2014 Latest Microsoft 70-688 Exam Dump Free Download!(41-50)

QUESTION 41
You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. You need to ensure that file and program activity is always monitored on this computer. What should you do?

A.    Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.
B.    In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that
uses the recommended settings.
C.    Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.
D.    Create and deploy a custom policy in the Windows Intune Center Settings template.

Answer: B

QUESTION 42
Drag and Drop Questions
You use a desktop computer and a laptop, both of which run Windows 8. You use a Microsoft account to log on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined to the HomeGroup and the laptop is a member of a workgroup. When you access a frequently visited website from your laptop, Internet Explorer saves your password. When you visit the website from your desktop computer, you are prompted to enter your password. You need to sync your saved password from your laptop to your desktop computer. Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
 clip_image002
Answer:
 clip_image002[4]
Explanation:
Note:
* Microsoft has integrated its cloud computing features into much of Windows 8. The focal point of that integration is the soon to be re-branded Windows Live service–use a Windows Live account as your login, and you can synchronize much of the information associated with your account to all your Windows devices through the cloud. Or at least, that’s the goal.
* Setting up for synchronization starts when you configure your user account. At installation, Windows 8 prompts you for a Windows Live account. You can create a new Live account or use an existing one for your user credentials, or choose to bypass this and set up a local-only user account– but you won’t be able to leverage the synchronization features if you do. You can also opt out later and switch to a local-only account through Windows 8’s settings menu. When you set up your user account–either at install time or from the PC settings menu afterward– you’ll be prompted to either use an existing Live account email address or enter a new one
 clip_image002[6]

QUESTION 43
Drag and Drop Questions
You support computers that run Windows 8 Pro. Your company recently purchased 200 new desktop computers. Company policy requires that the desktop computers include a recovery partition. The partition must contain a bootable image that includes support for incoming Remote Desktop connections. You need to configure the desktop computers to comply with company policy. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
 clip_image002[8]
Answer:
 clip_image002[10]
Explanation:
Note:
After you have finished running the Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0 Recovery Image wizard and created the recovery image, you can extract the boot.wim file from the ISO image file and deploy it as a recovery partition in a Windows 8 image. A partition is recommended, because any corruption issues that prevent the Windows operating system from starting would also prevent the recovery image from starting.
Reference: How to Deploy the DaRT Recovery Image as Part of a Recovery Partition

QUESTION 44
You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1. Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker. You need to make changes to the Configure MBAM Services Group Policy settings. Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Set MBAM Recovery and Hardware service endpoint to MBAM1.
B.    Set Enter status reporting frequency (in minutes) to 120.
C.    Set MBAM Status reporting endpoint to MBAM1.
D.    Set Select Bitlocker Recovery Information to store to Recovery password and key package.
E.    Set Select Bitlocker Recovery Information to store to Recovery password only.
F.    Set Enter client checking status frequency (in minutes) to 120.

Answer: AC

QUESTION 45
You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?

A.    Create a new Windows Intune Center Settings policy.
B.    Create a new Windows Intune Agent Settings policy.
C.    Create a new Windows Intune Mobile Security policy.
D.    Create a new Windows Firewall Settings policy.

Answer: C

QUESTION 46
You support computers that run Windows 8 Enterprise. Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline. You need to ensure that the App-V applications are available to users only when they are connected to the company network.
What should you do?

A.    Configure mandatory profiles for laptop users.
B.    Reset the App-V client FileSystem cache.
C.    Disable the Disconnected operation mode.
D.    Change user permissions to the App-V applications.

Answer: C

QUESTION 47
At work, you use a desktop computer that runs Windows 8 Pro. At home, you use a laptop that runs Windows 8. You use the same Microsoft account to log on to both computers. You want to use the same settings for both computers. You need to ensure that all computer settings, including stored passwords, are synced between the computers. What should you do?

A.    Add both computers to the same Active Directory domain.
B.    Use the same local accounts for both computers.
C.    Install SkyDrive for Windows on both computers.
D.    Designate both computers as trusted PCs.

Answer: D

QUESTION 48
Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration. You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter. You want to create an image of the reference desktop that retains the custom driver in the image. You need to edit the unattended answer file. Which setting in the unattended answer file should you edit?

A.    Microsoft-Windows-PnPSysprep | PersistAllDeviceInstalls
B.    Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
C.    Microsoft-Windows-PnpCustomizattonNonWinPE | DriverPaths
D.    Microsoft-Windows-Shell-Setup | OEMInformation

Answer: A

QUESTION 49
Drag and Drop Questions
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
 clip_image002[12]
Answer:
 clip_image002[14]
Explanation:
Note:
* You use the User State Migration Tool (USMT) 5.0 when hardware and/or operating system upgrades are planned for a large number of computers. USMT manages the migration of an end- user’s digital identity by capturing the user’s operating-system settings, application settings, and personal files from a source computer and reinstalling them on a destination computer after the upgrade has occurred.
One common scenario when only the operating system, and not the hardware, is being upgraded is referred to as PC refresh. A second common scenario is known as PC replacement, where one piece of hardware is being replaced, typically by newer hardware and a newer operating system.
* Scenario: PC-refresh using a hard-link migration store A company has just received funds to update the operating system on all of its computers to Windows 8. Each employee will keep the same computer, but the operating system on each computer will be updated. In this scenario, an administrator uses a hard-link migration store to save each user state to their respective computer.
The administrator runs the ScanState command-line tool on each computer, specifying the /hardlink /nocompress command-line options. ScanState saves the user state to a hard-link migration store on each computer, improving performance by minimizing network traffic as well as minimizing migration failures on computers with very limited space available on the hard drive. On each computer, the administrator installs the company’s SOE which includes Windows 8 and other company applications.
The administrator runs the LoadState command-line tool on each computer. LoadState restores each user state back on each computer.
Reference: User State Migration Toolkit (USMT) Reference

QUESTION 50
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?

A.    Publish the application through a public file transfer protocol (FTP) site.
B.    Publish the application through an intranet web site.
C.    Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
D.    Publish the application to Windows Store.

Answer: B

Passing Microsoft 70-688 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-688 Dump:http://www.braindump2go.com/70-688.html

2014 Latest Microsoft 70-687 Exam Dump Free Download!(71-80)

QUESTION 71
A company has client computers that run Windows 8. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.
You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A.    Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.
B.    Create and configure a collector-initiated subscription.
C.    Start the Windows Event Collector service on all computers other than COMPUTER1.
D.    Start the Windows Event Collector service on COMPUTER1.
E.    Create and configure a source computer—initiated subscription.
F.    Start the Windows Event Log service on all computers other than COMPUTER1.
G.    Add COMPUTER1 machine account to the Event Log Readers local group on all other computers.

Answer: BDG
Explanation:
For best management we want a collector-initiated subscription–meaning we’ll be setting up the subscription at the collecting computer instead of at each individual computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting. The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.

QUESTION 72
A company has client computers that run Windows 8. File History is on. An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History.
What should you do?

A.    Configure the File History advanced settings to include the Archives folder.
B.    From the File History configuration options, change the drive and select the Archives folder.
C.    Create a library named History and add the Archives folder to the library.
D.    Move the Archives folder into the Windows system folder.

Answer: C
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.

QUESTION 73
You have a portable computer that runs Windows 8. You are creating a backup plan.
You have the following requirements:
– Automatically back up the files in your Documents folder every hour.
– Ensure that you can recover different versions of the backed-up files.
– Do not back up the Windows operating system files.
You need to configure the computer to meet the requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Create a volume mount point in your Documents folder.
B.    Connect an external hard drive to the computer.
C.    Schedule a task to create a restore point every hour.
D.    Create a recovery drive on drive C
E.    Turn on File History.

Answer: BE
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx

QUESTION 74
A company has client computers that run Windows 8. Finance department employees store files in the C: \Finance directory. File History on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Set the Protection Settings for drive C to On.
B.    Restore the data files from the Previous
C.    Versions tab located in the folder properties.
D.    Review the File History backup log.
E.    Move the file into a library.

Answer: DE
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup. Since File History is already on we can assume the drive doesn’t need to be changed. So we should review the log and move the file to a library.
Volume shadow copy has been replaced with File History:
http://msdn.microsoft.com/en-us/library/ windows/desktop/hh848072(v=vs.85)

QUESTION 75
You install Windows 8 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app.
You need to remove only the most recently installed third-party desktop app. You start the computer from a system repair disk. Which troubleshooting option should you use?

A.    System Image Recovery
B.    Remove everything and install Windows
C.    System Restore
D.    Refresh your PC without affecting your files

Answer: C

QUESTION 76
All client computers in a company’s network environment run Windows 8. A client computer has two internal hard disk drives. The hard drives are configured as shown in the following table.
Drive  Size       Free space       Type  
———————————————–
C      250 GB      20 GB           Dynamic  
D      500 GB      450 GB           Dynamic  
You are choosing a backup destination for drive C. You have the following requirements:
• Ensure that the backup file is available if drive C fails.
• Ensure that the backup file can be accessed by other computers on the network.
• Support the backup of multiple system images.
You need to select a backup destination that meets the requirements.
Which destination should you select?

A.    shared network folder
B.    drive D
C.    multiple DVDs
D.    external hard drive

Answer: D
Explanation:
Shared network folder will only support one system image:
 clip_image002[10]
That applies to internal / external disks:
 clip_image002[12]
http://windows.microsoft.com/en-us/windows7/Back-up-your-programs-system-settings-and-files
Keeping different versions of system images: If you’re saving your system images on an internal or external drive, or on CDs or DVDs, you can keep several versions of system images. On internal and external hard drives, older system images will be deleted when the drive runs out of space.
Conclusion is to use external HDD and share it over the network.

QUESTION 77
A company has 100 client computers that run Windows Vista. The company uses several custom
applications. The company plans to replace the Windows Vista computers with new computers that run Windows 8. You need to establish which of the currently installed applications will work on Windows 8. What should you do?

A.    Install and run the Windows App Certification Kit.
B.    Install and run the Microsoft Assessment and Planning Toolkit.
C.    Install and run the Microsoft Deployment Toolkit.
D.    Install and run the Windows Application Compatibility Toolkit.

Answer: B
Explanation:
http://technet.microsoft.com/en-us/solutionaccelerators/dd537566.aspx

QUESTION 78
You are in the process of setting up File History on your workstation. You are configuring the Size of offline cache Advanced settings. Which of the following is the default setting?

A.    2%
B.    5%
C.    10%
D.    20%

Answer: B
Explanation:
http://news.softpedia.com/news/Windows-8-Secrets-Incremental-Backup-with-File-History- 299238.shtml
 clip_image002[14]

QUESTION 79
You are in the process of setting up File History on your workstation. You are configuring the Save copies of files Advanced settings.
Which of the following is the default setting?

A.    15 minutes
B.    30 minutes
C.    1 hour
D.    6 hours

Answer: C

QUESTION 80
You are employed as an administrator at contoso.com. The network consists of a single Active Directory Domain Services (AD DS) domain, named contoso.com.
All workstations on the contoso.com network have Windows 8 installed.
You need to configure files history on a client system.
You notice that the free storage space on the selected drive is low, but you do not have a spare drive to replace it. What should you do ?

A.    Configure the save copies of files setting to back up files once a day.
B.    Configure Size of offline cache setting to 2%
C.    Keep saved versions setting to be 1 month
D.    Keep saved versions setting until space is needed

Answer: D

Passing Microsoft 70-687 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-687 Dump:http://www.braindump2go.com/70-687.html

2014 Latest Microsoft 70-687 Exam Dump Free Download!(61-70)

QUESTION 61
You install Windows 8 on a desktop computer. You create a system image and then install third-party desktop apps and create personal data. You disable the creation of restore points. The computer is not running optimally.
You need to remove the third-party applications and preserve files that are stored in your Documents folder. You start the computer from a system repair disk. Which troubleshooting option should you use?

A.    Refresh your PC without affecting your files
B.    System Restore
C.    Remove everything and install Windows
D.    System Image Recovery

Answer: A
Explanation:
Basically the Refresh feature allows you to refresh your Windows 8 installation back to a vanilla, brand new install while preserving all your personal files. Windows 8 also includes a Reset feature which is similar however resetting your install deletes all personal files so don’t select this unless you want a full system wipe.
This is what happens: Your files and personalization settings won’t change. Your PC settings will be changed back to their defaults. Metro-style apps from the Windows store will be
retained.

QUESTION 62
A company has client computers that run Windows 8. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.
You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command line tools should you use? (Each correct answer presents part of the solution. Choose two.)

A.    isoburn
B.    BdeHdCfg
C.    ImageX
D.    bcdboot

Answer: CD
Explanation:
If you get DISM as an additional option in this question, I would select DISM. DISM is already integrated in the Windows 8 OS and it is the newer feature than ImageX. To use ImageX we have to install Windows 8 AIK first.
 clip_image002
 clip_image002[4]

QUESTION 63
A company has client computers that run Windows 8. On all client computers, Internet Explorer has:
– the Display intranet sites in Compatibility View option enabled and
– the Download updated compatibility lists from Microsoft option disabled.
The corporate website was designed for a previous version of Internet Explorer. When viewed on the client computers, menus and image on the corporate website are displayed out of place.
You need to ensure that the corporate website displays correctly on the client computers without negatively impacting the display of any other website. What should you do?

A.    Manually add the corporate website to the compatibility view settings.
B.    Enable the Display all websites in Compatibility View option.
C.    Disable the Display intranet sites in Compatibility View option.
D.    Manually download an updated compatibility list from Microsoft.

Answer: A
Explanation:
 clip_image002[6]

QUESTION 64
You manage client computers that run Windows 7 and Windows 8. You are configuring Windows updates for all client computers.
You have the following requirements: All client computers must use a specific Windows Server Update Services (WSUS) server for updates. All client computers must check for updates each hour.
You need to configure local Group Policy settings to meet the requirements. Which three actions should you perform? (Each answer presents part of the solution. Choose three.)

A.    Configure the Automatic Maintenance Activation Boundary policy setting.
B.    Configure the Automatic Updates detection frequency policy setting.
C.    Enable the Specify intranet Microsoft update service location policy setting.
D.    Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.
E.    Enable the Reschedule Automatic Updates scheduled installations policy setting.

Answer: BCD

QUESTION 65
A company has client computers that run Windows 8.
You need to create a baseline performance report that includes disk status by using the least amount of administrative effort. What should you do?

A.    Start the System Diagnostics Data Collector Set.
B.    Create and start a custom Data Collector Set.
C.    Start the System Performance Data Collector Set.
D.    Add counters to Performance Monitor, and then print the Performance Monitor output.

Answer: A
Explanation:
System Diagnostics and Performance Data Collector Set both deliver the the same, 17 performance counters for disk. Don’t get fooled by the word “Performance Baseline” The System Diagnostics Report includes Basic System Checks (see below), where Disk status is listed. This item does not appear in the System Performance Report.

QUESTION 66
A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption with the data-only option o all client computers.
You need to remove data fragments that exist in the free space on the local computer disk drives, without affecting current user data. Which command should you run on the computers?

A.    BdeHdCfg
B.    diskpart
C.    chkdsk
D.    manage-bde

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/jj647761.aspx
Manage-bde -WipeFreeSpace|-w [<Drive>] [-Cancel] [-computername <Name>] [{-?|/?}] [{-help|-h}] Wipes the free space on the volume removing any data fragments that may have existed in the space. Running this command on a volume that was encrypted using the “Used Space Only” encryption method provides the same level of protection as the “Full Volume Encryption” encryption method.

QUESTION 67
A company has client computers that run Windows 8. Users store data on company-issued USB flash drives. You establish that users are able to store data on personally owned USB flash drives.
You need to ensure that users can save data on company flash drives but not on personal flash drives.
What should you do?

A.    Disable driver signature enforcement.
B.    Run Device Manager as an administrator.
C.    In the local Group Policy, modify the device installation restrictions.
D.    In the system properties for hardware, modify the device installation settings

Answer: C
Explanation:
You could prevent installation of mass storage devices but use the “Allow administrators to override” setting to to ensure an administrator could get the flash drive installed.
 clip_image002[8]

QUESTION 68
A company has 10 client computers that run Windows 8. You are responsible for technical support. You purchase a support tool from the Windows Store while logged in with your Microsoft account. You install the support tool on several client computers. Three months later, you attempt to install the support tool on another client computer. The installation fails.
You need to ensure that you can install the support tool on the client computer.
What should you do?

A.    Log in with your Microsoft account and remove a computer from the Windows Store device list.
B.    On the computer on which you want to install the tool, synchronize the Windows Store application licenses.
C.    Disassociate your Microsoft account from the computer on which you want to install the tool.
Then reassociate your Microsoft account with the computer.
D.    Reset your Microsoft account password.

Answer: A

QUESTION 69
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. A notification appears when domain users change Windows settings and when applications try to make changes to client computers.
You need to ensure that a notification appears only when an application tries to make changes to the computer. What should you do?

A.    Configure the Notification Area Icons settings on the client computers.
B.    Create a Group Policy object (GPO) that enables the Admin Approval Mode for the built-in Administrator
account policy.
C.    Configure the User Account Control (UAC) settings on the client computers.
D.    Create a Group Policy object (GPO) that disables the Run all administrators in Admin Approval Mode policy.

Answer: C

QUESTION 70
A company has a main office and three branch offices. The company has 20 portable computers that run Windows 8. Portable computer users can install local devices while in any branch office. Your manager has instructed you to collect information about faulty devices and drivers within the company’s branch offices.
You need to create a performance report that includes a list of incorrectly installed devices by using the least amount of administrative effort. What should you do?

A.    Add counters from each portable computer to Performance Monitor, and then print the Performance
Monitor output.
B.    Start the System Performance Data Collector Set on each portable computer.
C.    Start the System Diagnostics Data Collector Set on each portable computer.
D.    Create and start a custom Data Collector Set on each portable computer.

Answer: C
Explanation:
System Diagnostics You can use this DCS when troubleshooting reliability problems such as problematic hardware, driver failures, or STOP errors. It logs all the information included in the System Performance DCS, plus detailed system information.
Passing Microsoft 70-687 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-687 Dump:http://www.braindump2go.com/70-687.html

2014 Latest Microsoft 70-687 Exam Dump Free Download!(51-60)

QUESTION 51
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs. Which permission should you grant to the Sales group?

A.    Manage queue
B.    Print
C.    Manage documents
D.    Manage this printer
E.    Manage spooler

Answer: B

QUESTION 52
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows Vista and are members of the domain.
A Group Policy object (GPO) configuring a software restriction policy is implemented in the domain to block a specific application. You upgrade a computer to Windows 8 and implement a GPO that configures an AppLocker rule in the domain. The blocked application runs on the Windows 8 computer but not on the Windows Vista computers.
You need to ensure that the application is blocked from running on all computers and the AppLocker rule is applied to the computers in the domain.
What should you do?

A.    Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
B.    Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
C.    Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
D.    Configure the software restriction policy as a local policy on the Windows 8 computer.
E.    Add the blocked application as a software restriction policy to the GPO that configures AppLocker.

Answer: A

QUESTION 53
A company has an Active Directory Domain Services (AD DS) domain. Client computers in the Test department run Windows 8 and are connected to the domain.
You need to ensure that Windows updates are not automatically applied and cannot be enabled by users. What should you do?

A.    Create a Group Policy object (GPO) to enable the Turn on recommended updates via Automatic
Updates policy setting.
B.    Configure Windows Update to install updates automatically.
C.    Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update
features policy setting.
D.    Create a Group Policy object (GPO) to configure the Configure Automatic Updates policy setting.

Answer: C
Explanation:
Remove access to use all Windows Update features:
This Group Policy setting is located in User Configuration\Administrative Templates\Windows Components\Windows Update.
When you enable this setting, the operating system cannot be updated through Windows Update, and Automatic Updates is disabled. Users or administrators can still perform actions such as clicking the Windows Update option on the Start menu, and the Windows Update Web site will appear in the browser. However, it will not be possible to update the operating system through Windows Update, regardless of the type of account being used to log on.

QUESTION 54
A company has 100 client computers that run Windows 8.
You need to assign static IPv6 addresses to the client computers.
Which Windows Powershell cmdlet should you run?

A.    Set-NetTCPSetting
B.    Set-NetIPInterface
C.    Set-NetlPv6Protocol
D.    Set-NetIPAddress

Answer: D
Explanation:
Modifies IP address configuration properties of an existing IP address.

QUESTION 55
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain. All Sales department employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers.
You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run.
You need to quickly ensure that the application can run.
What should you do?

A.    Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
B.    Configure the AppLocker properties to enforce rules.
C.    Run the gpupdate /force command.
D.    Create a new AppLocker file hash condition.

Answer: C

QUESTION 56
You administer Windows 8 laptops in your company network. You install several custom desktop
applications on the laptops. You need to create a custom recovery image for Windows to use when selecting the Refresh your PC option. The custom recovery image must include the custom desktop applications.
Which command should you use to create the custom recovery image?

A.    Recdisc.exe
B.    Recover.exe
C.    Recimg.exe
D.    RecoveryDrive.exe

Answer: A

QUESTION 57
You administer Windows 8 client computers in your company network. A computer that is used by non-administrator users has a directory named C:\Folder1.
A shared collection of Microsoft Excel files is stored in the C:\Folder directory, with non-administrator users being granted modify permissions to the directory.
You discover that some files have been incorrectly modified by a user.
You need to determine which user made changes to the directory’s folder’s files.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit
Policy \Audit object access to Failure.
B.    From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure
for the Modify permission.
C.    From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success
for the Modify permission.
D.    Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit
Policy \Audit object access to Success.

Answer: CD
Explanation:
We must audit for success, as we want to know which user has modified the file.

QUESTION 58
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Portable client computers no longer connect to the corporate wireless network.
You need to ensure that when the corporate wireless network is available, the computers always connect to it automatically. Which two actions would achieve the goal? (Each correct answer presents a complete solution.
Choose two.)

A.    Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the
organizational unit that contains the computers.
B.    Configure the corporate wireless network as an unmetered network.
C.    Configure the corporate wireless network as a preferred network.
D.    Manually connect to the corporate wireless network and select the option to connect automatically
to that network.

Answer: CD

QUESTION 59
A company has client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. Which setting should you configure on the home computers?

A.    Virtual Private Network connection
B.    Remote Desktop local resources
C.    DirectAccess connection
D.    Remote Desktop Gateway IP address

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/cc731435.aspx
Remote Desktop Gateway allows a home computer to remote into the work computer. The Work computer can access corporate network resources, just as if the worker was at the workstation, but the HOME COMPUTER cannot access corporate resources.
RD RAPs will enable us to control remote user access to internal network resources. With RD CAPs we can control which Users or Computers can connect via RDP.
VPN provides the HOME computer with an IP Address directly of the Corporate private network, giving the HOME computer access to the corporate private resources

QUESTION 60
A company has 100 client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. What should you do?

A.    Configure a Virtual Private Network connection.
B.    Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection
settings on each client.
C.    Configure the local resource settings of the Remote Desktop connection.
D.    Configure a DirectAccess connection.

Answer: B
Explanation:
While connecting the computers you will find a couple of options related to VPN and
Desktop Assistance.
See Understanding Authorization Policies for Remote Desktop Gateway:
http://technet.microsoft.com/en-us/library/cc731435.aspx
RD RAPs will enable us to control remote user access to internal network resources.
With RD CAPs we can control which Users or Computers can connect via RDP.
Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop
Connection settings on each client.
 clip_image001
DirectAccess is for Windows Server 2008/2012/Win 7 Ultimate/Enterprise/Win 8 Enterprise
only.
RD Gateway setup is only for servers.
Create VPN through manage networks. File -> Allow incoming connections.
Connect through Internet and create VPN which will allow one computer at a time to view
the hosts resources, and only the hosts resources unlike standard VPNs.

Passing Microsoft 70-687 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-687 Dump:http://www.braindump2go.com/70-687.html

2014 Latest Microsoft 70-416 Exam Dumps Free Download(61-70)!

QUESTION 61
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft Application Virtualization (App-V) 5.0 infrastructure. You package two complex applications named App1 and App2. You create a connection group that contains App1 and App2. You discover that App2 overwrites some of the registry settings used by App1. You need to recommend a solution for the deployment of App1 and App2 to meet the following requirements:
Prevent App2 from overwriting the registry settings of Appl.
Ensure that App1 and App2 can share information.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.

A.    Change the order of packages in the package library.
B.    Modify the PackageId of App1.
C.    Change the order of packages in the connection group.
D.    Create a single package that contains App1 and App2.
E.    Modify the VersionId of App1.

Answer: C
Explanation:
http://blogs.technet.com/b/appv/archive/2012/11/06/deploying-connection-groups-app-v-5-0.aspx
Note: The order of packages in the connection group is important. This determines the order in which the package contents are merged. So, in the following case, if there was a conflict (example: same registry value), the content of the “App1” package would be used.

QUESTION 62
Your network contains an Active Directory domain named contoso.com. The domain contains an application virtualization infrastructure. The infrastructure contains three servers. The servers are configured as shown in the following table.
 clip_image001[6]
You discover that it can take up to 10 minutes for newly published packages to be available from client computers. You need to recommend a solution to ensure that App-V 5.0 packages are available to the client computers within two minutes of being published. What should you include in the recommendation?

A.    Modifications to the Web.config file stored on Server1
B.    A scheduled task that runs the Get-AppVServerPackage cmdlet on Server1
C.    A scheduled task that runs the Get-AppVServerPackage cmdlet on Server2
D.    Modifications to the Web.config file stored on Server2

Answer: D

QUESTION 63
Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. You deploy a Microsoft Application Virtualization (App-V) infrastructure. You need to ensure that users can run the App-V applications that are published on the App-V publishing servers. What should you install on the client computers? (Each correct answer presents part of the solution.
Choose all that apply.)

A.    Windows Installer 4.5
B.    Windows Communication Foundation HTTP Activation
C.    App-V 5.0 Beta client
D.    Microsoft .NET Framework 4

Answer: CD
Explanation:
http://technet.microsoft.com/en-us/library/jj713458.aspx

QUESTION 64
Drag and Drop Question
Your company has three offices named Office1, Office2, and Main1. The offices do not have a network connection to each other. The offices are configured as shown in the following table.
 clip_image001[8]
You plan to deploy Microsoft Application Visualization (App-V) 5.0 to the network. Only Mainl requires App-V streaming. You need to identify the appropriate App-V infrastructure model for each office. Which infrastructure model should you identify? To answer, drag the appropriate infrastructure model to the correct requirement in the answer are a. Each infrastructure model may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
 clip_image001[10]
Answer:
 clip_image001[12]
Explanation:
Main1: Full Infrastructure The Full Infrastructure Model provides for built-in software distribution, management, and reporting capabilities; it also includes the streaming of applications. Office1: Standalone The Standalone Model allows virtual applications to be Windows Installer- enabled for distribution without streaming.
Office2: Standalone The Standalone Model allows virtual applications to be Windows Installer- enabled for distribution without streaming.
Note:
* The three models for distribution are:
1)Standalone Model. The Standalone Model allows virtual applications to be Windows Installerenabled for distribution without streaming.
2)Streaming Model. The Streaming Model offers application streaming without requiring Active Directory or a database; it enables administrators to stream from existing servers or via System Center Configuration Manager 2007 SP1 with R2 distribution points.
3)Full Infrastructure Model. The Full Infrastructure Model provides for built-in software distribution, management, and reporting capabilities; it also includes the streaming of applications. All models require a Microsoft Application Virtualization client to be installed on the workstation or RD Session Host server. More details on each of the options are given below.
* The following roles, while required, are not covered in detail since they have no significant infrastructure architecture discussion requirements:
Active Directory Domain Services, for user authentication and application security management. A client or server running the Microsoft Application Virtualization Management Console.
A sequencer for creating the virtualized application packages. Since the application packages can be shared between instances, not all instances require a sequencer.
App-V client installed on systems that require application virtualization: desktops, virtual machines (VMs), or RD Session Host servers.

QUESTION 65
Your network contains an Active Directory domain named contoso.com. You plan to deploy a Microsoft Application Virtualization (App-V) 5.0 infrastructure. You need to recommend a solution to manage the App-V client settings. What should you include in the recommendation?

A.    Deploy Microsoft System Center 2012 App Controller, and then deploy a service template.
B.    Deploy Microsoft System Center 2012 Virtual Machine Manager (VMM), and then deploy a service template.
C.    Copy Appxpackagemanager.admx and Appxpackagemanager.adml to a domain controller, and then
create a Group Policy object (GPO).
D.    Copy Appv.admx and Appv.adml to a domain controller, and then create a Group Policy object (GPO).

Answer: D

QUESTION 66
Your network contains client computers that run Windows 8. An administrator deploys a Group Policy object (GPO) that disables the following:
•    Desktop gadgets
•    Microsoft accounts
•    User Account Control (UAC)
•    The Program Compatibility Assistant
You discover that Windows Store applications cannot run on the client computers that are targeted by the new GPO. You verify that non-Windows Store applications run successfully. You need to ensure that all of the applications start correctly on the client computers that are targeted by the GPO.
What should you enable in the GPO?

A.    Microsoft accounts
B.    The Program Compatibility Assistant
C.    UAC
D.    Desktop gadgets

Answer: C

QUESTION 67
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. Server1 and Server2 have the Hyper-V server role installed. Server2 is configured as Hyper-V replica of Server1. Server1 hosts two virtual desktops named VM1 and VM2. VM1 and VM2 are replicated to Server2. VM1 and VM2 host a distributed application named Appl. App1 has its own authentication mechanism. You need to verify whether the replicated virtual machines are configured properly. The solution must maintain the availability
of App1. Which three actions should you perform? To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 clip_image002[6]
Answer:
 clip_image002[8]

QUESTION 68
Your network contains an Active Directory domain named contoso.com. The domain contains three member servers named Server1, Server2, and Server3. Server1, Server2, and Server3 have the Hyper-V server role installed. Server3 is located in a disaster recovery datacenter. Server1 and Server2 are members of a failover cluster named Cluster1. Cluster1 has the Hyper-V Replica Broker failover clustering role installed. You name the role Broker1. You plan to use Server3 as a Hyper-V replica for the virtual machines hosted in Cluster1. The replication of the virtual machines to Server3 must be encrypted. You need to identify which certificate must be purchased to implement the planned Hyper-V replicas. Which certificate should you identify? More than one answer choice may achieve the goal. Select the BEST answer.

A.    A certificate that contains clusterl.contoso.com as the subject name
B.    A certificate that contains Server1.contoso.com as the subject name and server2.contoso.com as
a Subject Alternative Name
C.    A certificate that contains brokeri.contoso.com as the subject name
D.    A certificate that contains contoso.com as the subject name

Answer: C

QUESTION 69
Your company has a main office and 20 branch offices. The main office contains 1,000 users. Each branch office contains 300 users. All of the branch offices connect to the main office by using a WAN link. Each office contains several servers that run Windows Server 2012. All of the servers are configured as virtual machines that are hosted on Hyper-V hosts. You deploy a Microsoft Application Virtualization (App-V) infrastructure. The infrastructure contains six servers located in the main office. The servers are configured as shown in the following table.
 clip_image001[14]
You need to recommend a solution to ensure that the App-V clients in the branch offices can download packages if a WAN link fails. What should you include in the recommendation?

A.    Create a Hyper-V replica of Server1 in each branch office, and then configure a BranchCache server
in each office.
B.    Create a Hyper-V replica of Server3 in each branch office, and then configure a BranchCache server
in each office.
C.    Replicate the content share by using Distributed File System (DFS) Replication, and then deploy a
publishing server in each branch office.
D.    Replicate the content share by using Distributed File System (DFS) Replication, and then deploy a
management server in each branch office.

Answer: C

QUESTION 70
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. You use Microsoft Application Virtualization (App-V) 5.0 to package and deploy applications to the network. You need to deploy an application named App1. The solution must ensure that an add-on for App1 is also installed. Which five actions should you perform? To answer, move the five appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 clip_image002[10]
Answer:
  clip_image002[12]
Explanation:
Box 1: Sequence App1
First sequence the application.
Box 2: Sequence the add-on
Then sequence the add-on.
Box 3: Add the packages to the publishing server.
Box 4: Create a connection group.
App1 and the add-on are added to the connection group.
Box 5: Publish the connection group.
Note:
* At a high level, virtual applications management with Configuration Manager requires sequencing applications, distributing virtual applications to end-users and client devices using Configuration Manager deployments, and finally, publishing those applications for use.
* Connection Groups group one or more App-V packages to enable member applications in these packages to interact with one another while maintaining isolation from the rest of the system. This gives sequencing engineers the flexibility to maintain packages independently and removes the redundancy of adding the same application several times onto a machine.
* The Microsoft Application Virtualization (App-V) 5.0 Sequencer enables you to create the following three types of virtualized application packages:
Standard application
Add-on or plug-in
Middleware
Passing Microsoft 70-416 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-416 Dump: http://www.braindump2go.com/70-416.html

2014 Latest Microsoft 70-416 Exam Dumps Free Download(51-60)!

QUESTION 51
You need to deploy App1 and App2 to the RD Session Host servers. The solution must meet the application requirements. What should you do first?

A.    Install Microsoft Silverlight.
B.    Install the Windows Internal Database feature.
C.    Install the Quality Windows Audio Video feature
D.    Install the App-V Remote Desktop Services client.

Answer: D

QUESTION 52
You need to monitor the usage of the APP-V applications. The Solution must meet the application requirements. What should you do?

A.    On the App-V management servers, run Update-AppvrServerConnectionGroup.
B.    On the App-V publisihing servers, run Set-AppvPublishingServer.
C.    On the clients computers, run Publish-AppVClientPackages.
D.    On the client computers, run Set-AppvClientConfiguration.

Answer: D

QUESTION 53
Your network contains an Active Directory domain named contoso.com. Client computers run either Windows 7 or Windows 8. You plan to replace the client computers that run Windows 7. You need to migrate the application settings and the configurations from the client computers that run Windows 7 to the client computers that run Windows 8. What should you do?

A.    On the client computers that run Windows 7, run loadstate.exe.
On the client computers that run Windows 8, run scanstate.exe.
B.    On the client computers that run Windows 7, run scanstate.exe.
On the client computers that run Windows 8, run loadstate.exe.
C.    On a server that runs Windows Server 2012, install the Windows Server Migration Tools.
Run the Export-SmigServerSetting cmdlet and the Import-SmigServerSetting cmdlet.
D.    On a server that runs Windows Server 2012, install the Windows Server Migration Tools.
Run the Send-SmigServerData cmdlet and the Receive-SmigServerData cmdlet.

Answer: B

QUESTION 54
Your network contains an Active Directory domain named contoso.com. All client computers are configured to download Windows updates from a server that runs Windows Server Update Services (WSUS). Microsoft Office 2010 is deployed to the client computers. You need to configure WSUS to update Office 2010 automatically on the client computers. What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

A.    From the Update Services console, modify the Products and Classifications settings.
B.    From the Update Services console, create an update rule.
C.    From the Update Services console, modify the update Files settings.
D.    From the Group Policy Management console, modify the Default Domain Controllers Policy.
E.    From the Group Policy Management console, modify the Default Domain Policy.

Answer: AB
Explanation:
Products and Classifications settings allows you to choose to update Office
The update rule allows you to set it to update automatically for updates to Office (Default is critical and security updates)
Since WSUS is already being used by client machines to update, there is no reason to modify any GPO.

QUESTION 55
Your company has offices in France and England. The network contains an Active Directory domain named contoso.com. You plan to deploy Microsoft Word 2010 to all users by using Group Policy objects (GPOs). The users in the office in France must receive a version of Word that contains custom options. You need to recommend a solution for the planned deployment of Word. What should you include in the recommendation?

A.    Application control policies
B.    A Windows Installer transform (.mst) file
C.    Software restriction policies
D.    A Windows Installer patch (.msp) file

Answer: B

QUESTION 56
Your network contains an Active Directory domain named contoso.com. The domain contains five servers that run Windows Server 2012 and 500 client computers that run Windows 7. You deploy five third-party applications named App1, App2, App3, App4, and App5 to 50 of the client computers. You need to recommend an application update solution for the third-party applications. The solution must ensure that an administrator can generate reports that contain installation information. What should you recommend implementing? More than one answer choice may achieve the goal. Select the BEST answer.

A.    Windows Server Update Services (WSUS)
B.    Windows Intune
C.    Assigned applications by using Group Policy
D.    Microsoft System Center 2012 Configuration Manager

Answer: D

QUESTION 57
You plan to deploy three Remote Desktop Gateway (RD Gateway) servers. You need to recommend a solution to ensure that if a single RD Gateway server fails, users can continue to access resources through the other RD Gateway servers. What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.

A.    Network Load Balancing (NLB)
B.    Hyper-V replicas
C.    Failover Clustering
D.    DNS round robin

Answer: A

QUESTION 58
Your network contains an Active Directory domain named contoso.com. The domain contains multiple servers that run Windows Server 2012. All of the servers run as virtual machines on Hyper-V hosts. The network contains a Remote Desktop Services (RDS) infrastructure. The infrastructure contains four servers. The servers are configured as shown in the following table.
 clip_image001
You publish a RemoteApp program named App1. App1 is accessed from client computers by using a web browser. You need to recommend changes to the RDS infrastructure to meet the following requirements:
App1 must be available from a web browser if Server3 fails. The connection requests for App1 must be distributed evenly between Server3 and Server4. What should you recommend adding to the RDS infrastructure?

A.    A replica of Server3 and Server4 on another Hyper-v host
B.    A Network Load Balancing (NLB) cluster that contains Server3 and Server4
C.    A failover cluster that contains Server3 and Server4
D.    An additional Remote Desktop Connection Broker (RD Connection Broker)

Answer: B

QUESTION 59
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4. The domain contains a RemoteApp farm. You install the Remote Desktop Connection Broker role service on Server1 and Server2. You need to recommend a Remote Desktop solution to ensure that users can reconnect to existing sessions if a single server fails. What should you recommend deploying on Server3 and Server4? To answer, drag the appropriate software to the correct server in the answer are a. Each software may be used once, more than once, or not at all. Additionally, you may need to drag the split bar between panes or scroll to view content.
 clip_image002
Answer:
 clip_image002[4]

QUESTION 60
You are an enterprise administrator for your company, which is named Contoso, Ltd. You plan to publish applications to virtual desktops by using Microsoft Application Virtualization (App-V) 5.0. You need to recommend a solution to prevent the virtual desktops from caching App- V 5.0 packages to disk. What should you include in the recommendation?

A.    Dynamic Memory
B.    Non-uniform memory access (NUMA)
C.    A dynamic user configuration file
D.    Shared Content Store Mode

Answer: D
Passing Microsoft 70-416 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-416 Dump: http://www.braindump2go.com/70-416.html

2014 Latest Microsoft 70-415 Exam Dump Free Download(91-100)!

QUESTION 91
Your network contains an Active Directory domain named contoso.com The domain contains a Virtual Desktop Infrastructure (VDI) You plan to create a new virtual desktop collection that will contain 500 virtual desktops Each virtual desktop will be assigned to a specific user All of the virtual desktops will be based on the same virtual machine template You need to recommend the configurationfor the virtual desktop collection
Which configuration should you recommend?

A.    a managed personal virtual desktop collection
B.    a managed pooled virtual desktop collection
C.    an unmanaged personal virtual desktop collection
D.    an unmanaged pooled virtual desktop collection

Answer: A

QUESTION 92
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has Microsoft System Center 2012 Configuration Manager installed. All client computers run Windows 8 and support Wake on LAN. You plan to implement a software updates infrastructure to support updating the Windows 8 client computers.
You need to meet the following requirements:
Ensure that the updates are not applied during business hours. Ensure that the updates are installed at 03:00 each day, even if the client computers are turned off. What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

A.    Add the Out of band service point Configuration Manager system role to Server1.
B.    Create and link a Group Policy object (GPO) to the domain and configure the Automatic Updates
settings in the GPO.
C.    Install and configure Windows Server Update Services (WSUS) on Server1.
D.    Add the Software update point Configuration Manager system role to Server1.
E.    Install and configure System Center Updates Publisher 2011 on Server1.

Answer: CD
Explanation:
CD: The software update point in Microsoft System Center Configuration Manager 2007 is a required component of software updates and is installed as a site system role in the Configuration Manager console. The software update point site system role must be created on a site system server that has Microsoft Windows Server Update Services (WSUS) 3.0 installed.

QUESTION 93
Your network contains an Active Directory domain named contoso.com The domain contains a server named Gateway1 that has the Remote Desktop Gateway role service installed You need to ensure that all of the users who connect to the Remote Desktop Session Host (RD Session Host) servers by using Gateway1 receive a custom logon message The solution must prevent the message from appearing then the users connect to the RD Session Hosts servers directly
What should you configure from Remote Desktop Gateway Manager

A.    the properties of Gateway1
B.    the RD Gateway-managed computer groups
C.    the Remote Desktop connection authorization policies (RD CAPs)
D.    the Remote Desktop resource authorization policies (RD RAPs)

Answer: A

QUESTION 94
Your network contains an Active Directory domain named contoso.com. The domain has Microsoft System Center 2012 Configuration Manager deployed. All client computers run Windows XP. Your company plans to replace all of the client computers with new computers that run Windows 8. You need to recommend which Configuration Manager system role must be deployed to capture the local application data from the Windows XP computers, and then deploy the local application data to the Windows 8 computers. Which system role should you recommend? To answer, select the appropriate system role in the answer area.
 clip_image001[1]
Answer:
 clip_image001[3]

QUESTION 95
Your network contains an Active Directory domain named contoso.com. You have an image of Windows 8 Enterprise that you plan to use as a template to provision new client computers. You have an internally developed Windows Store line-of-business application named App1 that must be added to the image.
You need to include App1 in the image. The solution must ensure that users can run Appl after the image is deployed to their desktop computer. What should you do before adding App1 to the image? (Each correct answer presents part of the solution. Choose all that apply.)

A.    Join the users’ computers to the domain.
B.    Create an XAP file for Appl.
C.    Create a Windows Installer package for App1.
D.    Sign the application by using a trusted certificate.
E.    Modify the AllowAllTrustedApps registry value.

Answer: ADE
Explanation:
A:
*You must join the device running Windows 8 Enterprise or Windows Server 2012 to an Active Directory domain that has the Allow all trusted applications to install Group Policy setting enabled.
*Setting the Group Policy to allow trusted applications updates the following registry setting:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Appx\AllowAllTrustedApps = 1
D:You can install LOB Windows Store apps that are not signed by the Windows Store. The apps must be cryptographically signed and can only be installed on a computer that trusts the signing certificate.
E:
Note:
*You can addline-of-business (LOB) WindowsStore apps to a Windows?image by using Windows PowerShell?or the Deployment Image Servicing and Management (DISM) platform. Windows Store apps are a new type of application that runs on Windows 8 devices. These apps are based on the Windows Runtime API and differ from traditional desktop apps in their design and in the way users can interact with them on Windows 8 devices.

QUESTION 96
Your network contains a Virtual Desktop Infrastructure (VDI). You have a virtual machine named VM1 that will be used as a virtual machine template. You need to enable RemoteFX video support on VM1. From which node should you perform the configuration? To answer, select the appropriate node in the answer area.

 clip_image002[1]
Answer:

clip_image002[3]

QUESTION 97
Your network contains an Active Directory domain named contoso.com. The domain contains a Virtual Desktop Infrastructure (VDI) and pooled virtual desktops. Users start virtual desktop sessions by using Remote Desktop Web Access (RD Web Access). Some users access virtual desktops by using a Remote Desktop Gateway (RD Gateway). You need to identify which users are connected currently to the virtual desktops. Which tool should you use?
To answer, select the appropriate tool in the answer area.

 clip_image001[5]
Answer:
 clip_image001[7]

QUESTION 98
Your network contains an Active Directory domain named contoso.com. The domain contains a server named SRV1 that runs Windows Server 2012. SRV1 has the Windows Server Updates Services (WSUS) server role installed.
You deploy Microsoft System Center 2012 Virtual Machine Manager (VMM). You plan to use WSUS to manage updates for the virtualization infrastructure. You need to integrate WSUS and VMM to manage the updates. What should you configure from the Virtual Machine Manager console? To answer, select the appropriate object in the answer area.
 clip_image002[5]
Answer:
 clip_image002[7]

QUESTION 99
Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012. Server1 has the Windows Deployment Services server role and the Microsoft Deployment Toolkit (MDT) installed. Server2 has Windows Server Update Services (WSUS) installed. You have an image of Windows 8 that is deployed by using MDT 2012. You plan to deploy a new hardware device to all new client computers. The new hardware requires additional device drivers that are unavailable from Microsoft Update. You need to add the hardware drivers to the Windows 8 image. What should you do?

A.    From Server1, add the new drivers to Deployment Workbench, and then create a task sequence.
B.    From Server1, install the Windows Internal Database, and then copy the drivers to
C:\Windows\System32\DriverStore\Temp.
C.    From Server1, mount the image, and then run the Add-WindowsPackage cmdlet.
D.    From Server2, copy the drivers to the Inventory folder.

Answer: C
Explanation:
* Add-WindowsPackage
Adds a single .cab or .msu file to a Windows image

QUESTION 100
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that has Microsoft System Center 2012 Configuration Manager installed. You have a client computer named Computer1 that runs Windows 8. Computer1 is a Configuration Manager client. You plan to use Computer1 as a reference computer, and then to deploy an image of the reference computer to the network. You need to recommend which task must be performed before you capture the image. What should you recommend?

A.    From Computer1, uninstall the Configuration Manager client.
B.    From Server1, create a build and capture a task sequence by using the Configuration Manager console.
C.    From Server1, add a capture image by using the Windows Deployment Services console.
D.    From Computer1, run sysprep.exe /generalize.

Answer: D
Explanation:
This is asking: You need to recommend which task must be performed before you capture the image Hence: From Computer1, run sysprep.exe /generalize

Passing Microsoft 70-415 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-415 Dump:http://www.braindump2go.com/70-415.html

2014 Latest Microsoft 70-415 Exam Dump Free Download(81-90)!

QUESTION 81
Your network contains an Active Directory domain named contoso.com. The domain has Remote Desktop Services (RDS) deployes The deployment contains two Remote Desktop Web Access (RD Web Access) servers named Server1 and Server2 You need to implement a solution to ensure that users can access RD Web Access if a single RD Web Access server fails
Which solution should you implement?

A.    Failover Clustering
B.    Multipath I/O (MPIO)
C.    DNS Round Robin
D.    Network Load Balancer (NLB)

Answer: D
Explanation:
http://blogs.technet.com/b/marobbin2/archive/2012/10/10/configuring-a-windows-2012-rdg- nlb-cluster.aspx

QUESTION 82
Your network contains an Active Directory domain named contoso.com You plan to deploy personal virtual desktops You create a standard desktop that contains multiple desktop shortcuts to line-of-business applications Administrators frequently update the desktop shortcuts You need to recommend a solution to prevent users from modifying the desktop shortcuts and from adding additional files to the desktop
What should you include in the recommendation?

A.    mandatory profiles
B.    Folder Redirection and NTFS permissions
C.    roaming profiles and NTFS permissions
D.    user profile disks

Answer: B

QUESTION 83
Your network contains an Active Directory domain named contoso.com The domain contains a server named Server1 that has Microsoft System Center 2012 Configuration Manager installed You have a client computer named computer1 that runs Windows 8. Computer1 is a Configuration Manager client You plan to use Computer1 as a reference computer, and then to deploy an image of the reference computer to the network You need to recommend which task must be performed before you capture the image
What should you recommend?

A.    From Server1, add a capture image by using the Windows Deployment Services console
B.    From Server1, create a build and capture a task sequence by using the Configuration Manager console
C.    From Computer1, uninstall the Configuration Manager client
D.    From Computer1, run sysprep.exe /generalize

Answer: D

QUESTION 84
Your network contains a Remote Desktop Services (RDS) session collection that is used by all users. Users in the sales department access the session collection by using a Remote Desktop Gateway (RD Gateway) server. Sales users ofter establish Remote Desktop connections to the internal network from offices. You need to prevent the sales users from copying files to the computers at their customers offices during the Remote Desktop sessions.
What should you configure?

A.    the Remote Desktop resource authorization policies (RD RAPs) from Remote Desktop Gateway Manager
B.    the Remote Desktop connection authorization policies (RD CAPs) from Remote Desktop Gateway Manager
C.    a Group Policy object (GPO) linked to the organizational unit (OU) that contains the sales user accounts
D.    a Group Policy object (GPO) linked to the organizational unit (OU) that contains the Remote Desktop Session Host (RD Session Host) server accounts
E.    the properties of the collection from the Remote Desktop Services node in Server Manager

Answer: B

QUESTION 85
Your network contains an Active Directory domain named contoso.com. You have an image of Windows 8 Enterprise that you plan to use as a template to provision new client computers. You have an internally developed Windows Store line-of-business application named App1 that must be added to the image You need to include App1 in the image. The solution must ensure that users can run App1 after the image is deployed to their desktop computer.
What should you do before adding App1 to the image?

A.    Join the users
B.    Modify the AllowAllTrustedApps registry value
C.    Sign the application by using a trusted certificate computers to the domain
D.    Create an XAP file for App1
E.    Create a Windows Installer package for App1

Answer: ABC

QUESTION 86
Your network contains a Remote Desktop Services (RDS) session collection named Collection1 You need to configure which users can connect to the Remote Desktop Session Host (RD Session Host) servers in Collection1
What should you configure from the properties of Collection1?

A.    Connections
B.    Security
C.    Client Settings
D.    User Groups

Answer: D
Explanation:
Remote Desktop Services accelerates and extends desktop and application deployments to any device, improving remote worker efficiency, while helping to keep critical intellectual property secure and simplify regulatory compliance. Remote Desktop Services enables virtual desktop infrastructure (VDI), session-based desktops, and applications, allowing users to work anywhere.
Remote Desktop Services (RDS) – Session Collection There are basically two types of RDS collections, Virtual Machine and Session.
-A Virtual Desktop collection deals with managing pools of VM desktops that can be made available to users (or they can also be dedicated to specific users).
-A Session collection is the old Terminal Services model. In Windows Server 2008 R2, the RemoteApp feature was introduced which allowed for seamless published applications. RemoteApp is also part of RDS in 2012 (but much easier to manage).

QUESTION 87
Drag and Drop Question
Your network contains an Active Directory domain named contoso.com The domain contains three servers that are part of a Remote Desktop Services (RDS) deployment The servers are configured as shown in the following table:
  clip_image001
You install a server named Server4 that runs Windows Server 2012. You need to configure Server4 as a Remote Desktop Gateway (RD Gateway) server. The solution must ensure that a third-party certificate is used to encrypt connections to Server4. Which three actions should you perform from Server Manager on Server4? (To answer, move the appropiate actions from the list of actions to the answer area and arrange them in the correct order)
  clip_image002
Answer:
  clip_image002[4]
Explanation:
Box 1:Add an RD Gateway server to the RDS deployment.
Box 2: Add Server 3 to server pool.
Box 3: Select the third-party certificate.
Note:
* To configure RD Gateway settings
1. On the RD Connection Broker server, open Remote Desktop Connection Manager. To open Remote Desktop Connection Manager, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click Remote Desktop Connection Manager.
2. (box 2) In the left pane, click RD Virtualization Host Servers, and then on the Action menu, click Properties.
3. In the Virtual Desktops Properties dialog box, on the RD Gateway Settings tab, configure the desired RD Gateway behavior. You can configure whether to automatically detect RD Gateway server settings, to use RD Gateway server settings that you specify, or to not use an RD Gateway server.
If you select Automatically detect RD Gateway server settings, the client tries to use Group Policy settings to determine the behavior of client connections to RD Gateway. If you select Use these RD Gateway server settings, do the following:
(box 3)The server name must match what is specified in the Secure Sockets Layer (SSL) certificate for the RD Gateway server.
Etc
*The server name must match what is specified in the Secure Sockets Layer (SSL) certificate for the RD Gateway server.
*You can specify whether users connect to virtual desktops by using Remote Desktop Gateway (RD Gateway). These settings are applied when a user connects to a virtual desktop pool or a personal virtual desktop through RemoteApp and Desktop Connection. The RD Gateway settings apply to both virtual desktop pools and personal virtual desktops.

QUESTION 88
Your network contains an Active Directory domain named contoso.com The domain contains a server named Server1 that is a part of a Remote Desktop Servcices (RDS) deployment The computer account of Server1 is in an organizational unit (OU) named Servers All of the client computers are in an OU named OU1 Server1 has a session collection named Collection1 that contains multiple RemoteApp programs.
You need to prevent users from using printer redirection when they connect to Server1 by using the Remote Desktop client
What should you do?

A.    Link a Group Policy object (GPO) to Servers. Configure the User Configuration settings of the GPO
B.    Link a Group Policy object (GPO) to the Domain Controllers OU. Configure the Computer Configuration settings of the GPO
C.    Link a Group Policy object (GPO) to Servers. Configure the Computer Configuration settings of the GPO
D.    Link a Group Policy object (GPO) to OU1. Configure the User Configuration settings of the GPO

Answer: C

QUESTION 89
Your network contains an Active Directory domain named contoso.com The domain contains two server named Server1 and Server2 that run Windows Server 2012 Server1 has the Windows Deployment Services server role and the Microsoft Deployment Toolkit (MDT) installed Server2 has Windows Server Update Services (WSUS) installed You have an image of Windows 8 that is deployed by using MDT 2012 You plan to deploy a new hardware device to all new client computers The new hardware requires additional device drivers that are unavailable from Microsoft Update You need to add the hardware drivers to the Windows 8 image
What should you do?

A.    From Server1, mount the image, and then run the Add-WindowsPackage cmdlet
B.    From Server1, install the Windows Internal Database, and then copy the drivers to C:\Windows \System32\DriverStore\Temp
C.    From Server2, copy the drivers to the Selfupdate folder
D.    From Server2, copy the drivers to the Inventory folder
E.    From Server1, add the new drivers to Deployment Workbench, and then create a task squence
F.    From Server1, mound the image and then run the Add-Drivers cmdlet
G.    From Server1, add the new drivers to Deployment Workbench and the create a selection profile
H.    From Server1, install Microsoft SQL Server 2012 Express and then copy the drivers to C:\Windows \System32\DriverStore

Answer: E

QUESTION 90
Your network contains a Virtual Desktop Infrastructure (VDI). The VDI contains four servers. The servers are configured as shown in the following table.
  clip_image001[4]
You create a virtual desktop collection. The virtual desktop collection supports 100 users. You need to identify how much processor time each virtual machine consumes. Which performance object should you monitor on Server1?

A.    Hyper-V Hypervisor Virtual Processor
B.    Terminal Services Session
C.    Processor
D.    Hyper-V Hypervisor Logical Processor

Answer: A
Explanation:
For a Hyper-V virtual machine, you cannot view the traditional % Processor Time metric to get a good understanding of that VM’s processing. Instead, the counter you’ll want to monitor is Hyper-V Hypervisor Virtual Processor \ % Guest Run Time (instanceName). This counter can be considered to be equivalent to % Processor Time, but for a specific VM as defined by its instance name.
While similar in name, this counter is different than Hyper-V Hypervisor Logical Processor. Whereas Hyper-V considers a “Virtual Processor” to be one that has been assigned as part of a VM’s configuration, a “Logical Processor” represents the total number of processors on a host system that are managed by Hyper-V. You get this number by multiplying the number of cores times sockets, doubling the result if hyperthreading is enabled.

Passing Microsoft 70-415 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-415 Dump:http://www.braindump2go.com/70-415.html

2014 Latest Microsoft 70-416 Exam Dumps Free Download(41-50)!

Case Study: 2 – A.Datum Corporation (Question 41 – Question 52)
Overview
A.Datum Corporation is a geological research company. The company has a main office and a branch office. The main office is located in Seattle. The branch office is located in Miami. Users in the research department work in the Miami office.
Existing Environment
Active Directory
The network contains a single-domain Active Directory forest named adatum.com. Network Infrastructure. The relevant servers on the network are configured as shown in the following table.
 clip_image001[4]
Content on SRV-FS1 and SRV-FS2 is replicated by using Distributed File System (DFS) Replication. All shared content is accessible through the UNC path of \\contoso.com\shared\data. All client computers run Windows XP. All of the client computers have Microsoft Office 2007 installed. All applications are installed locally on the client computers. The Miami office connects to the Seattle office by using a site-to-site VPN connection. Research users in the Miami office use two applications named App1 and App2. The research users are divided into two groups named Adatum\ResearchManagers and Adatum\ResearchStaff. The IT department has a custom install image of Windows 8. The image contains internally developed Windows Store apps. Windows Server Update Services (WSUS) is used to deploy patches to the client computers.
User Issues
Users report that when App1 and App2 run concurrently, the applications crash.
Requirements
Planned Changes
The company plans to implement the following changes:
Deploy a Remote Desktop Services (RDS) infrastructure that runs Windows Server 2012.
The infrastructure will be located in the Seattle office and will contain the following servers:
– Two Remote Desktop Virtualization Host (RD Virtualization Host) servers
– Two Remote Desktop Connection Broker (RD Connection Broker) servers
– Two Remote Desktop Session Host (RD Session Host) servers
– Two Remote Desktop Web Access (RD Web Access) servers
– Two Remote Desktop Gateway (RD Gateway) servers
Implement the desktops of the users in the Miami office by using a Virtual Desktop Infrastructure (VDI) and replace the desktop hardware with thin client devices.
Deploy a Windows Server 2012-based Microsoft Application Virtualization (App-V) infrastructure in the Seattle office that contains the following servers:
– Two App-V management servers
– Two App-V publishing servers
– One App-V reporting server
Standardize the client operating system on the 64-bit version of Windows 8. Publish an application named App3 as a RernoteApp program.
Technical Requirements
The company must meet the following technical requirements:
– The disk space used by the VDI must be minimized.
– The amount of administrative effort must be minimized whenever possible.
– The members of Adatum\ResearchManagers must have priority to the system resources on the RD Session Host servers.
– The availability of the RemoteApps programs, the App-V apps, and the virtual desktops must not be affected if a single server fails.
– The RD Session Host server will be installed on a server that is several years old. Only 20 percent of the sessions must be established to this server.
Application Requirements
The company must meet the following application requirements:
– Several custom add-ins for Office 2010 must be deployed.
– App1 and App2 must be published as Remote App programs.
– Application conflicts between App1 and App2 must be eliminated.
– Office 2010 must be deployed by using an existing App-V package.
– Updated Windows Store apps must be included in the Windows 8 image.
– The reporting server must be used to monitor the usage of the App-V apps.
– Users in the human resource (HR) department must be able to use existing 16-bit applications.
– The research users must be able to launch App3 by double-clicking files that have an .app3 extension.

QUESTION 41
You need to recommend a solution to ensure that the App-V applications are available to the research users. The solution must meet the technical requirements. What should you include in the recommendation?

A.    Deploy the App-V publishing server to the Miami office.
B.    Store the App-V database on the \\Contoso.com\Shared\Data share.
C.    Deploy the App-V management server to the Miami office.
D.    Store the App-V packages on the \\Contoso.com\Shared \Data share.

Answer: B

QUESTION 42
You identify a hotfix published on the Microsoft Support website. The hotfix applies to a locally installed application. You need to apply the hotfix to all of the client computers that have the application installed. What should you do?

A.    Create a Group Policy startup script that runs wuaclt.exe.
B.    Run wsusutil.exe and specify the import switch.
C.    Create a Group Policy startup script that runs wusa.exe.
D.    Run wsusutil.exe and specify the use custom website switch.

Answer: C
Explanation:
http://support.microsoft.com/kb/934307
WUSA can be used to script hotfix installations. Hotfixes that are downloaded from MS but not available as part of the standard update catalog cannot be installed with WSUS.

QUESTION 43
You need to install Office 2010 on virtual desktops that run Windows 8. The virtual desktops will be used by the research users in the Miami office. The solution must meet the technical requirements.
What should you do first?

A.    Run the App-V client setup and specify the /sharedcontentstoremode switch.
B.    Run the App-V client setup and specify the /migrationmode switch.
C.    Run the Office Customization Tool (OCT).
D.    Run the Office Migration Planning Manager (OMPM).

Answer: A

QUESTION 44
You publish App3 as a RemoteApp program. You need to configure App3 to meet the application requirements. What should you do?

A.    On the RD Session Host servers, modify the Windows Installer RDS Compatibility setting.
On client computers, modify the Remote Desktop Connection settings.
B.    From Remote Desktop Services, modify the properties of the App3 RemoteApp program.
On the client computers, configure the RemoteApp and Desktop Connection feed.
C.    From Remote Desktop Services, modify the properties of the collection to which the App3
RemoteApp program is published. On the client computers, configure the RemoteApp and
Desktop Connection feed.
D.    From Remote Desktop Services, modify the properties of the collection to which the App3
RemoteApp program is published. On client computers, modify the Remote Desktop Connection
settings.

Answer: B

QUESTION 45
You need to configure the virtual desktops for the Miami office users. The solution must meet the technical requirements. What should you create?

A.    An unmanaged personal virtual desktop collection
B.    An unmanaged pooled virtual desktop collection
C.    A managed pooled virtual desktop collection
D.    A managed personal virtual desktop collection

Answer: C

QUESTION 46
You need to ensure that the members of Adatum\ResearchManagers have priority to the system resources on the RD Session Host servers. The solution must meet the technical requirements. What should you do?

A.    On the RD Session Host servers, configure the Fair Share CPU Scheduling settings.
B.    On the RD Connection Broker servers, configure the collection properties.
C.    On the RD Session Host servers, install and configure the Windows System Resource Manager
feature.
D.    On the RD Session Host servers, install and configure the Windows Process Activation Service
feature.

Answer: C

QUESTION 47
You need to recommend a solution for the HR users that meets the application requirements. What should you recommend?

A.    Client Hyper-V
B.    An App-V 5.0 client on an RD Session Host server
C.    An App-V 5.0 client
D.    A RemoteApp program on an RD Session Host server

Answer: A
Explanation:
App-V does not support 16bit applications.
RemoteApp is running from a 64bit OS; 16bit apps are not supported on a 64bit OS.

QUESTION 48
You need to recommend a solution for deploying the Office 2010 add-ins. The solution must meet the application requirements. What should you include in the recommendation?

A.    From Server Manager, create a collection.
B.    From Group Policy Management, assign the add-ins to users.
C.    From Group Policy Management, assign add-in to client computers.
D.    From the Application Virtualization Management Console, create a connection group.

Answer: D

QUESTION 49
You need to recommend a solution to distribute sessions to the RD Session Host servers. The solution must meet the technical requirements. What should you recommend?

A.    On the RD Session Host servers, install and configure the Windows System Resource Manager feature.
B.    On the RD Connection Broker servers, configure the deployment properties.
C.    On the RD Web Access servers, modify the Web.config file located in %Systemroot%\Web\RDWeb \Pages.
D.    On the RD Connection Broker servers, configure the collection

Answer: D

QUESTION 50
You need to update the Windows 8 image. The solution must meet the application requirements.
What should you do first?

A.    Run dism and specify the /export-defaultappassociations switch.
B.    Run dism and specify the /rernoveprovisionedappxpackage switch.
C.    Run dism and specify the /rernove-package switch.
D.    Run dism and specify the /check-apppatch switch.

Answer: B

Passing Microsoft 70-416 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-416 Dump: http://www.braindump2go.com/70-416.html

2014 Latest Microsoft 70-416 Exam Dumps Free Download(31-40)!

QUESTION 31
You need to configure security for the HR users to meet the application requirements What should you configure in Group Policy Management Editor?

A.    Security Options
B.    Restricted Groups
C.    Public Key Policies
D.    Application Control Policies

Answer: D

QUESTION 32
You need to configure the virtualized applications to ensure that they download fully before they can run on the client computers. What should you use?

A.    Microsoft System Center 2012 App Controller
B.    The App-V Sequencer
C.    Microsoft System Center 2012 Virtual Machine Manager (VMM)
D.    The Application Virtualization Management Console

Answer: B

QUESTION 33
You need to recommend a solution to deploy App1. The solution must meet the application requirements. What should you include in the recommendation?

A.    Create an .rdp file for App1, and then copy the file to the client computers by using a logon script.
B.    Configure the software installation settings in a Group Policy object (GPO).
C.    Configure the RemoteApp and Desktop Connections setting in a Group Policy object (GPO).
D.    Create an .rdp file for App1, and then copy the file to the client computers by using a startup script.

Answer: C
Explanation:
Using a GPO to set the RA and RD Connections allows you to input a URL that publishes the applications and then allows them to use document invocation.

QUESTION 34
You need to meet the application requirements for administering the App-V infrastructure. What should you install on Server1?

A.    The Microsoft Visual C++ 2010 Redistributable Package
B.    Microsoft SQL Server Native Client
C.    Microsoft .NET Framework 4.5
D.    Microsoft Silver light

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/jj713458.aspx
Management console requires Silverlight, Visual C++2010 SP1, and .Net 4.0.

QUESTION 35
Drag and Drop Question
You need to update App4 in the standard desktop image. The solution must meet the technical requirements and the application requirements. Which four actions should you perform? To answer, move the four appropriate actions from the list of actions to the answer area and arrange them in the correct order.
 clip_image002
Answer:
 clip_image001

QUESTION 36
You need to implement an RDS infrastructure to meet the technical requirements. What should you do first?

A.    Install Microsoft SQL Server 2008 R2.
B.    Install the Failover Clustering feature.
C.    Install the Windows Internal Database feature.
D.    Install the Network Load Balancing (NLB) feature.

Answer: A

QUESTION 37
You need to recommend a solution to deliver the virtualized applications to the client computers. The solution must meet the application requirements. What should you include in the recommendation?

A.    Enhanced Storage
B.    BranchCache
C.    File Replication Service (FRS)
D.    Distributed File System (DFS)

Answer: D
Explanatin:
FRS is legacy. DFS is 2008+

QUESTION 38
You virtualize App5 and App6. You need to ensure that App5 and App6 meet the application requirements. What should you do?

A.    From the Application Virtualization Management Console, add a connection group.
B.    From the Application Virtualization Management Console, upgrade the packages.
C.    From the Microsoft Application Virtualization Sequencer, modify the Properties settings of App5
and App6.
D.    From the Microsoft Application Virtualization Sequencer, modify the Deployment settings of App5
and App6.

Answer: A

QUESTION 39
You need to secure the RD Web Access servers. The solution must meet the technical requirements.
What should you do?

A.    From Server Manager, edit the deployment properties.
B.    From the Certificates console, import the custom certificate to the personal certificates store of
the local computer.
C.    From Server Manager, edit the collection properties.
D.    From the Certificates console, import the custom certificate to the Remote Desktop certificates
store of the local computer.

Answer: A

QUESTION 40
You need to implement a software inventory solution for the A. Datum network. The solution must meet the technical requirements. What should you implement?

A.    The Microsoft Deployment Toolkit (MDT)
B.    The Microsoft Assessment and Planning (MAP) Toolkit
C.    The Windows Assessment and Deployment Kit (Windows ADK)
D.    Windows Intune

Answer: B
Explanation:
Intune requires an agent installed which is a direct conflict with the technical requirement to not install additional software (http://www.microsoft.com/sam/en/us/intune.aspx)
MAP is an agent-less inventory service (http://www.microsoft.com/sam/en/us/map.aspx)
Passing Microsoft 70-416 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-416 Dump: http://www.braindump2go.com/70-416.html

1 2 3 4 5 12