70-686 Premium Bundle

70-686 Premium Bundle

Pro: Windows Certification Exam

4.5 
(23895 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-686 Free Practice Questions

Q1. Your company has 1,000 client computers that run Windows 7 Enterprise. 

You need to ensure that users cannot bypass or disable Internet Explorer logging. 

What should you do? 

A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state to Enabled. 

B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state to Enabled. 

C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state to Enabled. 

D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state to Enabled. 

Answer:

Explanation: 

InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, form data, cookies, and usernames and passwords from being retained by the browser, leaving no easily accessible evidence of browsing or search history. 

http://en.wikipedia.org/wiki/Internet_Explorer_8 

hints: 

run IE InPrivate Browsing will not keep any history or logging. 

General Page able to clear IE history 

untitled 

Q2. Your company uses Windows Update to download and install security updates on client computers. 

When Microsoft releases a security update, you have the following requirements: 

Establish which client computers require the security update. 

Identify what changes will occur as a result of the security update. 

Identify which applications might be affected by the security update. 

You need to select the appropriate tool to detect application-compatibility issues. 

What should you do? 

A. Use the Inventory Collector 

B. Use the Setup Analysis Tool 

C. Use the Update Compatibility Evaluator. 

D. Use the Windows Compatibility Evaluator 

Answer:

Explanation: 

The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows. update, and looks for potential conflicts due to changes in the registry, application files, or application file properties. 

You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager. 

http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx 

Q3. Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you do? 

A. Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD). 

B. Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu. 

C. Use Bootcfg to modify the boot parameters. 

D. Use BCDboot to modify the system partition. 

Answer:

Explanation: 

BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder. http://technet.microsoft.com/library/cc731662.aspx 

Q4. You are planning the deployment of a new engineering application in the Chicago office. You need to meet company requirements for application deployment. What should you recommend? 

A. MED-V 

B. App-V 

C. Remote Desktop Session Host 

D. Remote Desktop RemoteApp 

Answer:

Q5. You are planning to upgrade Internet Explorer. 

You have the following requirements: 

. Create a report that identifies which computers are successfully upgraded. 

. Do not install additional software on the client computers. 

You need to design a deployment method that meets the requirements. 

What should you do? 

A. Use Windows Server Update Services (WSUS). 

B. Use Internet Explorer Administration Kit (IEAK) and Group Policy. 

C. Use Microsoft System Center Configuration Manager. 

D. Use Microsoft System Center Essentials. 

Answer:

Explanation: 

Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update. 

http://en.wikipedia.org/wiki/Windows_Server_Update_Services 

Q6. Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed. You create a Windows 7 image. 

You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. 

You need to design a deployment strategy that will install an image on unknown client computers only if administrative approval is granted. 

What should you do? 

A. Create a multicast transmission for the Windows 7 image. 

B. Use an Auto-Add policy on the WDS server. 

C. Create a unicast transmission for the Windows 7 image. 

D. Use DHCP rogue detection on the WDS server. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc731409(v=ws.10).aspx#BKMK_2 

untitled 

Q7. HOTSPOT 

You are creating a Windows 7 image. 

You need to prevent users from sharing their desktop sessions with remote users. You also 

need to allow administrators who are using Windows XP to administer the Windows 7 image remotely. 

Which settings should you configure? To answer, select the appropriate setting or settings in the work area. 

Answer:  

Q8. You are planning a Windows 7 deployment infrastructure for a new company. 

You have the following requirements: 

Three domains 

10,000 client computers 

No user interaction 

You need to recommend a deployment infrastructure. 

What should you recommend? 

A. Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation. 

B. Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation. 

C. Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation. 

D. Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation. 

Answer:

Explanation: 

Hints: 

no user interaction = zero touch 

Topic 2, Scenario A 

Background 

You are the desktop architect for a company with 14,000 client computers. Some client computers are portable computers and some are desktop computers. All client computers currently run Windows XP. You are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madrid offices are used by sales employees. Sales employees report to the office only once per quarter. Your company has users in offices as shown in the following table. 

The address for the SharePoint site is https://intranet.company.com. 

Each location has gigabit network connections to the desktop except Madrid, which has 100 megabit connections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multiple VLANs. 

You use Group Policy objects (GPOs) to manage various settings. The following figure displays the Organizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain. 

Each office has two connections, a data center WAN link and an Internet connection. Each office connects to a central data center facility with connection speeds as shown in the following table. 

You currently use one of each client computer model to create and maintain a disk image for each model. The models supported by your company are listed in the following table. 

You currently use a third-party disk imaging application to capture and deploy new Windows XP computers. Desktop administrators use optical media to deploy the image to new or repurposed client computers. The current Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB of Windows XP files. 

Business Requirements 

The deployment of Windows 7 must meet the following business requirements: 

Deployment requirements: 

The deployment must maximize the use of existing client computers. The deployment must 

reduce the amount of time spent updating client computers after deployment. 

Technical Requirements 

The application must meet the following technical requirements: 

Infrastructure requirements: 

The amount of disk space required to store deployment images must be reduced. The number of images that need to be copied across WAN links must be reduced. You are based in the Los Angeles office and use the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles. 

Application compatibility: 

-All current applications must be supported on Windows 7. 

-All offices are moving to a new finance application in the next six months. The new finance application installs and runs correctly on Windows 7. 

Migration requirements: 

-The deployment cannot require users to store their files on a network or external drive for the migration. Only system administrators can be allowed to install applications. User data must be migrated during upgrades to Windows 7. There is a small budget for hardware upgrades when required. 

Image maintenance: 

-You need to minimize the re-arm passes. 

Security 

-Each location has a security group made up of the desktop computer objects in that location. 

-Users must not be able to change their web browser or client computer security settings. 

-Your requirements are as follows: 

 A startup PIN and TPM are required for all BitLocker users. 

 Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes any other requirement. 

 All laptops within the company must have BitLocker enabled. 

 All Madrid desktops must have BitLocker enabled. 

 No other desktops besides Madrid should have Bitlocker enabled. 

-Computers in office lobbies are not permitted to join the domain. 

-You need to block the use of ActiveX controls for all external websites. 

Q9. Your company has client computers that run Windows XP Professional. 

You are planning to install Windows 7 Enterprise on the existing client computers. 

You have the following requirements: 

. Migrate user data and operating system components. 

. Encrypt and password-protect the migration store. 

You need to design a user state migration strategy that supports the requirements. 

What should you do? 

A. Use a hard-link migration store. 

B. Perform an offline migration by using Windows.old. 

C. Use a compressed migration store. 

D. Perform an offline migration by using Windows PE. 

Answer:

Explanation: 

Compressed migration The compressed migration store is a single image file that contains all files being migrated and a catalog file. This image file is often encrypted and protected with a password, and cannot be navigated with Windows Explorer. http://technet.microsoft.com/en-us/library/dd560795(v=ws.10).aspx 

Q10. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS. 

You deploy the Key Management Service (KMS) on a Windows 7 computer. 

You need to ensure that Windows 7 client computers can locate the KMS host and perform activation. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers. 

B. Deploy a Windows Server 2008 KMS host. 

C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record. 

D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone. 

Answer: A,C 

Explanation: 

http://technet.microsoft.com/en-us/library/ee939272.aspx 

The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days. 

Listening on Port: 

Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host. 

Q11. A server runs Windows Server 2008 P2 with Remote Desktop Services (RDS). 

You add an application to Remote Desktop RemoteApp. 

You need to ensure that the application can be published by using Group Policy. 

Which setting should you select? To answer, select the appropriate setting or settings in 

the work area. 

Answer:  

Q12. Your network contains an Active Directory domain. 

You plan to deploy Windows 7 by using zero-touch installation. 

You need to test the zero-touch installation on a computer named computer1. 

You create a computer account for Computer1. 

What should you do next? 

A. Create a computer collection that contains the computer account for computer1. 

B. Create a distribution group that contains the computer account for computer1. 

C. Create a child domain and move the computer account for computer1 to the child domain. 

D. Create a security group that contains the computer account for computer1. 

Answer:

Explanation: 

Original answer is B but some ppl believe is A. so i put it as A 

CheddaBob from United States - Apr 18 2012, 8:40 PM Report Spam 

@looller 

Answer is A. I took the test late December. I used a different dump that had the correct answer. 

looller from United States - Apr 17 2012, 9:42 PM Report Spam 

I think the answer is "A" here? anyone agree? answer given is B 

Q13. You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on individual client computers. 

. The company wants to maintain a standard Internet Explorer configuration on all client computers. 

. You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers. 

What should you do? 

A. Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box. 

B. Use the Group Policy Update utility to refresh Group Policy. 

C. Enable Internet Explorer Maintenance Policy Processing in Group Policy. 

D. Enable User Group Policy loopback processing mode. 

Answer:

Explanation: 

nternet Explorer Maintenance policy processing 

This policy affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer Maintenance. It overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed. 

If you enable this policy, you can use the check boxes provided to change the options. Allow processing across a slow network connection updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays. 

Do not apply during periodic background processing prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data. 

Process even if the Group Policy objects have not changed updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. 

However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it. 

http://technet.microsoft.com/en-us/library/cc978526.aspx 

Q14. You use a computer named Client02 to manage the BitLocker configuration on a remote computer named Client01. 

A new company policy states that when BitLocker is used, you must be able to access the data in case of a system failure. 

You need to comply with the company policy. 

Using manage-bde, how should you achieve this goal? (To answer, drag the appropriate parameter from the list of options to the correct location or locations in the work area.) 

Answer:  

Q15. You need to prevent users from accessing USB flash drives on portable computers. 

What should you do? (Choose all that apply.) 

A. Create a security group in AD DS and place all user objects for users with portable computers in the group. 

B. Create a security group in AD DS and place all portable computer objects in the group. 

C. Create a GPO that blocks the use of specific GUIDs used by USB flash drives and link it to the root of the domain. 

D. Create a WMI filter that applies only to Model A and B computers and link it to a GPO. 

E. Create an AppLocker policy that applies to the AD DS computer group you created. 

F. Create an AppLocker policy that applies to the AD DS user group you created. 

Answer: C,D 

START 70-686 EXAM