[Free] 2018(May) EnsurePass Braindumps Microsoft 70-688 Dumps with VCE and PDF 91-100

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-688
100% Free Download! 100% Pass Guaranteed!

Managing and Maintaining Windows 8.1

Question No: 91

You are an IT consultant for small and mid-sized businesses.

One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards.

You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do?

  1. Ensure that each laptop and tablet can read a physical smart card.

  2. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.

  3. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version

    1.2 or greater.

  4. Ensure that the laptops and tablets are running Windows 8 Enterprise edition.

Answer: C Explanation:

TPM virtual smart cards

Virtual smart cards (VSCs) emulate the functionality of traditional smart cards, but instead of requiring the purchase of additional hardware, they utilize technology that users already own and are more likely to have with them at all times.

Microsoft virtual smart card platform is currently limited to the use of the Trusted Platform Module (TPM) chip onboard most modern computers.

Reference:

http://www.microsoft.com/en-au/download/confirmation.aspx?id=29076 http://support.microsoft.com/kb/2855131

Question No: 92

You have Windows 8.1 Pro client computers.

You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort.

What should you include in the recommendation?

  1. the Program and Features Control Panel item

  2. Windows 7 File Recovery

  3. the Mpcmdrun command

  4. File History

Answer: C

Explanation: Windows Defender includes a command-line utility, MpCmdRun.exe, which can be handy if you want to automate the use of Windows Defender.

MpCmdRun.exe -RemoveDefinitions [-All]

Restores the installed signature definitions to a previous backup copy or to the original default set of signatures.

Reference: Run (and Automate) Windows Defender from the Command Line https://technet.microsoft.com/en-us/magazine/gg131918.aspx

Question No: 93 HOTSPOT

You install Windows 8.1 Pro on a new client computer.

You sign-in to the computer by using a domain user account.

You need to synchronize the Personalize settings between your domain account and a Microsoft account.

What should you configure first? (To answer, select the appropriate settings section in the answer area.)

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Explanation:

The settings sync features in Windows 8 require that you sign-in with a Microsoft account-or at least link a domain account to a Microsoft account. Syncing occurs via the SkyDrive cloud storage service, though there’s no web-based interface to view or modify your synced settings.

Settings sync is configured in PC Settings.

Question No: 94

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

You support Windows 8.1 Enterprise desktop computers and tablets. All of the computers are able to connect to your company network from the Internet by using DirectAccess.

Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:

->The application is not accessible if a user is working offline.

->The application is stored on an internal solid-state drive (SSD) on the tablets.

->The application is isolated from other applications.

->The application uses the least amount of disk space.

You need to deploy the new application to the tablets. What should you do?

  1. Deploy the application as an Application Virtualization (App-V) package. Install the App- V 4.6 client on the tablets.

  2. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.

  3. Install the application on a local drive on the tablets.

  4. Install the application in a Windows To Go workspace.

  5. Install Hyper-V on tablets. Install the application on a virtual machine.

  6. Publish the application to Windows Store.

  7. Install the application within a separate Windows 8.1 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.

  8. Install the application within a separate Windows 8.1 installation in a VHDX file. Configure tablets with dual boot.

Answer: A

Explanation: Microsoft Application Virtualization (also known as App-V) is an application virtualization and application streaming solution from Microsoft.

Reference: https://en.wikipedia.org/wiki/Microsoft_App-V

Question No: 95

You administer Windows 8.1 Enterprise desktop computers that are members of an Active Directory domain.

You want to create an archived copy of user profiles that are stored on the desktops. You create a standard domain user account to run a backup task.

You need to grant the backup task user account access to the user profiles. What should you do?

  1. Add the backup task account to the Backup Operators group on every computer.

  2. Set the backup task account as NTFS owner on all the profiles.

  3. Add the backup task account to the Remote Management Users group on a domain controller.

  4. Add the backup task account to the Backup Operators group on a domain controller.

Answer: D

Question No: 96

You have client computers that run Windows 8 Pro.

You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort.

What should you include in the recommendation?

  1. File History

  2. the Program and Features Control Panel item

  3. Windows 7 File Recovery

  4. System Restore points

Answer: D

Explanation: A restore point is a representation of a stored state of your computer#39;s system files. You can use a restore point to restore your computer#39;s system files to an earlier point in time.

http://technet.microsoft.com/en-us/library/ff398019.aspx

Question No: 97

You administer a company network that includes Windows 8.1 Enterprise computers in an Active Directory domain. The company has purchased a subscription to Windows Intune.

Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune.

You need to ensure that file and program activity is always monitored on this computer. What should you do?

  1. Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.

  2. In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that uses the recommended settings.

  3. Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.

  4. Create and deploy a custom policy in the Windows Intune Center Settings template.

Answer: B

Explanation: The Windows Intune Agent policy template in the Windows Intune administrator console lets you create policies that you can use to configure the Windows Intune Endpoint Protection policy settings and Updates policy settings.

Note: Monitor file and program activity on computers

This policy setting lets you configure monitoring for incoming files and outgoing files, without

completely disabling monitoring on client computers.

  • Yes lets you configure monitoring for incoming and outgoing files.

  • No disables monitoring for incoming and outgoing files. Recommended value: Yes

Reference: Windows Intune Agent Policy Reference

Question No: 98 HOTSPOT

Your network contains an Active Directory domain.

The Default Domain Policy contains the AppLocker settings configured as shown in the AppLocker Settings exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

The Default Domain Policy contains the AppLocker properties configured as shown in the AppLocker Properties exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

http://technet.microsoft.com/en-us/library/hh994614.aspx http://technet.microsoft.com/en-us/library/hh994629.aspx

Question No: 99 HOTSPOT

You have five client computers that are configured as shown in the following table.

Ensurepass 2018 PDF and VCE

You verify that each computer supports the installation of the 64-bit version of Windows 8 Pro.

You need to identify which method to use to deploy the 64-bit version of Windows 8 Pro to each computer. The solution must minimize the need to reinstall applications and to reconfigure settings.

In the table below, identify the correct deployment method for each computer. Make only one selection in each row. Each correct selection is worth one point.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

http://technet.microsoft.com/en-us/library/jj203353.aspx

Question No: 100

Your network contains Windows 8.1 Enterprise client computers. The computers are members of an Active Directory domain.

Your company purchases a subscription to Windows Intune.

Synchronization between Active Directory and Windows Intune is not configured. You enroll all of the computers in Windows Intune.

You plan to create groups that contain the computers by using dynamic membership. You need to identify which criteria you can use to populate the groups dynamically.

Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.)

  1. organizational unit (OU)

  2. domain

  3. security group

  4. manager

  5. device type

Answer: A,B,E

Explanation: A device group dynamic membership criteria:

  • (A) Organizational unit (OU): You can specify the OU for computers as membership criteria. OUs cannot be retrieved for mobile

    devices. The OUs are retrieved directly from the Windows Intune inventory.

    *(B) Domain: You can specify the domain for a computer as membership criteria. This information is retrieved from the Windows Intune inventory. Domain names cannot be retrieved for mobile devices.

  • (E) Device type: You can specify computers as membership criteria, and if your environment is configured to support mobile devices, mobile devices. Device type information for computers is retrieved from the Windows Intune inventory. Device type information for mobile devices is retrieved from Exchange.

    Reference: Windows Intune, Device and User Group Considerations

    100% Ensurepass Free Download!
    Download Free Demo:70-688 Demo PDF
    100% Ensurepass Free Guaranteed!
    Download 2018 EnsurePass 70-688 Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

  • Leave a Reply

    Your email address will not be published. Required fields are marked *