PrepAway - Latest Free Exam Questions & Answers

Category: 70-688 (v.2)

Exam 70-688: Managing and Maintaining Windows 8 (update March 3rd, 2015)

You need to reconfigure the new computer in order to access the HomeGroup resources

You are a systems administrator of a small branch office. Computers in the office are joined
to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several
shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared
folders. You discover that the shared folders are unavailable, and you receive an error
message that indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?

Which three actions should you perform in sequence?

DRAG DROP
You have a computer that runs Windows 8. You have a 1 -terabyte external hard drive. You
purchase a second 1 -terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives. You also
need to ensure that additional external hard drives can be added to the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)

Which two actions should you perform?

You administer computers that run Windows 8 Pro and are members of an Active Directory
domain. The computers are encrypted with BitLocker and are configured to store BitLocker
encryption passwords in Active Directory.
A user reports that he has forgotten the BitLocker encryption password for volume E on his
computer.
You need to provide the user a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Which of the following should you recommend?

You administer laptops that run Windows 8 Enterprise and are members of an Active
Directory domain.
Users travel frequently and access domain resources from inside client networks or from
their home network. You want to manage the laptops when they are connected to the
company network from the external networks.
You need to ensure that the laptops can be managed and maintained while users are not
logged on to the computers.
Which of the following should you recommend?

Which certificate or certificates should you use?

DRAG DROP
You support Windows 8 desktop computers for a company named Contoso, Ltd. The
computers are members of the Active Directory domain named contoso.com.
Contoso works with a supplier named Fabrikam, Inc. Each company has a public key
infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam
network includes a website that is accessible from the Contoso network. The website
requires SSL and mutual authentication.
You need to configure the computers to allow contoso.com domain users to access the
website without any warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate
to the correct certificate store. Each certificate may be used once, more than once, or not at
all. You may need to drag the split bar between panes or scroll to view content.)

You need to configure the network to support the required remote administration access

You support computers that run Windows 8 Pro and are members of an Active Directory
domain. Several desktop computers are located in a subnet that is protected by a firewall.
The firewall allows incoming TCP connections only to ports 80 and 443.
You want to manage disk volumes on the desktop computers from your computer, which is
located outside the protected subnet.
You need to configure the network to support the required remote administration access.
What should you do?

Which three actions should you perform in sequence?

DRAG DROP
You administer a computer that runs Windows 8 Enterprise and is a member of an Active
Directory domain.
You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1.
(Click the Exhibit button.)

You share the folder over the network with Read permission for a domain user account
named User1 as shown in Exhibit 2. (Click the Exhibit button.)

You want to provide access to the shared folder only for the time that User1 is a member of
the domain security group named Project. You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)

You need to deploy the new application to the tablets

You support desktop computers and tablets that run Windows 8 Enterprise. All of the
computers are able to connect to your company network from the Internet by using
DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is not accessible if a user is working offline.
The application is stored on an internal solid-state drive (SSD) on the tablets.
The application is isolated from other applications.
The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?

You need to deploy the new application to the tablets

You support desktop computers and tablets that run Windows 8 Enterprise. All of the
computers are able to connect to your company network from the Internet by using
DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution
must meet the following requirements:
Users have offline access to the application only within the first seven days
following their latest online session.
The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?

Which option on the Settings tab should you select?

HOTSPOT
You have computers that run Windows 8 Pro and are configured as a workgroup. Each
computer is scheduled to run a Windows Defender full scan every morning at 07:00.
Users report that they are unable to view previous instances of detected malware when they
arrive to work.
You need to ensure that all users can see previous instances of detected malware in
Windows Defender.
Which option on the Settings tab should you select? (To answer, select the appropriate
option in the answer area.)


Page 7 of 13« First...56789...Last »