[Free] 2017 Ensurepass Testking Microsoft 70-697 Actual Test 51-60

Ensurepass

Configuring Windows Devices

 

QUESTION 51

HOTSPOT

You have a computer that runs Windows 10 Enterprise that has a local group policy as shown in the following graphic.

 

clip_image002

 

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.

NOTE: Each correct selection is worth one point.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 52

You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet.

The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot.

You need to minimize data usage while connected to this hot spot.

What should you do?

 

A.

Turn on Airplane Mode.

B.

Disable File and Print Sharing for mobile broadband connections.

C.

Configure the interface metric of IP settings for Wi-Fi connection as 1.

D.

Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.

E.

Configure the broadband connection as a metered network.

 

Correct Answer: E

 

 

QUESTION 53

Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. You plan to develop a line-of-business application and to deploy the application by using Windows Store for Business.

You need to ensure that users can see the private store of your company when they sign in to the Windows Store for Business.

What should you do first?

 

A.

Provision a Windows Dev Center dev account for each user.

B.

Assign the Windows Store Purchaser role to each user.

C.

Assign the Windows Store Admin role to each user.

D.

Provision a Microsoft Azure Active Directory (Azure AD) account for each user.

E.

Provtsion a Microsoft accou
nt for each user.

 

Correct Answer: D

 

 

QUESTION 54

DRAG DROP

You have a line-of-business universal app named App1. You have an image of Windows 10 Enterprise named Image1. Image1 is mounted to the C:Folder1 folder on a Windows 10 Enterprise computer named Computer1. The source for App1 is in the C:folder2 folder.

You need to ensure that App1 is included in Image1.

What command should you run on Computer1?

To answer, drag the appropriate values to the correct locations. Each value may be used once, more than once or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image008

 

Correct Answer:

clip_image010

 

 

QUESTION 55

DRAG DROP

You have a computer that runs Windows 10.

 

You need to meet the following requirements:

 

clip_image012Users must use complex passwords.

clip_image012[1]Users must change their password every 180 days.

clip_image012[2]Users must be prompted to change their password seven days before the password expires.

 

Which policy setting should you configure for each requirement?

 

To answer, drag the appropriate policy settings to the correct requirements. Each policy setting may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

clip_image014

 

Correct Answer:

clip_image016

 

 

QUESTION 56

You administer Windows 10 Enterprise client computers in your company network.

You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.

You need to save the windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later.

What should you do?

 

A.

Open Local Group Policy Editor, select the Windows Fi re wall with Advanced Security node, and the select the Export Policy action.

B.

Run the netsh advfirewall export c:settings.wfw command.

C.

Run the netsh firewall export c:settings.xml command.

D.

Run the netsh advfirewall export c:setti ngs.xm I command.

 

Correct Answer: A

 

 

 

QUESTION 57

A company has 100 client computers that run Windows 8.1. The client computers are members of a workgroup.

A custom application requires a Windows Firewall exception on each client computer.

You need to configure the exception on the client computers without affecting existing firewall settings.

Which Windows PowerShell cmdlet should you run on each client computer?

 

A.

New-NetFirewallRule

B.

Set-NetFirewallSetting

C.

Set-NetFirewallRule

D.

Set-NetFirewallProfile

E.

New-NetlPSecMainModeRule

 

Correct Answer: A

 

 

QUESTION 58

HOTSPOT

You have DHCP server. The server has a scope that is configured as shown in the DHCP scope exhibit. (Click the Exhibit button.)

 

clip_image018

 

A user fails to access internal websites and resources.

 

The computer of the user has the firewall settings shown in the Firewall settings exhibit (Click the Exhibit button.)

 

clip_image020

 

The computer also has the network settings shown in the Network Settings exhibit (Click the Exhibit button.)

 

clip_image022

 

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

 

clip_image023

 

Correct Answer:

clip_image024

 

 

QUESTION 59

You administer Windows 10 Enterprise client computers in your company network.

A user reports that her Internet connection is slower than usual.

You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet.

Which command should you run?

 

A.

netstat -an

B.

jpconfig /showclassid

C.

netstat -o

D.

netsh set audit-logging

E.

netsh show netdlls

 

Correct Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/bb490947.aspx

 

Netstat

Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, 1C MR, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.

Syntax

netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]

Parameters a : Displays all active TCP connections and the TCP and UDP ports on which the computer is listening. -n : Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names. o : Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager. This parameter can be combined with – a, -n, and -p.

 

Further Information:

netstat -an – there is no “an” parameter

http://technet.microsoft.com/en-us/library/cc940124.aspx

 

 

 

 

 

 

 

 

QUESTION 60

A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 10 Enterprise.

 

A client computer hosts a Windows 10 Enterprise virtual machine (VM) test environment.

 

The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. (Click the Exhibit button.)

 

clip_image026

 

You have the following requirements:

 

clip_image012[3]Configure the test environment to allow VMs to communicate with the host machine.

clip_image012[4]Minimize impact on the host machine.

 

You need to meet the requirements.

 

What should you do?

 

A.

Create a new virtual switch with a Private Network [CPI] connection type.

B.

Create a new virtual switch with an Externa I Network connection type.

C.

Change the VLAN ID of the private virtual switch to Enable Virtual LAN identification.

D.

Create a new virtual switch with an Internal Network connection type.

 

Correct Answer: D

Explanation:

http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-2-configure-hardware-ancl- applications-16/

 

Virtual switches/ Hyper-V VLAN – you can create 3 different types of virtual switches depending the needs of your virtual machines and one single machine can use multiple virtual NICs that is member of different Virtual Switches.

External – This virtual switch binds to the physical network adapter and create a new adapter you can see in Control PanelNetwork and InternetNetwork Connections so if a virtual machine needs contact outside the host machine this one is a must.

Internal – This virtual switch can be used to connect all virtual machines and the host machine but cannot go outside

Private – This virtual switch can only be used by the virtual host

Further information:

 

http://technet.microsoft.eom/en-us/library/cc816585%28v:ws.10%29.aspx

 

Configuring Virtual Networks

clip_image028

 

Private will not allow communication with the host machine. External will allow communication with the host machine but also allow access to other machines on the host machine’s network which is not a requirement.

 

Free VCE & PDF File for Microsoft 70-697 Actual Tests

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…