Certification Exam Prep Questions For Configuring Windows Devices

QuickStart is now offering you assessment questions for Configuring Windows Devices (70-697). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions from a recent version of the test you will take for Configuring Windows Devices (70-697).


Arrow
 

1

The Windows 10 Enterprise computers that you support are the members of an Active Directory domain. The list of approved Windows Store apps are defined by your company policy and these are permitted download as well as installation. In order to aid in enforcing the company policy, a new AppLocker Packaged App policy is created by you. What must you do in order to test the app policy before implementing it for the whole company?

2

The Windows 10 Enterprise computers are supported by you. On a number of laptops, the Application Virtualization (App-V) applications are being tested by your company. The App-V applications are seen to be available for users regardless of the laptop status (i.e. even if it’s offline). What must you do in order to make sure that the App-V applications are only available to users who are connected to the company network?

3

Contoso.com is an Active Directory domain, containing Windows 10 Enterprise client computers, present in your network. A Microsoft Office 365 subscription is available in your company which means that every individual user owns a mailbox stored in the Office 365. The user account of the mailbox is present in the contoso.com domain. Since each individual mailbox has two email addresses, what must you do in order to create a third one for each user?

4

Your work computer featuring Windows 10 Enterprise is an Active Directory domain member. Your domain account is used to log on to the computer and the Microsoft account is used to log on to the laptop at home. With the use of your Microsoft account, you decide to access the Windows 10 Enterprise apps from the work computer. What must you do in order to make sure that, from your work computer, you are able to access the Windows 10 Enterprise apps?

5

Hyper-V is run on a Windows 10 Enterprise computer which you administer. A virtual machine, using a 512 MB of RAM as well as one virtual CPU, contains a number of screenshots and is hosted on a computer. The virtual machine is found to automatically pause and then the state is displayed as paused-critical. What must you do in order to identify the error-causing component?

6

Computer1 is a Windows 10 Enterprise computer in which the Hyper-V feature is installed. VM1 is a virtual machine hosted on Computer1 and it runs the Windows 10 Enterprise. A private virtual network switch is connected to VM1. What must you do if you need to remotely execute Windows PowerShell cmdlets on VM1 from Computer1?

7

Several tablet PCs are deployed and they run Windows 10 Enterprise.

What must you do in order to minimize the power usage for when the sleep button is pressed by the user?

8

You work as a desktop administrator in a small company and the environment of the workgroup contains Windows 10 Enterprise computers. Your job is to prevent around 10 help desks from sleeping while needing inactive computer screens to be shut off after some time. The 10 help desk computers available on your network need a power configuration scheme, which must be both be applied as well as configured. What are the two actions that you must perform? (Individual answers pose a solution part).

9

An Active Directory Domain Services (AD DS) domain is present in a company where every client computer is run on Windows 10 Enterprise. While some of the computers possess a Trusted Platform Module (TPM) chip, what are the two actions that you must perform in order to configure one Group Policy Object (GPO) which will permit the Windows BitLocker Drive Encryption on every client computer? Remember; each right answer is part of a complete solution.

10

A company’s employees are allowed to bring in personal portable Windows 10 Enterprise computers to the office. They are not only allowed to install corporate applications with the use of a management installation infrastructure agent, but with the use of the Mail app, they can also access corporate mail.

You must protect the email messages as well as corporate applications on an employee’s personal portable computer which is stolen. What are the two actions that you decide to perform? Remember; each right answer is part of a complete solution.

11

You are an IT consultant for mid-sized and small businesses. On tablets and laptops with Windows 10 Enterprise, a client of yours wants to use Virtual Smart Cards. Prior to the execution of changes, your client wants to make sure that the tablets and laptops support Virtual Smart Cards. Your job is to confirm that your client’s tablets and laptops support Virtual Smart Cards. How would you do that?

12

Contoso.com is an Active Directory domain present in your network and it is synchronized to a Microsoft Azure Active Directory. A Microsoft Intune subscription is in your possession. The Bring Your Own Device (BYOD) policy is planned to be implemented by your company. In order for that to happen, corporate data access is supposed to be provided to the users from their personally owned iOS devices. What would be the first thing you do in order to make sure that you are able to manage their personal iOS devices?

13

Contoso is a company for which you manage a Microsoft Intune, whose client computers run the Windows 10 Enterprise. The Intune administration console has been seen to list over 25 mandatory updates. However, after the installation, users are often prompted on to restart Windows; what is the policy that you must use in order to prevent this from happening?

14

Contoso.com is the name of an Active Directory domain in which the deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1) is contained. With the use of Microsoft Azure Active Directory Synchronization Tool (DirSync.), you synchronize Microsoft Intune subscription to contoso.com. What are the two actions that you must perform in order to make sure that you are able to use the Configuration Manager to manage devices registered on your Microsoft Intune subscription? Remember; each right answer is part of a complete solution.

15

In the Microsoft Intune subscription, there are three security gaps; Security1, Security2 and Security3. Securrity2 has around 100 users and its parent group is Security1. What would be the first step to changing Security2’s parent group into being Security3?

16

The Windows 10 Enterprise is run by a company possessing 100 client computers. Since all client computers must possess static IPv6 addresses according to a new company policy, what is the Network Shell (netsh) command that you must run in order to assign the addresses?

A. set interface
Incorrect.
B. set global

FROM Profits
Incorrect.
C. set address
Incorrect.
D. add address
Correct!
17

Windows 10 Enterprise is run on a computer named Computer1. You create a new volume to a drive with a letter D by adding a 1 TB hard drive. A limit must be added to usage of the amount of space that every user can consume on D: to 200 GB; however, the Administrator group members shouldn’t be give a limit. What are the three actions that you choose to perform? Remember; each right answer is part of a complete solution.

18

A new Windows 10 Enterprise desktop computer is purchased with four external USB drives that you possess. With the use of four USB drives, you wish to create one volume which has to be portable, expandable and also resilient in case of a single USB drive failure.

What must you do in order to make the required volume?

19

The Windows 10 Enterprise computers, which are members of an Active Directory domain, is supported by you. Many of the user accounts have recently been configured with super-mandatory user profiles. After restart of the computer, a user complained of losing all her data. What must you do in order to configure the user’s computer so future data loss can be prevented?

20

A client’s Windows 10 Enterprise computer is in your possession and this is connected with an Active Directory domain. Since there is no Trusted Platform Module (TPM) chip installed on the computer, you must configure the BitLocker Drive Encryption (BitLocker) on the operating system drive. What is the Group Policy object (GPO) setting that you must configure?

21

The Windows 10 Enterprise computers, which are members of an Active Directory domain, is administered by you. An archived copy of the user profiles has to be created by you, which can be stored on desktops. In order to run a backup task, a standard domain user account must be created and the task user account should be granted access to user profiles. What would be your approach?

22

Windows 10 Enterprise client computers are present in a company, and these computers are joined to a private corporate network. When using Remote Desktop, the users are unable to connect their work computers from their home computers. You have to make sure that, when using that Desktop; users are able to remotely link to their work computers. With the use of local Windows installation through their home computers, users should not be able to access any of the other corporate network resource. What is the setting that you must configure on the home computers?

23

Windows 10 Enterprise computers is included in the network that you manage. In this network, all the computers are a part of an Active Directory domain. A new security policy is recently proposed by a company and it prevents the users from synchronizing browsing history, application settings, favorites and passwords from computers through Microsoft accounts.

What must you do to enforce the computers with security policy requirements?

24

A domain configuration has Windows 10 Enterprise computers in the department that you’re an administrator for. An application is deployed for every computer present in the domain. What must you do in order to use the group policy in order to restrict some groups from running the application?

25

Windows 8 Enterprise is run on the tablets and desktop computers that you support. With the use of DirectAccess, all of the computers have the ability to gain connection to your company network through the internet. A new application needs to be deployed by your company to the tablets. The following requirements must be met by the deployment solution:

• The files stored on an internal solid-state drive (SSD) present on the tablets is permitted access with the application. • The least disk space on the tablet is used by the application. • The application is isolated from other applications.

What must you do in order to deploy a new application to the tablets?

26

Windows 10 Enterprise is run on a computer in your possession called Computer1, which is also a member of contoso.com, an Active Directory domain. App1 is a line-of-business universal app which is developed internally. It’s your job to make sure that App1 can be run on Computer1 and for that, the following requirements must be met by the solution:

• The attack surface on Computer1 must be minimized.
• Costs to deploy the app must be minimized.

What would be your approach?

27

Windows 10 Enterprise is run on a computer in your possession, called Computer1, and on it, you plan to install some of the most recent updates. In case you don’t get a response from the computer after the update, you need to make sure that you are able to revert the current state of Computer1. What would the solution include?

28

A Windows 10 Enterprise computer is administered by you. The File History for the computer, as well as the system protection for drive C are both turned on. A folder by the name of Libraries\Customers is accidentally deleted by using the Shift + Delete shortcut. If you have to restore the folder’s most recent version to the original location, what is the approach that you decide to use?

29

Computer1 is a Windows 10 Enterprise computer in your possession and in it, the File History is enabled. You then decide to create a folder by the name of Folder1 in C: drive root. After it’s been created, you must ensure that it is protected by File History. What are the two successful methods to achieve the goal? Remember; each right answer is part of a complete solution.

30

Windows 10 Enterprise is run on a computer that goes by the name of Computer1, which is configured for receiving Windows updates through the Internet. In case the Computer1 is already logged on by a user, then your job is to prevent it from restarting without the said user’s consent after the Windows updates installation. What would be your approach?

31

The Windows 8.1 tablet that you automatically receives Windows Update updates from the Internet. While the tablet has Wi-Fi connectivity, it is joined to the 3G mobile broadband Wi-Fi hot spot. What would be your approach to make sure that you minimize the data usage when joined to the hotspot?

32

Windows 10 is run on client computers in a company. The IPSec tunnels are frequently used by the client computer systems in order to safely transfer data. In order to configure the IPSec tunnels into using the 256-bit encryption keys, what is the encryption that you must use?

A. 3DES
Incorrect.
B. AES
Incorrect.
C. RSA
Correct!
D. DES
Incorrect.
33

Windows 10 is run on a group of 10 client computers which are known to be local workgroup members. With the use of Microsoft accounts, employees are able to log on to the client computers. Windows BitLocker Drive Encryption is planned to be used by the company and the BitLocker recovery key needs to be backed up. What are the two options that are best to use? Remember; each right answer is part of a complete solution.

34

In order to prepare a system for imaging, you decide to use sysprep. For that, you need to reset the security ID (SID) as well as clear event logs. What is the option that you decide to use?

A. /oobe
Incorrect.
B. /audit
Incorrect.
C. /unattend
Incorrect.
D. /generalize
Correct!
35

The working environment of both computer as well as user accounts are controlled by a set of rules called the Group Policy. This gives a configuration as well as a centralized management for applications, operating systems and user’s settings in an Active Directory environment. Basically, the Group Policy is responsible to control what the users are able to and not able to do with on a computer system. What is the policy amongst these which requires a reboot?

36

What is the term that is used for directly installing apps into a device; i.e, omitting going through the Windows store?

A. Sideloading
Correct!
B. SQL Injection
Incorrect.
C. DLLHijack
Incorrect.
D. BranchCache
Incorrect.
37

As compared to the IPv4, IPv6 possesses a quite large address space which is able to provide flexibility in routing traffic as well as allocating addresses. On top of that, it also eliminates need for Network Address Translation (NAT).

How many more bits are present in the IPv4 address as compared to the IPv6 one?

A. 8 times more
Incorrect.
B. Twice as many
Incorrect.
C. 4 times more
Correct!
D. 6 times more
Incorrect.
38

The sysprep is used for preparing a system for imaging which will allow end users to create user accounts, customer their Windows operating system, name the computer, and a number of other tasks. What is the sysprep setting that you must use?

A. /unattend
Incorrect.
B. /oobe
Correct!
C. /generalize
Incorrect.
D. /audit
Incorrect.
39

A new wireless network is setup by you for an important client. In order to prevent misuse, the director needs to make sure that only a few of the designated wireless laptops are able to join with the new network. What would be your approach?

A. Use WPA
Incorrect.
B. Use IPv4 address control
Incorrect.
C. Use WEP
Incorrect.
D. Use MAC address control
Correct!
40

The Windows 10 Enterprise computers, which are members of an Active Directory domain, is administered by you. BitLocker is encrypted on the computers and configured so as to store the BitLocker encryption passwords in the Active Directory. A BitLocker recovery key needs to be provided to the user with the complaint of forgetting the BitLocker encryption password for volume E present in his computer. What are the two actions that you need to perform to unlock the protected volume? Remember; each right answer is part of a complete solution.

41

Windows 8 Enterprise is run on a desktop computer, to which three of 3-terabyte disks are then added. What are the two actions that you must perform in order to make a 9-terabyte volume? Since each right answer is part of a complete solution, you need to pick two.

42

You use a Windows 10 desktop computer at home, whereas at work, a Windows 10 laptop joined to a corporate network is used. For both your computers, you use the same Microsoft account for log in. Your desktop computer has personal documents stored in a folder which has to be synced and available in both computers. What must you do in order to make sure that the latest version of the files are available?

43

The users of the 100 client computers with Windows 10 are NOT configured as local administrators. It is your duty to make sure that users are denied running applications downloaded from the internet. The only time it is acceptable is if they are signed by a trusted publisher. What is the configuration you must make from the Action Center’s Security Settings?

44

You are designated as a systems administrator in a small branch office whose computers are connected with a Windows 10 HomeGroup. This HomeGroup includes a number of shared folders as well as a single shared printer. An incorrect password error is received as soon as you notice that the shared folders are seen to be unavailable. What would be your approach to reconfigure the new computer so as to gain access to the HomeGroup resources?

45

An Active Directory domain, with a 100 of Windows 10 client computers, is present in your network. All computer connections on the internal network are secured by the computers with the use of IPSec. A legacy application is run by a server present in the network; however, the server lacks IPSec support. Your job is to make sure that some computers with Windows 8 are able to join with the legacy server. What solution will you choose to make sure that IPSec secures all the other connections?

46

The Windows 8 Pro is run on desktop computers and laptop that you administer. Active Directory Certificate Services (AD CS) and Active Directory Domain Services (AD DS) is used by your company. They then decide that a two- factor authentication should be used by all users in order gain access to the company network.

What must you do in order to configure computers into meeting this requirement?

47

The Active Directory domain is present in your network along with 100 of Windows 10 client computers. With the use of Microsoft Application Virtualization (App-V) 5.0, all of the software is then deployed. The users are not configured as local administrators. The Microsoft Office 365 subscription that your company purchases also includes the Office 365 ProPlus.

What must you do in order to make an App-V package for Office 36f ProPlus?

48

Windows 8 Enterprise is run on your administered computers which are also Active Directory domain’s members. BitLocker encrypts some of the volumes on the computers and the Active Directory contains the BitLocker Recovery password. A user complains of losing the BitLocker password to a local drive E: which means that they lack access to the volume which is protected.

What are the two actions that you decide to perform in order to unlock the protected volume through the recovery key?

49

You are designated as your company’s systems administrator. With the use of a virtual private network (VPN) on their Windows 8 Pro computers, the company’s employees are able to work remotely. An application is used by these employees on order to access the company’s database servers. Through a public cloud, the application’s latest version is distributed by the company. However, a warning message is received by some of the users that try to download an application with the use of Internet Explorer. The message indicates that the download could potentially harm the computer. What solution will you recommend in order to prevent the warning message from popping up; keep in mind that the computer’s security protection should not be compromised.

50

Computers running Windows 8 Enterprise on a single Active Directory site and within the Active Directory domain, are all administered by you. For every object of user accounts present in the Active Directory, the attribute of ‘Manager’ has been populated. A windows Intune subscription has been purchased by the company. The domain security groups and Microsoft Online directory are synchronized with each other. A Windows Intune group has been created. It has set the membership criterion to ‘Manager’. It is found out that there are no members in the group. You have to make sure that the Windows Intune group includes all those users who are meeting the membership criteria. What would you do to achieve that?

51

The Windows 10 Enterprise laptops that you support are part of a workgroup. You get a complaint from an employee that their laptop is unable to start the Windows Mobility Center. What must you do so the employee is able to use the Windows Mobility Center on the laptop?

52

The Windows 10 client computers, managed with the use of Windows Intune, are present in your company. With the use of Windows Intune, you need make sure a user is able to deploy software to computers. What role must you use in order to come up with a solution that minimizes the amount of permissions assigned to the user?

53

Your company’s main office has an Internet connection as well as of Windows Enterprise computers, all of which run the Microsoft Office 2010. For each user, you buy the Office 365 subscription as well as download the Click-to-Run’s Office Deployment Tool. Your job is to deploy the Office 365 Pro Plus to the computers and the amount of traffic over the Internet connection must be reduced.

What are the two actions that you must perform?

54

An Active Directory Domain Services (AD DS) domain is present in a company where all of the client computers tend to run the Windows 10. A client computer, whose user is a Sales AD security group member, shares a local printer. It’s your job to make sure that the Sales security group members are able to modify the document orders present in the print queue without deleting the printer share.

What is the permission that the Sales group should grant?

A. Print
Incorrect.
B. Manage queue
Incorrect.
C. Manage spooler
Incorrect.
D. Manage this printer
Incorrect.
E Manage documents
Correct!

Practice Exam - Configuring Windows Devices

$99.00

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Outline

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Hit button to validate captcha