aiotestking uk

70-686 Exam Questions - Online Test


70-686 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Your company plans to upgrade all client computers to Windows 7. 

The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7 

You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application. 

You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server. 

What should you do? 

A. Using MED-V TrimTransfer technology, deploy the VM image over the network 

B. In the MED-V console, configure the MED-V workspace to prevent offline operation 

C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored 

D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory 

Answer:

Q2. HOTSPOT

You are designing a Windows 7 Enterprise custom image. You create an autounattend.xml file by using Windows System Image Manager (SIM). This file will be used when the image is deployed. 

You are planning to install Windows 7 on a second hard disk in a computer. You configure the DiskID setting. 

You need to select the configuration pass where you will add the DiskID setting. 

Which option should you select? To answer, select the appropriate setting or settings in the work area. 

Answer:  

Q3. Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available in the Group Policy editing session.

 You need to ensure that the ADMX files are available to the GPO Editor. What should you do? 

A. Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restart the GPO Editor. 

B. Set the network share permissions to grant all Windows 7 users Read access for the share. 

C. Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and then restart the GPO Editor. 

D. Copy the ADMX files to the central store, and then restart the GPO Editor. 

Answer:

Explanation: 

http://support.microsoft.com/kb/929841 To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later replicated to all domain controllers in the domain. 

Q4. Your companys client computers run Windows 7. Your companys network has a wireless access point (WAP). 

A user reports that he regularly loses connectivity to the WAP. 

You need to display information about client connectivity to the WAP. 

What should you do? 

A. Use Event Viewer to view events from a source of WlanConn. 

B. Use auditpol.exe to enable successful attempts in the Object Access category. 

C. Use Event Viewer to view events from a source of WLAN AutoConfig. 

D. Use auditpol.exe to enable failed attempts in the Object Access category. 

Answer:

Explanation: 

WLAN AutoConfig service is built-in tool in Windows 7 that can be used to detect and connect to wireless network, http://www.home-network-help.com/wlan-autoconfig-service.html 

Q5. You are planning to upgrade Microsoft Internet Explorer. You must create a report that identifies which computers are successfully upgraded. You need to design a deployment method that meets this requirement. What should you use? (Choose all that apply.) 

A. Microsoft System Center Essentials 

B. Windows Intune 

C. Microsoft System Center Configuration Manager 

D. Internet Explorer Administration Kit (IEAK) and Group Policy 

E. Windows Server Update Services (WSUS) 

Answer: A,B,D,E 

Q6. Your network has 1,000 client computers that run Windows 7. 

You plan to deploy a new application. 

You need to ensure that the application deploys only during non-business hours. 

What should you do? 

A. Use Group Policy. 

B. Use Microsoft System Center Configuration Manager. 

C. Use Windows Deployment Services with a schedule cast. 

D. Use a logon script. 

Answer:

Explanation: 

Microsoft System Center Configuration Manager able to schedule task (Text Book) 

Q7. A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network. 

You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. 

You need to plan the most efficient method for activating all of the computers. 

What should you do? 

A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers. 

B. Use the Key Management Service (KMS) for all the computers. 

C. Use Multiple Activation Key (MAK) Independent for all the computers. 

D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers. 

Answer:

Explanation: 

Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself. 

refer to http://technet.microsoft.com/en-us/library/ee939272.aspx 

MAK: 

If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internet one time. If the users install a MAK using the Slmgr.vbs script, the MAK client does not try to activate itself automatically. 

refer to http://technet.microsoft.com/en-us/library/ff793438.aspx 

Hints: 

The computers do not have access to the internet 

Q8. A company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers run Windows 7 Enterprise. The kiosk computers do not have network connections. 

The company brands the Microsoft Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar. The company changes its logo. 

You have the following requirements: 

. Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers. 

. Modify the search providers that are available to main office computers. 

You need to define Internet Explorer settings to support the requirements. 

Which two actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q9. DRAG DROP 

All client computers in a company run Windows 7 Enterprise. The company creates Windows PowerShell scripts to collect statistical data from client computers. A logon script is configured to run the PowerShell scripts during log on. 

An error occurs when the scripts are run on client computers. 

You need to ensure that all PowerShell scripts run correctly. 

Which command should you use? (To answer, drag the appropriate component from the list of components to the correct location or locations in the work area.) 

Answer:  

Q10. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application. You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.) 

A. Create a collection with the required computers and assign the software to the collection. 

B. Create a software installation Group Policy object (GPO). 

C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain. 

D. Create a software deployment package by using System Center Configuration Manager 2007. 

E. Create an unattend.xml file. 

F. Create a silent install MSI file. 

Answer: A,D,F 

Explanation: 

hints: without user interaction = silent install MSI file