Act now and download your Microsoft 70-686 test today! Do not waste time for the worthless Microsoft 70-686 tutorials. Download Up to the immediate present Microsoft Pro: Windows exam with real questions and answers and begin to learn Microsoft 70-686 with a classic professional.

Q9. You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computers in Toronto by using ConfigMgr. 

The deployed image fails to activate. 

You need to ensure that the image meets company activation requirements. 

What should you do? 

A. Run the Sysprep /generalize command. 

B. Run the Sysprep /oobe command. 

C. Modify the unattend.xml file and enter a MAK key. 

D. Modify the unattend.xml file and enter a KMS key. 

Answer:


Q10. All client computers in your network run Windows 7 with default firewall settings. 

You have a server-based application that requires an agent to be installed on all client computers. 

You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. 

What should you do? 

A. Create inbound program rules. 

B. Create inbound port rules. 

C. Create Windows service hardening rules. 

D. Create connection security rules. 

Answer:

Explanation: 

hints: 

software havent install, so unable to block program 


Q11. Your company plans to upgrade all client computers to Windows 7. 

The company uses a custom line-of-business application. The application contains sensitive data. The application will not run on Windows 7 

You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application. 

You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server. 

What should you do? 

A. Using MED-V TrimTransfer technology, deploy the VM image over the network 

B. In the MED-V console, configure the MED-V workspace to prevent offline operation 

C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored 

D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory 

Answer:


Q12. Your network is configured as shown in the following diagram. 

You are planning to deploy Windows 7. 

You have the following requirements: 

. Use BitLocker on all computers in the isolated network. 

. Provide DirectAccess on all portable computers. 

. Use the Key Management Service (KMS) to activate all client computers. 

You need to plan a client computer licensing strategy that meets the requirements. 

What should you do? 

A. License 500 copies of Windows 7 Ultimate. 

B. License 500 copies of Windows 7 Enterprise. 

C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional licenses. 

D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate. 

Answer:

Explanation: 

hints: 

Direct Access only available for Ultimate and Enterprise only. 

Company should use Enterprise version 


Q13. You are planning to upgrade Internet Explorer. 

You have the following requirements: 

. Create a report that identifies which computers are successfully upgraded. 

. Do not install additional software on the client computers. 

You need to design a deployment method that meets the requirements. 

What should you do? 

A. Use Windows Server Update Services (WSUS). 

B. Use Internet Explorer Administration Kit (IEAK) and Group Policy. 

C. Use Microsoft System Center Configuration Manager. 

D. Use Microsoft System Center Essentials. 

Answer:

Explanation: 

Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update. 

http://en.wikipedia.org/wiki/Windows_Server_Update_Services 


Q14. Your network has 1,000 client computers that run Windows 7. 

You need to install an application, in the Local System account context, on the client computers. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Configure a logon script. 

B. Configure a startup script. 

C. Configure a shutdown script. 

D. Configure a logoff script. 

Answer: B,C 


Q15. Your company’s network has client computers that run Windows 7. 

When a user attempts to log on to the domain from a computer named Client1, she receives the following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect. 

You need to ensure that the user can log on to the domain from Client1. 

What should you do? 

A. Disjoin and rejoin Client1 to the domain. 

B. Reset the account password for Client1 through Active Directory Users and Computers. 

C. Add the computer account for Client1 to the Domain Computers Active Directory group. 

D. Reset the account password for the user through Active Directory Users and Computers. 

Answer:

Explanation: 

Re-create the computer account, join a workgroup, and then rejoin the domain. 

refer to http://support.microsoft.com/kb/810497 


Q16. DRAG DROP 

An enterprise organization has computers that run Windows 7. Users log on to the Contoso.com domain from their client computers. 

A user is unable to log on to the domain. The user changed his password the previous night and was unable to log on this morning. After reviewing the event logs, you notice a large amount of NETLOGON errors. 

You need to ensure that the user can log on to the domain. 

Which command should you run? (To answer, drag the appropriate command and parameter from the list of commands and parameters to the correct location or locations in the work area.) 

Answer: