70-686 Premium Bundle

70-686 Premium Bundle

Pro: Windows Certification Exam

4.5 
(22245 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Microsoft 70-686 Free Practice Questions

Q1. You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that 

the virtualization strategy meets the companys OSE requirements. Which GPO setting should you recommend? 

A. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings 

B. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings 

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications 

D. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications 

Answer:

Q2. Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain. 

You discover that multiple client computers were automatically shut down because the security log was full. 

You need to ensure that client computers are not shut down when the security log becomes full. 

What should you do? 

A. Increase the maximum log size. 

B. Configure an Event Viewer subscription. 

C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO). 

D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO). 

Answer:

Explanation: 

Why not Default Domain Controllers Policy Group Policy object?? 

Default Domain Controllers Policy Group Policy object is set policy to manage domain 

controller (domain server) 

Default Domain Policy Group Policy object is set of policy to manage client 

Q3. A user from the Finance department is testing applications in Windows 7 with Internet Explorer 9. The company’s finance application accesses a vendor web page that does not function correctly in Windows 7. When the user enables Internet Explorer Compatibility Mode for the vendor web page, it works correctly. 

You need to support the company’s future software deployments. 

What should you recommend? (Choose all that apply.) 

A. Package the new purchasing application and publish it by using a Group Policy object (GPO) that deploys to users of the new application. 

B. Package the new purchasing application and assign it by using a Group Policy object (GPO) that deploys to all Windows XP computers in the Finance department. 

C. Use a Group Policy object (GPO) to add the vendor website to the Trusted Sites list on all computers in the Finance department. 

D. Use a Group Policy object (GPO) to add the vendor website to the local intranet zone for all Windows 7 computers. 

E. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows XP computers in offices that use the old purchasing application. 

F. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows 7 computers. 

Answer: A,F 

Q4. You upgrade all of a companys client computers from Microsoft Internet Explorer 8 to Internet Explorer 9. 

After the upgrade, users are unable to download attachments from Microsoft Outlook Web App (OWA) or any other secure website. You verify the Group Policy settings for Internet Explorer 9. 

You need to ensure that all users can download attachments from OWA and other secure websites. 

Which setting should you select? To answer, select the appropriate item in the work area. 

Answer:  

Q5. You need to ensure that the companys remote computers receive Windows updates at the same time as the internal computers. What should you do? 

A. Deploy DirectAccess 

B. Implement System Center Operations Manager (OpsMgr) 

C. Install the Windows Deployment Services (WDS) role 

D. Install BranchCache in distributed mode 

Answer:

Explanation: 

Remote computers use Direct Access to connect to internal WSUS server to update 

Topic 3, Scenario B 

Background 

You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise. 

Your network consists of a main office and four regional offices. Your network has an Active Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office. 

All servers run Windows Servers 2008 R2. 

The regional offices are listed in the following table with users and WAN connection speeds. 

Users in the New York office will have a Customer Relationship Management (CRM) application that is CPU-intensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only. 

The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3. 

Business Requirements 

The following business requirements must be maintained or exceeded. 

Software Asset Management 

The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE. The Paris development group has a Key Management Server (KMS) in an isolated test network. All engineering applications are required to maintain compliance with the license agreements of the application vendors. 

Technology Requirements 

You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices. The mobile staff uses portable computers. 

In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7. 

Virtualization infrastructure 

You use Microsoft Application Virtualization (App-V) to deliver applications to computers. You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process. 

New Functionality 

The fewest number of servers should be added to the environment to meet the technical 

goals. 

A new version of an existing engineering application must be deployed to the users. The 

new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory. 

Technical Requirements 

The following technical requirements must be maintained or exceeded. 

Infrastructure Requirements 

All applications and updates are required to be deployed with the same central management tool. Detailed reporting for compliance audits are required to be available for all application and update deployments. 

Application Compatibility 

All current applications must be supported on Windows 7. 

You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP). 

Operating System Environment (OSE) Requirements 

. You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office. 

. You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers. 

Security 

All remote access must be logged and auditable. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger. 

Q6. Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. 

You plan to use Group Policy to ensure that application installation functions properly. 

You need to design the User Account Control (UAC) policy. 

Which setting should you select? To answer, select the appropriate setting in the work area. 

Answer:  

Q7. You are designing a Windows 7 virtual desktop infrastructure. You have the following requirements: 

. Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers. 

. Support network load balancing. Support reconnection to existing sessions on virtual desktops. 

. You need to specify a design that meets the requirements. 

What should you include in your design? 

A. Remote Desktop Gateway 

B. Windows Deployment Services 

C. Remote Desktop Connection Broker 

D. Windows Virtual PC and Windows XP Mode 

Answer:

Explanation: 

Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx 

Q8. You are designing an implementation of BitLocker. You create a GPO with BitLocker settings that conform to company requirements. 

You need to design an implementation strategy that supports the company requirements. 

What should you do? (Choose all that apply.) 

A. Link the GPO to the Munich-Computers OU. Use a security filter to apply the GPO to all Munich desktop computers. 

B. Block the Munich-Computers OU from inheriting policies. 

C. Link the GPO to the Madrid-Computers OU. Use a security filter to apply the GPO to all Madrid desktop computers. 

D. Link the GPO to the Munich-Users OU. 

E. Create and use a WMI filter that targets all portable computers with the GPO. Link the WMI filter to the GPO 

F. Link the GPO to the root of the AD DS domain. 

Answer: B,C,E,F 

Q9. You are planning the deployment of the CRM application to the New York office. 

You need to recommend a deployment method to maximize the performance of the application. 

What should you recommend? 

A. MED-V 

B. Unified Access Gateway 

C. Remote Desktop Connection Broker 

D. App-V 

Answer:

Q10. Your company is planning to deploy Windows 7 to all client computers. 

You have the following requirements: 

Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use. 

You need to select the appropriate method to detect application compatibility issues. 

What should you do? 

A. Use the Setup Analysis Tool in a virtual environment. 

B. Use the standalone Setup Analysis Tool. 

C. Use the Standard User Analyzer Wizard. 

D. Use the Standard User Analyzer tool. 

Answer:

Explanation: 

The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. 

http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx 

Q11. Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the domain and Group Policy object (GPO) is shown in the following diagram. 

You configure Group Policy preferences to define mapped drives in the Boston staff GPO. 

Users in the Boston organizational unit (OU) then report that the mapped drives are not available 

You need to identify and resolve Group Policy issues to ensure that the mapped drives are available. 

What should you do? 

A. Enable loopback processing in Replace mode. 

B. Enable loopback processing in Merge mode. 

C. Enable the computer configuration settings. 

D. Enable the user configuration settings. 

Answer:

Q12. You have an AD DS security group named Toronto Users and another named Toronto Computers. 

You are planning the deployment of a new browser by using Group Policy. 

You need to ensure that the computers in each office comply with company requirements. 

What should you recommend? (Choose all that apply.) 

A. Download the Internet Explorer 9 Administrative Kit. 

B. Deploy the Internet Explorer 9 Blocker to the Toronto Users group. 

C. Add all Toronto computers to the Toronto Computers security group. 

D. Deploy the Internet Explorer 9 Admin Kit to the Toronto Users group. 

E. Add all Toronto users to the Toronto Users security group. 

F. Download the Internet Explorer 9 Blocker Toolkit. 

G. Deploy the Internet Explorer 9 Admin Kit to the Toronto Computers group. 

H. Deploy the Internet Explorer 9 Blocker to the Toronto Computers group. 

Answer: C,F,H

Q13. HOTSPOT 

You are designing a Windows 7 deployment image. 

You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK). 

You need to add the MAK to the configuration pass by using an answer file. 

To which configuration pass should you add the MAK? 

Answer:  

Q14. When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message. 

You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC. 

To which group should you add the user? 

A. Add the user to the Power Users group on Server1. 

B. Add the user to the Remote Desktop Users group on Server1. 

C. Add the user to the domain Windows Authorization Access group. 

D. Add the user to the domain Remote Desktop Users group 

Answer:

Q15. Your company includes mobile computer users who frequently work offline. 

You are planning to deploy Windows 7 by using an image. 

You have the following requirements: 

. Provide access to all applications when mobile computer users first start their 

computers. 

. Minimize network and local storage requirements. 

. Provide language-pack support based on the geographic location of the user. 

You need to ensure that your image-creation strategy meets the requirements. 

What should you do? 

A. Create a single thin image for all computers. 

B. Create one thin image for the mobile computers. Create one thick image for all other computers. 

C. Create one thick image for the mobile computers. Create one thin image for all other computers. 

D. Create a single hybrid image for all computers. 

Answer:

Explanation: 

MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows. 7 By Ian McLean, Orin Thomas http://books.google.com.my/books?id=lpNuBdGgFncC&pg=PT310&lpg=PT310&dq=thin+i mage+thick+image+languagepack&source=bl&ots=mU6XADkqKY&sig=C_BBoYQjkIHwwo 7B9P2MlXM4TOU&hl=en&sa=X&ei=QE-KTDvC4fJrAfs7JGyCw&ved=0CB8Q6AEwAA#v=onepage&q=thin%20image%20thick%20i mage%20languagepack&f=false 

untitled 

START 70-686 EXAM