aiotestking uk

70-686 Exam Questions - Online Test


70-686 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You are planning the deployment of Windows 7 to computers that are located in a main office, in branch offices, and in a store kiosk. 

Computers in all three types of location use the same hardware. Kiosk computers are members of a workgroup. Kiosk computers must use specific settings for local security. 

Branch office computers must use BitLocker Drive Encryption. 

You have the following requirements: Create deployment images. Minimize image maintenance. 

You need to define an image-creation strategy that meets the requirements. 

What should you do? 

A. Create a single image to use for the branch office computers and the kiosk computers. Create a separate image to use for the main office computers. 

B. Create a single image to use for all location types. Create a custom Windows security template for each location type. 

C. Create one image to use for each location type. Encrypt the hard disks on the branch office computers prior to capturing the image. 

D. Create a single image to use for the main office computers and the branch office computers, and apply the required settings through Group Policy. Create a separate image to use for the kiosk computers. 

Answer:

Explanation: 

hints: 

Kiosk is belong to workgroup, it does not support by group policy. so it must use seperate 

image for its own local security. 

Q2. Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain. 

You discover that multiple client computers were automatically shut down because the security log was full. 

You need to ensure that client computers are not shut down when the security log becomes full. 

What should you do? 

A. Increase the maximum log size. 

B. Configure an Event Viewer subscription. 

C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO). 

D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO). 

Answer:

Explanation: 

Why not Default Domain Controllers Policy Group Policy object?? 

Default Domain Controllers Policy Group Policy object is set policy to manage domain 

controller (domain server) 

Default Domain Policy Group Policy object is set of policy to manage client 

Q3. DRAG DROP 

An enterprise organization has computers that run Windows 7. Users log on to the Contoso.com domain from their client computers. 

A user is unable to log on to the domain. The user changed his password the previous night and was unable to log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors. 

You need to ensure that the user can log on to the domain. 

Which command should you run? (To answer, drag the appropriate command and parameter from the list of commands and parameters to the correct location or locations in the work area.) 

Answer:  

Q4. You are managing data migration from an existing Windows 7 computer to a new Windows 7 computer. You need to migrate user and application data from the existing computer to the new computer. 

Which command should you run on the existing and new computers? (To answer, drag the appropriate commands to the correct location in the work area.) 

Answer:  

Q5. Your company uses Windows Update to download and install security updates on client computers. 

When Microsoft releases a security update, you have the following requirements: 

Establish which client computers require the security update. 

Identify what changes will occur as a result of the security update. 

Identify which applications might be affected by the security update. 

You need to select the appropriate tool to detect application-compatibility issues. 

What should you do? 

A. Use the Inventory Collector 

B. Use the Setup Analysis Tool 

C. Use the Update Compatibility Evaluator. 

D. Use the Windows Compatibility Evaluator 

Answer:

Explanation: 

The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies the installed applications and system information, matches that information against the profile set for the Windows. update, and looks for potential conflicts due to changes in the registry, application files, or application file properties. 

You configure the compatibility evaluator, defining when and how it runs, in the Application Compatibility Manager. You can also view your potential compatibility issues on the Analyze screen of the Application Compatibility Manager. 

http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx 

Q6. Your company is planning to deploy Windows 7 to all client computers. 

You have the following requirements: 

Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an applications operating system use. 

You need to select the appropriate method to detect application compatibility issues. 

What should you do? 

A. Use the Setup Analysis Tool in a virtual environment. 

B. Use the standalone Setup Analysis Tool. 

C. Use the Standard User Analyzer Wizard. 

D. Use the Standard User Analyzer tool. 

Answer:

Explanation: 

The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature. 

http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx 

Q7. Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains. 

Users in both domains can log on to client computers in only their own domains. System logs on the domain controllers display the error message Clock skew too great when users in Domain1 attempt to log on to client computers in Domain2. 

You need to ensure that users can log on to client computers in both domains. 

What should you do? 

A. Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object ( GPO ). 

B. Configure the primary domain controller (PDC) emulatorin each domain to synchronize its clock with the same external time source. 

C. Run a startup script that includes Net Time /setsntp on all client computers. 

D. Run a startup script that includes Net Time /querysntp on all client computers. 

Answer:

Q8. Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you do? 

A. Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD). 

B. Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu. 

C. Use Bootcfg to modify the boot parameters. 

D. Use BCDboot to modify the system partition. 

Answer:

Explanation: 

BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder. http://technet.microsoft.com/library/cc731662.aspx 

Q9. All client computers in your network run Windows XP. Some of the computers are part of a secure network. Some of the computers connect to the network by using virtual private networking (VPN). 

You are planning to deploy Windows 7. 

You have the following requirements: 

. Use a dedicated server for deployment. 

. Use a single operating system image for deployment. 

Ensure that you can use removable media to deploy the image. 

Ensure that you can select which applications are installed onto a client computer 

at the time of deployment. 

You need to design a deployment strategy that meets the requirements. 

What should you do? 

A. Use the Microsoft Deployment Toolkit to perform a lite-touch installation. 

B. Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image. 

C. Using a Windows PE boot media, use ImageX to apply the image from a network share to the client computers. 

D. Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation. 

Answer:

Q10. You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that 

the virtualization strategy meets the companys OSE requirements. Which GPO setting should you recommend? 

A. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings 

B. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of First Run Customize settings 

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications 

D. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performance notifications 

Answer: