How To Pass The New 70-688 Exam? PassLeader now is offering the newest and 100 percent pass ensure 70-688 exam dumps with free pdf and vce dumps download, the latest updated 70-688 exam questions(now total 205q) are the most accurate exam dumps with all new questions including, which will help you passing Supporting Windows 8.1 70-688 exam easily and quickly. Now visit our site passleader.com and get the valid 205q 70-688 vce and pdf practice test and FREE VCE PLAYER!
keywords: 70-688 exam,70-688 exam dumps,70-688 205q exam questions,70-688 pdf dumps,70-688 vce dumps,70-688 205q practice test,70-688 vce file,Supporting Windows 8.1 exam
You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to prevent possible user data loss in the future. What should you do?
A. Configure the user’s documents library to include folders from network shares.
B. Remove the .man extension from the user profile name.
C. Add the .dat extension to the user profile name.
D. Configure Folder Redirection by using the domain group policy.
Drag and Drop Questions
You administer computers that run Windows 8. The computers on your network are produced by various manufacturers and often require custom drivers. You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE). In which order should you perform the actions? (To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.)
You have a computer that runs Windows 8 Enterprise. You need to ensure that all users can see the history of detected items in Windows Defender. Which option on the Settings tab should you select? (To answer, select the appropriate option in the answer area.)
Drag and Drop Questions
You administer computers and printers on your company network. The computers run Window 8 Pro. An employee wants to add a separator page to her printer task on a network printer. You create a separator page file and save it to the C:\Windows\System32 folder on her computer. You need to configure the computer to use the separator page for the print task. Which three actions should you perform in sequence on the computer? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You are an IT consultant for small and mid-sized businesses. One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do?
A. Ensure that each laptop and tablet can read a physical smart card.
B. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
C. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
D. Ensure that the laptops and tablets are running Windows 8 Enterprise edition.
You have a computer that runs Windows 8. The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows:
UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder. What permission should you identify?
B. Full Control
D. Read and Execute
Drag and Drop Questions
You support a desktop computer that runs Windows 8 Pro. The computer is joined to an Active Directory domain. The computer has a folder named C:\Reports. The folder NTFS permissions are shown in Exhibit 1. (Click the Exhibit button.)
The folder is shared over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)
Members of the domain security group named Accountants must have access to the shared folder. You need to assign the required permissions. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled. Some users require access to the internal company database servers while traveling. You need to configure the requested network connection to the database servers. What should you configure on the laptops?
A. A DirectAccess connection to the company network
B. A virtual private network (VPN) connection to the company network
C. A metered network connection
D. Out of band management
You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Disk Management, create a new spanned volume.
B. From Disk Management, convert all of the 3-terabyte disks to GPT.
C. From PowerShell, run the New-VirtualDisk cmdlet.
D. From Disk Management, bring all disks offline.
E. From Diskpart, run the Convert MBR command.
F. From PowerShell, run the Add-PhysicalDisk cmdlet.
You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). Your company decides that access to the company network for all users must be controlled by two-factor authentication. You need to configure the computers to meet this requirement. What should you do?
A. Install smart card readers on all computers. Issue smart cards to all users.
B. Enable the Password must meet complexity requirements policy setting. Instruct users to log on by using the domain \username format for their username and their strong password.
C. Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate all traffic. Apply the IPsec policy to the domain.
D. Issue photo identification to all users. Instruct all users to set up and use PIN Logon.
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Ask the user to run the manage-bde -protectors -disable e: command.
B. Ask the user for his or her logon name.
C. Ask the user to run the manage-bde -unlock E: -pw command.
D. Ask the user for his or her computer name.
E. Ask the user for a recovery key ID for the protected drive.
Drag and Drop Questions
You support desktop computers for a company named Fabrikam, Inc. The computers are members of the Active Directory domain named fabrikam.com. Fabrikam works with a supplier named Contoso, Ltd. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain. The website requires SSL and mutual authentication. You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts. You also need to use the fewest certificates possible. Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has 10 client computers that run Windows 8. Employees log on to resources by using multiple accounts. You need to back up the user name and password for each logon account. What should you do on each client computer?
A. Back up each user’s Personal Information Exchange PKCS #12 (.pfx) certificate.
B. Use Credential Manager to save the information to a USB flash drive.
C. Use File History to back up the ntuser.dat file.
D. Run the Export-Certificate Windows PowerShell cmdlet.
A company has client computers that run Windows 8. You implement an AppLocker file hash rule that allows an application to run. You then apply a service pack to the application. When users attempt to run the application, the application is blocked by Group Policy. You need to ensure that the application runs. What should you do?
A. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
B. Set the wired network connection to non-metered.
C. Set the wired network connection to metered.
D. Configure the Automatic Maintenance setting.
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
A. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
B. Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.
C. Change the default sharing configuration for the shared folders on the HomeGroup computers.
D. Reset your account password to match the HomeGroup password.