Microsoft.certifyMe.70 686.v2012!08!29.by.bulgarian.195q

181
CertifyMe Number : 70-686 Passing Score : 700 Time Limit : 120 min File Version : 8.0 CertifyMe-70-686

Transcript of Microsoft.certifyMe.70 686.v2012!08!29.by.bulgarian.195q

CertifyMe

Number: 70-686Passing Score: 700Time Limit: 120 minFile Version: 8.0

CertifyMe-70-686

Exam A

QUESTION 1You are planning to upgrade Internet Explorer.

You have the following requirements:

- Create a report that identifies which computers are successfully upgraded.- Do not install additional software on the client computers.

You need to design a deployment method that meets the requirements.

What should you do?

A. Use Windows Server Update Services (WSUS).

B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.

C. Use Microsoft System Center Configuration Manager.

D. Use Microsoft System Center Essentials.

Answer: ASection: (none)

Explanation/Reference:Explanation:Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft.It allows administrators to approve or decline updates before release, to force updates to install by a givendate, and to obtain extensive reports on what updates each machine requires. System administrators canalso configure WSUS to approve certain classes of updates automatically (critical updates, securityupdates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing anadministrator to see what machines will require a given update without also installing that update.http://en.wikipedia.org/wiki/Windows_Server_Update_Services

QUESTION 2Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008R2 member servers and 1,000 Windows 7 client computers.

You are designing the deployment of a custom application.

You have the following requirements:

- The application must be available to only users who need it.

www.certify-me.co.uk 2Microsoft 70-686 Exam- Minimize network traffic during deployment.

You need to design a deployment strategy that meets the requirements.

Which deployment method should you use?

A. Microsoft Application Virtualization (App-V)

B. Microsoft System Center Configuration Manager 2007

C. RemoteApp and Desktop Connections

D. software installation in Group Policy

Answer: CSection: (none)

Explanation/Reference:

Explanation:http://blogs.msdn.com/b/rds/archive/2009/06/08/introducing-remoteapp-and-desktop- connections.aspx

The RemoteApp and Desktop Connections feature offers several benefits:RemoteApp programs launch from the Start menu just like any other application. Published RemoteDesktop connections are included alongside RemoteApp programs on the Start menu.Changes to the published connection (such as newly published RemoteApp programs) are user's Startmenu, without any effort on the user's part.automatically reflected on theRemoteApp programs can be easily launched with Windows Search. Users only have to log on once, tocreate the connection. From that point on, updates happen with no prompt for user credentials.RemoteApp and Desktop Connections does not require domain membership for client computers.

RemoteApp and Desktop Connections benefits from new features in Windows Server 2008 R2, such asPersonal Desktop assignment or per-user application filtering. RemoteApp and Desktop Connections is builton standard technologies such as XML and HTTPS, making it possible for developers to build solutionsaround it. It also offers APIs that allow the client software to support other types of resources, in addition toRemoteApp programs and Remote Desktop connections.

QUESTION 3Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computersthat run Windows XP. Nine hundred of the computers are on the local area network. One hundredcomputers are portable computers that connect to the main office only once every few months.

www.certify-me.co.uk 3Microsoft 70-686 ExamYou are planning to deploy Windows 7.

You need to generate a report of the software that is installed on all client computers. You need thisinformation as soon as possible.

What should you use?

A. Microsoft System Center Data Protection Manager

B. Microsoft Desktop Optimization Pack

C. Microsoft System Center Essentials

D. Microsoft System Center Operations Manager

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 4Your network has client computers that run Windows Vista.

- You are planning to deploy Windows 7.- You need to detect and analyze the compatibility of an application that requires elevated privileges.

What should you do?

A. Use the Standard User Analyzer (SUA) Wizard.

B. Run a virtual version of the Setup Analysis Tool (SAT).

C. Use the Standard User Analyzer (SUA) tool.

D. Run a stand-alone version of the Setup Analysis Tool (SAT).

Answer: C

Section: (none)

Explanation/Reference:Explanation:The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibilityissues due to the User Account Control (UAC) feature. http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx

QUESTION 5company's network has client computers that run Windows 7. Multiple users share the Your

www.certify-me.co.uk 4Microsoft 70-686 Examcomputers in the shipping department. These computers reside in the Shipping Computers organizationalunit (OU).

The company wants to deploy a new application. The application is not packaged.

You have the following requirements:

- Deploy the application to all computers in the shipping department.- Perform the deployment from a central location.

You need to plan the software deployment process to meet the requirements.

Which two actions should you include in the process? (Each correct answer presents part of the solution.Choose two.)

A. Using Microsoft System Center Configuration Manager, create a collection that contains the shippingdepartment computers, and assign the package to the collection.

B. Create a package by using Microsoft System Center Configuration Manager.

C. Create a Group Policy object (GPO) and add a software installation policy under the ComputerConfiguration container.

D. In the Group Policy Management Console, link the software installation policy to the Shipping ComputersOU.

E. Using Microsoft System Center Configuration Manager, create a collection that contains the shippingdepartment users, and assign the package to the collection.

Answer: ABSection: (none)

Explanation/Reference:Explanation:Hints:GPO only support MSI & ZAP file type this application is not packaged = non MSI or ZaP file type

QUESTION 6Your network has client computers that run Windows XP. All users access a custom line-of- businessapplication. The line-of-business application is not compatible with Windows 7.

You are planning to deploy Windows 7.

You have the following requirements:

- The application must run on all client computers.- The application executable must reside on each client computer.

www.certify-me.co.uk 5Microsoft 70-686 Exam

You need to manage application compatibility to meet the requirements.

What should you do?

A. Install the application on a Remote Desktop Services server.

B. Install a shim for the application on each client computer.

C. Virtualize the application by using Microsoft Application Virtualization (App-V).

D. Install the Windows Compatibility Evaluator on each client computer.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 7Your company has 1,000 client computers that run Windows XP Professional x64.

You are planning to deploy Windows 7 Enterprise x64.

The company uses an application that is incompatible with Windows 7 Enterprise x64.

You have the following requirements:

- Provide all users with access to the application.- Deploy and manage the application by using a centralized solution.

You need to design a solution that meets the requirements.

What should you do?

A. Install the application on all client computers by using Group Policy, and then use the Compatibility tab.

B. Install the Microsoft Application Virtualization (App-V) client on each client computer, and run theapplication in offline mode.

C. Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer.

D. Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream theapplication by using App-V.

Answer: CSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 6Microsoft 70-686 Exam

QUESTION 8Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7.

You need to detect compatibility issues that can occur during the installation and configuration process for aspecific application.

Which tool should you use?

A. Windows Compatibility Evaluator

B. Setup Analysis Tool

C. Inventory Collector

D. Update Compatibility Evaluator

Answer: BSection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx The Setup Analysis Tool (SAT)automates the running of application installations while monitoring application's installer. The standaloneversion of SAT can monitor any the actions taken by eachMSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-basedinstallers and third-party installers that run unattended.hints:You need to detect compatibility issues that can occur during the installation and configuration process for aspecific application.

QUESTION 9Your companys network has client computers that run Windows 7. Multiple users share the computers inthe shipping department. These computers reside in the Shipping Computers organizational unit (OU).

The network design is shown in the following diagram.

www.certify-me.co.uk 7Microsoft 70-686 Exam

You are planning to deploy an application. The application is packaged as a Microsoft Windows Installerpackage (MSI).

You need to deploy the application only to computers in the shipping department.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Link the software installation policy to the Workstations OU.

B. Link the software installation policy to the Shipping Computers OU.

C. Create a new Group Policy object (GPO) and add a software installation policy under the UserConfiguration container.

D. Create a new Group Policy object (GPO) and add a software installation policy under the ComputerConfiguration container.

Answer: BDSection: (none)

Explanation/Reference:Explanation:To specify how and when computers are updated through Group Policy In Group Policy Object Editor,expand Computer Configuration, expand Administrative Templates, expand Windows Components, andthen click Windows Update. In the details pane of Group Policy Object Editor, configure the appropriatepolicies. See the following table for examples of the policies you might want to set.. refer to http://technet.microsoft.com/en-us/library/cc708536(v=WS.10).aspx

www.certify-me.co.uk 8Microsoft 70-686 Exam

Hints:Workstations OU = engineering computer OU + finance computer OU + shipphing computer OU

QUESTION 10Your companys network has client computers that run Windows 7.

When a user attempts to log on to the domain from a computer named Client1, she receives the followingmessage: The system cannot log you on to this domain because the system's computer account in itsprimary domain is missing or the password on that account is incorrect.

You need to ensure that the user can log on to the domain from Client1.

What should you do?

A. Disjoin and rejoin Client1 to the domain.

B. Reset the account password for Client1 through Active Directory Users and Computers.

C. Add the computer account for Client1 to the Domain Computers Active Directory group.

D. Reset the account password for the user through Active Directory Users and Computers.

Answer: ASection: (none)

Explanation/Reference:Explanation:Re-create the computer account, join a workgroup, and then rejoin the domain.refer to http://support.microsoft.com/kb/810497

QUESTION 11Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains.

Users in both domains can log on to client computers in only their own domains. System logs on the domaincontrollers display the error message Clock skew too great when users in Domain1 attempt to log on toclient computers in Domain2.

You need to ensure that users can log on to client computers in both domains.

What should you do?

www.certify-me.co.uk 9Microsoft 70-686 Exam

A. Decrease the Maximum tolerance for computer clock synchronization setting in the default DomainGroup Policy object ( GPO ).

B. Configure the primary domain controller (PDC) emulatorin each domain to synchronize its clock with thesame external time source.

C. Run a startup script that includes Net Time /setsntp on all client computers.

D. Run a startup script that includes Net Time /querysntp on all client computers.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 12Your company has an Active Directory Domain Services (AD DS) forest with a single domain namedcontoso.com. The design of the organizational units (OUs) and Group Policy objects (GPOs) is shown in thefollowing diagram.

Multiple computer configuration settings and user configuration settings are defined in the Kiosk ComputersGPO.

A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO arenot applied when users log on to client computers that are in the Kiosk Computers OU.

You need to ensure that the user configuration settings are correctly applied.

www.certify-me.co.uk 10Microsoft 70-686 ExamWhat should you do?

A. Enable loopback processing in Merge mode on the Default Domain Policy GPO.

B. Disable the user configuration settings on the Default Domain Policy GPO.

C. Enable loopback processing in Replace mode on the Kiosk Computers GPO.

D. Disable the user configuration settings on the New York Users GPO.

Answer: CSection: (none)

Explanation/Reference:

Explanation:Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92

QUESTION 13You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7.Users in the marketing department use a custom application.

You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department thenreport that they are unable to use the custom application.

You need to ensure that all users in the marketing department are able to use the custom application. Youneed to ensure that all other users continue to receive the new GPO.

What should you do?

A. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Readpermission and the Allow-Apply Group Policy permission for the GPO.

B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to theOU.

C. Add marketing users to a domain group. Use security filtering to grant the group the Allow-Readpermission and the Deny-Apply Group Policy permission for the GPO.

D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to thedomain.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 14www.certify-me.co.uk 11Microsoft 70-686 ExamYou use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Usersoccasionally change the Internet Explorer settings on individual client computers.

- The company wants to maintain a standard Internet Explorer configuration on all client computers.- You need to ensure that the standard Internet Explorer configuration is in place each time users log on toclient computers.

What should you do?

A. Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.

B. Use the Group Policy Update utility to refresh Group Policy.

C. Enable Internet Explorer Maintenance Policy Processing in Group Policy.

D. Enable User Group Policy loopback processing mode.

Answer: CSection: (none)

Explanation/Reference:Explanation:nternet Explorer Maintenance policy processingThis policy affects all policies that use the Internet Explorer Maintenance component of Group Policy, suchas those in Windows Settings\Internet Explorer Maintenance. It overrides customized settings that theprogram implementing the Internet Explorer Maintenance policy set when it was installed.If you enable this policy, you can use the check boxes provided to change the options. Allow processingacross a slow network connection updates the policies even when the update is being transmitted across a

slow network connection, such as a telephone line. Updates across slow connections can cause significantdelays.Do not apply during periodic background processing prevents the system from updating affected policies inthe background while the computer is in use. Background updates can disrupt the user, cause a program tostop or operate abnormally, and, in rare cases, damage data. Process even if the Group Policy objects havenot changed updates and reapplies the policies even if the policies have not changed. Many policyimplementations specify that they are updated only when changed.However, you might want to update unchanged policies, such as reapplying a desired setting in case a userhas changed it.http://technet.microsoft.com/en-us/library/cc978526.aspx

QUESTION 15Your companys network includes client computers that run Windows 7.

www.certify-me.co.uk 12Microsoft 70-686 ExamYou design a wireless network to use Extensible Authentication ProtocolCTransport Level Security (EAP-TLS). The Network Policy Server has a certificate installed.

Client computers are unable to connect to the wireless access points.

You need to enable client computers to connect to the wireless network.

What should you do?

A. Install a certificate in the Trusted Root Certification Authorities certificate store.

B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport LayerSecurity (PEAP-TLS).

C. Configure client computers to use Protected Extensible Authentication Protocol-Microsoft ChallengeHandshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).

D. Install a certificate in the Third-Party Root Certification Authorities certificate store.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 16Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7Enterprise client computers.

The company wants to require a secure connection between client computers and the file server.

You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall withAdvanced Security.

What should you do?

A. Create an Isolation rule and specify Request authentication for inbound and outbound connections.

B. Create a Tunnel rule and specify Gateway-to-client as the tunnel type.

C. Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IPaddress.

D. Create an Authentication exemption rule and add the file server IP address to the Exempt Computerslist.

Answer: CSection: (none)

Explanation/Reference:Explanation:The PDC emulator master also serves as the machine to which all domain controllers in the

www.certify-me.co.uk 13Microsoft 70-686 Exam

domain will synchronise their clocks. It, in turn, should be configured to synchronise to an external NTP timesourcehttp://en.wikipedia.org/wiki/Primary_Domain_Controller

QUESTION 17You deploy Windows 7 to the computers that are used by your companys Web developers. All Webdeveloper user accounts are in a single organizational unit (OU).

Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted ondifferent servers.

You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internalWeb applications.

What should you do?

A. Enable Compatibility View in Internet Explorer.

B. Add each server to the Intranet zone.

C. Add each server to the Trusted Sites zone.

D. Set the default security setting in Internet Explorer to Medium.

Answer: BSection: (none)

Explanation/Reference:Explanation:Pop-up Blocker featuresPop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows,regardless of the Pop-up Blocker setting. Pop-up windows cannot be opened larger than or outside theviewable desktop area. For more information, see "Windows Restrictions" in this document.When this functionality is enabled, automatic and background pop-up windows are blocked, but windowsthat are opened by a user click will still open in the usual manner. Note that sites in the

Trusted Sites and LocalIntranet zones do not have their pop-up windows blocked by default, as they are considered safe. Thissetting can be configured in the Security tab in Internet Options. http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx hints: internal web , so i choose intranet zones.

Local Intranet Zone

www.certify-me.co.uk 14Microsoft 70-686 Exam

By default, the Local Intranet zone contains all network connections that were established by using aUniversalNaming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do notinclude periods (for example, http://local), as long as they are not assigned to either the Restricted Sites orTrusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer4) or Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) oran intranet share, or an intranet Web site by using an Internet Protocol (IP) address or by using a fullyqualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of inthe Local intranet zone.

Trusted Sites ZoneThis zone contains Web sites that you trust as safe (such as Web sites that are on your organization'sintranet or that come from established companies in whom you have confidence). When you add a Web siteto the Trusted Sites zone, you believe that files you download or that you run from the Web site will notdamage your computer or data. By default, there are no Web sites that are assigned to the Trusted Siteszone, and the security level is set to Low.http://support.microsoft.com/kb/174360

QUESTION 18Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrativetemplate policy settings by using custom ADMX files. You create the custom ADMX files, and you savethem on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files arenot available in the Group Policy editing session. You need to ensure that the ADMX files are available tothe GPO Editor. What should you do?

A. Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restartthe GPO Editor.

B. Set the network share permissions to grant all Windows 7 users Read access for the share.

C. Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and thenrestart the GPO Editor.

D. Copy the ADMX files to the central store, and then restart the GPO Editor.

Answer: DSection: (none)

Explanation/Reference:Explanation:http://support.microsoft.com/kb/929841To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on adomain controller. The Central Store is a file location that is checked by the Group Policy tools. The GroupPolicy tools use any .admx files that are in the Central Store. The files that are in the Central Store are laterreplicated to all domain controllers in the domain.

www.certify-me.co.uk 15Microsoft 70-686 Exam

QUESTION 19DRAG DROP

You are planning to deploy Windows 7 Enterprise to all of your company's client computers.

You have the following requirements:

· Create two custom partitions on each client computer's hard disk, one for the operating system and theother for data.

· Automatically create the partitions during Windows Setup.

You need to design an image that meets the requirements.

Which two actions should you perform in sequence? (To answer, move the appropriate actions from the listof actions to the answer area and arrange them in the correct order)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

www.certify-me.co.uk 16Microsoft 70-686 Exam

Explanation:

untitled

Windows System Image Manager create answer fileUsing windows 7 setup DVD can create partition based on answer file.

untitled

www.certify-me.co.uk 17Microsoft 70-686 Exam

QUESTION 20DRAG DROP

All client computers in an organization run Windows 7 and are joined to an Active Directory DomainServices (AD DS) domain. All user objects are stored in an Organizational Unit (OU) named Contoso Users.All computer objects are stored in an OU named Contoso Computers.

You need to add a proxy server to the Microsoft Internet Explorer 9 configuration on all client computers byusing the least administrative effort.

Which three actions should you perform? (To answer, move the appropriate action from the list of actions tothe answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 18Microsoft 70-686 Exam

untitled

It should be create the GPO 1st, then modify it, then only apply it.Original answer from smith is the following picture.

untitled

www.certify-me.co.uk 19Microsoft 70-686 Exam

QUESTION 21DRAG DROP

You are designing an application deployment strategy.

Application deployments must meet the following requirements:

· They must be able to use Setup.exe.

· They must not require Active Directory.

· They must not require a constant network connection.

· The application installation schedule must be easy to set up and implement.

You need to recommend a method that meets the requirements.

What should you recommend? (To answer, drag the appropriate deployment method from the list ofdeployment methods to the correct location or locations in the work area.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 20Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 21

Microsoft 70-686 Exam

untitled

QUESTION 22When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC),he receives the following error message.

You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 byusing RDC.

To which group should you add the user?

www.certify-me.co.uk 22Microsoft 70-686 Exam

A. Add the user to the Power Users group on Server1.

B. Add the user to the Remote Desktop Users group on Server1.

C. Add the user to the domain Windows Authorization Access group.

D. Add the user to the domain Remote Desktop Users group

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 23A company has an Active Directory Domain Services (AD DS) forest with a single domain.

Domain controllers are located in the companys offices in New York and Boston.

You deploy a group policy at the domain level that includes security filtering.

You discover that Group Policy object (GPO) settings are being applied to computers in the New York office,but not to computers in the Boston office.

You suspect there might be replication problems with the policies. What should you do?

A. Run a Group Policy Results report against computers in the Boston office.

B. Run a Group Policy Modeling report against computers in the Boston office.

C. Use the GpoTool.exe command-line tool.

D. Use the RepAdmin.exe command-line tool.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 24Your companys network has client computers that run Windows 7.

A software vendor releases version 2 of an application that your company uses.

Your company currently uses version 1. Version 1 and version 2 are not compatible.

You plan to deploy version 2 of the application.

You have the following requirements:

www.certify-me.co.uk 23Microsoft 70-686 Exam- Users must be able to run both versions of the application on their computers.- Version 2 must be available when a client computer is not connected to the network.

You need to plan a software deployment process that meets the requirements. What should you do?(Choose all that apply.)

A. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).

B. Deploy version 2 of the application by using Microsoft Enterprise Desktop (MED-V).

C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp.

D. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

Answer: ABSection: (none)

Explanation/Reference:Explanation:Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real- time toany client from a virtual application server. It removes the need for local installation of the applications.Instead, only the App-v client needs to be installed on the client machines. All application data ispermanently stored on the virtual application server. Whichever software is needed is either streamed orlocally cached from the application server on demand and run locally. The App-V stack sandboxes theexecution environment so that the application does not make changes to the client itself (OS File Systemand/or Registry). App-V applications are also sandboxed from each other, so that different versions of thesame application can be run under App-V concurrently.http://en.wikipedia.org/wiki/Microsoft_App-V

QUESTION 25A company uses Microsoft Deployment Toolkit (MDT) 2010 to deploy Windows 7 Enterprise and MicrosoftOffice 2010. The company is replacing existing computers with new 64-bit computers.

You have the following requirements:

- You need to include Office 2010 with the deployment.- You need to automate the deployment where possible.- Some employees have accessibility requirements that require specialized hardware.- The hardware must continue to be used after the deployment.- The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from themanufacturer.

You need to create an image that meets these requirements.

www.certify-me.co.uk 24Microsoft 70-686 ExamWhat should you do? (Choose all that apply.)

A. Import the Windows 7 Enterprise x86 source files.

B. From the MDT deployment workbench, select the Custom Task Sequence template.

C. Use a reference computer and capture a WIM image.

D. From the MDT deployment workbench, select the Sysprep and Capture template.

E. Import the necessary OEM drivers.

F. Import the 32-bit version of Office 2010.

G. Import the 64-bit version of Office 2010.

H. Import the Windows 7 Enterprise x64 source files.

Answer: ABEFSection: (none)

Explanation/Reference:Explanation:hints:The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from themanufacturer.

QUESTION 26company's network includes a main office and several branch offices. The branch offices are Yourconnected to the main office by high-latency links. All client computers run Windows 7 Enterprise, and allservers run Windows Server 2008 R2. Servers are located in each of the branch offices.

Client computers in the branch offices frequently access a specific group of files on a file server named

Server1. These access requests consume significant amounts of bandwidth and reduce the speed ofhigher-priority traffic.

You need to reduce the bandwidth that is consumed by requests for frequently accessed files.

What should you do?

A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branchoffices.

B. Configure BranchCache in Distributed Cache mode on client computers in the main office and thebranch offices.

C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache inDistributed Cache mode on a server computer in only the branch offices.

D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in HostedCache mode on a server computer in only the branch offices.www.certify-me.co.uk 25Microsoft 70-686 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:BranchCacheTM is designed to reduce WAN link utilization and improve application

responsiveness for branch office workers who access content from servers in remote locations. Branchoffice client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cachecan be distributed across client computers (Distributed Cache mode) or can be housed on a server in thebranch (Hosted Cache mode).

Distributed Cache modeIf client computers are configured to use Distributed Cache mode, the cached content is distributed amongclient computers on the branch office network. No infrastructure or services are required in the branch officebeyond client computers running Windows 7.

Hosted Cache modeIn hosted cache mode, cached content is maintained on a computer running Windows Server 2008 R2 onthe branch office network.hints: no server are located in the branch office.http://technet.microsoft.com/en-us/library/dd637832(v=ws.10).aspx

QUESTION 27A Windows Server 2008 R2 server named SERVER01 has the Windows Deployment Services (WDS) roleinstalled. SERVER02 is running DHCP services. You prestage computer objects in Active Directory. Youplan to use WDS to deploy Windows 7 to the prestaged computers. When you try to deploy an image byusing PXE, the process fails. You need to ensure that SERVER01 responds to prestaged client computersonly. From WDS, what should you do? (Choose all that apply.)

A. On the DHCP tab, select Configure DHCP option 60 to indicate that this server is also a PXE server.

B. On the Advanced tab, select Authorize this Windows Deployment Services server in DHCP.

C. On the PXE Response tab, select Respond to all client computers (known and unknown).

D. On the DHCP tab, select Do not listen on Port 67.

E. On the PXE Response tab, select Respond only to known client computers.

F. On the Advanced tab, select Do not authorize this Windows Deployment Services server in DHCP.

Answer: BESection: (none)

Explanation/Reference:

Explanation:hints: prestaged computers = known client computers

www.certify-me.co.uk 26Microsoft 70-686 Exam

QUESTION 28HOTSPOT

You are preparing to install a 32-bit legacy application on all client computers in an organization.

The application requires specific compatibility settings in order to function in Windows 7. You run the 32-bitversion of Compatibility Administrator and create a new application fix.

You need to create a shim database that includes a compatibility fix for applications that have known issueswith the Desktop Window Manager.

Which compatibility modes should you select? To answer, select the appropriate setting in the work area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 27Microsoft 70-686 Exam

Explanation:

Desktop Window Manager = DWMfree score -____-lll

www.certify-me.co.uk 28Microsoft 70-686 Exam

untitled

QUESTION 29Your company has a custom Web application that uses a self-signed SSL certificate. The company has aninternal certification authority (CA) and uses autoenrollment. When external users attempt to start the Webapplication, Internet Explorer displays an error message that recommends closing the Web page rather thancontinuing to the application. You need to ensure that Internet Explorer does not display the error message.What should you do?

A. Install the current certificate into the personal store on each client computer. Add the applications URL tothe Trusted Sites zone in Internet Explorer.

B. Install the current certificate into the computer store on each client computer.

C. Purchase and install a commercial certificate on the CA server. Ensure that users trust the issuing CA.

D. Issue a root certificate from the internal CA on the external users computers.www.certify-me.co.uk 29Microsoft 70-686 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 30Your companys network is shown in the following diagram.

There is a VPN between Branch Officebranch office B and the Core Networkcore network.

The company plans to deploy Windows 7 to all client computers.

You need to manage the deployment to ensure that client computers in branch office A and in branch officeB can activate Windows.

What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

A. Configure DNS so that client computers in branch office A use the Key Management Service www.certify-me.co.uk 30Microsoft 70-686 Exam(KMS) in the core network.

B. Deploy the Key Management Service (KMS) in branch office B.

C. Deploy the Key Management Service (KMS) in branch office A.

D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) inthe core network.

Answer: ABSection: (none)

Explanation/Reference:Explanation:

QUESTION 31DRAG DROP

Your company has an Active Directory Domain Services (AD DS) forest with a single domain namedcontoso.com.

You deploy a new Group Policy object (GPO) named California Computers GPO as part of theorganizational unit (OU) and GPO design shown in the following diagram.

The California Computers GPO contains computer configuration settings and user configuration settings.

User configuration settings are not being applied to users who log on to client computers in the CaliforniaComputers OU.

www.certify-me.co.uk 31Microsoft 70-686 ExamWhich GPO setting should you select?? (To answer, drag the appropriate setting from the list of settings tothe correct location or locations in the work area.)

A.

B.

C.

D.

Answer:

Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 32Microsoft 70-686 Exam

untitledRefer to Planning and managing windows 7 desktop deployments and environment Pg 10-92

untitled

QUESTION 32You are deploying an App-V client application to the New York office.

You need to ensure that the application will be installed at a specific time.

What should you use to deploy the application?

A. ConfigMgr

B. a Group Policy object (GPO) with a software installation policy.

C. MED-V

D. Microsoft Deployment Toolkit

Answer: ASection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 33Microsoft 70-686 Exam

QUESTION 33Your company has client computers that run Windows 7 Enterprise.

Each computer in the company is required to boot into a different Windows 7 application environmentwithout compromising the main Windows 7 Enterprise installation.

You need to create a new Native Boot VHD that will host the alternate Windows 7 environments.

Which command should you use?

A. BCDEdit.exe

B. Bootcfg.exe

C. DiskPart.exe

D. BCDboot.exe

Answer: DSection: (none)

Explanation/Reference:Explanation:http://www.techexams.net/forums/windows-7-exams/66547-bcdedit-bcdboot-difference.html BCDboot is atool used to quickly set up a system partition, or to repair the boot environment located on the systempartition. The system partition is set up by copying a small set of boot environment files from an installedWindows® image. BCDboot also creates a Boot Configuration Data (BCD) store on the system partition witha new boot entry that enables you to boot to the installed Windows image.BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes,including creating new stores, modifying existing stores, adding boot menu parameters, and so on. BCDEditserves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two majorimprovements

QUESTION 34Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7computers. You are planning to deploy a custom application. You need to schedule the deployment to occuroutside of business hours and without user interaction. What should you do? (Choose all that apply.)

A. Create a collection with the required computers and assign the software to the collection.

B. Create a software installation Group Policy object (GPO).

C. Assign the policy to the root of the Active Directory Domain Services (AD DS) domain.

D. Create a software deployment package by using System Center Configuration Manager 2007.www.certify-me.co.uk 34Microsoft 70-686 Exam

E. Create an unattend.xml file.

F. Create a silent install MSI file.

Answer: ADFSection: (none)

Explanation/Reference:Explanation:hints: without user interaction = silent install MSI file

QUESTION 35A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access tothe corporate network.

You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated overthe next several months.

You need to plan the most efficient method for activating all of the computers.

What should you do?

A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use MultipleActivation Key (MAK) Proxy for the remaining computers.

B. Use the Key Management Service (KMS) for all the computers.

C. Use Multiple Activation Key (MAK) Independent for all the computers.

D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key ManagementService (KMS) for the remaining computers.

Answer: BSection: (none)

Explanation/Reference:Explanation:Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.refer to http://technet.microsoft.com/en-us/library/ee939272.aspx MAK:If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internetone time. If the users install a MAK using the Slmgr.vbs script, the MAK client does not try to activate itselfautomatically.refer to http://technet.microsoft.com/en-us/library/ff793438.aspx Hints:The computers do not have access to the internet

www.certify-me.co.uk 35Microsoft 70-686 Exam

QUESTION 36company's network is shown in the following diagram.Your

Each office is connected to the Internet through a high-bandwidth connection. The branch offices areconnected to the core network through low-bandwidth connections.

Microsoft Windows Server Update Services (WSUS) must provide software updates for all offices.

You need to design the WSUS infrastructure to minimize traffic over the low-bandwidth connections.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Deploy BranchCache on the WSUS server and client computers

B. Configure WSUS to use updates that are stored locally

C. Configure WSUS to use updates that are stored on Microsoft Update

D. Deploy Quality of Service (QoS) on the WSUS server and client computers

E. Deploy WSUS servers in the branch offices

Answer: CESection: (none)

Explanation/Reference:Explanation:WSUS update from Microsoft update is faster then core network

Deploy WSUS servers in each branch office in order to provide WSUS server for branch client.

www.certify-me.co.uk 36Microsoft 70-686 Exam

hints:1. Each office is connected to the Internet through a high-bandwidth connection.2. The branch offices are connected to the core network through low-bandwidth connections.

QUESTION 37Your network is configured as shown in the following diagram.

You are planning to deploy Windows 7.

You have the following requirements:

· Use BitLocker on all computers in the isolated network.

· Provide DirectAccess on all portable computers.

· Use the Key Management Service (KMS) to activate all client computers.

You need to plan a client computer licensing strategy that meets the requirements.

What should you do?

A. License 500 copies of Windows 7 Ultimate.

B. License 500 copies of Windows 7 Enterprise.

C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, andpurchase Software Assurance for the Windows 7 Professional licenses.

D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate.

Answer: BSection: (none)

Explanation/Reference:Explanation:hints:Direct Access only available for Ultimate and Enterprise only.Company should use Enterprise version

www.certify-me.co.uk 37Microsoft 70-686 Exam

QUESTION 38Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7.

You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) imagethat includes the custom applications to all Windows 7 client computers.

What should you do?

A. Mount the VM image from the MED-V workspace.

B. Deploy the VM image from the MED-V server.

C. Deploy the VM image by using Windows Deployment Services (WDS).

D. Deploy the VM image by using Windows Server Update Services (WSUS).

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 39Your company plans to upgrade all client computers to Windows 7.

The company uses a custom line-of-business application. The application contains sensitive data.The application will not run on Windows 7

You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology toallow your organization to continue to use the application.

You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only whenthe user is connected to the MED-V server.

What should you do?

A. Using MED-V TrimTransfer technology, deploy the VM image over the network

B. In the MED-V console, configure the MED-V workspace to prevent offline operation

C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored

D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store www.certify-me.co.uk 38Microsoft 70-686 Examdirectory

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 40The client computers in your network run either Windows XP or Windows 7. All client computers are in asingle Active Directory Domain Services (AD DS) organizational unit (OU) named MyClients.

You install Windows Software Update Services (WSUS). You create a Group Policy object (GPO) thatenables automatic updates from the WSUS server, and you link the GPO to the MyClients OU. You place allclient computers in a targeting group named MyClients.

Testing reveals that a security update that is applicable to both Windows XP and Windows 7 causes a line-of-business application to fail on the Windows XP client computers.

You need to ensure that the application runs on the Windows XP client computers and that the Windows 7client computers receive the security update.

What should you do?

A. Remove the Windows XP client computers from the MyClients targeting group. Approve the update forinstallation to the All Computers targeting group.

B. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update forinstallation to the All Computers targeting group.

C. Create a targeting group named MyXPClients beneath the MyClients targeting group. Move theWindows XP client computers to the MyXpClients targeting group. Approve the update for installation tothe MyClients targeting group.

D. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update forinstallation to the Unassigned Computers targeting group.

Answer: DSection: (none)

Explanation/Reference:Explanation:All computers targeting group = assigned group and unassigned group. Unassigned computer targetinggroup = all computer which is not assign to any group.

www.certify-me.co.uk 39Microsoft 70-686 Exam

untitledhints:Windows 7 remove from MyClients = unassigned computer targeting group Windows XP = MyClientstargeting groupupdate will only done for unassigned computer targeting group

QUESTION 41Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates andservice packs. Microsoft releases a security update for Windows 7. You have the following requirements:The security update must be deployed by 5:00 P.M. on Friday. Computers that are off when the securityupdate is deployed must install the security update as soon as they are turned on. You need to manage thesoftware update process to meet the requirements.What should you do?

A. Approve the security update for installation through the WSUS console with no deadline.

B. Approve the security update for download through the WSUS console with a deadline of Friday at 5:00P.M.

C. Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00P.M.

D. Approve the security update for download through the WSUS console with no deadline.

Answer: CSection: (none)

Explanation/Reference:Explanation:Hints:1. question mention at friday 5pm2. question request install update in stead of download update

www.certify-me.co.uk 40Microsoft 70-686 Exam

QUESTION 42Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com thatuses Active DirectoryCintegrated DNS.

You deploy the Key Management Service (KMS) on a Windows 7 computer.

You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the clientcomputers.

B. Deploy a Windows Server 2008 KMS host.

C. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.

D. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.

Answer: ACSection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/ee939272.aspx The KMS clients find the KMS host via a DNSSRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate

themselves. When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Onceactivated, the KMS clients will attempt a renewal every 7days.Listening on Port:Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients toconnect to the KMS host. Make sure this port is open between your KMS clients and the KMS host.

QUESTION 43Your network contains 5 servers that have the Remote Desktop Session Host role service installed. Theservers host a Remote Desktop RemoteApp named App1.

You need to recommend a solution for App1 that meets the following requirements:

www.certify-me.co.uk 41Microsoft 70-686 Exam· Must ensure that users can connect to any Remote Desktop Session Host server

· Must ensure that users are automatically reconnected to disconnected sessions

What should you include in the recommendations?

A. Windows Virtual PC and Windows XP Mode

B. Remote Desktop Web Access

C. Remote Desktop Gateway

D. Windows Deployment Services

E. Remote Desktop Connection Broker

Answer: ESection: (none)

Explanation/Reference:Explanation:Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker(TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection.RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view ofRemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Brokersupports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktopsessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RDConnection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RDSession Host) servers that may host different RemoteApp programs.http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx

QUESTION 44Your company has two network segments. The core network segment is where centralized management isperformed. The high-security network segment is an isolated network. A firewall between the core networksegment and the high-security network segment limits network communication between the segments.

These network segments are shown in the following diagram.

www.certify-me.co.uk 42Microsoft 70-686 Exam

Your company plans to deploy Windows 7 to all client computers.

You need to manage activation for client computers that are located in the high-security network segment.

What should you do?

A. Deploy the Key Management Service (KMS) in the core network segment.

B. Deploy the Key Management Service (KMS) in the high-security network segment.

C. Install the Volume Activation Management Tool (VAMT) in the core network segment.

D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment.

Answer: DSection: (none)

Explanation/Reference:Explanation:Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.refer to http://technet.microsoft.com/en-us/library/ee939272.aspx There is a firewall blocking, (VAMT)should setup at high-security network.

QUESTION 45Your company has client computers that run Windows XP Professional.

You are planning to install Windows 7 Enterprise on the existing client computers.

You need to ensure that the user state can be viewed after it has been collected and saved.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Perform an offline migration by using Windows PE.www.certify-me.co.uk 43Microsoft 70-686 Exam

B. Use an uncompressed migration store.

C. Perform an offline migration by using Windows.old.

D. Use a hard-link migration store.

Answer: BDSection: (none)

Explanation/Reference:Explanation:

QUESTION 46You plan to deploy Windows 7 to client computers.

You have the following requirements:

Deploy Windows 7 over the network.

Do not affect the performance of existing network applications.

You need to design a zero-touch deployment strategy that supports the requirements.

What should you do?

A. Deploy images from a Microsoft System Center Configuration Manager server that runs Windows Server2008.

B. Deploy images from a dedicated share on a Windows Server 2008 server.

C. Ensure that all computers have the Internet Protocol version 6 (IPv6) protocol disabled prior todeployment.

D. Ensure that all computers have the Internet Protocol version 4 (IPv4) protocol disabled prior todeployment.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 47Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server hasthe Windows Deployment Services (WDS) role installed. You create a Windows 7 image.

You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image.

You need to design a deployment strategy that will install an image on unknown client computers

www.certify-me.co.uk 44Microsoft 70-686 Examonly if administrative approval is granted.

What should you do?

A. Create a multicast transmission for the Windows 7 image.

B. Use an Auto-Add policy on the WDS server.

C. Create a unicast transmission for the Windows 7 image.

D. Use DHCP rogue detection on the WDS server.

Answer: BSection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/cc731409(v=ws.10).aspx#BKMK_2

www.certify-me.co.uk 45Microsoft 70-686 Exam

untitled

QUESTION 48Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.

You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy theWindows 7 image.

You have the following requirements:

- Migrate 20 computers at a time.- Ensure that you conserve network bandwidth.

You need to design a deployment strategy that meets the requirements.

What should you do?

A. Configure multicast transmission on the deployment point.

B. Configure unicast transmission on the deployment point.

C. Distribute the image by using Background Intelligent Transfer Service (BITS).

D. Compress the contents of the distribution folder.

Answer: ASection: (none)

Explanation/Reference:Explanation:Performing Multicast DeploymentsIn order to deploy an image using multicasting instead of unicasting, you must first create a multicasttransmission. Multicast transmissions make the image available for multicasting, which enables you todeploy an image to a large number of client computers without overburdening the network. When youdeploy an image using multicasting, the image is sent over the network only once, which can drasticallyreduce the amount of network bandwidth that is used. http://technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx

QUESTION 49Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.

www.certify-me.co.uk 46Microsoft 70-686 ExamYou are planning to deploy Windows 7 by using a zero-touch installation process.

You need to test the deployment methodology.

What should you do first?

A. Create a computer collection with test computers as members.

B. Create a security group with test computers as members.

C. Create an organizational unit and move test computer accounts into it.

D. Create a distribution group with test computers as members.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 50You are planning a Windows 7 deployment infrastructure.

You have the following requirements:

- Enable network deployments of WIM images or VHDs- Support multicast with the use of multiple stream transfer functionality.- Allow drivers to be stored centrally, and use dynamic driver provisioning.

You need to design an infrastructure that meets the requirements.

Which deployment method should you recommend?

A. Microsoft Deployment Toolkit (MDT) 2010

B. Microsoft Deployment Toolkit (MDT) 2008

C. Windows Deployment Services in Windows Server 2008 R2

D. Deployment Image Servicing and Management (DISM)

Answer: CSection: (none)

Explanation/Reference:Explanation:

Exam B

QUESTION 1Your network has a single domain with 1,000 client computers that run Windows Vista.

You are planning a deployment of Windows 7.

www.certify-me.co.uk 47Microsoft 70-686 ExamYour company has multiple departments. Only the sales department will use the existing target computersto run Windows 7.

You have the following requirements:

- Migrate the user state for each user.- Preserve the file system and existing applications for only the sales department computers.

You need to recommend the deployment method that is appropriate for the environment.

Which combination of deployment scenarios should you recommend?

A. Use the Upgrade Computer method for the sales department computers.Use the Replace Computer method for all other computers.

B. Use the Upgrade Computer method for the sales department computers.Use the Refresh Computer method for all other computers.

C. Use the Refresh Computer method for the sales department computers.Use the New Computer method for all other computers.

D. Use the Refresh Computer method for the sales department computers.Use the Replace Computer method for all other computers.

Answer: ASection: (none)

Explanation/Reference:Explanation:Hints: only upgrade can preserve existing applicationReplace method - change new computer and migrate user state for each user.

QUESTION 2You are planning a zero-touch deployment of Windows 7 Enterprise to client computers on your corporatenetwork.

Each client computer has three available boot methods:

- boot from the network by using PXE- boot from USB media- boot from the local hard disk

You have the following requirements:

- Set the boot method for a zero-touch deployment.- Ensure that client computers that fail on deployment can be manually configured.

You need to design a zero-touch deployment strategy that supports the requirements.

www.certify-me.co.uk 48Microsoft 70-686 ExamWhat should you do?

A. Remove USB media and local hard disk from the available boot methods

B. Remove USB media and network from the available boot methods

C. Set network as the first boot method, USB media as the second boot method, and local hard disk as thethird boot method

D. Set USB media as the first boot method and local hard disk as the second boot method.Remove network from the available boot methods

Answer: CSection: (none)

Explanation/Reference:Explanation:hints: zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network so, setnetwork as 1st boot.

QUESTION 3Your company has client computers that run Windows XP Professional.

You are planning to install Windows 7 Enterprise on the existing client computers.

You need to design a user state migration strategy that minimizes network bandwidth and server use whenuser data is being migrated.

What should you do?

A. Use the Refresh Computer method and a hard-link migration store.

B. Use the Refresh Computer method and a compressed migration store.

C. Use the Replace Computer method and a hard-link migration store.

D. Use the Replace Computer method and a compressed migration store.

Answer: ASection: (none)

Explanation/Reference:Explanation:A hard-link migration store enables you to perform an in-place migration where all user state is maintainedon the computer while the old operating system is removed and the new operating system is installed; this iswhy it is best suited for the computer-refresh scenario. http://technet.microsoft.com/en-us/library/dd560753(v=ws.10).aspx

Refresh ScenarioSimilar to a new installation, the refresh scenario performs a clean setup. The difference is that the targetcomputer already contains Windows, for which files and settings will be preserved (installed

www.certify-me.co.uk 49Microsoft 70-686 Exam

applications are not taken into consideration). This scenario is especially useful in the event that preservingthe user state is a priority. It still leverages the consistency benefits that come through a new installation.You can automate this scenario with the latest version of the User State Migration Tool (USMT 4.0), whichwill collect pertinent data for each user state found in the system, and restore it after the clean installation isperformed.

Replace ScenarioThis is similar to the refresh scenario, except the target system is a new computer that does not yet containany files or settings. The scenario consists of conducting a new installation on the target computer, and thenusing the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario side-by-side with an older system running Windows XP or

Windows Vista.http://technet.microsoft.com/en-us/magazine/hh124549.aspx Hints:

Install on existing client computer = refreshReplace a new client computer = Replace

QUESTION 4Your company has 1,000 client computers that run Windows 7 Enterprise.

You need to ensure that users cannot bypass or disable Internet Explorer logging.

What should you do?

A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state toEnabled.

B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state toEnabled.

C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state toEnabled.

D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state toEnabled.

Answer: CSection: (none)

Explanation/Reference:Explanation:InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, formdata, cookies, and usernames and passwords from being retained by the browser, leaving no easilyaccessible evidence of browsing or search history.

www.certify-me.co.uk 50Microsoft 70-686 Exam

http://en.wikipedia.org/wiki/Internet_Explorer_8hints:run IE InPrivate Browsing will not keep any history or logging.General Page able to clear IE history

untitled

QUESTION 5All client computers in your network run Windows 7 with default firewall settings.

www.certify-me.co.uk 51Microsoft 70-686 ExamYou have a server-based application that requires an agent to be installed on all client computers.

You need to use Group Policy to allow the application to initiate installation of the agent on all clientcomputers.

What should you do?

A. Create inbound program rules.

B. Create inbound port rules.

C. Create Windows service hardening rules.

D. Create connection security rules.

Answer: BSection: (none)

Explanation/Reference:Explanation:

hints:software havent install, so unable to block program

QUESTION 6All client computers in your network run Windows 7 Enterprise.

You need to prevent all standard user accounts from running programs that are signed by a specificpublisher.

What should you do?

A. Use AppLocker application control policies. Create an Executable rule.

B. Use software restriction policies. Create a hash rule.

C. Use AppLocker application control policies. Create a Windows Installer rule.

D. Use software restriction policies. Create a path rule.

Answer: ASection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/dd759068.aspx The AppLocker Microsoft Management Console(MMC) snap-in is organized into four areas called rule collections. The four rule collections are executablefiles, scripts, Windows Installer files, and DLL files. These collections give the administrator an easy way todifferentiate the rules for different types of applications.Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to

www.certify-me.co.uk 52Microsoft 70-686 Exam

create an AppLocker rule. The three primary rule conditions are publisher, path, and file hash. Publisher -This condition identifies an application based on its digital signature and extended attributes. The digitalsignature contains information about the company that created the application (the publisher). The extendedattributes, which are obtained from the binary resource, contain the name of the product that the applicationis part of and the version number of the application. The publisher may be a software developmentcompany, such as Microsoft, or the information technology department of your organization. Path - Thiscondition identifies an application by its location in the file system of the computer or on the network.AppLocker uses path variables for directories in Windows. File hash - When the file hash condition ischosen, the system computes a cryptographic hash of the identified file.

QUESTION 7Your network has a single domain with 1,000 client computers that run Windows 7. You use MicrosoftSystem Center Configuration Manager 2007 to distribute and install software applications. All users havestandard user accounts.

You plan to use Group Policy to ensure that application installation functions properly.

You need to design the User Account Control (UAC) policy.

What should you do?

A. Configure the User Account Control: Behavior of the elevation prompt for standard users setting to bePrompt for credentials.

B. Configure the User Account Control: Only elevate executables that are signed and validated setting to beEnabled.

C. Configure the User Account Control: Detect application installations and prompt for elevation setting tobe Disabled.

D. Configure the User Account Control: Detect application installations and prompt for elevation setting tobe Enabled.

Answer: CSection: (none)

Explanation/Reference:Explanation:User Account Control: Detect application installations and prompt for elevation The User Account Control:Detect application installations and prompt for elevation policy setting controls the behavior of applicationinstallation detection for the computer.The options are:Enabled. (Default for home) When an application installation package is detected that requires

www.certify-me.co.uk 53Microsoft 70-686 Exam

elevation of privilege, the user is prompted to enter an administrative user name and password. If the userenters valid credentials, the operation continues with the applicable privilege. Disabled. (Default forenterprise) Application installation packages are not detected and prompted for elevation. Enterprises thatare running standard user desktops and use delegated installation technologies such as Group PolicySoftware Installation or Systems Management Server (SMS) should disable this policy setting. In this case,installer detection is unnecessary. http://technet.microsoft.com/en-us/library/dd851376.aspx

QUESTION 8Your network has 1,000 client computers that run Windows 7.

You need to install an application, in the Local System account context, on the client computers.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Configure a logon script.

B. Configure a startup script.

C. Configure a shutdown script.

D. Configure a logoff script.

Answer: BCSection: (none)

Explanation/Reference:Explanation:

QUESTION 9You are planning to deploy Windows 7 to all client computers in your network. You need to ensure thatdomain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers.What should you provide to the domain administrators?

A. Local Group Policy Editor

B. GPOAccelerator Tool

C. Remote Server Administration Tools

D. Administration Tools Pack

Answer: CSection: (none)

Explanation/Reference:Explanation:

Group Polices were modified using the Group Policy Edit tool that was integrated with Active

www.certify-me.co.uk 54Microsoft 70-686 Exam

Directory Users and Computers Microsoft Management Console (MMC) snap-in, but it was later split into aseparate MMC snap-in called the Group Policy Management Console (GPMC). The GPMC is now a usercomponent in Windows Server 2008 and Windows Server 2008 R2 and is provided as a download as partof the RemoteServer Administration Tools for Windows Vista and Windows 7.http://en.wikipedia.org/wiki/Group_Policy

QUESTION 10Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copydata from their computers to removable drives. You need to ensure that data that is copied to removabledrives is protected. What should you do?

A. Use Encrypting File System (EFS)

B. Enable Trusted Platform Module (TPM) hardware on all client computers

C. Use Active Directory Rights Management Services

D. Configure a Group Policy to enforce the use of BitLocker To Go

Answer: DSection: (none)

Explanation/Reference:Explanation:BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restrictedwith a passphrase. In addition to having control over passphrase length and complexity, IT administratorscan set a policy that requires users to apply BitLocker protection to removable drives before being able towrite to them.http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows- 7/features.aspx#bitlocker

QUESTION 11Your network has a single domain with 1,000 client computers that run Windows 7.

A large number of software installation scripts are configured to run on the client computers.

You need to recommend a Group Policy setting to allow users to log on to their computers as soon aspossible at first boot.

What should you recommend?

www.certify-me.co.uk 55Microsoft 70-686 Exam

A. Configure the Run logon scripts synchronously setting to be Enabled.

B. Configure the Run logon scripts synchronously setting to be Disabled.

C. Configure the Run startup scripts asynchronously setting to be Enabled.

D. Configure the Run startup scripts asynchronously setting to be Disabled.

Answer: CSection: (none)

Explanation/Reference:Explanation:Run logon scripts synchronously

DescriptionDirects the system to wait for logon scripts to finish running before it starts the Windows Explorer interfaceprogram and creates the desktop.If you enable this policy, Windows Explorer does not start until the logon scripts have finished running. Thissetting assures that logon script processing is complete before the user starts working, but it can delay theappearance of the desktop. If you disable this policy or do not configure it, the logon scripts and WindowsExplorer are not synchronized and can run simultaneously.Run startup scripts asynchronouslyDescriptionLets the system run startup scripts simultaneously.Startup scripts are batch files that run before the user is invited to log on. By default, the system waits foreach startup script to complete before it runs the next startup script. If you enable this policy, the systemdoes not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously.If you disable this policy or do not configure it, a startup script cannot run until the previous script iscomplete.http://msdn.microsoft.com/en-us/library/ms811602.aspx

QUESTION 12Your company has 1,000 computers in the main office and 20 computers in store kiosks. All the computersrun Windows 7 Enterprise. The kiosk computers do not have network connections. The company brandsthe Internet Explorer program window on all computers by displaying the company logo at the left end of thetitle bar. The company changes its logo.

You have the following requirements:

- Display the new logo on the Internet Explorer program window title bar on the main office computers andthe kiosk computers.- Modify the search providers that are available to main office computers.

You need to define Internet Explorer settings to support the requirements.

www.certify-me.co.uk 56Microsoft 70-686 ExamWhat should you do?

A. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deploymentpackage on the main office computers. Create a deployment CD for the kiosk computers.

B. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deploymentpackage on the main office computers. Enable automatic version synchronization and specify a flashdrive for the path. Distribute the configuration package to the kiosk computers.

C. Save the logo as Logo.png and copy the file to the C:\Windows\Branding\ directory on each kioskcomputer. Create and distribute a new OpenSearch description file for the main office computers.

D. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deploymentpackage. Copy the setup file to a flash drive, and distribute the file to all computers.

Answer: ASection: (none)

Explanation/Reference:Explanation:Hints:Kiosk computer do not have network connections, deployment CD is needed.

QUESTION 13You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computersin Toronto by using ConfigMgr.

The deployed image fails to activate.

You need to ensure that the image meets company activation requirements.

What should you do?

A. Run the Sysprep /generalize command.

B. Run the Sysprep /oobe command.

C. Modify the unattend.xml file and enter a MAK key.

D. Modify the unattend.xml file and enter a KMS key.

Answer: ASection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 57Microsoft 70-686 Exam

QUESTION 14Your company has an Active Directory domain.

You are planning the deployment of Windows 7 to client computers that are located in a main office and insatellite offices. All client computers use the same hardware.

company's security policy has the following requirements:Your

- All client computers in the main office must run Windows 7 Enterprise.- All client computers in the satellite offices must use BitLocker.- All client computers in the main office must apply a custom security template.

The template must not apply to client computers in the satellite offices.

You need to recommend an image-creation strategy that meets the requirements of the security policy. Thesolution must minimize administrative effort.

What should you include in your recommendations?

A. One image for all client computersA Group Policy object

B. One image for the main office computersOne image for the satellite office computersA Data Recovery AgentA Security database (secedit.sdb)

C. One image for the main office computersOne image for the satellite office computersA Group Policy object

D. One image for all client computersA Data Recovery AgentA Security database (secedit.sdb)

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 15You have an image that is used to deploy Windows 7 on client computers.

You need to add drivers to the Windows 7 image.

Which two actions should you perform? (Each correct answer presents part of the solution.

www.certify-me.co.uk 58Microsoft 70-686 ExamChoose two.)

A. Use the Deployment Image Servicing and Management (DISM) tool offline.

B. Use INF files for driver packages.

C. Use executable files for driver packages.

D. Use Windows Installer files for driver packages.

E. Use the Deployment Image Servicing and Management (DISM) tool online.

Answer: ABSection: (none)

Explanation/Reference:Explanation:Deployment Image Servicing and Management able to attach INF driver file to image at offline mode

QUESTION 16Your company is planning to deploy Windows 7.

You have an image that is used to deploy Windows 7 on client computers.

You need to add a volume image to the existing Windows image.

What should you do?

A. Service the image online.

B. Use ImageX to append the volume image.

C. Use the Deployment Image Servicing and Management (DISM) tool to mount the image.

D. Use DiskPart to attach a new volume.

Answer: BSection: (none)

Explanation/Reference:Explanation:ImageX is a command-line tool that enables the creation of Windows image (.wim) files for deployment in amanufacturing or corporate IT environment. The /append option appends a volume image to an existing .wim file. It creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice http://technet.microsoft.com/en-us/library/cc749603(v=ws.10).aspx

QUESTION 17Your company includes mobile computer users who frequently work offline.

www.certify-me.co.uk 59Microsoft 70-686 ExamYou are planning to deploy Windows 7 by using an image.

You have the following requirements:

- Provide access to all applications when mobile computer users first start their computers.- Minimize network and local storage requirements.

- Provide language-pack support based on the geographic location of the user.

You need to ensure that your image-creation strategy meets the requirements.

What should you do?

A. Create a single thin image for all computers.

B. Create one thin image for the mobile computers. Create one thick image for all other computers.

C. Create one thick image for the mobile computers. Create one thin image for all other computers.

D. Create a single hybrid image for all computers.

Answer: CSection: (none)

Explanation/Reference:Explanation:MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows® 7 By Ian McLean, Orin Thomashttp://books.google.com.my/books?id=lpNuBdGgFncC&pg=PT310&lpg=PT310&dq=thin+image+t hick+image+languagepack&source=bl&ots=mU6XADkqKY&sig=C_BBoYQjkIHwwo7B9P2MlXM4TOU&hl=en&sa=X&ei=QE-KTDvC4fJrAfs7JGyCw&ved=0CB8Q6AEwAA#v=onepage&q=thin%20image%20thick%20image%20languagepack&f=false

www.certify-me.co.uk 60Microsoft 70-686 Exam

untitled

QUESTION 18Your network includes the client computer hardware configurations shown in the following table.

You need to deploy Windows 7 by using the fewest images.

How many images are needed?

A. 2

B. 3www.certify-me.co.uk 61Microsoft 70-686 Exam

C. 4

D. 8

Answer: ASection: (none)

Explanation/Reference:Explanation:One for 32bit image and one for 64bit image

QUESTION 19Your company has 1,000 client computers.

You are planning to deploy Windows 7 and a new line-of-business application.

You have the following requirements:

- Install the application as part of the standard Windows 7 deployment.- Use a single Windows 7 image for the deployment.- The application must be available for use on client computers that are not connected to the network.

You need to ensure that the application is installed on all new client computers.

What should you do?

A. Deploy the application by using Windows Server Update Services (WSUS).

B. Publish the application by using Group Policy Software Installation.

C. Service an offline image of Windows 7 to add the new application.

D. Service an online image of Windows 7 to add the new application.

Answer: DSection: (none)

Explanation/Reference:Explanation:Hints:Client computer that are not connected to the network = A & B is wrong the question refer to applicationinstallation. You can not do it offline servicing. Only online will be able to achieve it.

QUESTION 20You deploy Windows 7 Enterprise to 1,000 client computers by using an image file.

www.certify-me.co.uk 62Microsoft 70-686 ExamYou need to define an image update strategy to incorporate software updates.

What should you do?

A. Install the deployment image on a client computer. Run the update package on the client computer, runSysprep, and then recapture the image.

B. Append a disk volume that contains the update to the deployment image.

C. Mount the deployment image on a client computer that runs Windows 7. Run the update package on theclient computer.

D. Install the deployment image on a client computer. Run the update package on the client computer, runBCDedit, and then recapture the image.

Answer: ASection: (none)

Explanation/Reference:Explanation:hints: incorporate software updates = update image online Sysprep is needed before capture image.

QUESTION 21You are designing a Windows 7 deployment image.

You plan to partition the hard disk of each client computer during deployment.

You need to modify the unattended answer file by using a text editor.

Where should you add the disk information?

A. to the Generalize configuration pass

B. to the AuditSystem configuration pass

C. to the WindowsPE configuration pass

D. to the Specialize configuration pass

Answer: CSection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/dd744551(v=ws.10).aspx The windowsPE configuration pass alsoenables you to specify Windows Setup-related settings, including:- Partition and format a hard disk.- Select a specific Windows image to install, the path of that image, and any credentials required to accessthat image.

www.certify-me.co.uk 63Microsoft 70-686 Exam

- Select a partition on the destination computer where you install Windows.- Apply a product key and administrator password.- Run specific commands during Windows Setup.

QUESTION 22You are planning to deploy Windows 7 Enterprise and several custom applications. You create a customWindows 7 Enterprise image. You need to validate that the custom applications will run after thedeployment. What should you do?

A. Use ImageX with the check option to mount the image.

B. Mount the custom image by using the Deployment Image Servicing and Management (DISM) tool.

C. Deploy the custom image, and then run the sigverif.exe command.

D. Deploy the custom image to a Virtual Hard Disk (VHD), and then boot from the VHD.

Answer: DSection: (none)

Explanation/Reference:Explanation:The only way to check custom application is C in question, as need to load image to VHD or real PC, thenboot from VHD or PC to windows, then run the customer application in windows.

QUESTION 23Your company has a main office and 5 branch offices. Each office contains 200 client computer.

Each office has a direct connection to the Internet. The branch offices are connected to the main officethrough dedicated connections.

You plan to deploy an update solution for all client computers by using Windows Server Update Services(WSUS).

You need to recommend a WSUS deployment solution. The solution must minimize traffic over thededicated connections.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Configure WSUS to download updates from an upstream server.www.certify-me.co.uk 64Microsoft 70-686 Exam

B. Deploy BranchCache in distributed cache mode in each office.

C. Deploy a WSUS server in each office.

D. Configure WSUS to download updates from Microsoft Update.

E. Deploy a WSUS server in the main office only.

Answer: CDSection: (none)

Explanation/Reference:Explanation:hints:Each office has a direct connection to the Internet.The branch offices are connected to the main office through dedicated connections.

QUESTION 24Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain,organizational unit (OU), and Group Policy object (GPO) design is shown in the following diagram.

www.certify-me.co.uk 65Microsoft 70-686 Exam

You deploy a Microsoft Windows Server Update Services (WSUS) server.

You need to ensure that only client computers that are members of the NY Computers OU use the WSUSserver for updates.

Where should you define Windows Update settings?

A. in the User Configuration settings of the New York Computers GPO

B. in the Computer Configuration settings of the New York Baseline GPO

C. in the User Configuration settings of the New York Baseline GPO

D. in the Computer Configuration settings of the New York Computers GPO

Answer: DSection: (none)

Explanation/Reference:Explanation:To specify how and when computers are updated through Group Policy

www.certify-me.co.uk 66Microsoft 70-686 Exam

In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, expandWindows Components, and then click Windows Update. In the details pane of Group Policy Object Editor,configure the appropriate policies. See the following table for examples of the policies you might want toset.. refer to http://technet.microsoft.com/en-us/library/cc708536(v=WS.10).aspx

QUESTION 25company's network is shown in the following diagram.

Your

All client computers are members of the contoso.com Active Directory Domain Services (AD DS) domain.Each network segment is represented by an AD DS site object that is named to match the networksegment.

Your company plans to deploy Windows 7 to all client computers.

You need to manage the deployment to ensure that client computers in branch office C can activateWindows. What should you do?

www.certify-me.co.uk 67Microsoft 70-686 Exam

A. Create a DNS service (SRV) resource record named_vlmcs._udp.BranchOfficeC._sites.contoso.com .

B. Deploy the Multiple Activation Key (MAK) in branch office C.

C. Deploy the Key Management Service (KMS) in branch office C.

D. Create a DNS service (SRV) resource record named_vlmcs._tcp.BranchOfficeC._sites.contoso.com .

Answer: BSection: (none)

Explanation/Reference:Explanation:Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.refer to http://technet.microsoft.com/en-us/library/ee939272.aspx

QUESTION 26Your company has client computers that run Windows Vista and client computers that run Windows 7. Theclient computers connect directly to the Microsoft Update Web site once per week and automatically installall available security updates.

Microsoft releases a security update for Windows 7.

You have the following requirements:

- Create a report of all Windows 7 computers that are currently connected to the network and that do nothave the security update installed.- Use the least amount of administrative effort.

You need to manage the software update process to meet the requirements.

What should you do?

A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update forinstallation, and force a detection cycle on the client computers.

B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection,and force a detection cycle on the client computers.

C. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.

D. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA touse the Microsoft Update site catalog.

Answer: DSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 68Microsoft 70-686 Exam

Microsoft Baseline Security AnalyzerMicrosoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional thathelps small- and medium-sized businesses determine their security state in accordance with Microsoftsecurity recommendations and offers specific remediation guidance. Improve your security managementprocess by using MBSA to detect common security misconfigurations and missing security updates on yourcomputer systems.http://technet.microsoft.com/en-us/security/cc184924

QUESTION 27Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with anadditional operating system boot option. What should you do?

A. Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD).

B. Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu.

C. Use Bootcfg to modify the boot parameters.

D. Use BCDboot to modify the system partition.

Answer: BSection: (none)

Explanation/Reference:Explanation:BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions ofWindows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder.http://technet.microsoft.com/library/cc731662.aspx

QUESTION 28Your network has a single domain with 1,000 client computers that run Windows Vista. All client computersare members of the domain.

You are planning to deploy Windows 7.

You need to create a report that shows hardware and device compatibility on all client computers.

You need to perform this action without installing any additional software on the client computers.

Which tool should you use?

www.certify-me.co.uk 69Microsoft 70-686 Exam

A. System Center Configuration Manager

B. System Center Capacity Planner

C. Windows Performance Monitor Data Collector Sets

D. Microsoft Assessment and Planning Toolkit

Answer: DSection: (none)

Explanation/Reference:Explanation:Microsoft Assessment and Planning Toolkit performs a detailed analysis of hardware and devicecompatibility for migration to Windows 7, Windows Server 2008 R2, SQL Server 2008 R2, Microsoft Office2010, and Office 365. The hardware assessment looks at the installed hardware and determines if migrationis recommended. If it is not recommended, then reports provide information about why it is not.http://technet.microsoft.com/en-us/library/bb977556.aspx

QUESTION 29You are designing a Windows 7 virtual desktop infrastructure.

You have the following requirements:

- Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.- Support network load balancing. Support reconnection to existing sessions on virtual desktops.- You need to specify a design that meets the requirements.

What should you include in your design?

A. Remote Desktop Gateway

B. Windows Deployment Services

C. Remote Desktop Connection Broker

D. Windows Virtual PC and Windows XP Mode

Answer: CSection: (none)

Explanation/Reference:Explanation:Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker(TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection.RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view ofRemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Brokersupports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktopsessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RDConnection Broker also aggregates RemoteApp sources from

www.certify-me.co.uk 70Microsoft 70-686 Exam

multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteAppprograms.http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx

QUESTION 30Your company plans to deploy Windows 7 Enterprise.

The current client computers run either Windows XP Professional or Windows Vista Enterprise.

The company uses 20 custom applications that were written for Windows XP.

You need to create a log of compatibility issues for the custom applications.

What should you do?

A. Install each application on a Windows XP client computer, and then run the Application CompatibilityToolkit (ACT).

B. Install each application on a Windows 7 client computer, and then run the Application CompatibilityToolkit (ACT).

C. Install each application on a Windows XP client computer. Sequence each application by using MicrosoftApplication Virtualization (App-V).

D. Install each application on a Windows Vista client computer. Sequence each application by usingMicrosoft Application Virtualization (App-V).

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 31You are planning to deploy Windows 7.

You have a custom line-of-business application that is not compatible with Windows 7.

You need to design a solution that allows the application to run.

What should you do?

www.certify-me.co.uk 71Microsoft 70-686 Exam

A. Use the Windows Compatibility Evaluator.

B. Use the Setup Analysis Tool.

C. Use the Compatibility Administrator.

D. Use the Update Compatibility Evaluator.

Answer: CSection: (none)

Explanation/Reference:Explanation:The Compatibility Administrator tool can help you to resolve many of your compatibility issues by enablingthe creation and the installation of application mitigation packages (shims), which can include individualcompatibility fixes, compatibility modes, and AppHelp messages. The flowchart in Figure illustrates thesteps required while using the Compatibility Administrator to create your compatibility fixes, compatibilitymodes, and AppHelp messages. http://sourcedaddy.com/windows-7/using-the-compatibility-administrator.

html

QUESTION 32Your company is planning to deploy Windows 7 to all client computers.

You have the following requirements:

Test an application to detect potential compatibility issues caused by User Account Control (UAC).Monitor an applications operating system use.

You need to select the appropriate method to detect application compatibility issues.

What should you do?

A. Use the Setup Analysis Tool in a virtual environment.

B. Use the standalone Setup Analysis Tool.

C. Use the Standard User Analyzer Wizard.

D. Use the Standard User Analyzer tool.

Answer: DSection: (none)

Explanation/Reference:Explanation:The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibilityissues due to the User Account Control (UAC) feature. http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx

www.certify-me.co.uk 72Microsoft 70-686 Exam

QUESTION 33Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7computers.

You are planning to deploy a custom application.

You need to schedule the deployment to occur outside of business hours and without user interaction.

Which deployment method should you choose?

A. Lite Touch Installation

B. software deployment with Microsoft System Center Configuration Manager 2007

C. software installation with Group Policy

D. Microsoft Application Virtualization (App-V)

Answer: BSection: (none)

Explanation/Reference:Explanation:Microsoft System Center Configuration Manager 2007 able to set schedule to deploy (text book) hints:without user interaction = zero touch

QUESTION 34Your network has 1,000 client computers that run Windows 7.

You plan to deploy a new application.

You need to ensure that the application deploys only during non-business hours.

What should you do?

A. Use Group Policy.

B. Use Microsoft System Center Configuration Manager.

C. Use Windows Deployment Services with a schedule cast.

D. Use a logon script.

Answer: BSection: (none)

Explanation/Reference:Explanation:Microsoft System Center Configuration Manager able to schedule task (Text Book)

www.certify-me.co.uk 73Microsoft 70-686 Exam

QUESTION 35Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vistacomputers.

You are planning to deploy Windows 7 and a custom application.

You have the following requirements:

- The application must be available to only a specific group of users.- You must be able to monitor application usage.

You need to design a deployment method for the custom application that meets the requirements.

Which deployment method should you use in your design?

A. software installation in Group Policy

B. Microsoft Application Virtualization (App-V)

C. baseline Windows 7 image that includes the custom application

D. startup scripts in Group Policy

Answer: BSection: (none)

Explanation/Reference:Explanation:MS App-V thus allows centralized installation and management of deployed applications. It supports policybased access control; administrators can define and restrict access to the applications by certain users bydefining policies governing the usage. App-V can require that applications not be run 'cached' fromworkstations, or require that 'cached' App-V applications routinely update license information from the App-Vserver, enforcing license compliance. These policies are centrally applied on the application repository. App-V also allows copy of the applications across multiple application servers for better scalability and faulttolerance, and also features a tracking interface to track the usage of the virtualized application.http://en.wikipedia.org/wiki/Microsoft_App-V

QUESTION 36Your companys network has client computers that run Windows 7.

www.certify-me.co.uk 74Microsoft 70-686 ExamA software vendor releases version 2 of an application that your company uses.

Your company currently uses version 1.

Version 1 and version 2 are not compatible.

You plan to deploy version 2 of the application.

You have the following requirements:

Users must be able to run both versions of the application on their computers.

Version 2 must be available when a client computer is not connected to the network.

You need to plan a software deployment process that meets the requirements.

What should you do?

A. Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

B. Deploy version 2 of the application by using a Group Policy Software Installation policy.

C. Deploy version 2 of the application as a Remote Desktop Services RemoteApp.

D. Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).

Answer: DSection: (none)

Explanation/Reference:Explanation:Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real- time toany client from a virtual application server. It removes the need for local installation of the applications.Instead, only the App-v client needs to be installed on the client machines. All application data ispermanently stored on the virtual application server. Whichever software is needed is either streamed orlocally cached from the application server on demand and run locally. The App-V stack sandboxes theexecution environment so that the application does not make changes to the client itself (OS File Systemand/or Registry). App-V applications are also sandboxed from each other, so that different versions of thesame application can be run under App-V concurrently.http://en.wikipedia.org/wiki/Microsoft_App-V

QUESTION 37Your network has client computers that run Windows XP. Users do not have administrative rights to theirlocal computers. You use Windows Server Update Services (WSUS) to manage software updates.

www.certify-me.co.uk 75Microsoft 70-686 ExamYou are planning to deploy Windows 7. Your company uses a custom application that is not compatible withWindows 7.

You need to ensure that all users are able to run the custom application.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Install and register a shim on the WSUS server.

B. Install and register a shim on the client computers by using Group Policy.

C. Deploy and register the compatibility-fix database file to the client computers by using a computerstartup script.

D. Deploy and register the compatibility-fix database file to the client computers by using a user startupscript.

Answer: BCSection: (none)

Explanation/Reference:Explanation:

QUESTION 38Your companys client computers run Windows 7. Your companys network has a wireless access point(WAP).

A user reports that he regularly loses connectivity to the WAP.

You need to display information about client connectivity to the WAP.

What should you do?

A. Use Event Viewer to view events from a source of WlanConn.

B. Use auditpol.exe to enable successful attempts in the Object Access category.

C. Use Event Viewer to view events from a source of WLAN AutoConfig.

D. Use auditpol.exe to enable failed attempts in the Object Access category.

Answer: CSection: (none)

Explanation/Reference:Explanation:WLAN AutoConfig service is built-in tool in Windows 7 that can be used to detect and connect to wirelessnetwork,http://www.home-network-help.com/wlan-autoconfig-service.html

www.certify-me.co.uk 76Microsoft 70-686 Exam

QUESTION 39Your company has an Active Directory Domain Services (AD DS) forest with a single domain namedcontoso.com. The design of the domain and Group Policy object (GPO) is shown in the following diagram.

You configure Group Policy preferences to define mapped drives in the Boston staff GPO.

Users in the Boston organizational unit (OU) then report that the mapped drives are not available

You need to identify and resolve Group Policy issues to ensure that the mapped drives are available.

What should you do?

A. Enable loopback processing in Replace mode.

B. Enable loopback processing in Merge mode.www.certify-me.co.uk 77Microsoft 70-686 Exam

C. Enable the computer configuration settings.

D. Enable the user configuration settings.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 40You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. InternetExplorer closes when users run a specific Web application. You need to find out whether an add-on is thecause of the problem. What should you do?

A. Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.

B. Use Group Policy to turn on Internet Explorer 7 Standards mode.

C. Start Internet Explorer in No Add-ons mode.

D. Reset all Internet Explorer security zones to the default levels.

Answer: CSection: (none)

Explanation/Reference:

Explanation:

QUESTION 41Your companys network has client computers that run Windows 7. From a computer named Computer1, auser attempts to log on to the domain and receives the following message: The system cannot log you on tothis domain because the system's computer account in its primary domain is missing or the password onthat account is incorrect. You need to ensure that the user can log on to the domain from Computer1. Whatshould you do?

A. Reset the password of the user account.

B. Move the computer account for Computer1 to the Computers container.

C. Run netdomcomputername computer1.

D. Remove Computer1 from the domain and rejoin Computer1 to the domain.

Answer: DSection: (none)

Explanation/Reference:Explanation:Re-create the computer account, join a workgroup, and then rejoin the domain.Refer to http://support.microsoft.com/kb/810497

www.certify-me.co.uk 78Microsoft 70-686 Exam

QUESTION 42Your company has a single Active Directory Domain Services (AD DS) forest with a single domain namedcontoso.com. All client computers run Windows 7. All client computer accounts are located in theComputers container in the contoso.com domain.

You discover that multiple client computers were automatically shut down because the security log was full.

You need to ensure that client computers are not shut down when the security log becomes full.

What should you do?

A. Increase the maximum log size.

B. Configure an Event Viewer subscription.

C. Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object (GPO).

D. Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).

Answer: DSection: (none)

Explanation/Reference:Explanation:Why not Default Domain Controllers Policy Group Policy object?? Default Domain Controllers Policy GroupPolicy object is set policy to manage domain controller (domain server)Default Domain Policy Group Policy object is set of policy to manage client

QUESTION 43Your company has an Active Directory Domain Services (AD DS) forest with a single domain namedcontoso.com.

You deploy a new Group Policy object (GPO) named NY Computers GPO as part of the organizational unit(OU) and GPO design shown in the following diagram.

www.certify-me.co.uk 79Microsoft 70-686 Exam

The NY Computers GPO contains computer configuration settings and user configuration settings.

User configuration settings are not being applied to users who log on to client computers in the NYComputers OU.

You need to ensure that user configuration settings are being applied.

What should you do?

A. Enable user configuration settings in the Default Domain Policy GPO.

B. Enable loopback processing in the NY Computers GPO.

C. Enable user configuration settings in the NY Computers GPO.

D. Enable loopback processing in the Default Domain Policy GPO.

Answer: BSection: (none)

Explanation/Reference:Explanation:refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92

QUESTION 44Your company has an internal Web application that uses a self-signed SSL certificate. The

www.certify-me.co.uk 80Microsoft 70-686 Examcompany has an internal certification authority (CA) with auto enrollment.

When users attempt to start the Web application, Internet Explorer displays an error message thatrecommends closing the Web page rather than continuing to the application.

You need to ensure that Internet Explorer does not display the error message.

What should you do?

A. Install the Web applications certificate into the computer store on each client computer.

B. Purchase a commercial certificate and install it on the internal CA.

C. Issue a certificate from the internal CA and install it on the application server.

D. Install the Web applications certificate into the personal store on each client computer. Add theapplications URL to the Trusted Sites zone in Internet Explorer.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 45DRAG DROP

You create a shim database and distribute it to each of a companys client computers through a script. Youname the database Shim_Database and give it a filename of shimdatabase.sdb. The database GUID is18315260-2ecb-43af-945a-56810da33fb4.

The database must be registered on all client computers. The registration process must be invisible to theuser.

You need to construct a command to register the shim database.

Which command should you use? To answer, drag the appropriate component from the list of commandcomponents to the correct location or locations in the work area.

www.certify-me.co.uk 81Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 82Microsoft 70-686 Exam

untitled

QUESTION 46HOTSPOT

You upgrade all of a companys client computers from Microsoft Internet Explorer 8 to Internet Explorer 9.

After the upgrade, users are unable to download attachments from Microsoft Outlook Web App (OWA) orany other secure website. You verify the Group Policy settings for Internet Explorer 9.

You need to ensure that all users can download attachments from OWA and other secure websites.

Which setting should you select? To answer, select the appropriate item in the work area.

www.certify-me.co.uk 83Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 84Microsoft 70-686 Exam

untitled

--resources received from HTTPS URLs areIn IE9, this option does exactly what it says it doesnot placed in the Temporary Internet Files Cache and temporary files are not created for these resources.This option is universal for HTTPS responses; their headers (e.g. Pragma, Cache- Control) are notconsulted.http://blogs.msdn.com/b/ieinternals/archive/2011/05/07/downloads-and-flash-fail-when-do-not- save-encryptedpages-to-disk-is-set.aspx

QUESTION 47DRAG DROP

Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with Windows 7.

You need to distribute a Microsoft Enterprise Desktop Visualization (MED-V) virtual machine (VM) imagethat includes the custom applications to all Windows 7 client computers.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from thelist of actions to the answer area and arrange them in the correct order.)

www.certify-me.co.uk 85Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 86Microsoft 70-686 Exam

untitled

QUESTION 48HOTSPOT

You are the desktop architect for an enterprise organization with client computers that run Windows 7.

You need to create a new Windows Firewall rule that will allow you to access the Disk Management snap-inof remote client computers.

Which predefined rule should you select? To answer, select the appropriate setting in the work area.

www.certify-me.co.uk 87Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

www.certify-me.co.uk 88Microsoft 70-686 Exam

untitled

untitledhttp://blogs.technet.com/b/server_core/archive/2008/01/14/configuring-the-firewall-for-remote-management-ofa-workgroup-server-core-installation.aspx

QUESTION 49You are planning to upgrade Microsoft Internet Explorer. You must create a report that identifies whichcomputers are successfully upgraded. You need to design a deployment method that

www.certify-me.co.uk 89Microsoft 70-686 Exammeets this requirement. What should you use? (Choose all that apply.)

A. Microsoft System Center Essentials

B. Windows Intune

C. Microsoft System Center Configuration Manager

D. Internet Explorer Administration Kit (IEAK) and Group Policy

E. Windows Server Update Services (WSUS)

Answer: ABDESection: (none)

Explanation/Reference:Explanation:

QUESTION 50HOTSPOT

Your network has a single domain with 1,000 client computers that run Windows 7. You use MicrosoftSystem Center Configuration Manager 2007 to distribute and install software applications. All users havestandard user accounts.

You plan to use Group Policy to ensure that application installation functions properly.

You need to design the User Account Control (UAC) policy.

Which setting should you select? To answer, select the appropriate setting in the work area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

www.certify-me.co.uk 90Microsoft 70-686 Exam

Explanation:

User Account Control: Detect application installations and prompt for elevation The User Account Control:Detect application installations and prompt for elevation policy setting controls the behavior of applicationinstallation detection for the computer.The options are:Enabled. (Default for home) When an application installation package is detected that requires elevation ofprivilege, the user is prompted to enter an administrative user name and password. If the user enters validcredentials, the operation continues with the applicable privilege. Disabled. (Default for enterprise)Application installation packages are not detected and prompted for elevation. Enterprises that are runningstandard user desktops and use delegated installation technologies such as Group Policy SoftwareInstallation or Systems Management Server (SMS) should disable this policy setting. In this case, installerdetection is unnecessary. http://technet.microsoft.com/en-us/library/dd851376.aspx

QUESTION 51Your company has 1,000 client computers that run Windows 7 Enterprise.

You need to ensure that users cannot bypass or disable Internet Explorer logging.

What should you do?

A. Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state toEnabled.

B. Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state toEnabled.

C. Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state toEnabled.

D. Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state toEnabled.

Answer: CSection: (none)

Explanation/Reference:Explanation:InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, formdata, cookies, and usernames and passwords from being retained by the browser, leaving no easilyaccessible evidence of browsing or search history.

www.certify-me.co.uk 50Microsoft 70-686 Exam

http://en.wikipedia.org/wiki/Internet_Explorer_8hints:run IE InPrivate Browsing will not keep any history or logging.General Page able to clear IE history

untitled

QUESTION 52Your network has 1,000 client computers that run Windows 7.

You need to install an application, in the Local System account context, on the client computers.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Configure a logon script.

B. Configure a startup script.

C. Configure a shutdown script.

D. Configure a logoff script.

Answer: BCSection: (none)

Explanation/Reference:Explanation:

QUESTION 53Your network has a single domain with 1,000 client computers that run Windows 7.

A large number of software installation scripts are configured to run on the client computers.

You need to recommend a Group Policy setting to allow users to log on to their computers as soon aspossible at first boot.

What should you recommend?

www.certify-me.co.uk 55Microsoft 70-686 Exam

A. Configure the Run logon scripts synchronously setting to be Enabled.

B. Configure the Run logon scripts synchronously setting to be Disabled.

C. Configure the Run startup scripts asynchronously setting to be Enabled.

D. Configure the Run startup scripts asynchronously setting to be Disabled.

Answer: CSection: (none)

Explanation/Reference:Explanation:Run logon scripts synchronouslyDescriptionDirects the system to wait for logon scripts to finish running before it starts the Windows Explorer interfaceprogram and creates the desktop.If you enable this policy, Windows Explorer does not start until the logon scripts have finished running. Thissetting assures that logon script processing is complete before the user starts working, but it can delay theappearance of the desktop. If you disable this policy or do not configure it, the logon scripts and WindowsExplorer are not synchronized and can run simultaneously.Run startup scripts asynchronouslyDescriptionLets the system run startup scripts simultaneously.Startup scripts are batch files that run before the user is invited to log on. By default, the system waits foreach startup script to complete before it runs the next startup script. If you enable this policy, the systemdoes not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously.If you disable this policy or do not configure it, a startup script cannot run until the previous script iscomplete.http://msdn.microsoft.com/en-us/library/ms811602.aspx

QUESTION 54You have an image that is used to deploy Windows 7 on client computers.

You need to add drivers to the Windows 7 image.

Which two actions should you perform? (Each correct answer presents part of the solution.

www.certify-me.co.uk 58Microsoft 70-686 ExamChoose two.)

A. Use the Deployment Image Servicing and Management (DISM) tool offline.

B. Use INF files for driver packages.

C. Use executable files for driver packages.

D. Use Windows Installer files for driver packages.

E. Use the Deployment Image Servicing and Management (DISM) tool online.

Answer: ABSection: (none)

Explanation/Reference:Explanation:Deployment Image Servicing and Management able to attach INF driver file to image at offline mode

QUESTION 55Your network includes the client computer hardware configurations shown in the following table.

You need to deploy Windows 7 by using the fewest images.

How many images are needed?

A. 2

B. 3www.certify-me.co.uk 61Microsoft 70-686 Exam

C. 4

D. 8

Answer: ASection: (none)

Explanation/Reference:Explanation:One for 32bit image and one for 64bit image

QUESTION 56You are planning to deploy Windows 7 Enterprise and several custom applications. You create a customWindows 7 Enterprise image. You need to validate that the custom applications will run after thedeployment. What should you do?

A. Use ImageX with the check option to mount the image.

B. Mount the custom image by using the Deployment Image Servicing and Management (DISM) tool.

C. Deploy the custom image, and then run the sigverif.exe command.

D. Deploy the custom image to a Virtual Hard Disk (VHD), and then boot from the VHD.

Answer: DSection: (none)

Explanation/Reference:Explanation:The only way to check custom application is C in question, as need to load image to VHD or real PC, thenboot from VHD or PC to windows, then run the customer application in windows.

Exam C

QUESTION 1HOTSPOT

You are creating a Windows 7 image.

You need to prevent users from sharing their desktop sessions with remote users. You also need to allowadministrators who are using Windows XP to administer the Windows 7 image remotely.

Which settings should you configure? To answer, select the appropriate setting or settings in the work area.

www.certify-me.co.uk 91Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 92Microsoft 70-686 Exam

Only less secure allow using windows XP to adminster the windows 7 image remotely smith answer originalis C, but print screen is B.

QUESTION 2DRAG DROP

A company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers runWindows 7 Enterprise. The kiosk computers do not have network connections.

The company brands the Microsoft Internet Explorer program window on all computers by displaying thecompany logo at the left end of the title bar. The company changes its logo.

You have the following requirements:

· Display the new logo on the Internet Explorer program window title bar on the main office computers andthe kiosk computers.

· Modify the search providers that are available to main office computers.

You need to define Internet Explorer settings to support the requirements.

Which two actions should you perform in sequence? (To answer, move the appropriate actions

www.certify-me.co.uk 93Microsoft 70-686 Examfrom the list of actions to the answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 94Microsoft 70-686 Exam

untitled

Hints:Kiosk computer do not have network connections, deployment CD is needed.

QUESTION 3DRAG DROP

You use a computer named Client02 to manage the BitLocker configuration on a remote computer namedClient01.

A new company policy states that when BitLocker is used, you must be able to access the data in case of asystem failure.

You need to comply with the company policy.

Using manage-bde, how should you achieve this goal? (To answer, drag the appropriate parameter from thelist of options to the correct location or locations in the work area.)

www.certify-me.co.uk 95Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

QUESTION 4HOTSPOT

A network has a single domain with 1,000 client computers that run Windows 7.

A large number of software installation scripts are configured to run on the client computers.

You need to recommend a Group Policy setting that allows users to log on to their computers as soon aspossible at first boot.

What should you recommend?

www.certify-me.co.uk 96Microsoft 70-686 Exam

A.

B.

C.

D.

Answer:

Section: (none)

Explanation/Reference:

Explanation:

Run startup scripts asynchronouslyDescription Lets the system run startup scripts simultaneously. Startup scripts are batch files that run beforethe user is invited to log on. By default, the system waits for each startup script to complete before it runsthe next startup script. If you enable this policy, the system does not coordinate the running of startupscripts. As a result, startup scripts can run simultaneously.If you disable this policy or do not configure it, a startup script cannot run until the previous script iscomplete.http://msdn.microsoft.com/en-us/library/ms811602.aspxhints: allows users to log on to their computers as soon as possible at first boot

www.certify-me.co.uk 97Microsoft 70-686 Exam

QUESTION 5DRAG DROP

A company network includes Windows 7 client computers and DirectAccess.

When using DirectAccess, users cannot connect to the companys internal resources.

You need to create a batch file that users can execute to trace all network traffic for DirectAccess from theirhome computers.

Which command should you use? To answer, drag the appropriate terms from the list of terms to thecorrect location or locations in the work area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 98Microsoft 70-686 Exam

untitled

QUESTION 6HOTSPOT

A user is unable to log on to a client computer that runs Windows 7. The user receives an error messagethat says The local policy of this system does not permit you to logon interactively. The user belongs only tothe Users group.

You need to ascertain which policy in the local security policy must be modified.

Which security policy should you select? To answer, select the appropriate policy in the work area.

www.certify-me.co.uk 99Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 100Microsoft 70-686 Exam

untitled

QUESTION 7DRAG DROP

You upgrade all of an organization's client computers to Windows 7.

After the upgrade, a specific legacy application does not function correctly.

You need to generate a list of all the computers that have the legacy application installed.

Which two actions should you perform? (To answer, move the appropriate action from the list of

www.certify-me.co.uk 101Microsoft 70-686 Examactions to the answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 102Microsoft 70-686 Exam

untitled

QUESTION 8You are using Windows Deployment Services (WDS) to deploy new images of Windows 7 to 64- bitcomputers.

Technicians receive the error message shown in the exhibit when they attempt to boot by using PXE.

You need to ensure that the technicians can boot the client computers by using PXE.

What should you do? (Choose all that apply.)

A. Run the bcdedit /set {ntldr} description "Windows 7 32-bit" command.

B. Add a 64-bit boot image to the WDS server.

C. Add a 64-bit install image to the WDS server.

D. Add a 32-bit boot image to the WDS server.

E. Run the bcdedit /set {ntldr} description "Windows 7 64-bit" command.

F. Add a 32-bit install image to the WDS server.

Answer: BDSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 103Microsoft 70-686 Exam

QUESTION 9HOTSPOT

A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment.Windows 7 is installed on all the companys client computers.

You add a domain user account named User1 to the local Administrators group on a client computer namedPC01. When User1 returns to the office, User1 does not have administrative access on PC01.

When you inspect PC01, you find that the local Administrators group does not contain the user account. Youneed to ensure that User1 is a member of the local Administrators group.

Which Group Policy setting should you select? To answer, select the appropriate Group Policy setting in thework area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 104Microsoft 70-686 Exam

untitled

Restricted groups allow an administrator to define the following two properties for security- sensitive(restricted) groups:MembersMember OfThe "Members" list defines who should and should not belong to the restricted group. The "Member Of" listspecifies which other groups the restricted group should belong to. Using the "Members" Restricted GroupPortion of Policy When a Restricted Group policy is enforced, any current member of a restricted group thatis not on the "Members" list is removed with the exception of administrator in the Administrators group. Anyuser on the "Members" list which is not currently a member of the restricted group is added. Using the"Member Of" Restricted Group Portion of Policy Only inclusion is enforced in this portion of a RestrictedGroup policy. The Restricted Group is not removed from other groups. It makes sure that the restrictedgroup is a member of groups that are listed in the Member Of dialog box.

www.certify-me.co.uk 105Microsoft 70-686 Exam

http://support.microsoft.com/kb/279301hints: if user was not added into local restricted group, it will remove from administrator group, even italready was added to administrator group.

untitled

QUESTION 10You are planning a deployment of Windows 7 on multiple client computers.

You need to recommend a Windows 7 deployment solution that meets the following requirements:

- Must support the deployment of WIM or VHD- Must support deployment by using multicast

What should you include in the recommendations?

A. System Center Configuration Manager 2010

B. Microsoft Deployment Toolkit (MDT)

C. Deployment Image Servicing and Management (DISM)

D. Windows Deployment Services

Answer: DSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 106Microsoft 70-686 Exam

QUESTION 11You are planning a Windows 7 deployment infrastructure for a new company.

You have the following requirements:

- Three domains- 10,000 client computers- No user interaction

You need to recommend a deployment infrastructure.

What should you recommend?

A. Deploy Microsoft System Center Configuration Manager 2007 R2. Design a zero-touch installation.

B. Deploy Microsoft System Center Virtual Machine Manager. Design a lite-touch installation.

C. Deploy Microsoft System Center Operations Manager 2007 R2. Design a lite-touch installation.

D. Deploy Microsoft Deployment Toolkit (MDT) 2010. Design a zero-touch installation.

Answer: ASection: (none)

Explanation/Reference:Explanation:Hints:no user interaction = zero touch

QUESTION 12Your network contains an Active Directory domain.

- You plan to deploy Windows 7 by using zero-touch installation.- You need to test the zero-touch installation on a computer named computer1.- You create a computer account for Computer1.

What should you do next?

A. Create a computer collection that contains the computer account for computer1.

B. Create a distribution group that contains the computer account for computer1.

C. Create a child domain and move the computer account for computer1 to the child domain.

D. Create a security group that contains the computer account for computer1.

Answer: BSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 107Microsoft 70-686 Exam

Original answer is B but some ppl believe is A. so i put it as A------------------------------------------------------------------------------------- CheddaBob from United States - Apr 182012, 8:40 PM Report Spam @loollerAnswer is A. I took the test late December. I used a different dump that had the correct answer.-------------------------------------------------------------------------------------- looller from United States - Apr 17 2012,9:42 PM Report Spam I think the answer is "A" here? anyone agree? answer given is B

QUESTION 13Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.

You are planning to deploy Windows 7 Enterprise to the client computers.

You need to design a zero-touch installation strategy.

What should you use in your design?

A. custom Windows 7 image on DVD

B. unattended installation

C. Windows Deployment Services (WDS)

D. Microsoft System Center Configuration Manager 2007 R2

Answer: D

Section: (none)

Explanation/Reference:Explanation:Microsoft Deployment Toolkit (MDT) 2010 is a Microsoft solution accelerator available at no cost fordeploying Windows operating systems. Based on the experience of Microsoft employees, --code thatpartners, and customers, MDT 2010 contains many thousands of lines of code provides a deploymentframework so that customers can focus on their business, not on programming. Integrating MDT 2010 withConfiguration Manager 2007 R2 helps large organizations use this framework to more easily implement theZero-Touch, High-Volume Deployment strategy.Benefits of integrating MDT 2010 with Configuration Manager 2007 R2 in the Zero-Touch, High- VolumeDeployment strategy include:- Streamlined deployment, because installation is fully automated without interaction.- Lower support costs, because configurations are consistent across all client computers.

www.certify-me.co.uk 108Microsoft 70-686 Exam

- Streamlined maintenance, because Configuration Manager 2007 R2 handles applications, device drivers,and updates.http://technet.microsoft.com/en-us/library/dd919178(v=ws.10).aspx

QUESTION 14Your company has client computers that run Windows Vista. The company plans to upgrade the WindowsVista computers to Windows 7. The current configuration of all client computers in your company is basedon a common Windows Vista image. Some branch offices use WAN connections to connect to the mainoffice.

You have the following requirements:

Transfer all user data from the original Windows Vista installation to the new Windows 7 installation.

Use the least amount of bandwidth while transferring the user data. Support the same migration strategy forall offices.

You need to design a user state migration strategy that supports the requirements.

What should you do?

A. Use the Deployment Image Servicing and Management (DISM) tool.

B. Use the User State Migration Tool (USMT) and a hard-link migration store.

C. Use Windows PE to perform an offline migration.

D. Use the multicast feature of Windows Deployment Services (WDS).

Answer: BSection: (none)

Explanation/Reference:Explanation:Hints:A and B is not use for user state migrationC is the best tool to do that

QUESTION 15You are designing a Windows 7 deployment image.

www.certify-me.co.uk 109Microsoft 70-686 ExamYou plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).

You need to add the MAK to the configuration pass by using an answer file.

To which configuration pass should you add the MAK?

A. the WindowsPE configuration pass

B. the Generalize configuration pass

C. the AuditSystem configuration pass

D. the Specialize configuration pass

Answer: DSection: (none)

Explanation/Reference:Explanation:As a single key is used, you can add MAK keys images when deploying them centrally. When using theSysprep utility to prepare an image, you add a MAK key to an image during the Specialize configurationpass. When performing a traditional installation, you can enter MAK keys in the same way that you wouldenter a retail key. The main issue that requires consideration when using a MAK key is how you will performactivation. http://blogs.msdn.com/b/microsoft_press/archive/2010/10/27/new-book-mcitp-self-paced-training-kit-exam-70-686-windows-174-7-enterprise-desktop-administrator.aspx

QUESTION 16All client computers in your network run Windows XP. Some of the computers are part of a secure network.Some of the computers connect to the network by using virtual private networking (VPN).

You are planning to deploy Windows 7.

You have the following requirements:

- Use a dedicated server for deployment.- Use a single operating system image for deployment.- Ensure that you can use removable media to deploy the image.- Ensure that you can select which applications are installed onto a client computer at the time ofdeployment.

You need to design a deployment strategy that meets the requirements.

What should you do?

www.certify-me.co.uk 110Microsoft 70-686 Exam

A. Use the Microsoft Deployment Toolkit to perform a lite-touch installation.

B. Use Windows Deployment Services on a network server to deploy Windows 7 by using an install image.

C. Using a Windows PE boot media, use ImageX to apply the image from a network share to the clientcomputers.

D. Use System Center Configuration Manager 2007 R2 to perform a zero-touch installation.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 17You have a single Active Directory domain. All domain controllers run Windows Server 2003 with ServicePack 1 (SP1).

You plan to store Windows BitLocker Drive Encryption recovery passwords in Active Directory.

You need to recommend the solution that uses the least amount of administrative effort.

What should you recommend?

A. Upgrade the domain controller that has the role of operations master to Windows Server 2008 R2.

B. Upgrade all domain controllers to Windows Server 2008 R2.

C. Upgrade all domain controllers to Windows Server 2003 SP2.

D. Extend the Active Directory schema.

Answer: DSection: (none)

Explanation/Reference:Explanation:BitLocker Drive Encryption Configuration Guide: Backing Up BitLocker and TPM Recovery Information toActive DirectoryThis section provides information about how BitLocker and TPM recovery information can be backed up inActive Directory.By default, no recovery information is backed up. Administrators can configure Group Policy settings toenable backup of BitLocker or TPM recovery information. Before configuring these settings, as a domainadministrator you must ensure that the Active Directory schema has been extended with the necessarystorage locations and that access permissions have been granted to perform the backup.http://technet.microsoft.com/en-us/library/cc766015(v=ws.10).aspx

www.certify-me.co.uk 111Microsoft 70-686 Exam

QUESTION 18You create a Windows 7 deployment image that includes custom Internet Explorer branding and searchproviders.

Your company decides to deploy all custom settings by using Group Policy.

You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings.

Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)

A. Use the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on thedeployment image.

B. Update the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for allcomputers.

C. Update the Internet Explorer Manage Add-ons settings for all computers.

D. Use the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deploymentimage.

Answer: ADSection: (none)

Explanation/Reference:Explanation:Reset Internet Explorer settings Deletes all temporary files, disables browser add-ons, and resets all thechanged settings to factory settings. It can be used if the browser is in an unusable state.http://en.wikipedia.org/wiki/Internet_Explorer_7

QUESTION 19Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain,organizational unit (OU), and Group Policy object (GPO) design is shown in the following diagram.

www.certify-me.co.uk 112Microsoft 70-686 Exam

The NY Computers OU contains client computers that run either Windows Vista Enterprise or Windows 7Enterprise. The New York Computers GPO defines software restriction policies (SRPs).

You have the following requirements:

- SRPs must be used for only Windows Vista Enterprise client computers.- AppLocker policies must be used for only Windows 7 Enterprise client computers.- AppLocker policies must be defined by using Group Policy.

You need to design an AppLocker deployment that meets these requirements.

What should you do?

A. Create a new GPO that has the AppLocker settings, and link it to the NY Users OU.www.certify-me.co.uk 113Microsoft 70-686 Exam

B. Define the AppLocker settings in the New York Baseline GPO.

C. Define the AppLocker settings in the New York Users GPO.

D. Create a new GPO that has the AppLocker settings, and link it to the NY Computers OU.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 20Your network has client computers that run Windows 7. A custom Web-based application requires specificsecurity settings. You need to prevent users from permanently modifying their Internet Explorer browserssecurity settings.

What should you do?

A. Reset the Internet Explorer settings

B. Restore the advanced settings in Internet Explorer

C. Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode

D. Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode

Answer: DSection: (none)

Explanation/Reference:Explanation:Normal mode, you can configure IEM settings so that they are refreshed on users' computers on a periodicbasis (or each time the users log in). However, users can temporarily change these settings between thetimes scheduled for their setting refresh. For this reason, these settings in Normal mode behave as"pseudo-policies."In Preference mode, you can configure IEM settings, but allow users to change these settings later by usingthe Internet Explorer 9 user interface.http://technet.microsoft.com/en-us/library/gg699413.aspx

QUESTION 21You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.

You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.

www.certify-me.co.uk 114Microsoft 70-686 ExamWhat should you do?

A. Set the script execution policy to Restricted.

B. Set the script execution policy to RemoteSigned.

C. Use Group Policy preferences.

D. Set the script execution policy to AllSigned.

Answer: BSection: (none)

Explanation/Reference:Explanation:I am not sure why the answer is A. i found some information, hope it can help to understand. =) As part ofPowerShell's "secure by default" initial setup, scripts are not allowed to be ran by the command interpreter.This behavior can be modified by changing the PowerShell execution policy.There are four execution polices to choose from.Restricted - The default, allows no scripts to runAllSigned - All scripts must be Authenticode-signed to run RemoteSigned - Scripts downloaded from aremote location must be signed Unrestricted - PowerShell will run any script, works like what you areprobably used to now http://powershellscripts.com/article3_powershell_script_signing.html

QUESTION 22

Your company has offices in several countries. You must test and validate all operating system imagesbefore you deploy them.

You create a Windows 7 Enterprise master image that has all language packs installed. You test andvalidate the master image.

You are planning to create regional images based on the master image. Each regional image will containonly the language pack that is necessary for a specific geographic region.

You have the following requirements:

- Remove the language packs that are unnecessary for each region.- Minimize the necessary testing and validation.

You need to create the regional images.

What should you do?

A. Run lpksetup.exe /u in unattended mode on the master image.www.certify-me.co.uk 115Microsoft 70-686 Exam

B. Deploy the master image to a target computer. Remove the unnecessary language packs, and thencapture each regional image.

C. Service the master image online by using the Deployment Image Servicing and Management (DISM)tool.

D. Service the master image offline by using the Deployment Image Servicing and Management (DISM)tool.

Answer: DSection: (none)

Explanation/Reference:Explanation:Deployment Image Servicing and Management (DISM) tool:Image servicing and management solutions fall into two main categories:Managing the data or information included in the Windows image, such as enumerating or taking aninventory of the components, updates, drivers, or applications contained in an image. Servicing the imageitself, including adding or removing driver packages and drivers, modifying language settings, enabling ordisabling Windows features, and upgrading to a higher edition of Windows.http://technet.microsoft.com/en-us/library/dd744566(v=ws.10).aspx

QUESTION 23You are planning the deployment of Windows 7 to computers that are located in a main office, in branchoffices, and in a store kiosk.

Computers in all three types of location use the same hardware. Kiosk computers are members of aworkgroup. Kiosk computers must use specific settings for local security. Branch office computers must useBitLocker Drive Encryption.

You have the following requirements: Create deployment images. Minimize image maintenance.

You need to define an image-creation strategy that meets the requirements.

What should you do?

A. Create a single image to use for the branch office computers and the kiosk computers. Create aseparate image to use for the main office computers.

B. Create a single image to use for all location types. Create a custom Windows security template for eachlocation type.

C. Create one image to use for each location type. Encrypt the hard disks on the branch office computersprior to capturing the image.

D. Create a single image to use for the main office computers and the branch office computers, and applythe required settings through Group Policy. Create a separate image to use for the kiosk computers.www.certify-me.co.uk 116Microsoft 70-686 Exam

Answer: DSection: (none)

Explanation/Reference:Explanation:hints:Kiosk is belong to workgroup, it does not support by group policy. so it must use seperate image for its ownlocal security.

QUESTION 24You have an image that is used to deploy Windows 7 on client computers.

You need to modify the image to change the edition of Windows 7.

What should you do?

A. Use Windows Setup to service the image.

B. Service the image online.

C. Service the image offline.

D. Use audit mode to service the image.

Answer: CSection: (none)

Explanation/Reference:Explanation:http://technet.microsoft.com/en-us/library/dd744572(v=ws.10).aspx Change the Windows Image to a HigherEditionYou can change your Windows image to a higher edition while it is offline by using the DISM commands inthe following procedure. You should not use this procedure on an image that has already been changed to ahigher edition.

QUESTION 25Your company has more than 1,000 client computers. You deploy Windows 7 by using six different images.

A driver that is included in the images needs to be replaced.

You have the following requirements:

- Update the Windows 7 images with the new driver.- Ensure that the old driver is no longer available.

www.certify-me.co.uk 117Microsoft 70-686 ExamYou need to define an image-update strategy that meets the requirements.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.Choose two.)

A. Deploy each image to a reference computer, and then uninstall the old driver and install the new driver.Capture the new image.

B. Mount each image by using ImageX, and then install the new driver.

C. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and thendelete the old driver and inject the new driver.

D. Mount each image by using the Deployment Image Servicing and Management (DISM) tool, and thencopy the new driver into a new folder in the image.

Answer: ACSection: (none)

Explanation/Reference:Explanation:hints:Question request add new drive and remove old driver.

QUESTION 26Your company has a main office and 20 branch offices.

The network contains 5,000 client computers. 100 users have laptop computers and work remotely. Allremaining users have desktop computers.

You plan to deploy Windows 7 on all client computers.

You need to ensure that your image-creation strategy meets the following requirements:

- Provide access to all applications on the laptop computers when the users first start their computers.- Provide language-pack support based on the geographic location of the user.- Minimize the bandwidth used to deploy images to the desktop computers.

What should you create?

A. one thick image for all client computers

B. one thin image for all client computers

C. one hybrid image for all client computers

D. one thick image for the portable computers and one thin image for the desktop computers

E. one thin image for the portable computers and one thick image for the desktop computers www.certify-me.co.uk 118Microsoft 70-686 Exam

Answer: DSection: (none)

Explanation/Reference:Explanation:hints: all applications on the laptop computers = thick image language- pack support based on thegeographic location = thin image

QUESTION 27company's client computers.You are planning to deploy Windows 7 Enterprise to all of your

You have the following requirements:

- Create two custom partitions on each client computers hard disk, one for the operating system and theother for data.- Automatically create the partitions during Windows Setup.

You need to design an image that meets the requirements.

What should you do?

A. Use SysPrep to create the two partitions during Windows Setup.

B. Use Windows PE to create the partitions. Install Windows 7 on the first partition.

C. Use Windows System Image Manager (Windows SIM) to specify the partition configuration.

D. Use Disk Management to create the two partitions on the hard disk.

Answer: CSection: (none)

Explanation/Reference:Explanation:Windows System Image Manager (Windows SIM) creates and manages unattended Windows Setupanswer files in a graphical user interface (GUI). Answer files are XML-based files that are used duringWindows Setup to configure and to customize the default Windows installation.For example, you can use Windows SIM to create an answer file that partitions and formats a disk beforeinstalling Windows, changes the default setting for the Internet Explorer home page, and configuresWindows to boot to Audit mode after installation. By modifying settings in the answer file, Windows SIM canalso install third-party applications, device drivers, language packs, and other updates.http://technet.microsoft.com/en-us/library/cc766347(v=ws.10).aspx

www.certify-me.co.uk 119Microsoft 70-686 Exam

QUESTION 28You plan to deploy an image of Windows 7 Enterprise to 1,000 client computers.

You need to design a custom image that will enable users to connect to a Telnet server.

What should you do?

A. Create a Network Connection before capturing the image.

B. Turn on the Telnet Server feature in the image.

C. Create a Certificate-Based credential before capturing the image.

D. Turn on the Telnet Client feature in the image.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 29HOTSPOT

You are designing a Windows 7 deployment image.

You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).

You need to add the MAK to the configuration pass by using an answer file.

To which configuration pass should you add the MAK?

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 120Microsoft 70-686 Exam

Explanation:

QUESTION 30You are planning a migration to Windows 7.

You need to recommend applications that obtain a list of software installed on client computers.

Which applications should you recommend? (Choose all that apply.)

A. Microsoft Deployment Toolkit (MDT)

B. Sysprep

C. Microsoft Assessment and Planning Toolkit (MAP)

D. Microsoft Application Compatibility Toolkit (ACT)www.certify-me.co.uk 121Microsoft 70-686 Exam

E. windows User State Migration Tool (USMT)

F. Windows System Image Manager (windows SIM)

Answer: CDSection: (none)

Explanation/Reference:Explanation:

QUESTION 31You are designing a Windows 7 deployment image. You receive a baseline image over the network, from adifferent geographic location.

You need to verify that the baseline image is valid.

Which tool should you use?

A. ImageX

B. the Deployment Image Servicing and Management (DISM) tool

C. Windows Compatibility Evaluator

D. windows System Image Manager (Windows SIM)

Answer: ASection: (none)

Explanation/Reference:Explanation:imagex /append image_path image_file {"description"}{/boot | /check | /config configuration_file.ini | /scroll | /verify}/check

Checks the integrity of the .wim file. If not provided, existing checks are removed. http://technet.microsoft.com/en-us/library/cc749447(v=ws.10).aspx

QUESTION 32You are installing a new third-party application to all the Windows 7 client workstations that your companyhas deployed.

You need to monitor all of the actions taken by the application installer.

Which application should you use?

A. Update Compatibility Evaluator

B. Setup Analysis Toolwww.certify-me.co.uk 122Microsoft 70-686 Exam

C. Windows Compatibility Evaluator

D. Compatibility Administrator

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 33DRAG DROP

You are the desktop architect for an enterprise organization with computers that run Windows 7 Enterprise.

You need to create a customized WinPE image.

Which four actions should you perform in sequence? (To answer, move the appropriate actions from the listof actions to the answer area and arrange them in the correct order,)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 123Microsoft 70-686 Exam

QUESTION 34DRAG DROP

A company has client computers in an Active Directory Domain Services (AD DS) environment. You deploya new wireless access point (WAP). Third-party security software controls access to the wireless network.

Users are able to connect to the wireless network and access the Internet but are unable to access thecompany's file servers.

You need to enable users to connect to the file servers by using the wireless network.

Which two actions should you perform in sequence? (To answer, move the appropriate actions from the listof actions to the answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 124Microsoft 70-686 Exam

Explanation:

QUESTION 35Your company has client computers that run Windows XP Professional.

You are planning to install Windows 7 Enterprise on the existing client computers.

You have the following requirements:

- Migrate user data and operating system components.- Encrypt and password-protect the migration store.

You need to design a user state migration strategy that supports the requirements.

What should you do?

A. Use a hard-link migration store.

B. Perform an offline migration by using Windows.old.

C. Use a compressed migration store.

D. Perform an offline migration by using Windows PE.www.certify-me.co.uk 125Microsoft 70-686 Exam

Answer: CSection: (none)

Explanation/Reference:Explanation:Compressed migrationThe compressed migration store is a single image file that contains all files being migrated and a catalogfile.This image file is often encrypted and protected with a password, and cannot be navigated with WindowsExplorer.http://technet.microsoft.com/en-us/library/dd560795(v=ws.10).aspx

QUESTION 36HOTSPOT

You use Microsoft Application Compatibility Manager to produce a report that lists a company's applicationsand their compatibility status with Windows 7.

You need to add your ratings of the compatibility of the applications to the report.

Which Microsoft Application Compatibility Manager action should you select? To answer, select theappropriate setting or settings in the work area.

www.certify-me.co.uk 126Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 127Microsoft 70-686 Exam

QUESTION 37DRAG DROP

All client computers in a company run Windows 7 Enterprise. The company creates Windows PowerShellscripts to collect statistical data from client computers. A logon script is configured to run the PowerShellscripts during logon.

An error occurs when the scripts are run on client computers.

You need to ensure that all PowerShell scripts run correctly.

Which command should you use? (To answer, drag the appropriate component from the list of componentsto the correct location or locations in the work area.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 128Microsoft 70-686 Exam

QUESTION 38HOTSPOT

A company runs Windows Server 2008 R2 in an Active Directory Domain Services (AD DS) environment.Windows 7 is installed on all client computers.

Users discover that they cannot delete files that they have created and placed in their local folders.

You need to enable users to modify file permissions.

Which setting should you configure? To answer, select the appropriate setting or settings in the work area,

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 129Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 130Microsoft 70-686 Exam

QUESTION 39Your company uses Windows Update to download and install security updates on client computers.

When Microsoft releases a security update, you have the following requirements:

- Establish which client computers require the security update.- Identify what changes will occur as a result of the security update.- Identify which applications might be affected by the security update.

You need to select the appropriate tool to detect application-compatibility issues.

What should you do?

A. Use the Inventory Collector

B. Use the Setup Analysis Tool

C. Use the Update Compatibility Evaluator.

D. Use the Windows Compatibility Evaluator

Answer: CSection: (none)

Explanation/Reference:Explanation:The Update Compatibility Evaluator (UCE) examines your organization's computers and identifies theinstalled applications and system information, matches that information against the profile set for theWindows® update, and looks for potential conflicts due to changes in the registry, application files, orapplication file properties.You configure the compatibility evaluator, defining when and how it runs, in the Application CompatibilityManager. You can also view your potential compatibility issues on the Analyze screen of the ApplicationCompatibility Manager.http://technet.microsoft.com/en-us/library/cc766043(v=ws.10).aspx

QUESTION 40HOTSPOT

A company's server runs Windows 2008 R2 with Active Directory Domain Services (AD DS) and WindowsServer Update Services (WSUS). All client computers run Windows 7 Enterprise.

You need to automate the distribution of Windows security updates to all client computers by meeting thefollowing requirements:

1) Point all client computers to the WSUS server.

www.certify-me.co.uk 131Microsoft 70-686 Exam2) Schedule updates to install at a specific time.

3) Run the updates immediately after Windows starts if the computer missed the originally scheduledupdates.

You need to configure Group Policy to meet the requirements.

Which settings should you configure? To answer, select the appropriate setting or settings in the work area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 132Microsoft 70-686 Exam

QUESTION 41HOTSPOT

You use Group Policy to configure Windows 7 Enterprise client computers.

You need to modify a Group Policy object (GPO) to specify a custom location for the temp folder.

Which setting should you select? To answer, select the appropriate setting or settings in the work area.

www.certify-me.co.uk 133Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 134

Microsoft 70-686 Exam

QUESTION 42HOTSPOT

A company has client computers that run windows 7. A new corporate security policy states that all clientcomputers in the legal department should allow only inbound and outbound network connections for whichthere is an existing firewall rule.

You need to ensure that all client computers in the legal department are configured to follow the newsecurity policy.

Which settings should you select? To answer, select the appropriate setting or settings in the work area.

www.certify-me.co.uk 135Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

www.certify-me.co.uk 136Microsoft 70-686 Exam

Explanation:

Here is the full configuration.

untitled

QUESTION 43DRAG DROP

You are the desktop architect for an enterprise organization with computers that run Windows 7.

You need to create a Group Policy object (GPO) to prevent Windows Explorer from starting until all logonscripts have finished.

Which setting should you select? To answer, select the appropriate setting in the work area.

www.certify-me.co.uk 137Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

QUESTION 44DRAG DROP

You are designing a Windows 7 image creation strategy for a multilingual deployment. You currently havean English language image of Windows 7.

The deployment must meet the following requirements:

- The image must include the German, French, and English languages.- Users must be able to change the display languages.

You need to recommend an action plan that meets the deployment requirements.

www.certify-me.co.uk 138Microsoft 70-686 ExamWhich two actions should be performed in sequence? (To answer, move the appropriate actions from thelist of actions to the answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 139Microsoft 70-686 Exam

QUESTION 45You are designing a Windows 7 Enterprise image creation strategy.

The strategy must meet the following requirements:

- Support 32-bit and 64-bit hardware.- Support 64-bit applications.- Minimize the total number of images.- Reduce the bandwidth required to deploy an image.- Use System Center Configuration Manager (ConfigMgr) for application deployment.

You need to recommend the images that meet the requirements.

Which images should you recommend? (Choose all that apply.)

A. a thin image for the 32-bit version of Windows 7

B. a thick image for the 32-bit version of Windows 7

C. a thick image for the 64-bit version of Windows 7

D. a thin image for the 64-bit version of Windows 7

Answer: ADSection: (none)

Explanation/Reference:Explanation:

QUESTION 46HOTSPOT

Active Directory Domain Services (AD OS) is running on windows Server 2008 R2.

- All user objects are located in the Boston Users Organizational Unit (OU) or the San Diego Users OU.- All client computer objects are in the Boston Computers OU or in the San Diego Computers OU.- All domain controller computer objects are in their default location.

You decide to audit changes to AD DS.

Administrative users in San Diego add new users to the domain without approval. You configure the auditpolicy settings in the San Diego Policy Group Policy object (GPO) and set up auditing in object SystemAccess Control Lists, YOU verify that the GPO is being applied to the resources in the San Diego OUs, butauditing still does not work.

www.certify-me.co.uk 140Microsoft 70-686 ExamYou need to select the GPO to ensure that users added by the San Diego administrative users are audited.

Which GPO should you select? To answer, select the appropriate setting or settings in the work area.

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 141Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 142Microsoft 70-686 Exam

QUESTION 47DRAG DROP

A company has a main office and two branch offices named Branch Site 1 and Branch Site 2. The mainoffice has a server that runs Windows Server 2008 R2. Branch Site 2 also has a server that runs WindowsServer 2008 R2. The branch offices do not have direct access to the Internet.

Windows 7 Enterprise is installed on all client computers. A diagram of the network is shown in the exhibit.

Corporate policy dictates that all updates must be approved by the IT department before being deployed.

Using the hardware configuration shown in the exhibit, you need to design a Windows Update strategy tomeet the following goals:

- Minimize traffic to the Internet.- Minimize network traffic between the branch locations and the main office.

What should you recommend? (To answer, drag the appropriate answer to the correct location or locationsin the work area.)

www.certify-me.co.uk 143Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 144Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 145Microsoft 70-686 Exam

QUESTION 48HOTSPOT

A server runs Windows Server 2008 P2 with Remote Desktop Services (RDS).

You add an application to Remote Desktop RemoteApp.

You need to ensure that the application can be published by using Group Policy.

Which setting should you select? To answer, select the appropriate setting or settings in the work area.

www.certify-me.co.uk 146Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 147Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 148Microsoft 70-686 Exam

QUESTION 49HOTSPOT

You are designing a Windows 7 Enterprise custom image. You create an autounattend.xml file by usingWindows System Image Manager (SIM). This file will be used when the image is deployed.

You are planning to install Windows 7 on a second hard disk in a computer. You configure the DiskIDsetting.

You need to select the configuration pass where you will add the DiskID setting.

Which option should you select? To answer, select the appropriate setting or settings in the work area.

www.certify-me.co.uk 149Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 150Microsoft 70-686 Exam

QUESTION 50HOTSPOT

A company has a server that runs Windows Server 2008 R2 in an Active Directory Domain Services (ADDS) environment. The domain controllers were recently upgraded from Windows Server 2003. You areusing Group Policy to deploy applications to the client computers remotely. The computers reboot eachnight as part of routine maintenance.

You need to ensure that the application installs when the computer starts up.

Which Group Policy setting should you configure? To answer, select the appropriate setting or settings inthe work area.

www.certify-me.co.uk 151Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 152Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 153Microsoft 70-686 Exam

Exam D

QUESTION 1HOTSPOT

All portable computers on a company's wireless network run windows 7 Enterprise.

You need to ensure that users can connect only to the predefined SSID shown in the work area.

Which Group Policy object (GPO) settings should you select? To answer, select the appropriate setting orsettings in the work area.

www.certify-me.co.uk 154Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:www.certify-me.co.uk 155Microsoft 70-686 Exam

Explanation:

www.certify-me.co.uk 156Microsoft 70-686 Exam

untitled

QUESTION 2DRAG DROP

You are managing data migration from an existing Windows 7 computer to a new Windows 7 computer.You need to migrate user and application data from the existing computer to the new computer.

Which command should you run on the existing and new computers? (To answer, drag the appropriatecommands to the correct location in the work area.)

www.certify-me.co.uk 157Microsoft 70-686 Exam

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

QUESTION 3DRAG DROPAn enterprise organization has computers that run Windows 7. Users log on to the Contoso.com

www.certify-me.co.uk 158Microsoft 70-686 Examdomain from their client computers.

A user is unable to log on to the domain. The user changed his password the previous night and was unableto log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors.

You need to ensure that the user can log on to the domain.

Which command should you run? (To answer, drag the appropriate command and parameter from the list ofcommands and parameters to the correct location or locations in the work area.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

Explanation:

www.certify-me.co.uk 159Microsoft 70-686 Exam

QUESTION 4You plan to upgrade Windows Vista to Windows 7 on a computer named Computer01. You run ScanStateand store the results on a remote computer at \\Server01\mystore. After the ScanState commandcompletes, a user customizes a profile and adds mission-critical data.

You attempt to run ScanState again but it fails.

You need to overwrite Computer01's existing information on Server01.

Which command line options should you use to execute the ScanState command? (Choose all that apply.)

A. /efsxopyraw

B. /v:13

C. \\Server01\mystore

D. /o

Answer: CDSection: (none)

Explanation/Reference:Explanation:

QUESTION 5Your company plans to upgrade 1,000 client computers to Windows 7.

The company uses a custom line-of-business application that is frequently updated.

The application is not compatible with Windows 7.

You need to ensure that the company can use the application.

You also need to ensure that the application can be updated with the least amount of administrative effort.

What should you do?

A. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, anddistribute the virtual machine image and updates through MED-V TrimTransfer.www.certify-me.co.uk 160Microsoft 70-686 Exam

B. Deploy Microsoft Enterprise Desktop Virtualization (MED-V) v2 to all Windows 7 client computers, anddistribute the virtual machine image and updates through Microsoft System Center ConfigurationManager.

C. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machineimage and updates through a file share resource.

D. Configure Windows XP Mode on all Windows 7 client computers, and distribute the virtual machineimage and updates through Microsoft System Center Configuration Manager.

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 6Your company has 1,000 client computers. Each client computer has 1 GB of RAM.

You are planning to deploy Windows 7 Enterprise.

You need to design a zero-touch deployment strategy to increase the number of client computers that canbe imaged at one time.

What should you do?

A. Increase the amount of RAM on the client computers.

B. Change from unicast to multicast deployment of images.

C. Change from multicast to unicast deployment of images.

D. Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

Answer: BSection: (none)

Explanation/Reference:Explanation:Performing Multicast DeploymentsIn order to deploy an image using multicasting instead of unicasting, you must first create a multicasttransmission. Multicast transmissions make the image available for multicasting, which enables you todeploy an image to a large number of client computers without overburdening the network. When youdeploy an image using multicasting, the image is sent over the network only once, which can drasticallyreduce the amount of network bandwidth that is used. http://technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx

QUESTION 7www.certify-me.co.uk 161Microsoft 70-686 ExamYour company's network includes a main office and several branch offices.

The branch offices are connected to the main office by high-latency links.

All client computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2.

No servers are located in the branch offices.

Client computers in the branch offices frequently access a specific group of files on a file server namedServer1.

These access requests consume significant amounts of bandwidth and reduce the speed of higher-prioritytraffic.

You need to reduce the bandwidth that is consumed by requests for frequently accessed files.

What should you do?

A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branchoffices.

B. Configure BranchCache in Distributed Cache mode on client computers in the main office and thebranch offices.

C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in HostedCache mode on client computers in only the branch offices.

D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache inDistributed Cache mode on client computers in only the branch offices.

Answer: DSection: (none)

Explanation/Reference:Explanation:Branch office does not have server, Distributed cache is only choice. Since we have server at main office,we can enable the BranchCache For Network Files role service

Topic 2, Scenario A

Background

You are the desktop architect for a company with 14,000 client computers. Some client computers areportable computers and some are desktop computers. All client computers currently run Windows XP. You

are in the evaluation phase for upgrading to Windows 7. Approximately half of the Carlsbad and Madridoffices are used by sales employees. Sales employees report to the

www.certify-me.co.uk 162Microsoft 70-686 Examoffice only once per quarter. Your company has users in offices as shown in the following table.

The address for the SharePoint site is https://intranet.company.com.

Each location has gigabit network connections to the desktop except Madrid, which has 100 megabitconnections. Each office has a Dynamic Host Configuration Protocol (DHCP) server and uses multipleVLANs.

You use Group Policy objects (GPOs) to manage various settings. The following figure displays theOrganizational Unit (OU) layout for the Active Directory Domain Services (AD DS) domain.

www.certify-me.co.uk 163Microsoft 70-686 Exam

Each office has two connections, a data center WAN link and an Internet connection. Each office connectsto a central data center facility with connection speeds as shown in the following table.

www.certify-me.co.uk 164Microsoft 70-686 ExamYou currently use one of each client computer model to create and maintain a disk image for each model.The models supported by your company are listed in the following table.

You currently use a third-party disk imaging application to capture and deploy new Windows XP computers.Desktop administrators use optical media to deploy the image to new or repurposed client computers. Thecurrent Windows XP image is about 11 GB in size, which includes 2 GB of applications and 9 GB ofWindows XP files.

Business Requirements

The deployment of Windows 7 must meet the following business requirements:

Deployment requirements:

The deployment must maximize the use of existing client computers. The deployment must reduce theamount of time spent updating client computers after deployment.

Technical Requirements

The application must meet the following technical requirements:

Infrastructure requirements:

The amount of disk space required to store deployment images must be reduced. The number of imagesthat need to be copied across WAN links must be reduced. You are based in the Los Angeles office anduse the Microsoft Deployment Toolkit. You have a file server hosting a deployment share in Los Angeles.

Application compatibility:

- All current applications must be supported on Windows 7.

- All offices are moving to a new finance application in the next six months. The new finance applicationinstalls and runs correctly on Windows 7.

Migration requirements:

www.certify-me.co.uk 165Microsoft 70-686 Exam- The deployment cannot require users to store their files on a network or external drive for the migration.Only system administrators can be allowed to install applications. User data must be migrated duringupgrades to Windows 7. There is a small budget for hardware upgrades when required.

Image maintenance:

- You need to minimize the re-arm passes.

Security

- Each location has a security group made up of the desktop computer objects in that location.

- Users must not be able to change their web browser or client computer security settings.

- Your requirements are as follows:

- A startup PIN and TPM are required for all BitLocker users.- Local regulations prohibit the use of BitLocker for all computers in the Munich office. This supersedes anyother requirement.- All laptops within the company must have BitLocker enabled.- All Madrid desktops must have BitLocker enabled.- No other desktops besides Madrid should have Bitlocker enabled.

- Computers in office lobbies are not permitted to join the domain.

- You need to block the use of ActiveX controls for all external websites.

QUESTION 8You have deployed a ConfigMgr site server at each site. You are planning to use PXE boot to deploy a newWindows 7 image. You need to deploy the image to all office locations. When you attempt to perform a PXEboot, it fails at each office location.

You need to prepare the infrastructure.

What should you do? (Choose all that apply.)

A. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in each office.

B. Install a single PXE service point in the Los Angeles office.

C. On each VLAN or subnet, create an IP helper for PXE that points to the PXE service point in the LosAngeles office.

D. Install a PXE service point in each office.

E. Create a single IP helper for PXE that points to the DHCP server in the Los Angeles office.www.certify-me.co.uk 166Microsoft 70-686 Exam

F. Create a single IP helper for PXE that points to the DHCP server in each office.

Answer: CDSection: (none)

Explanation/Reference:Explanation:This dump's question is not complete.MS exam question mention Deployment share is only setup at los Angeles office.one of question from testlets

QUESTION 9You need to prevent users from accessing USB flash drives on portable computers.

What should you do? (Choose all that apply.)

A. Create a security group in AD DS and place all user objects for users with portable computers in thegroup.

B. Create a security group in AD DS and place all portable computer objects in the group.

C. Create a GPO that blocks the use of specific GUIDs used by USB flash drives and link it to the root ofthe domain.

D. Create a WMI filter that applies only to Model A and B computers and link it to a GPO.

E. Create an AppLocker policy that applies to the AD DS computer group you created.

F. Create an AppLocker policy that applies to the AD DS user group you created.

Answer: CDSection: (none)

Explanation/Reference:Explanation:

QUESTION 10You create a Windows 7 image. You plan to test the image on 10 percent of the computers in each office.You need to recommend a deployment strategy to minimize the amount of time spent deploying the image.What should you recommend?

A. Distribute one USB flash drive containing a Windows 7 installation to Madrid, Carlsbad, and NewOrleans. Create a new deployment share in Munich.

B. Send one USB flash drive containing a Windows 7 installation to each site.

C. Send one DVD installation disk to each site.

D. Distribute one USB flash drive containing a Windows 7 installation to Carlsbad and New Orleans. Createa new deployment share in Los Angeles.www.certify-me.co.uk 167Microsoft 70-686 Exam

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 11You are deploying Windows 7 Enterprise and Microsoft Office to client computers.

The deployment must meet the following requirements:

- Deploy Windows 7 Enterprise to all client computers.- Deploy Office 2007 Professional to client computers in the Munich office.- Deploy Office 2010 Professional to client computers in the Madrid office.- Automate the deployment to minimize administrative effort.

You need to recommend a deployment solution that meets the requirements.

What should you recommend?

A. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using atask sequence that checks for the account used for deployment.

B. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using aGroup Policy object based on the user who is logged in.

C. Create a Windows 7 Enterprise Edition image with Office 2007 installed. Create a second Windows 7Enterprise Edition image with Office 2010 installed.

D. Create a single Windows 7 Enterprise Edition image. Deploy the image that installs Office by using atask sequence that checks for the Organizational Unit of the client computer.

Answer: DSection: (none)

Explanation/Reference:Explanation:AppLocker (a set of Group Policy settings that evolved from Software Restriction Policies, to restrict whichapplications can run on a corporate network, including the ability to restrict based on the application'sversion number or publisher)http://en.wikipedia.org/wiki/Features_new_to_Windows_7

QUESTION 12You are planning to deploy a computer in the lobby of each office.

You need to control which programs can run on the computer.

www.certify-me.co.uk 168Microsoft 70-686 ExamWhat should you do?

A. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable andconfigure AppLocker.

B. Use the Group Policy Object Editor to modify the local computer policy on the computer to enable andconfigure BitLocker.

C. Create a GPO that enables and configures AppLocker and link it to the Carlsbad OU.

D. Create a GPO that enables and configures BitLocker and link it to the root of the AD DS domain.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 13company's computers experience malware infections as a result of using unsafe ActiveX Yourcontrols.

You need to update the client computer settings to follow the company policy.

What should you do?

A. Upgrade all users to Internet Explorer 9. Use a GPO to change the default setting of the Internet securityzone to high. Add all internal web addresses to the Trusted Sites list.

B. Use a GPO to change the default setting of the local intranet security zone to medium-low. Add allinternal web addresses to the Trusted Sites list.

C. Upgrade all users to Internet Explorer 9. Use a GPO to change the default setting of the Trusted Sitessecurity zone to block ActiveX controls for all websites. Add all internal web addresses to the TrustedSites list.

D. Create a GPO that enables the Disable add-on performance notifications setting. Link it to the OU foreach site.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 14DRAG DROP

You are updating the corporate image to add drivers to support a new device.

You need to meet company requirements for updating images.

www.certify-me.co.uk 169Microsoft 70-686 ExamWhich two actions should you perform in sequence? (To answer, move the appropriate actions from the listof actions to the answer area and arrange them in the correct order.)

A.

B.

C.

D.

Answer: Section: (none)

Explanation/Reference:

www.certify-me.co.uk 170Microsoft 70-686 Exam

untitled

QUESTION 15You create a deployment image that must be tested in each office. You need to complete testing within aweek to finalize the image for production. You need to recommend a deployment strategy to test the imagewith at least two users from each of the following departments: Finance Research Accounting Sales Whatshould you recommend?

A. Create a deployment share at each site. Direct the desktop technicians at each site to create WindowsPE DVDs that install Windows 7 from the deployment share at each site.

B. Create a deployment share in Los Angeles. Enable network boot at each site and have desktoptechnicians support users from each department.

C. Create a deployment share in Los Angeles. Create a DVD installation disk and send one to each userfrom the Sales department. Have the desktop technicians at each site create DVD- based installationsfor users at each site.

D. Create a deployment share at each site. Direct the desktop technicians at each site to create WindowsPE USB flash drives that install Windows 7 from the deployment share at each site.

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 16You create and test a Windows 7 image that supports all existing client computer hardware in the company.User settings must be preserved during migrations to Windows 7. You need to deploy the new image to alloffice locations by using the Zero Touch Installation methodology. What should you recommend? (Chooseall that apply.)

www.certify-me.co.uk 171Microsoft 70-686 Exam

A. Enable a DHCP helper address on the routers for each remote office.

B. Enable network boot functionality on all client computers at the remote locations.

C. Deploy and configure Microsoft System Center Configuration Manager (ConfigMgr).

D. Deploy and configure Microsoft System Center Operations Manager (OppMgr).

E. Create a task sequence that enables local administrators to select their local office.

F. Create a User State Migration Tool configuration file and include it in the deployment.

Answer: BCFSection: (none)

Explanation/Reference:Explanation:

QUESTION 17You deploy Windows 7 Enterprise in a VDI pool resource group.

You need to ensure that the visualization strategy meets the company's OSE requirements.

Which GPO setting should you recommend?

A. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performancenotifications.

B. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of FirstRun Customize settings.

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performancenotifications.

D. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of FirstRun Customize settings.

Answer: DSection: (none)

Explanation/Reference:Explanation:

QUESTION 18You need to recommend a Microsoft Enterprise Desktop Virtualization (MED-V) image update strategy tomeet company requirements. What should you recommend?

A. Windows Intune

B. Windows Update

C. ConfigMgr

D. Windows Deployment Services (WDS)

Answer: CSection: (none)

Explanation/Reference:www.certify-me.co.uk 172Microsoft 70-686 Exam

Explanation:http://technet.microsoft.com/en-us/library/hh463536.aspx Creating and Deploying MED-V WorkspacePackages with System Center Configuration Manager

QUESTION 19You are planning the delivery of the ERP add-on to the remote users. You need to ensure that the ERP add-on meets company requirements and functions for all remote users. Which product should yourecommend?

A. MED-V

B. Remote Desktop RemoteApp

C. System Center Virtual Machine Manager Self Service Portal 2.0

D. Windows XP Mode

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 20You deploy Windows 7 Enterprise in a VDI pool resource group. You need to ensure that the virtualizationstrategy meets the companys OSE requirements. Which GPO setting should you recommend?

A. Disable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of FirstRun Customize settings

B. Enable Administrative Templates\Windows Components\Internet Explorer\Prevent performance of FirstRun Customize settings

C. Enable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performancenotifications

D. Disable Administrative Templates\Windows Components\Internet Explorer\Disable add-on performancenotifications

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 21www.certify-me.co.uk 173Microsoft 70-686 ExamYou need to ensure that the companys remote computers receive Windows updates at the same time asthe internal computers. What should you do?

A. Deploy DirectAccess

B. Implement System Center Operations Manager (OpsMgr)

C. Install the Windows Deployment Services (WDS) role

D. Install BranchCache in distributed mode

Answer: ASection: (none)

Explanation/Reference:Explanation:Remote computers use Direct Access to connect to internal WSUS server to update

QUESTION 22You need to manage Windows 7 and Microsoft Office 2010 license keys for the VDI pool automatically.What should you do? (Choose all that apply.)

A. Install the Remote Desktop Licensing role service.

B. Install a ConfigMgr primary site server.

C. Install a MAK proxy server.

D. Install the Office 2010 KMS Host License Pack.

E. Activate the KMS host with the Office 2010 KMS key.

F. Install Volume Activation Management Tool 2.0.

G. Install a server core installation of Windows Server 2008 R2 Standard and add the AD DS role.

H. Activate the server with a MAK key.

I. Activate the server with a KMS key.

Answer: DEGISection: (none)

Explanation/Reference:Explanation:

QUESTION 23You are planning the deployment of a new engineering application in the Chicago office. You need to meetcompany requirements for application deployment. What should you recommend?

A. MED-V

B. App-V

C. Remote Desktop Session Host

D. Remote Desktop RemoteAppwww.certify-me.co.uk 174Microsoft 70-686 Exam

Answer: BSection: (none)

Explanation/Reference:Explanation:

QUESTION 24You run Sysprep on a base image for the company's VDI pool. You plan to use Windows DeploymentServices (WDS) for the deployment.

You need to recommend the Sysprep parameters to ensure that the base image is ready for deploymentwhile meeting the company requirements.

Which parameters should you recommend? (Choose all that apply.)

A. /quiet

B. /shutdown

C. /oobe

D. /generalize

E. /quit

F. /audit

G. / unattendiunattend.xml

Answer: BDGSection: (none)

Explanation/Reference:Explanation:

QUESTION 25You are planning to deliver VDI by using the companys virtualization infrastructure.

You need to ensure that VDI users are always reconnected to the same VDI session.

What should you recommend?

A. Deploy the App-V desktop client.

B. Add the VmHostAgent role service.

C. Deploy the App-V Sequencer.

D. Install Windows Server 2008 R2 Datacenter with the Hyper-V role.

Answer: BSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 175Microsoft 70-686 Exam

QUESTION 26Users with newly deployed Windows 7 computers see a security prompt when they attempt to uploaddocuments to the company's intranet site.

You need to suppress the prompt without creating a security risk for the company.

What should you do? (Choose all that apply).

A. Modify the GPO to set https://intranet.company.com with a value of 1 in the Site to Zone AssignmentList.

B. Modify the default Windows 7 image to add the Internet Explorer Enhanced Security Configurationcomponent.

C. Modify the default Windows 7 image to change the default Internet Explorer security level to MediumLow.

D. Modify the default Windows 7 image to disable the Internet Explorer Automatically Detect IntranetNetwork setting.

E. Create a GPO and link it to the root of the domain.

F. Modify the GPO to set the web server's NEtBIOS name with a value of 2 in the Site to Zone AssignmentList.

Answer: AFSection: (none)

Explanation/Reference:Explanation:

QUESTION 27You are designing an implementation of BitLocker. You create a GPO with BitLocker settings that conformto company requirements.

You need to design an implementation strategy that supports the company requirements.

What should you do? (Choose all that apply.)

A. Link the GPO to the Munich-Computers OU. Use a security filter to apply the GPO to all Munich desktopcomputers.

B. Block the Munich-Computers OU from inheriting policies.

C. Link the GPO to the Madrid-Computers OU. Use a security filter to apply the GPO to all Madrid desktopcomputers.

D. Link the GPO to the Munich-Users OU.

E. Create and use a WMI filter that targets all portable computers with the GPO. Link the WMI filter to theGPO

F. Link the GPO to the root of the AD DS domain.www.certify-me.co.uk 176Microsoft 70-686 Exam

Answer: BCEFSection: (none)

Explanation/Reference:Explanation:

QUESTION 28You use the Microsoft Deployment Toolkit (MDT) 2010 to create a Windows 7 test image. You deploy theimage by using a USB flash drive. The Windows 7 deployment includes a custom task sequence to install anew finance application from the deployment share.

You need to deploy the image in the Munich office by using Zero Touch Installation.

What should you do?

A. Install System Center Configuration Manager (ConfigMgr) 2007 in the Munich office. Configure adeployment point and configure the network for PXE. Recapture the MDT image and create a tasksequence for the finance application.

B. Install System Center Configuration Manager (ConfigMgr) 2007 in the Carlsbad office.Configure a deployment point and configure the network for PXE. Recapture the MDT image with thefinance application installed.

C. Install a new deployment share in the Munich office. Create a Windows PE boot disk with networkdrivers. Recapture the MDT image and create a task sequence for the finance application.Create a custom script that can map a drive to the deployment share and start Setup.

D. Install a new deployment share in the Munich office. Configure a deployment point and configure thenetwork for PXE. Recapture the MDT image and create a task sequence for the finance application.

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 29A user from the Finance department is testing applications in Windows 7 with Internet Explorer 9.company's finance application accesses a vendor web page that does not function correctly in TheWindows 7. When the user enables Internet Explorer Compatibility Mode for the vendor web page, it workscorrectly.

company's future software deployments.You need to support the

What should you recommend? (Choose all that apply.)

www.certify-me.co.uk 177Microsoft 70-686 Exam

A. Package the new purchasing application and publish it by using a Group Policy object (GPO) thatdeploys to users of the new application.

B. Package the new purchasing application and assign it by using a Group Policy object (GPO) thatdeploys to all Windows XP computers in the Finance department.

C. Use a Group Policy object (GPO) to add the vendor website to the Trusted Sites list on all computers inthe Finance department.

D. Use a Group Policy object (GPO) to add the vendor website to the local intranet zone for all Windows 7computers.

E. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows XPcomputers in offices that use the old purchasing application.

F. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows 7computers.

Answer: AFSection: (none)

Explanation/Reference:Explanation:

Topic 3, Scenario B

Background

You are the desktop architect for a company with 10,000 client computers. Client computers are eitherportable or desktop computers. All client computers run the 64-bit version of Windows 7 Enterprise.

Your network consists of a main office and four regional offices. Your network has an Active DirectoryDomain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levelsare set to Windows Server 2008 R2. There are four domain controllers in the main office and two additionaldomain controllers in each regional office.

All servers run Windows Servers 2008 R2.

The regional offices are listed in the following table with users and WAN connection speeds.

www.certify-me.co.uk 178Microsoft 70-686 ExamUsers in the New York office will have a Customer Relationship Management (CRM) application that isCPU-intensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensiveapplication. All users in the Toronto office use a legacy CRM application that runs on Windows XP only.

The existing client computers are managed with Microsoft System Center Configuration Manager(ConfigMgr) 2007 R3.

Business Requirements

The following business requirements must be maintained or exceeded.

Software Asset Management

The company Software Asset Management (SAM) team has a policy that mandates that after operatingsystems are deployed, the operating system environment (OSE) must be activated automatically before anyadditional updates or software are installed in the OSE.

The Paris development group has a Key Management Server (KMS) in an isolated test network.

All engineering applications are required to maintain compliance with the license agreements of theapplication vendors.

Technology Requirements

You need to ensure that users can always receive operating system and application updates on the internalnetwork and when away from the main office or branch offices.

The mobile staff uses portable computers.

In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning(ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integratewith the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7.

Virtualization infrastructure

You use Microsoft Application Virtualization (App-V) to deliver applications to computers.

You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systemsdeployed in the VDI pool must be automatically joined to the domain during the deployment process.

New Functionality

www.certify-me.co.uk 179Microsoft 70-686 ExamThe fewest number of servers should be added to the environment to meet the technical goals.

A new version of an existing engineering application must be deployed to the users. The new applicationrequires a dedicated graphics processing unit (GPU) with 2 GB of memory.

Technical Requirements

The following technical requirements must be maintained or exceeded.

Infrastructure Requirements

All applications and updates are required to be deployed with the same central management tool. Detailedreporting for compliance audits are required to be available for all application and update deployments.

Application Compatibility

All current applications must be supported on Windows 7.

You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP).

Operating System Environment (OSE) Requirements

- You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in theToronto office.- You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual DesktopInfrastructure (VDI) computers.

Security

All remote access must be logged and auditable. All VDI desktops computers must not send CustomerExperience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger.

QUESTION 30You are planning the deployment of the CRM application to the New York office.

You need to recommend a deployment method to maximize the performance of the application.

What should you recommend?

A. MED-V

B. Unified Access Gatewaywww.certify-me.co.uk 180Microsoft 70-686 Exam

C. Remote Desktop Connection Broker

D. App-V

Answer: ASection: (none)

Explanation/Reference:Explanation:

QUESTION 31You are replacing the desktop computers in the Chicago office.

You need to automate the migration of user profile data to the new computers.

What should you recommend? (Choose all that apply.)

A. state migration point

B. Windows Client Operating System Management Pack

C. Background Intelligent Transfer Server

D. Windows Easy Transfer

E. ConfigMgr custom task sequence

Answer: AESection: (none)

Explanation/Reference:Explanation:

QUESTION 32You have an AD DS security group named Toronto Users and another named Toronto Computers.

You are planning the deployment of a new browser by using Group Policy.

You need to ensure that the computers in each office comply with company requirements.

What should you recommend? (Choose all that apply.)

A. Download the Internet Explorer 9 Administrative Kit.

B. Deploy the Internet Explorer 9 Blocker to the Toronto Users group.

C. Add all Toronto computers to the Toronto Computers security group.

D. Deploy the Internet Explorer 9 Admin Kit to the Toronto Users group.

E. Add all Toronto users to the Toronto Users security group.

F. Download the Internet Explorer 9 Blocker Toolkit.

G. Deploy the Internet Explorer 9 Admin Kit to the Toronto Computers group.www.certify-me.co.uk 181Microsoft 70-686 Exam

H. Deploy the Internet Explorer 9 Blocker to the Toronto Computers group.

Answer: CFHSection: (none)

Explanation/Reference:Explanation:

QUESTION 33You need to recommend a Microsoft Enterprise Desktop Visualization (MED-V) image update strategy tomeet company requirements.

What should you recommend?

A. windows Update

B. Windows Intune

C. ConfigMgr

D. Windows Deployment Services (WDS)

Answer: CSection: (none)

Explanation/Reference:Explanation:

QUESTION 34You need to ensure that the company's remote computers receive Windows updates at the same time asthe internal computers.

What should you do?

A. Implement System Center Operations Manager (OpsMgr)

B. Install the Windows Deployment Services (WDS) role.

C. Install BranchCache in distnbuted mode.

D. Deploy DtrectAccess.

Answer: DSection: (none)

Explanation/Reference:Explanation:

www.certify-me.co.uk 182