PrepAway - Latest Free Exam Questions & Answers

Category: 70-688 (v.2)

Exam 70-688: Managing and Maintaining Windows 8 (update March 3rd, 2015)

What permission should you identify?

You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows:

UserA is a member of both the Everyone group and the Marketing group. UserA must
access C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?

Which three actions should you perform in sequence?

DRAG DROP
You support a desktop computer that runs Windows 8 Pro. The computer is joined to an
Active Directory domain.
The computer has a folder named C:\Reports. The folder NTFS permissions are shown in
Exhibit 1. (Click the Exhibit button.)

The folder is shared over the network with Read permission for a domain user account
named User1 as shown in Exhibit 2. (Click the Exhibit button.)

Members of the domain security group named Accountants must have access to the shared folder.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)

You need to configure the computers to meet this requirement

You administer laptop and desktop computers that run Windows 8 Pro. Your company uses
Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD
CS).
Your company decides that access to the company network for all users must be controlled
by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?

Which two actions should you perform?

You administer computers that run Windows 8 Enterprise and are members of an Active
Directory domain.
Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery
passwords are stored in Active Directory. A user forgets the BitLocker password to local
drive E: and is unable to access the protected volume.
You need to provide a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Which certificate or certificates should you use?

DRAG DROP
You support desktop computers for a company named Fabrikam, Inc. The computers are
members of the Active Directory domain named fabrikam.com.
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key
infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam
employees regularly use a Contoso website that is hosted on a server in the contoso.com
domain. The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso
website without any warning prompts. You also need to use the fewest certificates
possible.
Which certificate or certificates should you use? (To answer, drag the appropriate
certificate to the correct certificate store. Each certificate may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

You need to manage Active Directory from the tablet by using a VPN connection

You administer computers that run Windows 8 Enterprise. The computers are members of
an Active Directory domain.
You have a tablet that runs Windows 8 Enterprise. You configure the tablet to access your
company network by using a virtual private network (VPN) connection.
You need to manage Active Directory from the tablet by using a VPN connection.
What should you do?

Which VPN tunneling protocol should you use?

You support tablets that run Windows 8 Pro. You are designing a remote access server
(RAS) that will be placed behind a firewall. The firewall will accept incoming TCP
connections to ports 80 and 443 only.
You want to connect to the RAS server from a tablet.
You need to create a virtual private network (VPN) connection to the RAS server.
Which VPN tunneling protocol should you use?

You need to reconfigure the new computer in order to access the HomeGroup resources

You are a systems administrator of a small branch office. Computers in the office are joined
to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several
shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared
folders.
You discover that the shared folders are unavailable, and you receive an error message that
indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?


Page 3 of 1312345...10...Last »