How to pass Microsoft 70-686 Real Exam in 24 Hours [sample question 1-16]

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-686 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-686-dumps.html


70-686 Product Description:
Exam Number/Code: 70-686 vce
Exam name: Pro: Windows
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-686 Pro: Windows

70-686 examcollection

70-686 test questions

Question No. 1

HOTSPOT 

A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. Windows 7 is installed on all client computers. 

Users discover that they cannot delete files that they have created and placed in their local folders. 

You need to enable users to modify file permissions. 

Which setting should you configure? To answer, select the appropriate setting or settings in the work area, 


Answer: 



Question No. 2

You need to ensure that the company's remote computers receive Windows updates at the same time as the internal computers. 

What should you do? 

A. Implement System Center Operations Manager (OpsMgr) 

B. Install the Windows Deployment Services (WDS) role. 

C. Install BranchCache in distnbuted mode. 

D. Deploy DtrectAccess. 

Answer:


Question No. 3

Your company includes mobile computer users who frequently work offline. 

You are planning to deploy Windows 7 by using an image. 

You have the following requirements: 

. Provide access to all applications when mobile computer users first start their 

computers. 

. Minimize network and local storage requirements. 

. Provide language-pack support based on the geographic location of the user. 

You need to ensure that your image-creation strategy meets the requirements. 

What should you do? 

A. Create a single thin image for all computers. 

B. Create one thin image for the mobile computers. Create one thick image for all other computers. 

C. Create one thick image for the mobile computers. Create one thin image for all other computers. 

D. Create a single hybrid image for all computers. 

Answer:

Explanation: 

MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows. 7 By Ian McLean, Orin Thomas http://books.google.com.my/books?id=lpNuBdGgFncC&pg=PT310&lpg=PT310&dq=thin+i mage+thick+image+languagepack&source=bl&ots=mU6XADkqKY&sig=C_BBoYQjkIHwwo 7B9P2MlXM4TOU&hl=en&sa=X&ei=QE-KTDvC4fJrAfs7JGyCw&ved=0CB8Q6AEwAA#v=onepage&q=thin%20image%20thick%20i mage%20languagepack&f=false 


untitled 


Question No. 4

HOTSPOT 

All portable computers on a company's wireless network run windows 7 Enterprise. 

You need to ensure that users can connect only to the predefined SSID shown in the work area. 

Which Group Policy object (GPO) settings should you select? To answer, select the appropriate setting or settings in the work area. 


Answer: 



Question No. 5

You deploy Windows 7 Enterprise in a VDI pool resource group. 

You need to ensure that the visualization strategy meets the company's OSE requirements. 

Which GPO setting should you recommend? 

A. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. 

B. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. 

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications. 

D. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings. 

Answer:


Question No. 6

Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7. 

You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. 

Which tool should you use? 

A. Windows Compatibility Evaluator 

B. Setup Analysis Tool 

C. Inventory Collector 

D. Update Compatibility Evaluator 

Answer:

Explanation: 

http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx 

The Setup Analysis Tool (SAT) automates the running of application installations while monitoring the actions taken by each application’s installer. The standalone version of SAT can monitor any MSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-based installers and third-party installers that run unattended. 

hints: 

You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. 


Question No. 7

Your company plans to deploy Windows 7 Enterprise. 

The current client computers run either Windows XP Professional or Windows Vista 

Enterprise. 

The company uses 20 custom applications that were written for Windows XP. 

You need to create a log of compatibility issues for the custom applications. 

What should you do? 

A. Install each application on a Windows XP client computer, and then run the Application Compatibility Toolkit (ACT). 

B. Install each application on a Windows 7 client computer, and then run the Application Compatibility Toolkit (ACT). 

C. Install each application on a Windows XP client computer. Sequence each application by using Microsoft Application Virtualization (App-V). 

D. Install each application on a Windows Vista client computer. Sequence each application by using Microsoft Application Virtualization (App-V). 

Answer:


Question No. 8

You are the desktop architect for an enterprise organization with client computers that run Windows 7. 

You need to create a new Windows Firewall rule that will allow you to access the Disk Management snap-in of remote client computers. 

Which predefined rule should you select? To answer, select the appropriate setting in the work area. 


Answer: 



70-686 free exam questions

Question No. 9

Your network is configured as shown in the following diagram. 


You are planning to deploy Windows 7. 

You have the following requirements: 

. Use BitLocker on all computers in the isolated network. 

. Provide DirectAccess on all portable computers. 

. Use the Key Management Service (KMS) to activate all client computers. 

You need to plan a client computer licensing strategy that meets the requirements. 

What should you do? 

A. License 500 copies of Windows 7 Ultimate. 

B. License 500 copies of Windows 7 Enterprise. 

C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses. 

D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate. 

Answer:

Explanation: 

hints: 

Direct Access only available for Ultimate and Enterprise only. 

Company should use Enterprise version 


Question No. 10

You need to prevent users from accessing USB flash drives on portable computers. 

What should you do? (Choose all that apply.) 

A. Create a security group in AD DS and place all user objects for users with portable computers in the group. 

B. Create a security group in AD DS and place all portable computer objects in the group. 

C. Create a GPO that blocks the use of specific GUIDs used by USB flash drives and link it to the root of the domain. 

D. Create a WMI filter that applies only to Model A and B computers and link it to a GPO. 

E. Create an AppLocker policy that applies to the AD DS computer group you created. 

F. Create an AppLocker policy that applies to the AD DS user group you created. 

Answer: C,D 


Question No. 11

Users with newly deployed Windows 7 computers see a security prompt when they attempt to upload documents to the company's intranet site. 

You need to suppress the prompt without creating a security risk for the company. 

What should you do? (Choose all that apply). 

A. Modify the GPO to set https://intranet.company.com with a value of 1 in the Site to Zone Assignment List. 

B. Modify the default Windows 7 image to add the Internet Explorer Enhanced Security Configuration component. 

C. Modify the default Windows 7 image to change the default Internet Explorer security level to Medium Low. 

D. Modify the default Windows 7 image to disable the Internet Explorer Automatically Detect Intranet Network setting. 

E. Create a GPO and link it to the root of the domain. 

F. Modify the GPO to set the web server's NEtBIOS name with a value of 2 in the Site to Zone Assignment List. 

Answer: A,F 


Question No. 12

You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers. 

Your company decides to deploy all custom settings by using Group Policy. 

You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Use the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deployment image. 

B. Update the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers. 

C. Update the Internet Explorer Manage Add-ons settings for all computers. 

D. Use the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image. 

Answer: A,D 

Explanation: 

Reset Internet Explorer settings Deletes all temporary files, disables browser add-ons, and resets all the changed settings to factory settings. It can be used if the browser is in an unusable state. 

http://en.wikipedia.org/wiki/Internet_Explorer_7 


Question No. 13

Your network contains an Active Directory domain. 

You plan to deploy Windows 7 by using zero-touch installation. 

You need to test the zero-touch installation on a computer named computer1. 

You create a computer account for Computer1. 

What should you do next? 

A. Create a computer collection that contains the computer account for computer1. 

B. Create a distribution group that contains the computer account for computer1. 

C. Create a child domain and move the computer account for computer1 to the child domain. 

D. Create a security group that contains the computer account for computer1. 

Answer:

Explanation: 

Original answer is B but some ppl believe is A. so i put it as A 

CheddaBob from United States - Apr 18 2012, 8:40 PM Report Spam 

@looller 

Answer is A. I took the test late December. I used a different dump that had the correct answer. 

looller from United States - Apr 17 2012, 9:42 PM Report Spam 

I think the answer is "A" here? anyone agree? answer given is B 


Question No. 14

Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with auto enrollment. 

When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. 

You need to ensure that Internet Explorer does not display the error message. What should you do? 

A. Install the Web applications certificate into the computer store on each client computer. 

B. Purchase a commercial certificate and install it on the internal CA. 

C. Issue a certificate from the internal CA and install it on the application server. 

D. Install the Web applications certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer. 

Answer:


Question No. 15

HOTSPOT 

A company has a server that runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment. The domain controllers were recently upgraded from Windows Server 2003. You are using Group Policy to deploy applications to the client computers remotely. The computers reboot each night as part of routine maintenance. 

You need to ensure that the application installs when the computer starts up. 

Which Group Policy setting should you configure? To answer, select the appropriate setting or settings in the work area. 


Answer: 



Question No. 16

Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copy data from their computers to removable drives. You need to ensure that data that is copied to removable drives is protected. What should you do? 

A. Use Encrypting File System (EFS) 

B. Enable Trusted Platform Module (TPM) hardware on all client computers 

C. Use Active Directory Rights Management Services 

D. Configure a Group Policy to enforce the use of BitLocker To Go 

Answer:

Explanation: 

BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restricted with a passphrase. In addition to having control over passphrase length and complexity, IT administrators can set a policy that requires users to apply BitLocker protection to removable drives before being able to write to them. 

http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-7/features.aspx#bitlocker