70-686 Premium Bundle

70-686 Premium Bundle

Pro: Windows Certification Exam

4.5 
(4170 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-686 Free Practice Questions

Q1. You upgrade all of a companys client computers from Microsoft Internet Explorer 8 to Internet Explorer 9. 

After the upgrade, users are unable to download attachments from Microsoft Outlook Web App (OWA) or any other secure website. You verify the Group Policy settings for Internet Explorer 9. 

You need to ensure that all users can download attachments from OWA and other secure websites. 

Which setting should you select? To answer, select the appropriate item in the work area. 

Answer:  

Q2. Your company uses Windows Update to download and install security updates on client computers. 

When Microsoft releases a security update, you have the following requirements: 

Establish which client computers require the security update. 

Identify what changes will occur as a result of the security update. 

Identify which applications might be affected by the security update. 

You need to select the appropriate tool to detect application-compatibility issues. 

What should you do? 

A. Use the Inventory Collector 

B. Use the Setup Analysis Tool 

C. Use the Update Compatibility Evaluator. 

D. Use the Windows Compatibility Evaluator 

Answer:

Explanation: 

The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows. update, and looks for potential conflicts due to changes in the registry, application files, or application file properties. 

You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager. 

http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx 

Q3. Your network is configured as shown in the following diagram. 

You are planning to deploy Windows 7. 

You have the following requirements: 

. Use BitLocker on all computers in the isolated network. 

. Provide DirectAccess on all portable computers. 

. Use the Key Management Service (KMS) to activate all client computers. 

You need to plan a client computer licensing strategy that meets the requirements. 

What should you do? 

A. License 500 copies of Windows 7 Ultimate. 

B. License 500 copies of Windows 7 Enterprise. 

C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses. 

D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate. 

Answer:

Explanation: 

hints: 

Direct Access only available for Ultimate and Enterprise only. 

Company should use Enterprise version 

Q4. DRAG DROP 

You are planning to deploy Windows 7 Enterprise to all of your company's client computers. 

You have the following requirements: 

. Create two custom partitions on each client computer's hard disk, one for the operating system and the other for data. 

. Automatically create the partitions during Windows Setup. 

You need to design an image that meets the requirements. 

Which two actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order) 

Answer:  

Q5. You need to ensure that the company's remote computers receive Windows updates at the same time as the internal computers. 

What should you do? 

A. Implement System Center Operations Manager (OpsMgr) 

B. Install the Windows Deployment Services (WDS) role. 

C. Install BranchCache in distnbuted mode. 

D. Deploy DtrectAccess. 

Answer:

Q6. You are planning a zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network. 

Each client computer has three available boot methods: 

boot from the network by using PXE 

boot from USB media 

boot from the local hard disk 

You have the following requirements: 

Set the boot method for a zero-touch deployment. 

Ensure that client computers that fail on deployment can be manually configured. 

You need to design a zero-touch deployment strategy that supports the requirements. 

What should you do? 

A. Remove USB media and local hard disk from the available boot methods 

B. Remove USB media and network from the available boot methods 

C. Set network as the first boot method, USB media as the second boot method, and local hard disk as the third boot method 

D. Set USB media as the first boot method and local hard disk as the second boot method. Remove network from the available boot methods 

Answer:

Explanation: 

hints: zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network so, set network as 1st boot. 

Q7. You are designing a Windows 7 Enterprise image creation strategy. 

The strategy must meet the following requirements: 

Support 32-bit and 64-bit hardware. 

Support 64-bit applications. 

Minimize the total number of images. 

Reduce the bandwidth required to deploy an image. 

Use System Center Configuration Manager (ConfigMgr) for application deployment. 

You need to recommend the images that meet the requirements. 

Which images should you recommend? (Choose all that apply.) 

A. a thin image for the 32-bit version of Windows 7 

B. a thick image for the 32-bit version of Windows 7 

C. a thick image for the 64-bit version of Windows 7 

D. a thin image for the 64-bit version of Windows 7 

Answer: A,D 

Q8. You create and test a Windows 7 image that supports all existing client computer hardware in the company. User settings must be preserved during migrations to Windows 7. You need to deploy the new image to all office locations by using the Zero Touch Installation methodology. What should you recommend? (Choose all that apply.) 

A. Enable a DHCP helper address on the routers for each remote office. 

B. Enable network boot functionality on all client computers at the remote locations. 

C. Deploy and configure Microsoft System Center Configuration Manager (ConfigMgr). 

D. Deploy and configure Microsoft System Center Operations Manager (OppMgr). 

E. Create a task sequence that enables local administrators to select their local office. 

F. Create a User State Migration Tool configuration file and include it in the deployment. 

Answer: B,C,F 

Q9. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.) 

A. Create a collection with the required computers and assign the software to the collection. 

B. Create a software installation Group Policy object (GPO). 

C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain. 

D. Create a software deployment package by using System Center Configuration Manager 2007. 

E. Create an unattend.xml file. 

F. Create a silent install MSI file. 

Answer: A,D,F 

Explanation: 

hints: without user interaction = silent install MSI file 

Q10. Your network contains 5 servers that have the Remote Desktop Session Host role service installed. The servers host a Remote Desktop RemoteApp named App1. 

You need to recommend a solution for App1 that meets the following requirements: 

. Must ensure that users can connect to any Remote Desktop Session Host server 

. Must ensure that users are automatically reconnected to disconnected sessions 

What should you include in the recommendations? 

A. Windows Virtual PC and Windows XP Mode 

B. Remote Desktop Web Access 

C. Remote Desktop Gateway 

D. Windows Deployment Services 

E. Remote Desktop Connection Broker 

Answer:

Explanation: 

Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx 

Q11. You are deploying Windows 7 Enterprise and Microsoft Office to client computers. 

The deployment must meet the following requirements: 

Deploy Windows 7 Enterprise to all client computers. 

Deploy Office 2007 Professional to client computers in the Munich office. 

Deploy Office 2010 Professional to client computers in the Madrid office. 

Automate the deployment to minimize administrative effort. 

You need to recommend a deployment solution that meets the requirements. 

What should you recommend? 

A. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the account used for deployment. 

B. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a Group Policy object based on the user who is logged in. 

C. Create a Windows 7 Enterprise Edition image with Office 2007 installed. Create a second Windows 7 Enterprise Edition image with Office 2010 installed. 

D. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using a task sequence that checks for the Organizational Unit of the client computer. 

Answer:

Explanation: 

AppLocker (a set of Group Policy settings that evolved from Software Restriction Policies, to restrict which applications can run on a corporate network, including the ability to restrict based on the application's version number or publisher) http://en.wikipedia.org/wiki/Features_new_to_Windows_7 

Q12. A company network includes Windows 7 client computers and DirectAccess. 

When using DirectAccess, users cannot connect to the companys internal resources. 

You need to create a batch file that users can execute to trace all network traffic for 

DirectAccess from their home computers. 

Which command should you use? To answer, drag the appropriate terms from the list of 

terms to the correct location or locations in the work area. 

Answer:  

Q13. You upgrade all of an organization's client computers to Windows 7. 

After the upgrade, a specific legacy application does not function correctly. 

You need to generate a list of all the computers that have the legacy application installed. 

Which two actions should you perform? (To answer, move the appropriate action from the 

list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q14. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS. 

You deploy the Key Management Service (KMS) on a Windows 7 computer. 

You need to ensure that Windows 7 client computers can locate the KMS host and perform activation. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers. 

B. Deploy a Windows Server 2008 KMS host. 

C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record. 

D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone. 

Answer: A,C 

Explanation: 

http://technet.microsoft.com/en-us/library/ee939272.aspx 

The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days. 

Listening on Port: 

Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between your KMS clients and the KMS host. 

Q15. Your company has 1,000 client computers. 

You are planning to deploy Windows 7 and a new line-of-business application. 

You have the following requirements: 

Install the application as part of the standard Windows 7 deployment. 

Use a single Windows 7 image for the deployment. 

The application must be available for use on client computers that are not 

connected to the network. 

You need to ensure that the application is installed on all new client computers. 

What should you do? 

A. Deploy the application by using Windows Server Update Services (WSUS). 

B. Publish the application by using Group Policy Software Installation. 

C. Service an offline image of Windows 7 to add the new application. 

D. Service an online image of Windows 7 to add the new application. 

Answer:

Explanation: 

Hints: 

Client computer that are not connected to the network = A & B is wrong the question refer 

to application installation. You can not do it offline servicing. Only online will be able to 

achieve it. 

START 70-686 EXAM