Microsoft Microsoft Windows Store apps

Download Exams Microsoft 070-688 Pass Certification Exam Training Questions With PDF And VCE

Microsoft 070-688 Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques.“Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section.Microsoft 070-688 lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it.Challenging Microsoft 070-688 review questions help you assess your knowledge and reinforce key concepts.Microsoft 070-688 exercises help you think about exam objectives in real-world situations, thus increasing recall during exam time.

Question 1

You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25
new tablets that run Windows 8 Pro.
For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise.
You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure.
What should you do?

A. Start the tablets from the Windows To Go workspace.
B. Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE).
C. Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share.
D. Start the tablets from a customized Windows Recovery Environment (WinRE). Correct Answer: A QUESTION 2
You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain.
The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords
from the computers with their Microsoft accounts.
You need to enforce these security policy requirements on the computers.

What should you do?

A. From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
B. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts.
C. On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts.
D. From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.

Correct Answer: B QUESTION 3
You administer a computer that runs Windows 8 Pro.
You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer.
What should you do?

A. Create a system restore point.
B. Run the bcdedit /export command.
C. Perfom a backup to a shared folder by using the wbadmin command with the -allcritical switch.
D. Create a system recovery drive. Correct Answer: C QUESTION 4
You manage client computers that run Windows 8 and are part of a workgroup.
These computers are configured to use Microsoft Update. Updates are downloaded every day at

10:00
and installed automatically.
Users report that their computers sometimes reboot without any interaction. You need to prevent unplanned automatic reboots of the computers.
What should you do?
A.
Enable the Reschedule Automatic Updates scheduled installations policy setting.
B.
Disable the Re-prompt for restart with scheduled installations policy setting.
C.
Enable the Automatic Updates detection frequency policy setting.
D.
Enable the No auto-restart with logged on users for scheduled automatic updates installations policy setting.
Correct Answer: D
QUESTION 5

You administer computers that run Windows 8 Pro. Your company uses credit card readers that require a custom driver supplied by the manufacturer. The readers frequently are moved from computer to computer.
Your company recently purchased five new computers that run Windows 8 Pro. You want the required drivers to be installed automatically and silently when users connect the readers to the new computers.
You need to pre-stage the credit card reader driver on the new computers. What should you do?
A. Add a Registry key with a path to a network shared folder that has the driver installation files.
B. Run the pnputil.exe utility. Specify the document scanner driver.
C. Add a Registry key with a path to a local folder on every computer. Copy the driver installation files to the folder.
D. Run the dism.exe utility. Copy the driver files to the C:\Windows\System32\drivers folder in the WIM image. Correct Answer: B QUESTION 6
You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature.
Some employees work from home.
You need to ensure that employees can log on to their laptops when they work from home.

What should you do?
A. Provide employees their BitLocker PINs.
B. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.
C. Enable BitLocker To Go.
D. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network. Correct Answer: A QUESTION 7
You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft
Exchange 2010 with ActiveSync and Outlook Web Access.
Users will be using the tablets outside of the corporate network.
The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password.
You need to ensure an alphanumeric password is required on all Windows 8 tablets.
What should you do?

A. From the Mail app, add the user’s Exchange account.
B. Set up New Partnership in Sync Center.
C. From Sync your Settings, set Password to Off.
D. Create a user profile by using a Microsoft account. Correct Answer: A QUESTION 8
You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with
super-mandatory user profiles.

A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to prevent possible user data loss in
the future.
What should you do?

A. Configure the user’s documents library to include folders from network shares.
B. Remove the .man extension from the user profile name.
C. Add the .dat extension to the user profile name.
D. Configure Folder Redirection by using the domain group policy. Correct Answer: D QUESTION 9
You are an IT consultant for small and mid-sized businesses.

One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client
wants to ensure that the laptops and tablets support Virtual Smart Cards.
You need to verify that the client laptops and tablets support Virtual Smart Cards.
What should you do?

A. Ensure that each laptop and tablet can read a physical smart card.
B. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
C. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
D. Ensure that the laptops and tablets are running Windows 8 Enterprise edition. Correct Answer: C QUESTION 10
You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.

The current NTFS and share permissions are configured as follows:
UserA is a member of both the Everyone group and the Marketing group. UserA must access
C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?

A. Read
B. Full Control
C. Modify
D. Read and Execute

Correct Answer: C QUESTION 11
You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled.
Some users require access to the internal company database servers while traveling. You need to configure the requested network connection to the database servers.
What should you configure on the laptops?
A. A DirectAccess connection to the company network
B. A virtual private network (VPN) connection to the company network
C. A metered network connection
D. Out of band management

Correct Answer: B QUESTION 12
You have a desktop computer that runs Windows 8 Enterprise.
You add three new 3-terabyte disks.
You need to create a new 9-terabyte volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. From Disk Management, create a new spanned volume.
B. From Disk Management, convert all of the 3-terabyte disks to GPT.
C. From PowerShell, run the New-VirtualDisk cmdlet.
D. From Disk Management, bring all disks offline.
E. From Diskpart, run the Convert MBR command.
F. From PowerShell, run the Add-PhysicalDisk cmdlet. Correct Answer: AB QUESTION 13
You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory
Certificate Services (AD CS).
Your company decides that access to the company network for all users must be controlled by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?

A. Install smart card readers on all computers. Issue smart cards to all users.
B. Enable the Password must meet complexity requirements policy setting. Instruct users to log on by using the domain \username format for their username and their strong password.
C. Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to authenticate all traffic. Apply the IPsec policy to the domain.
D. Issue photo identification to all users. Instruct all users to set up and use PIN Logon.

Correct Answer: A QUESTION 14
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain.
Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker

password to local drive E:
and is unable to access the protected volume.
You need to provide a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Ask the user to run the manage-bde -protectors -disable e: command.
B. Ask the user for a recovery key ID for the protected drive.
C. Ask the user for his or her logon name.
D. Ask the user for his or her computer name. Correct Answer: CD QUESTION 15
You administer computers that run Windows 8 Enterprise. The computers are members of an Active Directory domain.
You have a tablet that runs Windows 8 Enterprise. You configure the tablet to access your company network by using a virtual private network (VPN) connection.
You need to manage Active Directory from the tablet by using a VPN connection.
What should you do?

A. Run the winrm.exe qc command.
B. Install the System Center Configuration Manager (SCCM) 2012 client.
C. Install the Remote Server Administration Tools (RSAT).
D. Install the Windows Intune client. Correct Answer: C QUESTION 16
You support tablets that run Windows 8 Pro. You are designing a remote access server (RAS) that will be placed behind a firewall. The firewall will accept
incoming TCP connections to ports 80 and 443 only.
You want to connect to the RAS server from a tablet. You need to create a virtual private network (VPN) connection to the RAS server.
Which VPN tunneling protocol should you use?

A. IPSec/L2TP
B. SSTP
C. PPTP
D. IPSec/IKEv2 Correct Answer: B QUESTION 17
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared
printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you
receive an error message that indicates the password is incorrect.

You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
A. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
B. Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.
C. Change the default sharing configuration for the shared folders on the HomeGroup computers.
D. Reset your account password to match the HomeGroup password.

Correct Answer: A QUESTION 18
You are a systems administrator for Contoso; Ltd. All client computers run Windows 8 and are members of the contoso.com Active Directory domain. Users log on
to their computers by using domain user accounts.
Contoso develops an internal line of business (LOB) Windows Store app. You want to deploy the LOB app to the client computers and configure the app to access
various resources in the domain.

You need to enable all users to run the LOB app and access the required resources from the LOB app. What should you do?
A. Certify the LOB app with Windows Store. Ask users to log on to their computers by using a Microsoft Account. Install the LOB app from Windows Store. Ask users to log off, and then log back on in by using their domain accounts.
B. Restart each computer by using WinPE. From WinPE, copy all of the LOB app executable files in the Program Files folder. Restart into Windows 8 and ask users to log on by using their domain accounts.
C. Use the DISM utility to include the LOB app in a new Windows 8 image. Reimage the computers with the new image. Join the computers to a new workgroup. Ask each user to log on to the computer by using a new Microsoft Account that ends with @contoso.com.
D. Configure the Allow all trusted apps to install policy settings for all computers. Ask users to log on by using their domain accounts, and then execute a PowerShell script that includes the add-appxpackage cmdlet.

Correct Answer: A QUESTION 19
You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise.
You are planning to add a guest wireless network.
You need to collect information about nearby wireless networks, including their encryption methods.
Which command should you include in the batch file?

A. Netsh wlan set autoconfig enabled=no interface=”Wireless Network Connection”
B. ipconfig /allcompartments
C. Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘
D. netsh wlan show networks
E. netsh wlan show hostednetwork
F. netstat a

Correct Answer: D QUESTION 20
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is stored locally on the tablets.

Access to the application is protected with extra logon credentials, in addition to a standard domain account used by users.

The application utilizes the least amount of network bandwidth.

The application must maintain access to the current desktop.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

Correct Answer: E QUESTION 21
You support desktop computers and tablets that run Windows 8. Domain joined computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is installed locally on the tablets.

The application installation is hosted in a public cloud.

The installation must support Windows RT.
You need to deploy the new application to the tablets. What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

Correct Answer: F QUESTION 22
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is not accessible if a user is working offline.

The application is isolated from other applications.

The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure the tablets with dual boot. Correct Answer: B QUESTION 23
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application. The deployment solution must meet the following requirements:
The application does not utilize the company server infrastructure.

The application is isolated from other applications.

The application uses the least amount of disk space possible on a solid-state drive (SSD) on the tablets.

The application utilizes the least amount of network bandwidth.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot. Correct Answer: D QUESTION 24
You administer laptop and desktop computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to
Windows Intune.
You plan to install Intune Endpoint Protection on all computers. Some of the computers also have another antimalware application installed.
You need to ensure that only the Intune Endpoint Protection application is running on all computers.

What should you do?
A. Configure the Enable Realtime Protection policy to Yes.
B. Configure the Enable Endpoint Protection policy to Only on computers that are unprotected when Endpoint Protection is installed.
C. Configure the Enable Endpoint Protection policy setting to Yes.
D. Configure the Enable Endpoint Protection policy setting to No. Correct Answer: C QUESTION 25
Your company has purchased a subscription to Windows Intune. You use Windows Intune to automatically deploy Windows updates.
You create an automatic approval rule in Windows Intune but notice that previously existing updates are not deployed.
You need to ensure that all previously existing updates are automatically approved.
What should you do?

A. Run the approval rule.
B. Edit the schedule for the automatic approval rule.
C. Create and deploy a policy that uses the recommended settings in the Windows Intune Center Settings template.
D. Create and deploy a custom policy in the Windows Intune Center Settings template.

Correct Answer: A

microdess
We are a team that focuses on tutoring Microsoft series certification exams and is committed to providing efficient and practical learning resources and exam preparation support to candidates. As Microsoft series certifications such as Azure, Microsoft 365, Power Platform, Windows, and Graph become more and more popular, we know the importance of these certifications for personal career development and corporate competitiveness. Therefore, we rely on the Pass4itsure platform to actively collect the latest and most comprehensive examination questions to provide candidates with the latest and most accurate preparation materials. MICROSOFT-TECHNET not only provides the latest exam questions, but also allows candidates to find the required learning materials more conveniently and efficiently through detailed organization and classification. Our materials include a large number of mock test questions and detailed analysis to help candidates deeply understand the test content and master the answering skills, so as to easily cope with the test. In addition, we have also specially launched exam preparation materials in PDF format to facilitate candidates to study and review anytime and anywhere. It not only contains detailed analysis of exam questions, but also provides targeted study suggestions and preparation techniques so that candidates can prepare more efficiently. We know that preparing for exams is not just about memorizing knowledge points, but also requires mastering the correct methods and techniques. Therefore, we also provide a series of simulation questions so that candidates can experience the real examination environment in the simulation examination and better adapt to the examination rhythm and atmosphere. These simulation questions can not only help candidates test their preparation results, but also help candidates discover their own shortcomings and further improve their preparation plans. In short, our team always adheres to the needs of candidates as the guide and provides comprehensive, efficient and practical test preparation support to candidates. We believe that with our help, more and more candidates will be able to successfully pass the Microsoft series certification exams and realize their career dreams.