[Free] 2018(May) EnsurePass Examcollection Microsoft 70-688 Dumps with VCE and PDF 101-110

By | April 30, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-688
100% Free Download! 100% Pass Guaranteed!

Managing and Maintaining Windows 8.1

Question No: 101

You administer Windows 8.1 Enterprise laptops that are members of an Active Directory Domain Services (AD DS) domain.

You want to be able to assist users remotely from the computer at the help desk.

You need to enable the help desk computer to connect to users#39; laptops while the users are logged in.

Which feature should you use?

  1. DirectAccess

  2. Remote Assistance

  3. Windows Remote Management (WinRM)

  4. Remote Desktop

Answer: B

Explanation: Sometimes the best way to fix a problem is to have someone show you how. Windows Remote Assistance is a convenient way for someone you trust, such as a friend or technical support person, to connect to your computer and walk you through a solution-even if that person isn#39;t nearby.

Reference: What is Windows Remote Assistance?

Question No: 102

Your network contains a web server named testweb.contoso.com that is used for testing. You have a Windows 8.1 Pro laptop.

After a network administrator changes the IP address of the web server, you discover that you can no longer connect to testweb.contoso.com.

You need to resolve immediately the issue that prevents you from connecting to the server. Which command line tool should you run?

  1. Clear-DnsClientCache

  2. Set-DnsClientGlobalSetting

  3. Set-DnsClient

  4. Nbtstat

Answer: C

Explanation: Set-DnsClient – Sets the interface specific DNS client configurations on the computer.



http://technet.microsoft.com/en-us/library/jj590773.aspx http://technet.microsoft.com/en-us/library/jj590767.aspx

http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en- us/nbtstat.mspx?mfr=true

Question No: 103

You support computers that run Windows 8 Enterprise.

Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline.

You need to ensure that the App-V applications are available to users only when they are connected to the company network.

What should you do?

  1. Configure mandatory profiles for laptop users.

  2. Reset the App-V client FileSystem cache.

  3. Disable the Disconnected operation mode.

  4. Change user permissions to the App-V applications.

Answer: C

Explanation: Disconnected Operation Mode


http://technet.microsoft.com/en-us/library/cc843712.aspx Explanation:

The disconnected operation mode settings-accessible by right-clicking the Application Virtualization node, selecting Properties , and clicking the Connectivity tab-enables the Application Virtualization Desktop Client or Client for Remote Desktop Services (formerly Terminal Services) to run applications that are stored in the file system cache of the client when the client is unable to connect to the Application Virtualization Management Server.

Question No: 104

You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1 has a Trusted Platform Module (TPM) chip installed and the operating system volume is encrypted by using BitLocker Drive Encryption (BitLocker).

You plan to upgrade the BIOS of Computer1.

You need to recommend a solution that meets the following requirements:

->Ensures that the drive remains encrypted

->Avoids the need to perform a BitLocker recovery

->Ensures that Windows can start after the BIOS is upgraded

->Minimizes the time required to complete the BIOS upgrade What should you include in the recommendation?

  1. From the command prompt, run manage-bde and specify the -protectors parameter and the -disable parameter.

  2. From the command prompt, run manage-bde and specify the -protectors parameter and the -delete parameter.

  3. From the Trusted Platform Module (TPM) Management console, click Turn TPM Off from the Actions menu.

  4. From the command prompt, run tpmvscmgr.exe and specify the destroy parameter.

Answer: A

Explanation: * For mass BIOS updates, create a script that disables BitLocker, installs the update, reboots the system and then re-enables BitLocker.

Manage-bde -autounlock {-enable | -disable | -ClearAllKeys} Volume [-ComputerName Name] disable Disables automatic unlocking for a data drive.

The Disable-BitLocker cmdlet disables BitLocker Drive Encryption for a BitLocker volume. When you run this cmdlet, it removes all key protectors and begins decrypting the content of the volume.

http://technet.microsoft.com/en-us/library/ff829849.aspx http://technet.microsoft.com/en-us/Library/dn593707.aspx http://technet.microsoft.com/en-us/library/ff829848.aspx http://support.microsoft.com/kb/2855131

Question No: 105

Your company has a main office that has a connection to the Internet.

The company has 100 Windows 8.1 Pro client computers that run Microsoft Office 2010.

You purchase a subscription to Office 365 for each user. You download the Office Deployment Tool for Click-to-Run,

You need to deploy Office 365 ProPlus to the computers. The solution must minimize the amount of traffic over the Internet connection.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. On a file server, run setup.exe and specify the /download parameter.

  2. On each client computer, run setup.exe and specify the /configure parameter.

  3. On a file server, run setup.exe and specify the /configure parameter.

  4. On each client computer, run setup.exe and specify the /download parameter,

Answer: C,D

Explanation: http://technet.microsoft.com/en- us/windows/jj219423(v=office.14).aspx

Question No: 106

You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain.

Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume.

You need to provide a BitLocker recovery key to unlock the protected volume.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Ask the user to run the manage-bde -protectors -disable e: command.

  2. Ask the user for a recovery key ID for the protected drive.

  3. Ask the user for his or her logon name.

  4. Ask the user for his or her computer name.

Answer: B,D

Explanation: BitLocker Drive Encryption Operations Guide: Recovering Encrypted Volumes with AD DS

Record the name of the user#39;s computer

You can use the name of the user#39;s computer to locate the recovery password in AD DS. If the user does not know the name of the computer, ask the user to read the first word of the Drive Label in the BitLocker Drive Encryption Password Entry user interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.

Verify the user#39;s identity

You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. Another option is to verify that the computer with the name the user provided belongs to the user.


http://technet.microsoft.com/en-us/library/cc771778(v=ws.10).aspx http://support.microsoft.com/kb/2855131

Question No: 107 HOTSPOT

Your company has several Windows RT 8.1 devices. The devices connect to Exchange Online in Microsoft Office 365 and to Windows Intune for device management.

The security policies of Office 365 and Windows Intune are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You need to identify the effective settings on the Windows RT devices.

What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.)

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Question No: 108 HOTSPOT

You support desktop computers that run Windows 8 Enterprise. One computer is a member of a workgroup and is used as a guest computer in a reception area.

You need to configure the SmartScreen setting to require administrator approval before running downloaded unknown software on the desktop computer.

Which policy setting should you use? (To answer, select the appropriate object in the answer area.)

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Question No: 109

A user reports that multiple stop errors are occurring on his Windows 8.1 laptop. The user has installed no new software since he received the laptop.

You need to find out when the problem started and which events preceded it.

Which tool should you use?

  1. Task Manager.

  2. Device Manager.

  3. Performance Monitor

  4. Reliability Monitor.

Answer: D

Question No: 110

Your network contains an Active Directory domain. All client computers run Windows 8.1 Enterprise.

Microsoft System Center 2012 Endpoint Protection is deployed to all of the computers by using the default settings contained in the Default Antimalware Policy.

The users in the research department report that a folder named C:\TestApp must not be scanned by the Endpoint Protection client.

You need to configure the Endpoint Protection client not to scan the C:\TestApp folder for the computers in the research department only.

What should you do first?

  1. In the Default Antimalware Policy, modify the Exclusion settings.

  2. Create a new antimalware policy and modify the Threat overrides settings.

  3. Create a new antimalware policy and modify the Exclusion settings.

  4. In the Endpoint Protection client, modify the Excluded files and locations setting for each research department computer.

Answer: C

Explanation: Once enabled, Endpoint Protection client settings are controlled centrally through Antimalware Policies and Windows Firewall Policies. You can create antimalware policies on a per-collection basis and configure them with the following settings:

  • Exclusion settings. Use these settings to exclude files, folders, file types and processes from scanning.

  • Etc.

    Reference: Using System Center Endpoint Protection https://technet.microsoft.com/en-us/security/jj900682.aspx

    100% Ensurepass Free Download!
    Download Free Demo:70-688 Demo PDF
    100% Ensurepass Free Guaranteed!
    70-688 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.