[Free] Download New Updated (December) Microsoft 70-688 Exam Questions 61-70

Ensurepass

QUESTION 61

You support computers that run Windows 8. You are designing a remote access server (RAS). The firewall accepts incoming TCP connections only to ports 80 and 443. You want to connect to the RAS server from a laptop. You need to create a virtual private network (VPN) connection to the RAS server. Which VPN tunneling protocol should you use?

 

A.

L2TP

B.

SSTP

C.

PPTP

D.

IPSEC

 

Correct Answer: B

Explanation:

http://www.windowsecurity.com/articles-tutorials/firewalls_and_VPN/Secure- Socket-Tunneling-Protocol.html

http://technet.microsoft.com/en-us/library/cc731352%28v=WS.10%29.aspx

 

 

QUESTION 62

You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. You are planning to add a guest wireless network. You need to collect information about nearby wireless networks, including their encryption methods. Which command should you include in the batch file?

 

A.

Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘

B.

PowerShell commandlet Get-Host

C.

PowerShell commandlet Get-Netadapter with parameter -Wireless

D.

netstat -a

E.

netsh wlan show hostednetwork

F.

netsh wlan show networks

 

Correct Answer: F

Explanation:

http://technet.microsoft.com/en-us/library/cc755301%28v=WS.10%29.aspx

http://technet.microsoft.com/en-us/library/cc755301%28v=WS.10%29.aspx#bkmk_wlanShowNetworks

 

 

QUESTION 63

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?

 

A.

Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.

B.

Reset your account password to match the HomeGroup password.

C.

Disjoin all HomeGroup members and re-create the HomeGroup.

D.

Change NTFS security permission on the shared folders. Grant Everyone account Read & Execute permission.

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/cc754178.aspx

 

 

QUESTION 64

DRAG DROP

You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image002

 

Correct Answer:

clip_image004

 

 

 

 

 

 

 

QUESTION 65

You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.

Ask the user for his computer name.

B.

Ask the user to run the manage-bde -unlock E: -pw command.

C.

Ask the user for his logon name.

D.

Ask the user for a recovery key ID for the protected volume.

 

Correct Answer: AC

Explanation:

http://windows.microsoft.com/en-US/windows-8/bitlocker-recovery-keys-faq

http://technet.microsoft.com/en-us/library/dn383583.aspx

http://technet.microsoft.com/en-us/library/dd875560%28v=WS.10%29.aspx

http://support.microsoft.com/kb/2855131

 

 

QUESTION 66

You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain. Users travel frequently and access domain resources from inside client networks or from their home network. You want to manage the laptops when they are connected to the company network from the external networks. You need to ensure that the laptops can be managed and maintained while users are not logged on to the computers. Which of the following should you recommend?

 

A.

Remote Assistance

B.

Windows Remote Management (WinRM)

C.

DirectAccess

D.

Remote Desktop

 

Correct Answer: C

Explanation:

Networking and Access Technologies

 

Reference:

http://technet.microsoft.com/en-us/network/dd420463.aspx

 

DirectAccess, introduced in the Windows 7 and Windows Server 2008 R2 operating systems, allows remote users to securely access enterprise shares, web sites, and applications without connecting to a virtual private network (VPN). DirectAccess establishes bi-directional connectivity with a user’s enterprise network every time a user’s DirectAccess-enabled portable computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the enterprise network and IT administrators can manage remote computers outside the office, even when the computers are not connected to the VPN. Forefront Unified Access Gateway (UAG) 2010 extends the benefits of DirectAccess across your infrastructure, enhancing scalability and simplifying deployment and ongoing management.

 

 

 

 

 

QUESTION 67

DRAG DROP

You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members of the Active Directory domain named contoso.com. Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible from the Contoso network. The website requires SSL and mutual authentication. You need to configure the computers to allow contoso.com domain users to access the website without any warning prompts. You also need to use the fewest certificates possible. Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

 

clip_image006

 

Correct Answer:

clip_image008

 

 

 

 

 

 

 

 

 

 

 

QUESTION 68

You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers a
re located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do?

 

A.

Enable Remote Desktop on the desktop computers.

B.

Run the winrm quickconfig command on your computer.

C.

Install Remote Server Administration Tools (RSAT) on your computer.

D.

Run the winrm quickconfig command on the desktop computers.

 

Correct Answer: D

Explanation:

Installation and Configuration for Windows Remote Management (Windows)

 

Reference:

http://msdn.microsoft.com/en-us/library/windows/desktop/aa384372(v=vs.85).aspx

 

Quick default configuration

 

Starting with Windows Vista, you can enable the WS-Management protocol on the local computer and set up the default configuration for remote management with the following command: Winrm quickconfig.

 

Windows Server 2003 R2: The Winrm quickconfig command is not available.

 

The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:

 

Starts the WinRM service, and sets the service startup type to auto-start.

 

Configures a listener for the ports that send and receive WS-Management protocol messages using either HTTP or HTTPS on any IP address.

 

Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.

 

Note:

The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not be enabled.

 

Reference 2:

http://blogs.technet.com/b/jonjor/archive/2009/01/09/winrm-windows-remote-management- troubleshooting.aspx

 

WinRM (Windows Remote Management) Troubleshooting

 

While WinRM listens on port 80 by default, it doesn’t mean traffic is unencrypted. Traffic by default is only accepted by WinRM when it is encrypted using the Negotiate or Kerberos SSP. WinRM uses HTTP (TCP 80) or HTTPS (TCP 443). WinRM also includes helper code that lets the WinRM listener share port 80 with IIS or any other application that may need to use that port.

 

http://technet.microsoft.com/en-us/library/hh921475.aspx

QUESTION 69

DRAG DROP

You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.

 

You create a folder named C:Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)

 

clip_image010

 

You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)

 

clip_image012

 

You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image014

 

Correct Answer:

clip_image016

 

 

QUESTION 70

You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.

 

Your company wants to deploy a new application to the tablets.

 

The deployment solution must meet the following requirements:

 

clip_image018The application is not accessible if a user is working offline.

clip_image018[1]The application is stored on an internal solid-state drive (SSD) on the tablets.

clip_image018[2]The application is isolated from other applications.

clip_image018[3]The application uses the least amount of disk space.

 

You need to deploy the new application to the tablets.

 

What should you do?

 

A.

Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.

B.

Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.

C.

Install the application on a local drive on the tablets.

D.

Install the application in a Windows To Go workspace.

E.

Install Hyper-V on tablets. Install the application on a virtual machine.

F.

Publish the application to Windows Store.

G.

Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.

H.

Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

 

Correct Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/cc843848.aspx

http://technet.microsoft.com/en-us/library/jj680850.aspx

 

Free VCE & PDF File for Microsoft 70-688 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…