May 2016 updated: Pass4sure Microsoft 70-688 exams 136-150

Exam Code: 70-688 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Managing and Maintaining Windows 8
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-688 Exam.

2016 May 70-688 Study Guide Questions:

Q136. You install the Microsoft Application Compatibility Toolkit (ACT) on a client computer named Computer1. Computer1 has the ACT Log Processing Service and Microsoft SQL Server 2012 Express installed. 

You install the ACT on a client computer named Computer2. 

When Computer2 attempts to connect to a SQL Server database, you receive the following error message: "The SQL Server you entered either does not exist or you do not have the required credentials for access." 

You need to ensure that Computer2 can connect to the SQL Server database successfully. 

Which should you do on Computer1? 

A. Create firewall exceptions for TCP port 443 and UDP port 389. 

B. Add Computer2 to the local Administrators group. 

C. Add Computer1 to the local Administrators group. 

D. Create firewall exceptions for Sqlservr.exe and Sqlbrowser.exe. 

Answer: A 


Q137. You are an administrator for a large company that has an Active Directory domain. Your company has tablets that run Windows RT. 

Users report that their tablets get locked after one minute of inactivity. They also report that when they change the Personalization setting to 15 minutes, it resets back to 1 minute. 

You need to ensure that the lockout time for inactivity is set to 15 minutes. 

What should you do? 

A. Log on to the tablets as a local administrator and configure the screensaver wait time and logon options. 

B. Modify Group Policy. 

C. Modify ActiveSync configuration. 

D. Log on to the tablets as a local administrator and run the PowerShell cmdlet Set-ScreenSaverTimeout -Seconds 900. 

E. Configure the local system policy Do not display the lock screen setting to Enabled. 

Answer: C 


Q138. DRAG DROP 

You support computers that run windows 8 Enterprise. AppLocker policies are deployed. 

Company policy states that AppLocker must be disabled. 

You need to disable AppLocker. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q139. DRAG DROP 

You have a Windows 8.1 computer. You have a 1-terabyte external hard drive. 

You purchase a second 1-terabyte external hard drive. 

You need to create a fault-tolerant volume that includes both external hard drives. You also 

need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q140. Your network contains an Active Directory domain. All client computers run Windows 8.1 Enterprise. 

You have a client computer named Computer1 that has a shared printer named Printer1. 

You need to recommend a solution to provide managers with the ability to print their print jobs before all of the other jobs in the print queue. 

What should you recommend? 

A. Modify the print processor of Printer1. 

B. Add a new shared printer, and then modify the print processor of the new printer. 

C. Add a new shared printer, and then modify the priority of the new printer. 

D. Modify the priority of Printer1. 

Answer: C 


70-688  training

Replace 70-688 free exam:

Q141. You administer laptop and desktop computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. 

You plan to install Intune Endpoint Protection on all computers. Some of the computers also have another antimalware application installed. 

You need to ensure that only the Intune Endpoint Protection application is running on all computers. 

What should you do? 

A. Configure the Enable Realtime Protection policy to Yes. 

B. Configure the Enable Endpoint Protection policy to Only on computers that are unprotected when Endpoint Protection is installed. 

C. Configure the Enable Endpoint Protection policy setting to Yes. 

D. Configure the Enable Endpoint Protection policy setting to No. 

Answer: C 


Q142. You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro. 

For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise. 

You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. 

What should you do? 

A. Start the tablets from the Windows To Go workspace. 

B. Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE). 

C. Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share. 

D. Start the tablets from a customized Windows Recovery Environment (WinRE). 

Answer: B 


Q143. Your network contains an Active Directory domain named contoso.com. All client computers in the domain run Windows 8.1 Pro. All domain users have roaming user profiles. 

You need to prevent a user named User2 from being able to save changes to his roaming user profile. 

Which file you modify? 

A. registry.pol 

B. ntuser.pol 

C. ntuser.dat 

D. system.dat 

Answer: B 


Q144. You have a Windows 8.1 Enterprise client computer named Computer1 The Storage Spaces settings of Computer1 are configured as shown in the following exhibit. (Click the Exhibit button.) 

You plan to create a three-way mirror storage space in the storage pool and to set the size of the storage space to 50 GB. 


You need to identify the minimum number of disks that must be added to the storage pool for the planned mirror. 

How many disks should you identify? 

A. 1 

B. 3 

C. 4 

D. 5 

Answer: B 


Q145. You administer Windows 8.1 Enterprise laptops that are members of an Active Directory Domain Services (AD DS) domain. 

You want to be able to assist users remotely from the computer at the help desk. 

You need to enable the help desk computer to connect to users' laptops while the users are logged in. 

Which feature should you use? 

A. DirectAccess 

B. Remote Assistance 

C. Windows Remote Management (WinRM) 

D. Remote Desktop 

Answer: B 


certleader.com

Precise 70-688 ebook:

Q146. DRAG DROP 

You administer 50 laptops that run Windows 7 Professional 64-bit. 

Your company purchases new laptops. You plan to install Windows 8.1 Pro (64-bit) on each new laptop. 

You need to ensure that user application settings, Windows settings, and user files are stored in a shared location before the installation of Windows 8.1 Pro on the new laptops. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q147. Your network contains a web server named testweb.contoso.com that is used for testing. 

You have a Windows 8.1 Pro laptop. 

After a network administrator changes the IP address of the web server, you discover that 

you can no longer connect to testweb.contoso.com. 

You need to resolve immediately the issue that prevents you from connecting to the server. 

Which command line tool should you run? 

A. Clear-DnsClientCache 

B. Set-DnsClientGlobalSetting 

C. Set-DnsClient 

D. Nbtstat 

Answer: C 


Q148. HOTSPOT  

Your network contains an Active Directory forest named adatum.com. The forest contains three domains named adatum.com, na.adatum.com, and eu.adatum.com. 

You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1 is a member of the na.adatum.com domain. 

You need to ensure that single-label names can be resolved from all three domains. 

Which setting should you configure? (To answer, select the appropriate setting in the answer area.) 


Answer: 



Q149. You have Windows 8.1 Enterprise tablet computers. 

On a computer named Computed, you have a Wi-Fi connection named Access1. 

When you connect to Access1 you discover the following behaviors: 

New device software is not installed automatically. 

Video streamed from the Internet is in low resolution by default. 

Only critical updates are downloaded automatically in the background. 

Many Windows Store apps do not perform background network activities. When you connect to your company's LAN, you do not experience the same behaviors. 

You need to ensure that when you connect to Accessl, you have the same user experience as when you connect to the LAN. 

What should you do? 

A. Configure Access1 to not allow sharing. 

B. From the PC settings page, enable the Download over metered connections option. 

C. Configure Access1 as a non-metered connection. 

D. From the PC settings page, modify the Wireless devices settings. 

Answer: B 


Q150. You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain. 

The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. 

You need to enforce these security policy requirements on the computers. 

What should you do? 

A. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off. 

B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add or log on with Microsoft accounts. 

C. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add Microsoft accounts. 

D. From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off. 

Answer: B 



see more 70-688 dumps