aiotestking uk

70-688 Exam Questions - Online Test


70-688 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. 

You are planning to add a guest wireless network. 

You need to collect information about nearby wireless networks, including their encryption methods. 

Which command should you include in the batch file? 

A. Netsh wlan set autoconfig enabled=no interface="Wireless Network Connection" 

B. ipconfig /allcompartments 

C. Get-WmiObject win32_networkadapterconfiguration -Filter 'ipenabled = "true"' 

D. netsh wlan show networks 

E. netsh wlan show hostednetwork 

F. netstat –a 

Answer:

Q2. DRAG DROP 

You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. 

Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication. 

You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible. 

Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer:  

Q3. DRAG DROP 

You support Windows 8.1 Enterprise computers. AppLocker policies are deployed. 

Company policy states that AppLocker must be disabled. 

You need to disable AppLocker. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q4. You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. 

Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. 

You need to create a Windows Intune policy that meets the security policy requirements. 

What should you do? 

A. Create a new Windows Intune Center Settings policy. 

B. Create a new Windows Intune Agent Settings policy. 

C. Create a new Windows Intune Mobile Security policy. 

D. Create a new Windows Firewall Settings policy. 

Answer:

Q5. HOTSPOT  

You have a client computer that runs Windows 8 Pro. The computer contains a storage pool. 

You need to remove a disk named Disk 2 from the storage pool. 

What should you configure first? (To answer, select the appropriate option in the answer area.) 

Answer:  

Q6. You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. 

Some employees work from home. 

You need to ensure that employees can log on to their laptops when they work from home. 

What should you do? 

A. Provide employees their BitLocker PINs. 

B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater. 

C. Enable BitLocker To Go. 

D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network. 

Answer:

Q7. Your network contains client computers that run Windows 8 Enterprise. The computers are 

members of an Active Directory domain. 

Your company purchases a subscription to Windows Intune. 

Synchronization between Active Directory and Windows Intune is not configured. 

You enroll all of the computers in Windows Intune. 

You plan to create groups that contain the computers by using dynamic membership. 

You need to identify which criteria you can use to populate the groups dynamically. Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.) 

A. organizational unit (OU) 

B. manager 

C. security group 

D. device type 

E. domain 

Answer: A,B,C 

Q8. DRAG DROP 

Your company is migrating from Windows 7 to Windows 8.1. 

Before you attempt to migrate a client computer named Computer1. Computer1 fails and can no longer start Windows 7. 

You need to migrate the user profile from Computer1 to a client computer named Computer2 that runs Windows 8.1. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q9. Your network contains an Active Directory domain named contoso.com. All client computers in the domain run Windows 8.1 Pro. All domain users have roaming user profiles. 

You need to prevent a user named User2 from being able to save changes to his roaming user profile. 

Which file you modify? 

A. registry.pol 

B. ntuser.pol 

C. ntuser.dat 

D. system.dat 

Answer:

Q10. You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager. 

You enable Microsoft System Center 2012 Endpoint Protection on the computers. 

You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers. 

What should you configure form the System Center 2012 Endpoint Protection settings? 

A. Advanced 

B. MAPS 

C. Real-time protection 

D. Default actions 

Answer: