Q28. Your network contains an Active Directory domain named contoso.com. The domain contains Windows 10 Enterprise client computers. 

Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses. 

You need to add a third email address for each user. 

What should you do? 

A. From Active Directory Users and Computers, modify the E-mail attribute for each user. 

B. From Microsoft Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet. 

C. From Active Directory Domains and Trust, add a UPN suffix for each user. 

D. From the Office 365 portal, modify the Users settings of each user. 

Answer:


Q29. You have a Windows 10 Enterprise computer named Computer1. Computer1 has File History enabled. 

You create a folder named Folder1 in the root of the C: drive. 

You need to ensure that Folder1 is protected by File History. 

What are two possible ways to achieve the goal? Each correct answer presents a complete solution. 

A. From File Explorer, include Folder1 in an existing library. 

B. Modify the Advanced settings from the File History Control Panel item. 

C. From the Settings app, modify the Backup options. 

D. From File Explorer, modify the system attribute of Folder1. 

Answer: A,C 


Q30. DRAG DROP 

You manage Microsoft Intune for a company named Contoso. You have 200 computers that run Windows 10. The computers are Intune clients. 

You need to configure software updates for the clients. 

Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. 

Answer: