Top Simulation 70-686 testing material Tips!

It is more faster and easier to pass the Microsoft 70-686 exam by using Guaranteed Microsoft Pro: Windows questuins and answers. Immediate access to the Most up-to-date 70-686 Exam and find the same core area 70-686 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-686 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-686 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-686-exam-dumps.html

Q71. You plan to upgrade Windows Vista to Windows 7 on a computer named Computer01. You run ScanState and store the results on a remote computer at \\Server01\mystore. After the ScanState command completes, a user customizes a profile and adds mission-critical data. 

You attempt to run ScanState again but it fails. 

You need to overwrite Computer01's existing information on Server01. 

Which command line options should you use to execute the ScanState command? (Choose all that apply.) 

A. /efsxopyraw 

B. /v:13 

C. \\Server01\mystore 

D. /o 

Answer: C,D 


Q72. You have an image that is used to deploy Windows 7 on client computers. 

You need to modify the image to change the edition of Windows 7. 

What should you do? 

A. Use Windows Setup to service the image. 

B. Service the image online. 

C. Service the image offline. 

D. Use audit mode to service the image. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/dd744572(v=ws.10).aspx 

Change the Windows Image to a Higher Edition You can change your Windows image to a higher edition while it is offline by using the DISM commands in the following procedure. You should not use this procedure on an image that has already been changed to a higher edition. 


Q73. You are designing a Windows 7 Enterprise image creation strategy. 

The strategy must meet the following requirements: 

Support 32-bit and 64-bit hardware. 

Support 64-bit applications. 

Minimize the total number of images. 

Reduce the bandwidth required to deploy an image. 

Use System Center Configuration Manager (ConfigMgr) for application deployment. 

You need to recommend the images that meet the requirements. 

Which images should you recommend? (Choose all that apply.) 

A. a thin image for the 32-bit version of Windows 7 

B. a thick image for the 32-bit version of Windows 7 

C. a thick image for the 64-bit version of Windows 7 

D. a thin image for the 64-bit version of Windows 7 

Answer: A,D 


Q74. Your company has offices in several countries. You must test and validate all operating system images before you deploy them. 

You create a Windows 7 Enterprise master image that has all language packs installed. You test and validate the master image. 

You are planning to create regional images based on the master image. Each regional image will contain only the language pack that is necessary for a specific geographic region. 

You have the following requirements: 

. Remove the language packs that are unnecessary for each region. 

. Minimize the necessary testing and validation. 

You need to create the regional images. 

What should you do? 

A. Run lpksetup.exe /u in unattended mode on the master image. 

B. Deploy the master image to a target computer. Remove the unnecessary language packs, and then capture each regional image. 

C. Service the master image online by using the Deployment Image Servicing and Management (DISM) tool. 

D. Service the master image offline by using the Deployment Image Servicing and Management (DISM) tool. 

Answer:

Explanation: 

Deployment Image Servicing and Management (DISM) tool: 

Image servicing and management solutions fall into two main categories: 

Managing the data or information included in the Windows image, such as enumerating or taking an inventory of the components, updates, drivers, or applications contained in an image. 

Servicing the image itself, including adding or removing driver packages and drivers, modifying language settings, enabling or disabling Windows features, and upgrading to a higher edition of Windows. 

http://technet.microsoft.com/en-us/library/dd744566(v=ws.10).aspx 


Q75. Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browsers security settings. 

What should you do? 

A. Reset the Internet Explorer settings 

B. Restore the advanced settings in Internet Explorer C. Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode 

D. Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode 

Answer:

Explanation: 

Normal mode, you can configure IEM settings so that they are refreshed on users' 

computers on a periodic basis (or each time the users log in). However, users can 

temporarily change these settings between the times scheduled for their setting refresh. 

For this reason, these settings in Normal mode behave as "pseudo-policies." 

In Preference mode, you can configure IEM settings, but allow users to change these 

settings later by using the Internet Explorer 9 user interface. 

http://technet.microsoft.com/en-us/library/gg699413.aspx 


Q76. HOTSPOT 

You are preparing to install a 32-bit legacy application on all client computers in an organization. 

The application requires specific compatibility settings in order to function in Windows 7. You run the 32-bit version of Compatibility Administrator and create a new application fix. 

You need to create a shim database that includes a compatibility fix for applications that have known issues with the Desktop Window Manager. 

Which compatibility modes should you select? To answer, select the appropriate setting in the work area. 

Answer: 


Q77. A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network. 

You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months. 

You need to plan the most efficient method for activating all of the computers. 

What should you do? 

A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers. 

B. Use the Key Management Service (KMS) for all the computers. 

C. Use Multiple Activation Key (MAK) Independent for all the computers. 

D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers. 

Answer:

Explanation: 

Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself. 

refer to http://technet.microsoft.com/en-us/library/ee939272.aspx 

MAK: 

If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internet one time. If the users install a MAK using the Slmgr.vbs script, the MAK client does not try to activate itself automatically. 

refer to http://technet.microsoft.com/en-us/library/ff793438.aspx 

Hints: 

The computers do not have access to the internet 


Q78. Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. 

You are planning to deploy Windows 7 Enterprise to the client computers. 

You need to design a zero-touch installation strategy. 

What should you use in your design? 

A. custom Windows 7 image on DVD 

B. unattended installation 

C. Windows Deployment Services (WDS) 

D. Microsoft System Center Configuration Manager 2007 R2 

Answer:

Explanation: 

Microsoft Deployment Toolkit (MDT) 2010 is a Microsoft solution accelerator available at no cost for deploying Windows operating systems. Based on the experience of Microsoft employees, partners, and customers, MDT 2010 contains many thousands of lines of code—code that provides a deployment framework so that customers can focus on their business, not on programming. Integrating MDT 2010 with Configuration Manager 2007 R2 helps large organizations use this framework to more easily implement the Zero-Touch, High-Volume 

Deployment strategy. 

Benefits of integrating MDT 2010 with Configuration Manager 2007 R2 in the Zero-Touch, High-Volume 

Deployment strategy include: 

-Streamlined deployment, because installation is fully automated without interaction. 

-Lower support costs, because configurations are consistent across all client computers. 

-Streamlined maintenance, because Configuration Manager 2007 R2 handles applications, device drivers, and updates. 

http://technet.microsoft.com/en-us/library/dd919178(v=ws.10).aspx 


Q79. When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message. 

You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC. 

To which group should you add the user? 

A. Add the user to the Power Users group on Server1. 

B. Add the user to the Remote Desktop Users group on Server1. 

C. Add the user to the domain Windows Authorization Access group. 

D. Add the user to the domain Remote Desktop Users group 

Answer:


Q80. Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates. 

Microsoft releases a security update for Windows 7. 

You have the following requirements: 

. Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed. 

. Use the least amount of administrative effort. 

You need to manage the software update process to meet the requirements. 

What should you do? 

A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation, and force a detection cycle on the client computers. 

B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers. 

C. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers. 

D. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA to use the Microsoft Update site catalog. 

Answer:

Explanation: 

Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems. 

http://technet.microsoft.com/en-us/security/cc184924