PrepAway - Latest Free Exam Questions & Answers

Tag: Exam 70-688 (update September 3rd, 2014)

Exam 70-688: Managing and Maintaining Windows 8 (update September 3rd, 2014)

What should you do next?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You will use a recently purchased Windows Intune subscription to manage the Windows 8
devices.
Computers in the Research department often contain sensitive information. You want to monitor
file and program activity on computers in the Research department. You add the Research
department computers to a Windows Intune device group named ResearchPCs.
What should you do next?

Which two of the following actions should you perform?

You have two computers at home. One is a laptop computer and one is a tablet computer. Both
devices run Windows 8 Pro.

The laptop is named Win8Lap and is a member of a workgroup named HOME. The tablet is
named Win8Tab and is a member of a HomeGroup.
You log in to Win8Lap using a local user account. You log in to Win8Tab using a Microsoft
account.
You use Internet Explorer to visit websites. Passwords required by the websites are saved when
you visit the websites on Win8Tab. When you visit the same websites on Win8Lap, you are
prompted to enter the passwords.
You want the saved passwords on Win8Tab to be synchronized to Win8Lap.
Which two of the following actions should you perform? (Choose two).

How can you replace the recovery partition in your Windows 8 Image with your DaRT Recovery Image?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You are modifying a Windows 8 Enterprise image to deploy to 100 new computers.
You want to include a bootable recovery partition in the image that will enable you to connect to
the computer using a Remote Desktop connection when the computer is booted into the recovery
partition.
You plan to use Microsoft Diagnostics and Recovery Toolset (DaRT) to create a recovery image.
You run the DaRT Recovery Image Wizard and create a recovery image named Win8RecImg.ISO.
How can you replace the recovery partition in your Windows 8 Image with your DaRT Recovery
Image?

Which two policy settings must be configured to enable the MBAM Client BitLocker encryption management?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You plan to deploy Microsoft BitLocker Administration and Monitoring (MBAM) to manage
Bitlocker on the client computers.
You configure MBAM on a server and deploy the MBAM Client software to all Windows 8
Enterprise computers.
You now need to configure the MBAM Services Group Policy settings.
Which two policy settings must be configured to enable the MBAM Client BitLocker encryption
management? (Choose two)

Which of the four Windows Intune policies should you configure to enforce the password settings?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server

2012 and all client computers run Windows 8 Enterprise.
The company has a Microsoft Exchange email infrastructure. Users use the Mail app to access
their Microsoft Exchange mailboxes.
You will use a recently purchased Windows Intune subscription to manage the Windows 8 devices
and the Microsoft Exchange infrastructure.
You need to configure Windows Intune to enforce security settings on the Windows 8 devices that
include password length, password expiration and password history.
Which of the four Windows Intune policies should you configure to enforce the password settings?

What should you configure?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
You have recently configured an Application Virtualization (App-V) infrastructure. All client
computers have the App-V client installed.
You plan to deploy an App-V application to computers in the Sales department.
You need to configure the Application Virtualization (App-V) infrastructure to ensure that Sales
users can only run the App-V application when their computers are connected to the network.
What should you configure?

How can you ensure that the settings are synced between the two computers?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
At work, you use a client computer named ABC-Admin1. ABC-Admin1 is a member of the
ABC.com domain. You log in to ABC-Admin1 using a Microsoft Account.
At home, you use a tablet computer named Tablet1. Tablet1 runs Windows 8 Pro and is a
member of a HomeGroup. You log in to Tablet1 using the same Microsoft Account as the one you
use for your work computer.
You discover that saved passwords and other computer settings are not being synced between
ABC-Admin1 and Tablet1.
How can you ensure that the settings are synced between the two computers?

How can you prevent the Sysprep /Generalize process removing the device drivers from the reference computer be

Your role of Systems Administrator at ABC.com includes the management of the Windows Server
2012 servers and the Windows 8 client computers.
The company has purchased 20 new computers. The new computers all have the same hardware
configurations. You are planning to deploy Windows 8 to the new computers using a Windows 8
image. After configuring one of the new computers as a reference computer with Windows 8 and
the required applications, you plan to capture an image of it.

To reduce the time taken for each new installation, you want to prevent the device drivers being
removed when you generalize the reference computer so that the same device drivers are
installed when you deploy the image to the remaining computers.
How can you prevent the Sysprep /Generalize process removing the device drivers from the
reference computer before capturing the image?

How can you achieve this goal while maintaining the security of the remote users’ computers?

You work as a desktop technician at ABC.com. The ABC.com network consists of an Active
Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server
2012 and all client computers run Windows 8 Enterprise.
Sales users often work away from the office. When they are away from the office, they can
connect to network resources using VPN (virtual private network) connections.
All client computers have a custom application named CorpApp installed. A new version of the
application is deployed to computers in the network.
The new version of CorpApp is made available in a public cloud for the remote Sales users to
download and install.
Sales users report that Internet Explorer displays a warning message saying the application could
be harmful to their computer when they attempt to download the application.
You need to enable remote users to download the new version of CorpApp without receiving the
warning messages.
How can you achieve this goal while maintaining the security of the remote users’ computers?

Which two of the following actions should you perform next?

Your role of desktop technician at ABC.com includes the management of the company’s Windows
client computers. All client computers run Windows 7 Professional 32-bit.
The company plans to migrate the client computers to Windows 8 Pro 64-bit.
You are developing a migration strategy to enable the migration to Windows 8 Pro. Your strategy
must enable users to keep their current operating-system settings, application settings, and
personal files.
You plan to use the User State Migration Tool (USMT) 5.0 to perform the “PC-refresh using a
hard-link migration store” migration method.
You are testing your migration strategy on test computer.
You copy USMT 5.0 to the test computer. You then run the following command:
Scanstate C:\Store /i:migdocs.xml /i:migapp.xml /v:13 /c /hardlink /nocompress
Which two of the following actions should you perform next? (Choose two)


Page 5 of 512345