[Free] 2017(May) Ensurepass Testinsides Microsoft 70-697 Real Tests Topic 2, Plan desktop and device deployment

Ensurepass
2017 May Microsoft Official New Released 70-697 Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/70-697.html

Configuring Windows Devices

Topic 2, Plan desktop and device deployment

 

QUESTION 1

You are the desktop administrator for a small company.

 

Your workgroup environment consists of Windows 10 Enterprise computers. You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used.

 

You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network.

 

Which two actions should you perform? Each correct answer presents part of the solution.

 

A.

Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S.

B.

Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.

C.

Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements. Export the power scheme by using POWERCFG /EXPORT.

D.

Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.

 

Correct Answer: AB

Explanation:

You can use the Powercfg.exe tool to control power settings and configure computers to default to Hibernate or Standby modes.

In this question, we use POWERCFG /X on one help desk computer to modify the power scheme to meet our requirements. After configuring the required settings, we can export the power scheme settings to a file by using POWERCFG /EXPORT. We can then import the power scheme from the file on each of the remaining help desk computers by using POWERCFG /IMPORT. After importing the power scheme on the remaining computers, we need to set the new power scheme to be the active power scheme by using POWERCFG /S.

 

 

QUESTION 2

You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch.

 

From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1.

 

What should you do?

 

A.

Run the winrm.exe command and specify the -s parameter.

B.

Run the Powershell.exe command and specify the -Command parameter.

C.

Run the Receive-PSSession cmdlet and specify the -Name parameter.

D.

Run the Invoke-Command cmdlet and specify the -VMName parameter.

 

Correct Answer: D

Explanation:

We can use Windows PowerShell Direct to run PowerShell cmdlets on a virtual machine from the Hyper-V host. Because Windows PowerShell Direct runs between the host and virtual machine, there is no need for a network connection or to enable remote management.

There are no network or firewall requirements or special configuration. It works regardless of your remote management configuration. To use it, you must run Windows 10 or Windows Server Technical Preview on the host and the virtual machine guest operating system.

 

To create a PowerShell Direct session, use one of the following commands:

Enter-PSSession -VMName VMName

Invoke-Command -VMName VMName -ScriptBlock {commands}

 

 

QUESTION 3

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip.

 

You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers.

 

Which two actions should you perform? Each correct answer presents part of the solution.

 

A.

Enable the Require additional authentication at startup policy setting.

B.

Enable the Enforce drive encryption type on operating system drives policy setting.

C.

Enable the option to allow BitLocker without a compatible TPM.

D.

Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.

 

Correct Answer: AC

Explanation:

We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip). We can do this by enabling the option to allow BitLocker without a compatible TPM in the group policy. The `Allow BitLocker without a compatible TPM’ option is a checkbox in the `Require additional authentication at startup’ group policy setting. To access the `Allow BitLocker without a compatible TPM’ checkbox, you need to first select Enabled on the `Require additional authentication at startup’ policy setting.

 

 

QUESTION 4

Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app.

 

An employee’s personally owned portable computer is stolen.

 

You need to protect the corporate applications and email messages on the computer.

 

Which two actions should you perform? Each correct answer presents part of the solution.

 

A.

Prevent the computer from connecting to the corporate wireless network.

B.

Change the user’s password.

C.

Disconnect the computer from the management infrastructure.

D.

Initiate a remote wipe.

 

Correct Answer: BD

Explanation:

The personally owned portable Windows10Enterprise computers being managed by the management infrastructure agent enables the use of remote wipe. By initiating a remote wipe, we can erase all company data including email from the stolen device. Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. Because mobile devices can store sensitive corporate data and provide access to many corporate resources, you can issue a remote device wipe command from the Microsoft Intune administrator console to wipe a lost or stolen device.

Changing the user’s password should be the first step. If the stolen computer is accessed before the remote wipe happens, the malicious user could be able to access company resources if the laptop has saved passwords.

 

 

QUESTION 5

You administer a Windows 10 Enterprise computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of RAM.

 

You discover that the virtual machine pauses automatically and displays the state as paused-critical.

 

You need to identify the component that is causing the error.

 

Which component should you identify?

 

A.

no virtual switch defined

B.

insufficient memory

C.

insufficient hard disk space

D.

insufficient number of virtual processors

 

Correct Answer: C

Explanation:

In this question, the VM has “multiple snapshots” which would use up a lot of disk space. Virtual machines will go into the “Paused-Critical” state in Hyper-V if the free space on the drive that contains the snapshots goes below 200MB. One thing that often trips people up is if they have their virtual hard disks configured on one drive ?but have left their snapshot files stored on the system drive. Once a virtual machine snapshot has been taken?the base virtual hard disk stops expanding and the snapshot file stores new data that is written to the disk ?so it is critical that there is enough space in the snapshot storage location.

 

 

QUESTION 6

You are an IT consultant for small and mid-sized business.

 

One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards.

 

You need to verify that the client laptops and tablets support Virtual Smart Cards.

 

What should you do?

 

A.

Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.

B.

Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.

C.

Ensure that each laptop and tablet can read a physical smart card.

D.

Ensure that the laptops and tablets are running Windows 10 Enterprise edition.

 

Correct Answer: A

Explanation:

A Trusted Platform Module (TPM) chip of version 1.2 or greater is required to support Virtual Smart Cards.

Virtual smart card technology from Microsoft offers comparable security benefits to physical smart cards by using two-factor authentication. Virtual smart cards emulate the functionality of physical smart cards, but they use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. Virtual smart cards are created in the TPM, where the keys that are used for authentication are stored in cryptographically secured hardware.

 

 

QUESTION 7

You deploy several tablet PCs that run Windows 10 Enterprise.

 

You need to minimize power usage when the user presses the sleep button.

 

What should you do?

 

A.

In Power Options, configure the sleep button setting to Sleep.

B.

In Power Options, configure the sleep button setting to Hibernate.

C.

Configure the active power plan to set the system cooling policy to passive.

D.

Disable the C-State control in the computer’s BIOS.

 

Correct Answer: B

Explanation:

We can minimize power usage on the tablet PCs by configuring them to use Hibernation mode. A computer in hibernation mode uses no power at all. Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and settings in memory and draws a small amount of power, hibernation puts your open documents and programs on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hibernation uses the least amount of power. On a laptop, use hibernation when you know that you won’t use your laptop for an extended period and won’t have an opportunity to charge the battery during that time.

100% Free Download!
—Download Free Demo:70-697 Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass 70-697 Full Exam PDF and VCE Q&As:146
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.05.01-2017.05.31]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE