[Free] 2018(July) Dumps4cert Microsoft 70-686 Dumps with VCE and PDF Download 11-20

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July Microsoft Official New Released 70-686
100% Free Download! 100% Pass Guaranteed!

Pro: Windows 7, Enterprise Desktop Administrator

Question No: 11 – (Topic 1)

You are planning to upgrade Microsoft Internet Explorer. You must create a report that identifies which computers are successfully upgraded. You need to design a deployment method that meets this requirement. What should you use? (Choose all that apply.)

  1. Microsoft System Center Essentials

  2. Windows Intune

  3. Microsoft System Center Configuration Manager

  4. Internet Explorer Administration Kit (IEAK) and Group Policy

  5. Windows Server Update Services (WSUS)

Answer: A,B,D,E

Question No: 12 – (Topic 1)

Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.

Microsoft releases a security update for Windows 7. You have the following requirements:

->Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed.

->Use the least amount of administrative effort.

You need to manage the software update process to meet the requirements. What should you do?

  1. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation, and force a detection cycle on the client computers.

  2. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers.

  3. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

  4. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA to use the Microsoft Update site catalog.

Answer: D Explanation:

Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common

security misconfigurations and missing security updates on your computer systems. http://technet.microsoft.com/en-us/security/cc184924

Question No: 13 – (Topic 1)

Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. All client computers run Windows 7. All client computer accounts are located in the Computers container in the contoso.com domain.

You discover that multiple client computers were automatically shut down because the security log was full.

You need to ensure that client computers are not shut down when the security log becomes full.

What should you do?

  1. Increase the maximum log size.

  2. Configure an Event Viewer subscription.

  3. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO).

  4. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).

Answer: D Explanation:

Why not Default Domain Controllers Policy Group Policy object??

Default Domain Controllers Policy Group Policy object is set policy to manage domain controller (domain server)

Default Domain Policy Group Policy object is set of policy to manage client

Question No: 14 – (Topic 1)

You deploy Windows 7 to the computers that are used by your companys Web developers.

All Web developer user accounts are in a single organizational unit (OU).

Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers.

You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications.

What should you do?

  1. Enable Compatibility View in Internet Explorer.

  2. Add each server to the Intranet zone.

  3. Add each server to the Trusted Sites zone.

  4. Set the default security setting in Internet Explorer to Medium.

Answer: B Explanation:

Pop-up Blocker features

Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside the viewable desktop area. For more information, see quot;Windows Restrictionsquot; in this document.

When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual manner. Note that sites in the

Trusted Sites and Local

Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet Options. http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx

hints: internal web , so i choose intranet zones.

Local Intranet Zone

By default, the Local Intranet zone contains all network connections that were established by using a Universal

Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, http://local), as long as they are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by

using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the Local intranet zone.

Trusted Sites Zone

This zone contains Web sites that you trust as safe (such as Web sites that are on your organization#39;s intranet or that come from established companies in whom you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low.

http://support.microsoft.com/kb/174360

Question No: 15 – (Topic 1)

Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.

You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.

You have the following requirements:

->Migrate 20 computers at a time.

->Ensure that you conserve network bandwidth.

You need to design a deployment strategy that meets the requirements. What should you do?

  1. Configure multicast transmission on the deployment point.

  2. Configure unicast transmission on the deployment point.

  3. Distribute the image by using Background Intelligent Transfer Service (BITS).

  4. Compress the contents of the distribution folder.

Answer: A Explanation:

Performing Multicast Deployments

In order to deploy an image using multicasting instead of unicasting, you must first create a

multicast transmission. Multicast transmissions make the image available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used.

http://technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx

Question No: 16 – (Topic 1)

You are installing a new third-party application to all the Windows 7 client workstations that your company has deployed.

You need to monitor all of the actions taken by the application installer. Which application should you use?

  1. Update Compatibility Evaluator

  2. Setup Analysis Tool

  3. Windows Compatibility Evaluator

  4. Compatibility Administrator

Answer: D

Question No: 17 – (Topic 1)

You are designing a Windows 7 deployment image.

You plan to partition the hard disk of each client computer during deployment. You need to modify the unattended answer file by using a text editor.

Where should you add the disk information?

  1. to the Generalize configuration pass

  2. to the AuditSystem configuration pass

  3. to the WindowsPE configuration pass

  4. to the Specialize configuration pass

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/dd744551(v=ws.10).aspx

The windowsPE configuration pass also enables you to specify Windows Setup-related settings, including:

  • Partition and format a hard disk.

  • Select a specific Windows image to install, the path of that image, and any credentials required to access that image.

  • Select a partition on the destination computer where you install Windows.

  • Apply a product key and administrator password.

  • Run specific commands during Windows Setup.

Question No: 18 – (Topic 1)

You are planning a Windows 7 deployment infrastructure. You have the following requirements:

->Enable network deployments of WIM images or VHDs

->Support multicast with the use of multiple stream transfer functionality.

->Allow drivers to be stored centrally, and use dynamic driver provisioning.

You need to design an infrastructure that meets the requirements. Which deployment method should you recommend?

  1. Microsoft Deployment Toolkit (MDT) 2010

  2. Microsoft Deployment Toolkit (MDT) 2008

  3. Windows Deployment Services in Windows Server 2008 R2

  4. Deployment Image Servicing and Management (DISM)

Answer: C

Question No: 19 – (Topic 1)

Your company has client computers that run Windows Vista. The company plans to upgrade the Windows Vista computers to Windows 7. The current configuration of all client computers in your company is based on a common Windows Vista image. Some branch offices use WAN connections to connect to the main office.

You have the following requirements:

Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.

Use the least amount of bandwidth while transferring the user data. Support the same migration strategy for all offices.

You need to design a user state migration strategy that supports the requirements. What should you do?

  1. Use the Deployment Image Servicing and Management (DISM) tool.

  2. Use the User State Migration Tool (USMT) and a hard-link migration store.

  3. Use Windows PE to perform an offline migration.

  4. Use the multicast feature of Windows Deployment Services (WDS).

Answer: B Explanation: Hints:

A and B is not use for user state migration C is the best tool to do that

Question No: 20 – (Topic 1)

Your network is configured as shown in the following diagram.

Dumps4Cert 2018 PDF and VCE

You are planning to deploy Windows 7. You have the following requirements:

  • Use BitLocker on all computers in the isolated network.

  • Provide DirectAccess on all portable computers.

  • Use the Key Management Service (KMS) to activate all client computers.

    You need to plan a client computer licensing strategy that meets the requirements. What should you do?

    1. License 500 copies of Windows 7 Ultimate.

    2. License 500 copies of Windows 7 Enterprise.

    3. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses.

    4. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate.

    Answer: B Explanation: hints:

    Direct Access only available for Ultimate and Enterprise only. Company should use Enterprise version

    100% Dumps4cert Free Download!
    Download Free Demo:70-686 Demo PDF
    100% Dumps4cert Pass Guaranteed!
    70-686 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *