Free Download Microsoft 70-688 PDF Full Version Now 121-130

Vendor: Microsoft
Exam Code: 70-688
Exam Name: Supporting Windows 8.1
Version: 14.92

QUESTION 121
You administer computers that run Windows 8 Enterprise.
The computers are members of an Active Directory domain.
You have a tablet that runs Windows 8 Enterprise.
You configure the tablet to access your company network by using a virtual private network (VPN) connection.
You need to manage Active Directory from the tablet by using a VPN connection.
What should you do?

A.    Run the winrm.exe qc command.
B.    Install the System Center Configuration Manager (SCCM) 2012 client.
C.    Install the Remote Server Administration Tools (RSAT).
D.    Install the Windows Intune client.

Answer: C

Explanation:
Remote Server Administration Tools for Windows 8 includes Server Manager, Microsoft Management Console (MMC) snap-ins, consoles, Windows PowerShell cmdlets and providers, and command-line tools for managing roles and features that run on Windows Server 2012. In limited cases, the tools can be used to manage roles and features that are running on Windows Server 2008 R2 or Windows Server 2008.
Some of the tools work for managing roles and features on Windows Server 2003.
http://blogs.technet.com/b/keithcombs/archive/2012/09/13/remote-server-administrationtools-rsat-for-windows-8-now-available-for-download.aspx

QUESTION 122
You support tablets that run Windows 8 Pro. You are designing a remote access server (RAS) that will be placed behind a firewall. The firewall will accept incoming TCP connections to ports 80 and 443 only. You want to connect to the RAS server from a tablet. You need to create a virtual private network (VPN) connection to the RAS server. Which VPN tunneling protocol should you use?

A.    IPSec/L2TP
B.    SSTP
C.    PPTP
D.    IPSec/IKEv2

Answer: B
Explanation:
Was a bit difficult to find information on Technet regarding SSTP but, the below explains it well and why it would be used here.
Secure Socket Tunneling Protocol
http://en.wikipedia.org/wiki/Secure_Socket_Tunneling_Protocol
http://technet.microsoft.com/en-us/library/cc783910%28v=WS.10%29.aspx
Secure Socket Tunneling Protocol (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP or L2TP traffic through an SSL 3.0 channel. SSL provides transport-level security with key-negotiation, encryption and traffic integrity checking. The use of SSL over TCP port 443 allows SSTP to pass through virtually all firewalls and proxy servers.

QUESTION 123
At home, you use a desktop computer that runs Windows 8.
At work, you use a laptop that runs Windows 8 and is connected to a corporate network.
You use the same Microsoft account to log on to both computers.
You have a folder with some personal documents on your desktop computer.
The folder must be available and synced between both computers.
You need to ensure that the latest version of these files is available.
What should you do?

A.    Move the folder to the Documents folder.
B.    Go to PC Settings.
Under Homegroup, select Documents to be Shared.
C.    Install SkyDrive for Windows.
In Windows Explorer, move the folder that contains the personal documents to the SkyDrive folder.
D.    Move the folder to the Libraries folder.
E.    Go to PC Settings.
Under Sync your settings, enable App settings.
F.    Right-click the folder and click Properties.
Under Security, provide Full Control for the Microsoft account.

Answer: C
Explanation:
Original answer was ‘A’ is the wrong answer. Windows 8 will not synchronize any of your files automatically, when they are in Documents folder.
The correct answer is C – SkyDrive is the only way to sync files between Windows 8 computers.

QUESTION 124
A portable computer that runs Windows 8 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.
You need to ensure that the computer automatically downloads updates by using Windows Update only while connected to the wired corporate network connection.
What should you do?

A.    Set the corporate wireless network to metered.
B.    Set the corporate wireless network to non-metered.
C.    Configure the Specify intranet Microsoft update service location local Group Policy setting.
D.    Configure a Windows Firewall connection security rule.

Answer: A
Explanation:
http://www.windowsnetworking.com/articles_tutorials/Using-Wireless-Networks-Windows-8.html
You can also set particular networks as a metered connection, which will then disable Windows Update from downloading updates (except for critical security patches) and possibly disable or reduce data usage from other Microsoft and non-Microsoft applications as well.

QUESTION 125
Employees are permitted to bring personally owned portable computers that run Windows 8 to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using Windows Mail.
An employee’s personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Prevent the computer from connecting to the corporate wireless network.
B.    Disconnect the computer from the management infrastructure.
C.    Change the user’s password.
D.    Initiate a remote wipe.

Answer: CD
Explanation:
D: A Remote Wipe is the process where a device is selected from a central Microsoft Exchange or management console and chosen to be wiped, for example if the device has been lost by the owner. The Remote Wipe command is then sent to the device via ActiveSync.
For a device such as a Windows Phone, all data is deleted, including email, contacts, calendar for all accounts and other data on the device such as documents and picture.
However, when ActiveSync Remote Wipe is performed against a Windows 8 or Windows RT device, the scope of the wipe is more limited. Only the email, contacts, and calendar for information stored in thebuiltin Mail applicationare deleted. Other data on the system is not deleted, including information from the Microsoft Office Outlook client.

QUESTION 126
You administer client computers that run Windows 8.1 Enterprise deployed by using Windows Deployment Services (WDS).
Your company recently purchased 25 new tablets that run Windows 8.1 Pro.
For all 25 new tablets, you want to replace the existing Windows 8.1 Pro installation with Windows 8.1 Enterprise.
You need to deploy the Windows 8.1 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure.
What should you do?

A.    Start the tablets in Windows Recovery mode.
B.    Start the tablets by using a network boot option.
C.    Start the tablets normally. Deploy the Windows Image (WIM) file located on a WDS network share.
D.    Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share.

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/cc947592%28v=WS.10%29.aspx
http://technet.microsoft.com/en-us/library/cc766320%28v=WS.10%29.aspx
http://forum.wegotserved.com/index.php/tutorials/article/11-windows-deployment-services/
http://windows.microsoft.com/en-us/windows/advanced-startup-options-including-safe- mode#1TC=windows-7

QUESTION 127
Drag and Drop Questions
Your company is migrating from Windows 7 to Windows 8.1.
Before you attempt to migrate a client computer named Computer1. Computer1 fails and can no longer start Windows 7.
You need to migrate the user profile from Computer1 to a client computer named Computer2 that runs Windows 8.1.

wps8843.tmp

Answer:

wps9DA8.tmp

QUESTION 128
You have client Windows 8.1 Enterprise computers.
Your company purchases a subscription to Windows Intune.
You deploy the Windows Intune agent to all of the computers.
You need to uninstall a Microsoft update that was installed before the Windows Intune agent was installed. The solution must minimize administrative effort.
What should you do?

A.    Create a Group Policy object (GPO) that runs wusa.exe by using a startup script.
B.    From Windows Intune, create a new automatic approval rule.
C.    From Windows Intune, click New updates to approve.
D.    Create a Group Policy object (GPO) that runs msiexec.exe by using a startup script.

Answer: C
Explanation:
http://technet.microsoft.com/en-us/library/hh456367.aspx
http://www.microsoft.com/en-us/server-cloud/products/windows-intune/support.aspx#fbid=I_-Vds59NJT
http://support.microsoft.com/kb/934307
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/msiexec.mspx?mfr=true

QUESTION 129
You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager.
You enable Microsoft System Center 2012 Endpoint Protection on the computers.
You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers.
What should you configure form the System Center 2012 Endpoint Protection settings?

A.    Advanced
B.    MAPS
C.    Real-time protection
D.    Default actions

Answer: B
Explanation:
Microsoft Active Protection Service. Allows the collection and sending of information about detected malware to Microsoft.
Advanced. Use these settings to configure actions such as system restore point creation, client interface visibility, quarantined item deletion period, allowing users to exclude specific folders, and scan and definition update schedule randomization. Default actions. Allows you to specify how malware is treated once detected based on malware threat level. You have the option of having malware quarantined or removed.
You can also configure Endpoint Protection to take whatever action is recommended by Microsoft. Enable real-time protection. You can use the settings here to enable real time protection. You can also enable or disable scanning of incoming and outgoing files, and all downloaded files and attachments. You can also enable behavior monitoring, which can detect new malware based on behavioral characteristics and also enable protection against network-based exploits.
http://technet.microsoft.com/en-us/security/jj900682.aspx
http://technet.microsoft.com/en-us/library/hh508836.aspx

QUESTION 130
Hotspot Question
Your company has several Windows RT 8.1 devices. The devices connect to Exchange Online in Microsoft Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.

wpsCE69.tmp

You need to identify the effective settings on the Windows RT devices.
What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.)

wpsE5B1.tmp

Answer:

wpsFEAE.tmp

If you want to pass Microsoft 70-688 exam successfully, donot missing to read latest lead2pass Microsoft 70-688 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/70-688.html

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back