(DAILY QUESTIONS UPDATE) Download Free Microsoft 70-688 VCE Files From Braindump2go – Get Microsoft 70-688 Certification Right Now (56-70)

Braindump2go Updated Microsdoft 70-688 Practice Exam Dumps Today! All Latest 276 Questions and Answers are all from Micrsoft Exam Center – Many New Question added into 70-688 Exam! Free Download the latest Microsoft 70-688 sample Exam Questions from Braindump2go Now!

Vendor: Microsoft
Exam Code: 70-688
Exam Name: Supporting Windows 8.1


You are a Windows 8 user. Your organization has purchased an Office 365 subscription.
You install Microsoft Lync and Microsoft Outlook on your computer.
You need to connect Office 365 to Lync and Outlook.
What should you do?

A.    Run the Office Professional Plus setup from the Office 365 portal.
B.    Run the Windows Mail application. Add a new account by using your Office 365 credentials.
C.    Run the People application. Add a new account by using your Office 365 credentials.
D.    Run the Office 365 desktop setup from the Office 365 portal.

Answer: D
Set up your desktop for Office 365
When you have set up your desktop, you will be able to:
Install the complete suite of Microsoft Office 2010 desktop apps, if you have a Office Professional Plus subscription.
Install Lync, your workplace connection for instant messaging and online meetings, including audio and video.
Use your user ID to sign in to Office 365 from your desktop applications.

Drag and Drop Questions
You use a desktop computer and a laptop, both of which run windows 8.
You use a Microsoft account to log on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined to the HomeGroup and the laptop is a member of a workgroup. When you access a frequently visited website from your laptop, Internet Explorer saves your password. When you visit the website from your desktop computer, you are prompted to enter your password.
You need to sync your saved password from your laptop to your desktop computer.
Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




* Microsoft has integrated its cloud computing features into much of Windows 8. The focal point of that integration is the soon to be re-branded Windows Live service–use a Windows Live account as your login, and you can synchronize much of the information associated with your account to all your Windows devices through the cloud. Or at least, that’s the goal.
* Setting up for synchronization starts when you configure your user account. At installation, Windows 8 prompts you for a Windows Live account. You can create a new Live account or use an existing one for your user credentials, or choose to bypass this and set up a local-only user account– but you won’t be able to leverage the synchronization features if you do. You can also opt out later and switch to a local-only account through Windows 8’s settings menu. When you set up your user account–either at install time or from the PC settings menu afterward– you’ll be prompted to either use an existing Live account email address or enter a new one


Drag and Drop Questions
You support computers that run Windows 8 Pro. Your company recently purchased 200 new desktop computers. Company policy requires that the desktop computers include a recovery partition. The partition must contain a bootable image that includes support for incoming Remote Desktop connections.
You need to configure the desktop computers to comply with company policy.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




After you have finished running the Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0 Recovery Image wizard and created the recovery image, you can extract the boot.wim file from the ISO image file and deploy it as a recovery partition in a Windows 8 image. A partition is recommended, because any corruption issues that prevent the Windows operating system from starting would also prevent the recovery image from starting.
Reference: How to Deploy the DaRT Recovery Image as Part of a Recovery Partition

You administer Windows 8 client computers in your company network.
You receive a virtual hard disk (VHD) file that has Windows 8 Pro preinstalled, along with several business applications.
You need to configure your client computer to start from either the VHD file or from your current operating system.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)

A.    Import the contents of the system store from a file.
B.    Export the contents of the system store into a file.
C.    Attach the VHD file by using Disk Management.
D.    Make the VHD disk bootable.
E.    Create a new empty boot configuration data store.
F.    Create a new entry in the boot configuration data store.

Answer: CDF

You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory.
You create a Windows Intune group that specifies a manager as a membership criterion.
You notice that the group has no members.
You need to ensure that users that meet the membership criteria are added to the Windows Intune group.
What should you do?

A.    Force Active Directory replication within the domain.
B.    Ensure that all user accounts are identified as synchronized users.
C.    Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory.
D.    Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.

Answer: B
Add Computers, Users, and Mobile Devices
For users and security groups to appear in the Windows Intune administrator console, you must sign in to the Windows Intune account portal and do one of the following:
Manually add users or security groups, or both, to the account portal.
Use Active Directory synchronization to populate the account portal with synchronized users and security groups.
Windows Intune
The Windows Intune cloud service enables you to centrally manage and secure PCs through a single web-based console so you can keep your computers, IT staff, and users operating at peak performance from virtually anywhere without compromising the essentials–cost, control, security, and compliance.

You support computers that run Windows 8.
You are designing a remote access server (RAS). The firewall accepts incoming TCP connections only to ports 80 and 443.
You want to connect to the RAS server from a laptop.
You need to create a virtual private network (VPN) connection to the RAS server.
Which VPN tunneling protocol should you use?

A.    L2TP
B.    SSTP
C.    PPTP

Answer: B

You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise.
You are planning to add a guest wireless network.
You need to collect information about nearby wireless networks, including their encryption methods.
Which command should you include in the batch file?

A.    Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘
B.    PowerShell commandlet Get-Host
C.    PowerShell commandlet Get-Netadapter with parameter -Wireless
D.    netstat -a
E.    netsh wlan show hostednetwork
F.    netsh wlan show networks

Answer: F
http://technet.microsoft.com/en-us/library/cc755301%28v=WS.10%29.aspx http://technet.microsoft.com/en-us/library/cc755301%28v=WS.10%29.aspx#bkmk_wlanShowNetworks

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?

A.    Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
B.    Reset your account password to match the HomeGroup password.
C.    Disjoin all HomeGroup members and re-create the HomeGroup.
D.    Change NTFS security permission on the shared folders.
Grant Everyone account Read & Execute permission.
Answer: A

Drag and Drop Questions
You have a computer that runs Windows 8.
You have a 1-terabyte external hard drive.
You purchase a second 1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives.
You also need to ensure that additional external hard drives can be added to the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




To create a storage space, you’ll have to connect two or more additional drives to your computer you can’t use your system drive for this. The drives can be either internal or external drives.
You can open the Storage Spaces configuration window from the Control Panel or by bringing up the Start screen with the Windows key, typing “Storage Spaces,” clicking the Settings category and selecting the Storage Spaces shortcut.
Select the drives you want to use for the storage space and click the “Create pool” button to continue. You’ll lose any files that are already on the drive copy any important files off the drives before pooling them. You can add additional drives later. The resiliency type controls how Windows handles your data. There are four options:
* None: Windows will store only a single copy of your. You’ll lose the data if one of your drives fails, but no space will be used on backups.
* Two-way mirror: Windows will store two copies of your data. If one of your drives fails, you won’t lose your data. This requires at least two drives.
* Three-way mirror: Windows will store three copies of your data. If one or two of your drives fails, you won’t lose your data. This requires at least three drives.
* Parity: Windows stores parity information with the data, protecting you from a single drive failure. Parity uses drive space more efficiently than mirroring, but file access times are slower. Parity is ideal for drives with large, infrequently updated files, such as video files.
Reference: How to Use Windows 8s Storage Spaces to Mirror & Combine Drives

You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer.
You need to provide the user a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Ask the user for his computer name.
B.    Ask the user to run the manage-bde -unlock E: -pw command.
C.    Ask the user for his logon name.
D.    Ask the user for a recovery key ID for the protected volume.

Answer: AC
http://windows.microsoft.com/en-US/windows-8/bitlocker-recovery-keys-faq http://technet.microsoft.com/en-us/library/dn383583.aspx

You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain. Users travel frequently and access domain resources from inside client networks or from their home network.
You want to manage the laptops when they are connected to the company network from the external networks.
You need to ensure that the laptops can be managed and maintained while users are not logged on to the computers.
Which of the following should you recommend?

A.    Remote Assistance
B.    Windows Remote Management (WinRM)
C.    DirectAccess
D.    Remote Desktop

Answer: C
Networking and Access Technologies
DirectAccess, introduced in the Windows 7 and Windows Server 2008 R2 operating systems, allows remote users to securely access enterprise shares, web sites, and applications without connecting to a virtual private network (VPN). DirectAccess establishes bi-directional connectivity with a user’s enterprise network every time a user’s DirectAccess-enabled portable computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the enterprise network and IT administrators can manage remote computers outside the office, even when the computers are not connected to the VPN. Forefront Unified Access Gateway (UAG) 2010 extends the benefits of DirectAccess across your infrastructure, enhancing scalability and simplifying deployment and ongoing management.

Drag and Drop Questions
You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members of the Active Directory domain named contoso.com. Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible from the Contoso network. The website requires SSL and mutual authentication.
You need to configure the computers to allow contoso.com domain users to access the website without any warning prompts.
You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)




* Fabrikam.com provided the resources. contoso.com be the trusted root authorities store
* No untrusted certificates
* Not allow access to local computer account (just to user account)
* user account access through client (user) certificate issued by Fabrikam

You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443.
You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet.
You need to configure the network to support the required remote administration access.
What should you do?

A.    Enable Remote Desktop on the desktop computers.
B.    Run the winrm quickconfig command on your computer.
C.    Install Remote Server Administration Tools (RSAT) on your computer.
D.    Run the winrm quickconfig command on the desktop computers.

Answer: D
Installation and Configuration for Windows Remote Management (Windows)
Quick default configuration
Starting with Windows Vista, you can enable the WS-Management protocol on the local computer and set up the default configuration for remote management with the following command: Winrm quickconfig.
Windows Server 2003 R2: The Winrm quickconfig command is not available.
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start.
Configures a listener for the ports that send and receive WS-Management protocol messages using either HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
Note The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not be enabled.
http://blogs.technet.com/b/jonjor/archive/2009/01/09/winrm-windows-remote-management- troubleshooting.aspx
WinRM (Windows Remote Management) Troubleshooting
While WinRM listens on port 80 by default, it doesn’t mean traffic is unencrypted. Traffic by default is only accepted by WinRM when it is encrypted using the Negotiate or Kerberos SSP. WinRM uses HTTP (TCP 80) or HTTPS (TCP 443). WinRM also includes helper code that lets the WinRM listener share port 80 with IIS or any other application that may need to use that port.

Drag and Drop Questions
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.
You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)


You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)


You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
– The application is not accessible if a user is working offline.
– The application is stored on an internal solid-state drive (SSD) on the tablets.
– The application is isolated from other applications.
– The application uses the least amount of disk space.
You need to deploy the new application to the tablets. What should you do?

A.    Deploy the application as an Application Virtualization (App-V) package.
Install the App-V 4.6 client on the tablets.

B.    Deploy the application as a published application on the Remote Desktop server.
Create a Remote Desktop connection on the tablets.

C.    Install the application on a local drive on the tablets.

D.    Install the application in a Windows To Go workspace.

E.    Install Hyper-V on tablets. Install the application on a virtual machine.

F.    Publish the application to Windows Store.

G.    Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file.
Configure the tablets with dual boot.

H.    Install the application within a separate Windows 8 installation in a VHDX file.
Configure tablets with dual boot.

Answer: A

Braindump2go promise you a 100% totally pass of 70-688 Exam! Believe us, trying to pass 70-688 exam, we will return your full money back if you cannot pass! We are confident in helping everyone pass any IT Exams one time! Download our latest updated 70-688 Exam Dumps now!