The Latest Guide To 70-688 item pool Jun 2017

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-688 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/70-688-dumps.html


70-688 Product Description:
Exam Number/Code: 70-688 vce
Exam name: Managing and Maintaining Windows 8
n questions with full explanations
Certification: Microsoft Certification
Last updated on Global synchronizing

Instant Access to Free VCE Files: Microsoft 70-688 Managing and Maintaining Windows 8

70-688 examcollection

Pass4sure offers free demo for 70-688 exam. "Managing and Maintaining Windows 8", also known as 70-688 exam, is a Microsoft Certification. This set of posts, Passing the Microsoft 70-688 exam, will help you answer those questions. The 70-688 Questions & Answers covers all the knowledge points of the real exam. 100% real Microsoft 70-688 exams and revised by experts!

Q51. You administer laptop and desktop computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. 

You plan to install Intune Endpoint Protection on all computers. Some of the computers also have another antimalware application installed. 

You need to ensure that only the Intune Endpoint Protection application is running on all computers. 

What should you do? 

A. Configure the Enable Realtime Protection policy to Yes. 

B. Configure the Enable Endpoint Protection policy to Only on computers that are unprotected when Endpoint Protection is installed. 

C. Configure the Enable Endpoint Protection policy setting to Yes. 

D. Configure the Enable Endpoint Protection policy setting to No. 

Answer:


Q52. DRAG DROP 

You support a computer that runs Windows 8 Enterprise. 

You want to create a dual-boot configuration by using the native boot virtual hard disk 

(VHD) method. 

You need to create an alternate Windows 8 installation. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q53. DRAG DROP 

You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. 

Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication. 

You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible. 

Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer: 


Q54. HOTSPOT  

Your network contains an Active Directory domain. DirectAccess was deployed recently. 

You have a Windows 8.1 Enterprise client computer named LON-CL1. 

You need to ensure that LON-CL1 can establish connections to the network by using 

DirectAccess. 

What should you configure? (To answer, select the appropriate item in the answer area.) 

Answer: 


Q55. HOTSPOT  

You have a computer that runs Windows 8 Enterprise. 

You need to ensure that all users can see the history of detected items in Windows Defender. 

Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.) 

Answer: 


Q56. HOTSPOT  

You have computers that run Windows 8 Pro and are configured as a workgroup. Each computer is scheduled to run a Windows Defender full scan every morning at 07:00. 

Users report that they are unable to view previous instances of detected malware when they arrive to work. 

You need to ensure that all users can see previous instances of detected malware in Windows Defender. 

Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.) 

Answer: 


Q57. You have laptops that run Windows 8. The laptops have Microsoft User Experience Virtualization (UE-V) installed. 

You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network. 

What should you do? 

A. From a command prompt, run sc config PeerDistSvc start=auto. 

B. From Group Policy Management Editor, configure the Windows Connection Manager settings. 

C. From a command prompt, run sc config CscService start=auto. 

D. From Group Policy Management Editor, configure the Network Connections settings. 

Answer:


Q58. At work, you use a desktop computer that runs Windows 8 Pro. At home, you use a laptop that runs Windows 8. You use the same Microsoft account to log on to both computers. 

You want to use the same settings for both computers. 

You need to ensure that all computer settings, including stored passwords, are synced between the computers. 

What should you do? 

A. Enable the Guest account on both computers. 

B. Designate both computers as trusted PCs. 

C. Add both computers to the same workgroup. 

D. Join both computers to the same HomeGroup 

Answer:

Explanation: http://technet.microsoft.com/en-us/windowsserver/bb250462%28v=vs.71%29.aspx 


Q59. You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker. 

You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files. 

You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained. 

What should you do? 

A. Restore computer from the latest restore point. 

B. Delete the HKEY_CLASSES_ROOT\\exefile\\shell\\open\\command registry key. 

C. Modify setting in Change default settings for media or devices. 

D. Select Reset your PC. 

Answer:


Q60. You administer desktop computers on your company network. 

You want to deploy a WIM file of Windows 8 Enterprise to 15 desktop computers that have a third-party iSCSI adapter installed. The hardware vendor provided a device driver to support this adapter. 

You need to update the image to ensure that the device driver is installed when you deploy the image. 

What should you do? 

A. Run the dism.exe tool and specify the fadd-driver parameter. 

B. Download and run the drvload.exe tool and specify the path to the driver .inf file. 

C. Download and run the imagex.exe tool and specify the /remount parameter. 

D. Run the dism.exe tool and specify the /append-image parameter. 

Answer:



To know more about the Managing and Maintaining Windows 8, click here.