PrepAway - Latest Free Exam Questions & Answers

Category: 70-688

Exam 70-688: Managing and Maintaining Windows 8

You need to ensure that file and program activity is always monitored on this computer

You administer a company network that includes computers that run Windows 8 Enterprise in an Active
Directory domain. The company has purchased a subscription to Windows Intune.
Corporate security policy requires that computers in the accounting department have file and program activity
logged. A user in the accounting department uses a computer that is managed by Windows Intune.
You need to ensure that file and program activity is always monitored on this computer.
What should you do?

Which two actions should you perform?

You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring
(MBAM) is deployed on your network on a server named MBAM1.
Company policy requires that within 2 hours of being started, computers that have the MBAM client installed
prompt users to enable BitLocker.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform?
(Each correct answer presents part of the solution.Choose two.)

You need to create a Windows Intune policy that meets the security policy requirements

You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has
purchased a subscription to Windows Intune.
Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is
connected to Windows Intune. Company security policy defines the minimum length of passwords and required
encryption settings.
You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?

You need to ensure that the App-V applications are available to users only when they are connected to the comp

You support computers that run Windows 8 Enterprise.
Your company has started testing Application Virtualization (App-V) applications on several laptops. You
discover that the App-V applications are available to users even when the laptops are offline.
You need to ensure that the App-V applications are available to users only when they are connected to the
company network.
What should you do?

You need to ensure that all computer settings, including stored passwords, are synced between the computers

At work, you use a desktop computer that runs Windows 8 Pro. At home, you use a laptop that runs Windows
8. You use the same Microsoft account to log on to both computers.
You want to use the same settings for both computers.
You need to ensure that all computer settings, including stored passwords, are synced between the computers.
What should you do?

Which setting in the unattended answer file should you edit?

Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the
desktop computers have the same hardware configuration.
You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter.
You want to create an image of the reference desktop that retains the custom driver in the image.
You need to edit the unattended answer file.
Which setting in the unattended answer file should you edit?

You need to recommend a solution that prevents thiswarning message from appearing, without compromising the se

You are a systems administrator for your company. The company has employees who work remotely by usinga
virtual private network (VPN) connection from theircomputers, which run Windows 8 Pro.
These employees use an application to access the company intranet database servers. The company recently
decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a
warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents thiswarning message from appearing, without compromising
the security protection of the computers.
What should you do?

Which four actions should you perform in sequence?

You administer 50 laptops that run Windows 7 Professional 32-bit.
You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops.
You need to ensure that user application settings, Windows settings, and user files are maintained after
Windows 8 Pro is installed.
Which four actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.)

You need to restrict access to Windows Store for local user accounts on the computers

You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area.
They are connected to the Internet and are configured with automatic logon by using a local user account.
You discover new applications on the Start screen of the computers.
You need to restrict access to Windows Store for local user accounts on the computers.
What should you do?

You need to ensure that the folder redirection settings are applied only to laptops

You support laptops that run Windows 8 Pro and are members of an Active Directory domain.
The domain is configured with user folder redirection by using a Group Policy Object (GPO).
Loopback group policies are not used.
Your company has decided to deploy tablets to all managers, for use as secondary computers. Tablets will be
added to the domain.
You need to ensure that the folder redirection settings are applied only to laptops.
What should you do?


Page 5 of 8« First...34567...Last »