[Free] 2018(Aug) Dumps4cert Microsoft 70-697 Dumps with VCE and PDF Download 1-10

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug Microsoft Official New Released 70-697
100% Free Download! 100% Pass Guaranteed!

Configuring Windows Devices

Question No: 1 – (Topic 1)

You support Windows 10 Enterprise computers that are members of an Active Directory domain. Your company policy defines the list of approved Windows Store apps that are allowed for download and installation.

You have created a new AppLocker Packaged Apps policy to help enforce the company policy.

You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company.

What should you do?

  1. From Group Policy, enforce the new AppLocker policy in Audit Only mode.

  2. From Group Policy, run the Group Policy Results Wizard.

  3. From Group Policy, run the Group Policy Modeling Wizard.

  4. From PowerShell, run the Get-AppLocker Policy -Effective command to retrieve the AppLocker effective policy.

Answer: A Explanation:

You can test an AppLocker Packaged Apps policy by running it in audit mode. After AppLocker rules are created within the rule collection, you can configure the enforcement setting to Enforce rules or Audit only.

When AppLocker policy enforcement is set to Enforce rules, rules are enforced for the rule collection and all events are audited. When AppLocker policy enforcement is set to Audit only, rules are only evaluated but all events generated from that evaluation are written to the AppLocker log.

Question No: 2 – (Topic 1)

Your Windows 10 Enterprise work computer is a member of an Active Directory domain. You use your domain account to log on to the computer. You use your Microsoft account to log on to a home laptop.

You want to access Windows 10 Enterprise apps from your work computer by using your Microsoft account.

You need to ensure that you are able to access the Windows 10 Enterprise apps on your work computer by logging on only once.

What should you do?

  1. Add the Microsoft account as a user on your work computer.

  2. Enable Remote Assistance on your home laptop.

  3. Connect your Microsoft account to your domain account on your work computer.

  4. Install SkyDrive for Windows on both your home laptop and your work computer.

Answer: C Explanation:

You can connect your Microsoft account to your domain account on your work computer. This will enable you to sign in to your work computer with your Microsoft account and access the same resources that you would access if you were logged in with your domain account.

When you connect your Microsoft account to your domain account, you can sync your settings and preferences between them. For example, if you use a domain account in the

workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other Microsoft account settings that you see on your home PC.

Question No: 3 – (Topic 1)

You support Windows 10 Enterprise computers.

Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline.

You need to ensure that the App-V applications are available to users only when they are connected to the company network.

What should you do?

  1. Change user permissions to the App-V applications.

  2. Disable the Disconnected operation mode.

  3. Configure mandatory profiles for laptop users.

  4. Reset the App-V client File System cache.

Answer: B Explanation:

Disconnected operation mode is enabled by default and allows App-V applications to be available to users even when the laptops are offline. We need to disable Disconnected operation mode to prevent offline access.

The disconnected operation mode settings-accessible by right-clicking the Application Virtualization node, selecting Properties, and clicking the Connectivity tab-enables the Application Virtualization Desktop Client or Client for Remote Desktop Services (formerly Terminal Services) to run applications that are stored in the file system cache of the client when the client is unable to connect to the Application Virtualization Management Server.

Question No: 4 DRAG DROP – (Topic 1)

You manage Microsoft Intune for a company named Contoso. You have an administrative computer named Computer1 that runs Windows 10 Enterprise.

You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Question No: 5 HOTSPOT – (Topic 1)

You have an image of Windows 10 Enterprise named Image1. Image1 has version number

1.0.0.0 of a custom, line-of-business universal app named App1. You deploy Image1 to Computer1 for a user named User1.

You need to update App1 to version 1.0.0.1 on Computer1 for User1 only.

What command should you run? To answer, select the appropriate options in the answer area.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

In this question, we need to update App1 toversion1.0.0.1 on Computer1 “for User1 only”. The Add-AppxPackage cmdlet adds a signed app package (.appx) to a user account.

To update the application, we need to use the -path parameter to specify the path to the upgraded application.

Question No: 6 HOTSPOT – (Topic 1)

You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory of Subcsription1.

AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory.

You have the following user accounts:

Dumps4Cert 2018 PDF and VCE

You need to identify to which collections each user can be assigned access.

What should you identify? To answer, select the appropriate options in the answer area.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

Dumps4Cert 2018 PDF and VCE

A Microsoft account can only access a cloud collection.

An Azure Active Directory (Azure AD) account can access a cloud collection and it can access a hybrid collection if directory synchronization with password sync is deployed. An on-premise domain account that does not exist in any Azure Active Directory cannot access Azure cloud resources.

References:

https://azure.microsoft.com/en-gb/documentation/articles/remoteapp-collections/

Question No: 7 – (Topic 1)

Your network contains an Active Directory domain named contoso.com. The domain contains Windows 10 Enterprise client computers.

Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses.

You need to add a third email address for each user. What should you do?

  1. From Active Directory Users and Computers, modify the E-mail attribute for each user.

  2. From Microsoft Azure Active Directory Module for Windows PowerShell, run the Set- Mailbox cmdlet.

  3. From Active Directory Domains and Trust, add a UPN suffix for each user.

  4. From the Office 365 portal, modify the Users settings of each user.

Answer: B Explanation:

We can use the Set-Mailbox cmdlet to modify the settings of existing mailboxes.

The EmailAddresses parameter specifies all the email addresses (proxy addresses) for the recipient, including the primary SMTP address. In on-premises Exchange organizations, the primary SMTP address and other proxy addresses are typically set by email address policies. However, you can use this parameter to configure other proxy addresses for the recipient.

To add or remove specify proxy addresses without affecting other existing values, use the following syntax:

@{Add=quot;[lt;Typegt;]:lt;emailaddress1gt;quot;,quot;[lt;Typegt;]:lt;emailaddress2gt;quot;…; Remove=quot;[lt;Typegt;]:lt;emailaddress2gt;quot;,quot;[lt;Typegt;]:lt;emailaddress2gt;quot;…}.

Topic 2, Plan desktop and device deployment

Question No: 8 – (Topic 2)

You are the desktop administrator for a small company.

Your workgroup environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used.

You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S.

  2. Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.

  3. Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.

  4. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.

Answer: A,B Explanation:

You can use the Powercfg.exe tool to control power settings and configure computers to default to Hibernate or Standby modes.

In this question, we use POWERCFG /X on one help desk computer to modify the power scheme to meet our requirements. After configuring the required settings, we can export the power scheme settings to a file by using POWERCFG /EXPORT.

We can then import the power scheme from the file on each of the remaining help desk computers by using POWERCFG /IMPORT. After importing the power scheme on the remaining computers, we need to set the new power scheme to be the active power scheme by using POWERCFG /S.

Question No: 9 – (Topic 2)

You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch.

From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1. What should you do?

  1. Run the winrm.exe command and specify the -s parameter.

  2. Run the Powershell.exe command and specify the -Command parameter.

  3. Run the Receive-PSSession cmdlet and specify the -Name parameter.

  4. Run the Invoke-Command cmdlet and specify the -VMName parameter.

Answer: D Explanation:

We can use Windows PowerShell Direct to run PowerShell cmdlets on a virtual machine from the Hyper-V host. Because Windows PowerShell Direct runs between the host and virtual machine, there is no need for a network connection or to enable remote management.

There are no network or firewall requirements or special configuration. It works regardless of your remote management configuration. To use it, you must run Windows 10 or Windows Server Technical Preview on the host and the virtual machine guest operating system.

To create a PowerShell Direct session, use one of the following commands: Enter-PSSession -VMName VMName

Invoke-Command -VMName VMName -ScriptBlock {commands}

Question No: 10 – (Topic 2)

A company has an Active Directory Domain Services (AD DS) domain. All client computers

run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip.

You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Enable the Require additional authentication at startup policy setting.

  2. Enable the Enforce drive encryption type on operating system drives policy setting.

  3. Enable the option to allow BitLocker without a compatible TPM.

  4. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.

Answer: A,C Explanation:

We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip).

We can do this by enabling the option to allow BitLocker without a compatible TPM in the group policy. The ‘Allow BitLocker without a compatible TPM’ option is a checkbox in the ‘Require additional authentication at startup’ group policy setting. To access the ‘Allow BitLocker without a compatible TPM’ checkbox, you need to first select Enabled on the ‘Require additional authentication at startup’ policy setting.

100% Dumps4cert Free Download!
70-697 PDF
100% Dumps4cert Pass Guaranteed!
70-697 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *