Proper study guides for Improved Microsoft Managing and Maintaining Windows 8 certified begins with Microsoft 70-688 preparation products which designed to deliver the Breathing 70-688 questions by making you pass the 70-688 test at your first time. Try the free 70-688 demo right now.
2021 Mar 70-688 test engine
Q31. Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration.
You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter.
You want to create an image of the reference desktop that retains the custom driver in the image.
You need to edit the unattended answer file.
Which setting in the unattended answer file should you edit?
A. Microsoft-Windows-PnPSysprep | PersistAllDeviceInstalls
B. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
C. Microsoft-Windows-PnpCustomizattonNonWinPE | DriverPaths
D. Microsoft-Windows-Shell-Setup | OEMInformation
Answer: A
Q32. DRAG DROP
You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain.
A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5.
You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q33. You support computers that run Windows 8 Enterprise.
Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline.
You need to ensure that the App-V applications are available to users only when they are connected to the company network.
What should you do?
A. Configure mandatory profiles for laptop users.
B. Reset the App-V client FileSystem cache.
C. Disable the Disconnected operation mode.
D. Change user permissions to the App-V applications.
Answer: C
Q34. DRAG DROP
You administer 50 laptops that run Windows 7 Professional 32-bit.
You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops.
You need to ensure that user application settings, Windows settings, and user files are
maintained after Windows 8 Pro is installed.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q35. DRAG DROP
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com.
Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Refresh 70-688 answers:
Q36. Your company has a main office that has a connection to the Internet.
The company has 100 Windows 8.1 Pro client computers that run Microsoft Office 2010.
You purchase a subscription to Office 365 for each user. You download the Office
Deployment Tool for Click-to-Run,
You need to deploy Office 365 ProPlus to the computers. The solution must minimize the
amount of traffic over the Internet connection.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. On a file server, run setup.exe and specify the /download parameter.
B. On each client computer, run setup.exe and specify the /configure parameter.
C. On a file server, run setup.exe and specify the /configure parameter.
D. On each client computer, run setup.exe and specify the /download parameter,
Answer: C,D
Q37. Your network contains an Active Directory domain named contoso.com.
A user receives the following error message when attempting to sign in to a computer: "The trust relationship between this workstation and the primary domain failed."
You need to ensure that the user can sign in to the computer by using a domain user account.
Which tool should you use?
A. Netcfg
B. Netsh
C. Netdom
D. Netstat
Answer: C
Q38. You have client computers that run Windows 7 Enterprise. All users have roaming user profiles.
You deploy several client computers that run Windows 8 Enterprise.
Users who sign in to both the Windows 8 Enterprise computers and the Windows 7 Enterprise computers report that they no longer see their desktop background and their theme.
You suspect that the user profiles are corrupt.
You need to resolve the profile corruption issue.
What should you do?
A. Move all of the user profiles to a file server that runs Windows Server 2012, and then modify the profile path of each user account.
B. on the Windows 7 computers, configure the Download roaming profiles on primary computers only Group Policy setting.
C. on the Windows 8 computers, configure the Set roaming profile path for all users logging onto this computer Group Policy setting.
D. For each user, set the msDs-PrimaryComputer attribute to use a Windows 8 computer.
Answer: C
Q39. Your network contains a Microsoft Exchange Server 2013 organization.
You have an Exchange ActiveSync policy that has the following settings configured:
AllowRemoteDesktop
AllowInternetSharing
RequireDeviceEncryption
MinDevicePasswordLength
AllowSimpleDevicePassword
You need to identify which settings are applied to devices that run Windows RT.
Which three settings should you identify? (Each correct answer presents part of the solution. Choose three.)
A. MinDevicePasswordLength
B. AllowRemoteDesktop
C. AllowInternetSharing
D. RequireDeviceEncryption
E. AllowSimpleDevicePassword
Answer: A,D,E
Q40. HOTSPOT
You have a computer that runs Windows 8 Enterprise.
You need to ensure that all users can see the history of detected items in Windows Defender.
Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.)
Answer: