[Free] 2019(Nov) EnsurePass Microsoft 70-697 Dumps with VCE and PDF 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/70-697.html

Question No.61

You are using sysprep to prepare a system for imaging.

You want to reset the security ID (SID) and clear the event logs.

Which option should you use?

  1. /generalize

  2. /oobe

  3. /audit

  4. /unattend

Correct Answer: A

Explanation:

Generalize prepares the Windows installation to be imaged. If this option is specified, all unique system information is removed from the Windows installation. The security ID (SID) resets, any system restore points are cleared, and event logs are deleted.

The next time the computer starts, the specialize configuration pass runs. A new security ID (SID)is created, and the clock for Windows activation resets, if the clock has not already been reset three times.

Question No.62

DRAG DROP

You administer computers that run Windows 10 Enterprise. The computers on your network are produced by various manufacturers and often require custom drivers.

You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).

In which order should you perform the actions?

To answer, move all actions from the list of actions to the answer area and arrange then in the correct order.

image

Correct Answer:

image

Question No.63

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.

You have an application named App1 installed on a computer named Computer1. Computer1 runs Windows 10. App1 saves data to %UserProfile%\App1\Data.

You need to ensure that you can recover the App1 data if Computer1 fails. What should you configure?

  1. share permissions

  2. application control policies

  3. Encrypting File System (EFS) settings

  4. NTFS permissions

  5. HomeGroup settings

  6. Microsoft OneDrive

  7. software restriction policies

  8. account policies

Correct Answer: F

Question No.64

You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker.

The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume.

You need to provide a BitLocker recovery key to unlock the protected volume.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Ask the user to run the manage-bde-protectors-disable e: command.

  2. Ask the user for his or her logon name.

  3. Ask the user to run the manage-bde-unlock E:-pw command.

  4. Ask the user for his or her computer name.

  5. Ask the user for a recovery key ID for the protected drive.

Correct Answer: CD

Explanation:

D: To view the recovery passwords for a computer you would need the computer name.

C: The Manage-bde: unlock command unlocks a BitLocker-protected drive by using a recovery password or a recovery key.

Question No.65

A company has client computers that run Windows 10.

The client computer systems frequently use IPSec tunnels to securely transmit data.

You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?

  1. 3DES

  2. DES

  3. RSA

  4. AES

Correct Answer: D

Explanation:

IPSec tunnels can be encrypted by 256-bit AES.

L2TP/IPsec allows multiprotocol traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery, such as IP or Asynchronous Transfer Mode (ATM).

The L2TP message is encrypted with one of the following protocols by using encryption keys generated from the IKE negotiation process: Advanced Encryption Standard (AES) 256, AES 192, AES 128, and 3DES encryption algorithms.

Question No.66

You administer computers that run Windows 10 Enterprise and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory.

A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume.

Which two actions should you perform? Each correct answer presents part of the solution.

  1. Ask the user for his computer name.

  2. Ask the user to run the manage-bde -unlock E: -pw command.

  3. Ask the user for his logon name.

  4. Ask the user for a recovery key ID for the protected volume.

Correct Answer: AB

Explanation:

A: To view the recovery passwords for a computer you would need the computer name:

B: The Manage-bde: unlock command unlocks a BitLocker-protected drive by using a recovery password or a recovery key.

Question No.67

You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory.

You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members.

You need to ensure that users that meet the membership criteria are added to the Windows Intune group. What should you do?

  1. Force Active Directory replication within the domain.

  2. Ensure that all user accounts are identified as synchronized users.

  3. Ensure that the user who is performing the search has been synchronized with the Microsoft

    Online directory.

  4. Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.

Correct Answer: B

Explanation:

Add Computers, Users, and Mobile Devices http://technet.microsoft.com/library/hh441723.aspx

For users and security groups to appear in the Windows Intune administrator console, you must sign in to the Windows Intune account portal and do one of the following:

Windows Intune

The Windows Intune cloud service enables you to centrally manage and secure PCs through a single web-based console so you can keep your computers, IT staff, and users operating at peak performance from virtually anywhere without compromising the essentialscost, control, security, and compliance.

References: http://technet.microsoft.com/en-us/windows/intune.aspx

Question No.68

You administer Windows 10 Enterprise client computers in your company network. A user reports that her Internet connection is slower than usual.

You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet.

Which command should you run?

  1. netstat -an

  2. netsh show netdlls

  3. netsh set audit-logging

  4. netstat -o

  5. ipconfig /showclassid

Correct Answer: D

Question No.69

Which term is used to refer to installing apps directly to a device without going through the Windows Store?

  1. SQL Injection

  2. BranchCache

  3. DLLHijack

  4. Sideloading

Correct Answer: D

Explanation:

When you sideload an app, you deploy a signed app package to a device. You maintain the signing, hosting, and deployment of these apps, instead of installing the apps from Windows Store.

Question No.70

DRAG DROP

You manage update compliance for Windows 10 desktop computers that are part of a domain. You need to configure new desktops to automatically receive updates from an intranet resource that you manage.

Which three actions should you perform in sequence?

image

Correct Answer:

image

Get Full Version of the Exam
70-697 Dumps
70-697 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.