PrepAway - Latest Free Exam Questions & Answers

Category: 70-698 (v.1)

Exam 70-698: Installing and Configuring Windows 10 (update May 26th, 2017)

Only local users have permissions to Share

Note: This question is part of a series of questions that use the same scenario. For your convenience,
the scenario is repeated in each question. Each question presents a different goal and answer choices,
but the text of the scenario is exactly the same in each question in this series.
Start of repeated scenario
Your network contains a single Active Directory domain named adatum.com. The network contains five servers
configured as shown in the following table.

All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table.

All of the client computers run the 64-bit version of Windows.
User3 frequently accesses ShareA.
Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
– Ensure that you can test unsigned device drivers on Computer1
– Enable Credential Guard on Computer2.
– Run commands and cmdlets remotely on computer2.
– Configure User Account control (UAC) on Computer3 to prompt administrators for
credentials when elevated privileges are required.
– Ensure that User1 can view and interact with a desktop session of User3.
– Ensure that User2 can use Telnet to manage the mainframe.
– Ensure that User4 can use Remote Desktop to access Computer4 remotely.
End of repeated scenario.
You need to meet the requirement of User4.
What should you do?

Only local users have permissions to Share

Note: This question is part of a series of questions that use the same scenario. For your convenience,
the scenario is repeated in each question. Each question presents a different goal and answer choices,
but the text of the scenario is exactly the same in each question in this series.
Start of repeated scenario
Your network contains a single Active Directory domain named adatum.com. The network contains five servers
configured as shown in the following table.

All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table.

All of the client computers run the 64-bit version of Windows.
User3 frequently accesses ShareA.
Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
– Ensure that you can test unsigned device drivers on Computer1
– Enable Credential Guard on Computer2.
– Run commands and cmdlets remotely on computer2.
– Configure User Account control (UAC) on Computer3 to prompt administrators for
credentials when elevated privileges are required.
– Ensure that User1 can view and interact with a desktop session of User3.
– Ensure that User2 can use Telnet to manage the mainframe.
– Ensure that User4 can use Remote Desktop to access Computer4 remotely.
End of repeated scenario.
You need to meet the requirement for administering Computers remotely.
Which remote management technology should you use?

Only local users have permissions to Share

Note: This question is part of a series of questions that use the same scenario. For your convenience,
the scenario is repeated in each question. Each question presents a different goal and answer choices,but the text of the scenario is exactly the same in each question in this series.
Start of repeated scenario
Your network contains a single Active Directory domain named adatum.com. The network contains five servers
configured as shown in the following table.

All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table.

All of the client computers run the 64-bit version of Windows.
User3 frequently accesses ShareA.
Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
– Ensure that you can test unsigned device drivers on Computer1
– Enable Credential Guard on Computer2.
– Run commands and cmdlets remotely on computer2.
– Configure User Account control (UAC) on Computer3 to prompt administrators for
credentials when elevated privileges are required.
– Ensure that User1 can view and interact with a desktop session of User3.
– Ensure that User2 can use Telnet to manage the mainframe.
– Ensure that User4 can use Remote Desktop to access Computer4 remotely.
End of repeated scenario.
You need to recommend a solution to meet the requirements of User1.
What should you include in the recommendation?

Only local users have permissions to Share

Note: This question is part of a series of questions that use the same scenario. For your convenience,
the scenario is repeated in each question. Each question presents a different goal and answer choices,
but the text of the scenario is exactly the same in each question in this series.
Start of repeated scenario
Your network contains a single Active Directory domain named adatum.com. The network contains five servers
configured as shown in the following table.

All of the servers run Windows Server 2012 R2.
Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.
The network contains a mainframe computer that is administered by using the Telnet protocol.
The domain contains four client computers configured as shown in the following table.

All of the client computers run the 64-bit version of Windows.
User3 frequently accesses ShareA.
Remote Desktop is enabled on Computer4.
Your company identifies the following requirements:
– Ensure that you can test unsigned device drivers on Computer1
– Enable Credential Guard on Computer2.
– Run commands and cmdlets remotely on computer2.
– Configure User Account control (UAC) on Computer3 to prompt administrators for
credentials when elevated privileges are required.
– Ensure that User1 can view and interact with a desktop session of User3.
– Ensure that User2 can use Telnet to manage the mainframe.
– Ensure that User4 can use Remote Desktop to access Computer4 remotely.
End of repeated scenario.
You need to meet the requirement of Computer1.
Which tool should you use on Computer1?

You need to ensure that User1 can connect to the shared…

Note: This question is part of a series of questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
Your network contains a single Active Directory domain. The domain contains computers that run Windows 10
Enterprise.
The computers are configured as shown in the following table.

When User1 works remotely, the user fails to access shared folders on the corporate network.
When User 2 and User3 work remotely, they successfully connect to the shared folders on the corporate
network.
You need to ensure that User1 can connect to the shared folders without user interaction.
What should you do?

You need to prevent computers from connecting to hosts …

Note: This question is part of a series of questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
Your network contains a single Active Directory domain. The domain contains devices that run windows 10
Enterprise.
You need to prevent computers from connecting to hosts on subnet 131.107.0.0/24.
What should you do?

A user connects to a wireless network and receives the …

Note: This question is part of a series of questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
A user connects to a wireless network and receives the following message:
“Do you want to allow your PC to be discoverable by other PCs and devices on this
network?”
The user clicks No.
The user is unable to browse to the shared folders of other computers on the network by using File E explorer.
You need to ensure that the user can browse to the other computers.
What should you do?

You need to ensure that when users work remotely and Co…

Note: This question is part of a series of questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of
the VPN protocols.
You have mobile devices that run Windows 10 and have VPN connection to the VPN server.
You need to ensure that when users work remotely and Connect to the VPN, only traffic for the corporate
network is sent through the VPN server.
What should you do?

You need to access each folder as a separate drive from…

Note: This question is part of a series of a questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
You have a computer named Computer1 that has storage configured as shown in the following table.

Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2
that is 100 GB.
Pool2 is empty.
Space1 contains 10 folders.
You need to access each folder as a separate drive from Windows Explorer.
What should you use?

You need to configure Space2 to be 2 TB

Note: This question is part of a series of a questions that use the same set of answer choices. Each
answer choice may be used once, more than once, or not at all.
You have a computer named Computer1 that has storage configured as shown in the following table.

Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2
that is 100 GB.
Pool2 is empty.
You need to configure Space2 to be 2 TB.
What should you use?


Page 6 of 12« First...45678...Last »