Proper study guides for Avant-garde Microsoft Managing and Maintaining Windows 8 certified begins with Microsoft 70-688 preparation products which designed to deliver the Downloadable 70-688 questions by making you pass the 70-688 test at your first time. Try the free 70-688 demo right now.

2021 Mar 70-688 practice test

Q21. Your network contains an Active Directory domain. All client computers run Windows 8.1 Enterprise. 

You have a client computer named Computer1 that has a shared printer named Printer1. 

You need to recommend a solution to provide managers with the ability to print their print jobs before all of the other jobs in the print queue. 

What should you recommend? 

A. Modify the print processor of Printer1. 

B. Add a new shared printer, and then modify the print processor of the new printer. 

C. Add a new shared printer, and then modify the priority of the new printer. 

D. Modify the priority of Printer1. 

Answer:


Q22. DRAG DROP 

You support Windows 8.1 Enterprise computers. AppLocker policies are deployed. 

Company policy states that AppLocker must be disabled. 

You need to disable AppLocker. 

Which three actions should you perform in sequence? (To answer, move the appropriate 

actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q23. You have a desktop computer that runs Windows 8 Enterprise. 

You add three new 3-terabyte disks. 

You need to create a new 9-terabyte volume. 

Which two actions should you perform? (Each correct answer presents part of the solution. 

Choose two.) 

A. From Disk Management, create a new spanned volume. 

B. From Disk Management, convert all of the 3-terabyte disks to GPT. 

C. From PowerShell, run the New-VirtualDisk cmdlet. 

D. From Disk Management, bring all disks offline. 

E. From Diskpart, run the Convert MBR command. 

F. From PowerShell, run the Add-PhysicalDisk cmdlet. 

Answer: A,B 


Q24. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. 

Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. 

You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. 

What should you do? 

A. Publish the application through a public file transfer protocol (FTP) site. 

B. Publish the application through an intranet web site. 

C. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings. 

D. Publish the application to Windows Store. 

Answer:


Q25. You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. 

You are planning to add a guest wireless network. 

You need to collect information about nearby wireless networks, including their encryption methods. 

Which command should you include in the batch file? 

A. Get-WmiObject win32_networkadapterconfiguration -Filter 'ipenabled = "true"' 

B. PowerShell commandlet Get-Host 

C. PowerShell commandlet Get-Netadapter with parameter -Wireless 

D. netstat -a 

E. netsh wlan show hostednetwork 

F. netsh wlan show networks 

Answer:


Avant-garde 70-688 brain dumps:

Q26. You have a client computer named Computer1 that runs Windows 8 Enterprise. Computer1 has a Trusted Platform Module (TPM) chip installed and the operating system volume is encrypted by using BitLocker Drive Encryption (BitLocker). 

You plan to upgrade the BIOS of Computer1. 

You need to recommend a solution that meets the following requirements: 

Ensures that the drive remains encrypted 

Avoids the need to perform a BitLocker recovery 

Ensures that Windows can start after the BIOS is upgraded 

Minimizes the time required to complete the BIOS upgrade 

What should you include in the recommendation? 

A. From the command prompt, run manage-bde and specify the -protectors parameter and the -disable parameter. 

B. From the command prompt, run manage-bde and specify the -protectors parameter and the -delete parameter. 

C. From the Trusted Platform Module (TPM) Management console, click Turn TPM Off from the Actions menu. 

D. From the command prompt, run tpmvscmgr.exe and specify the destroy parameter. 

Answer:


Q27. DRAG DROP 

You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain. 

You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.) 

You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.) 

You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions. 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q28. You manage Windows 8.1 client computers that are part of a workgroup. 

These computers are configured to use Microsoft Update. Updates are downloaded every 

day at 10:00 and installed automatically. 

Users report that their computers sometimes reboot without any interaction, 

You need to prevent unplanned automatic reboots of the computers. 

What should you do? 

A. Disable the Re-prompt for restart with scheduled installations policy setting. 

B. Disable the Delay Restart for scheduled installations policy setting. 

C. Disable the No auto-restart with logged on users for scheduled automatic updates installations policy setting. 

D. Set the Configure automatic updating policy to 3 - Auto download and notify for install. 

Answer:


Q29. DRAG DROP 

You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain. 

A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. 

You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings. 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q30. You administer client computer that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). 

Your company recently purchased 25 new tablets that run Windows 8 Pro. 

For all 25 new tables, you want to replace the existing Windows 8 Pro installation with Windows 8 enterprise. 

You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. 

What should you do? 

A. Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share. 

B. Start the tablets from a customized Windows Recovery Environment (WinRE) 

C. Start the tablets in Windows Recovery Mode. 

D. Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE.). 

Answer: