2017 June Microsoft Official New Released 70-697 Dumps in Lead2pass.com!
100% Free Download! 100% Pass Guaranteed!
You can prepare for Microsoft 70-697 exam with little effort because Lead2pass is now at your service to act as a guide to pass Microsoft 70-697 exam. Our Microsoft 70-697 braindumps are rich in variety. We offer Microsoft 70-697 PDF dumps and Microsoft 70-697 VCE. Both are the newest version.
Following questions and answers are all new published by Microsoft Official Exam Center: http://www.lead2pass.com/70-697.html
QUESTION 21
Hotspot Question
You have an image of Windows 10 Enterprise named Image1. Image1 has version number 1.0.0.0 of a custom, line-of-business universal app named App1.
You deploy Image1 to Computer1 for a user named User1.
You need to update App1 to version 1.0.0.1 on Computer1 for User1 only.
What command should you run? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
In this question, we need to update App1 to version 1.0.0.1 on Computer1 “for User1 only”. The Add-AppxPackage cmdlet adds a signed app package (.appx) to a user account. To update the application, we need to use the -path parameter to specify the path to the upgraded application.
Incorrect Answers:
add-provisionedappxpackage would make the app available to all users, not just User1 only. Set-AppXProvisionedDataFile adds custom data into an app. It does not update it to a later version.
https://technet.microsoft.com/en-us/library/hh856048.aspx
http://blogs.technet.com/b/sunshine/archive/2014/03/22/updating-a-modern-app-in-windows-8.aspx
QUESTION 22
Drag and Drop Question
You manage Microsoft Intune for a company named Contoso.
You have an administrative computer named Computer1 that runs Windows 10 Enterprise.
You need to add a Windows Store universal app named App1 to the Company Portal Apps list for all users.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
1. Log into your computer using a domain account.
2. Run the Microsoft Intune Software Publisher wizard app.
3. Configure the deployment settings of the app.
Incorrect Answers:
You do not need to install App1 on Computer1.
You need to log in with a domain account, not a local administrator account.
https://technet.microsoft.com/en-gb/library/dn646961.aspx
https://technet.microsoft.com/en-gb/library/dn646955.aspx#BKMK_SoftwareDistProcess
QUESTION 23
Your network contains an Active Directory domain named contoso.com.
The domain contains Windows 10 Enterprise client computers.
Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses.
You need to add a third email address for each user.
What should you do?
A. From Active Directory Users and Computers, modify the E-mail attribute for each user.
B. From Microsoft Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet.
C. From Active Directory Domains and Trust, add a UPN suffix for each user.
D. From the Office 365 portal, modify the Users settings of each user.
Answer: B
Explanation:
We can use the Set-Mailbox cmdlet to modify the settings of existing mailboxes.
The EmailAddresses parameter specifies all the email addresses (proxy addresses) for the recipient, including the primary SMTP address. In on-premises Exchange organizations, the primary SMTP address and other proxy addresses are typically set by email address policies. However, you can use this parameter to configure other proxy addresses for the recipient.
To add or remove specify proxy addresses without affecting other existing values, use the following syntax:
@{Add=”[<Type>]:<emailaddress1>”,”[<Type>]:<emailaddress2>”…; Remove=”[<Type>]:<emailaddress2>”,”[<Type>]:<emailaddress2>”…}.
Incorrect Answers:
A: You cannot use the E-mail attribute in Active Directory Users and Computers to add email addresses.
C: A UPN (User Principal Name) is used for authentication when you enter your credentials as [email protected] instead of: domainname\username. A UPN suffix is not an email address.
D: Users’ email addresses are not configured in the User settings in the Office 365 portal.
https://technet.microsoft.com/en-us/library/bb123981(v=exchg.160).aspx
QUESTION 24
Hotspot Question
You manage a Microsoft Azure RemoteApp deployment. The deployment consists of a cloud collection named CloudCollection1 and a hybrid collection named HybridCollection1. Both collections reside in a subscription named Subscription1. Subscription1 contains two Active Directory instances named AzureAD1 and AzureAD2. AzureAD1 is the associated directory of Subcsription1.
AzureAD1 is synchronized to an on-premises Active Directory forest named constoso.com. Passwords are synchronized between AzureAD1 and the on-premises Active Directory.
You have the following user accounts:
You need to identify to which collections each user can be assigned access.
What should you identify? To answer, select the appropriate options in the answer area.
Answer:
Explanation:
A Microsoft account can only access a cloud collection.
An Azure Active Directory (Azure AD) account can access a cloud collection and it can access a hybrid collection if directory synchronization with password sync is deployed. An on-premise domain account that does not exist in any Azure Active Directory cannot access Azure cloud resources.
https://azure.microsoft.com/en-gb/documentation/articles/remoteapp-collections/
QUESTION 25
Your Windows 10 Enterprise work computer is a member of an Active Directory domain.
You use your domain account to log on to the computer.
You use your Microsoft account to log on to a home laptop.
You want to access Windows 10 Enterprise apps from your work computer by using your Microsoft account.
You need to ensure that you are able to access the Windows 10 Enterprise apps on your work computer by logging on only once.
What should you do?
A. Add the Microsoft account as a user on your work computer.
B. Enable Remote Assistance on your home laptop.
C. Connect your Microsoft account to your domain account on your work computer.
D. Install SkyDrive for Windows on both your home laptop and your work computer.
Answer: C
Explanation:
You can connect your Microsoft account to your domain account on your work computer. This will enable you to sign in to your work computer with your Microsoft account and access the same resources that you would access if you were logged in with your domain account.
When you connect your Microsoft account to your domain account, you can sync your settings and preferences between them. For example, if you use a domain account in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other Microsoft account settings that you see on your home PC.
Incorrect Answers:
A: If you add the Microsoft account as a user on your work computer, this would be a separate account with no domain access. The account would not have access to the resources that you access with your domain account.
B: Enabling Remote Assistance on your home laptop would just enable you to send remote assistance invitations from your home laptop. It would have no effect on your work computer or your ability to log on to it.
D: SkyDrive is a cloud storage solution. You can save your files on SkyDrive and access them from any device. Installing SkyDrive will not enable you to log on to your work computer with your Microsoft account.
http://windows.microsoft.com/en-gb/windows-8/connect-microsoft-domain-account
QUESTION 26
You have a Windows 10 Enterprise computer named Computer1 that has the Hyper-V feature installed. Computer1 hosts a virtual machine named VM1. VM1 runs Windows 10 Enterprise. VM1 connects to a private virtual network switch.
From Computer1, you need to remotely execute Windows PowerShell cmdlets on VM1.
What should you do?
A. Run the winrm.exe command and specify the -s parameter.
B. Run the Powershell.exe command and specify the -Command parameter.
C. Run the Receive-PSSession cmdlet and specify the -Name parameter.
D. Run the Invoke-Command cmdlet and specify the -VMName parameter.
Answer: D
Explanation:
We can use Windows PowerShell Direct to run PowerShell cmdlets on a virtual machine from the Hyper-V host. Because Windows PowerShell Direct runs between the host and virtual machine, there is no need for a network connection or to enable remote management.
There are no network or firewall requirements or special configuration. It works regardless of your remote management configuration. To use it, you must run Windows 10 or Windows Server Technical Preview on the host and the virtual machine guest operating system.
To create a PowerShell Direct session, use one of the following commands:
Enter-PSSession -VMName VMName
Invoke-Command -VMName VMName -ScriptBlock { commands }
Incorrect Answers:
A: WinRM is Windows Remote Management. This is not required when using Windows PowerShell Direct.
B: Running PowerShell.exe with a PowerShell cmdlet will execute the PowerShell cmdlet on the local machine. It will not remotely execute the PowerShell cmdlet on the VM.
C: You could run the Enter-PSSession cmdlet with the -VMName parameter but the Receive-PSSession cmdlet with the ?ame parameter will not work.
https://msdn.microsoft.com/en-us/virtualization/hyperv_on_windows/about/whats_new
QUESTION 27
You deploy several tablet PCs that run Windows 10 Enterprise.
You need to minimize power usage when the user presses the sleep button.
What should you do?
A. In Power Options, configure the sleep button setting to Sleep.
B. In Power Options, configure the sleep button setting to Hibernate.
C. Configure the active power plan to set the system cooling policy to passive.
D. Disable the C-State control in the computer’s BIOS.
Answer: B
Explanation:
We can minimize power usage on the tablet PCs by configuring them to use Hibernation mode.
A computer in hibernation mode uses no power at all.
Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and settings in memory and draws a small amount of power, hibernation puts your open documents and programs on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hibernation uses the least amount of power. On a laptop, use hibernation when you know that you won’t use your laptop for an extended period and won’t have an opportunity to charge the battery during that time.
Incorrect Answers:
A: Sleep is a power-saving state that allows a computer to quickly resume full-power operation.
A sleeping computer draws a small amount of power whereas a hibernating computer uses no power.
C: A passive cooling policy slows down the processor before speeding up the processor’s cooling fan to conserve power. However, this will still use more power than a hibernating tablet.
D: C-States are different modes of CPU clock speed used to conserve power when processors are idle.
Disabling C-State control disables the ability to reduce the power consumption of the computer.
http://windows.microsoft.com/en-gb/windows7/sleep-and-hibernation-frequently-asked-questions
QUESTION 28
You are the desktop administrator for a small company.
Your workgroup environment consists of Windows 10 Enterprise computers.
You want to prevent 10 help desk computers from sleeping. However, you want the screens to shut off after a certain period of time if the computers are not being used.
You need to configure and apply a standard power configuration scheme for the 10 help desk computers on your network.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /S.
B. Use POWERCFG /X on one help desk computer to modify the power scheme to meet the requirements.
Export the power scheme by using POWERCFG /EXPORT.
C. Use POWERCFG /S on one help desk computer to modify the power scheme to meet the requirements.
Export the power scheme by using POWERCFG /EXPORT.
D. Import the power scheme by using POWERCFG /IMPORT on each of the remaining help desk computers. Set the power scheme to Active by using POWERCFG /X.
Answer: AB
Explanation:
You can use the Powercfg.exe tool to control power settings and configure computers to default to Hibernate or Standby modes.
In this question, we use POWERCFG /X on one help desk computer to modify the power scheme to meet our requirements. After configuring the required settings, we can export the power scheme settings to a file by using POWERCFG /EXPORT.
We can then import the power scheme from the file on each of the remaining help desk computers by using POWERCFG /IMPORT. After importing the power scheme on the remaining computers, we need to set the new power scheme to be the active power scheme by using POWERCFG /S.
Incorrect Answers:
C: You need to use the /X switch to modify the power scheme, not the /S switch.
D: You need to use the /S switch to set the power scheme as active, not the /X switch.
https://technet.microsoft.com/en-us/library/cc748940(v=ws.10).aspx
QUESTION 29
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 10 Enterprise. Some computers have a Trusted Platform Module (TPM) chip.
You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Enable the Require additional authentication at startup policy setting.
B. Enable the Enforce drive encryption type on operating system drives policy setting.
C. Enable the option to allow BitLocker without a compatible TPM.
D. Configure the TPM validation profile to enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11.
Answer: AC
Explanation:
We need to allow Windows BitLocker Drive Encryption on all client computers (including client computers that do not have Trusted Platform Module (TPM) chip).
We can do this by enabling the option to allow BitLocker without a compatible TPM in the group policy. The `Allow BitLocker without a compatible TPM’ option is a checkbox in the `Require additional authentication at startup’ group policy setting. To access the `Allow BitLocker without a compatible TPM’ checkbox, you need to first select Enabled on the `Require additional authentication at startup’ policy setting.
Incorrect Answers:
B: Enabling the `Enforce drive encryption type on operating system drives’ policy setting allows you to configure whether the entire drive or used space only is encrypted when BitLocker is enabled. However, it does not enable the use of BitLocker on computers without a TPM chip.
D: The Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 are enabled by default for computers that use an Extensible Firmware Interface (EFI). Configuring the TPM validation profile does not enable the use of BitLocker on computers without a TPM chip.
http://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/
QUESTION 30
Employees are permitted to bring personally owned portable Windows 10 Enterprise computers to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using the Mail app.
An employee’s personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? Each correct answer presents part of the solution.
A. Prevent the computer from connecting to the corporate wireless network.
B. Change the user’s password.
C. Disconnect the computer from the management infrastructure.
D. Initiate a remote wipe.
Answer: BD
Explanation:
The personally owned portable Windows 10 Enterprise computers being managed by the management infrastructure agent enables the use of remote wipe. By initiating a remote wipe, we can erase all company data including email from the stolen device.
Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. Because mobile devices can store sensitive corporate data and provide access to many corporate resources, you can issue a remote device wipe command from the Microsoft Intune administrator console to wipe a lost or stolen device.
Changing the user’s password should be the first step. If the stolen computer is accessed before the remote wipe happens, the malicious user could be able to access company resources if the laptop has saved passwords.
Incorrect Answers:
A: Preventing the computer from connecting to the corporate wireless network will not offer much protection. The person in possession of the laptop would still be able to access all the data on the laptop and download emails. Furthermore, it is likely that the corporate applications can access corporate servers over any Internet connection.
C: Disconnecting the computer from the management infrastructure will not help. The person in possession of the laptop would still be able to access all the data on the laptop and download emails. This step would also remove the ability to perform a remote wipe. The computer will be disconnected from the management infrastructure when the remote wipe happens.
https://technet.microsoft.com/en-gb/library/jj676679.aspx
QUESTION 31
You are an IT consultant for small and mid-sized business.
One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards.
You need to verify that the client laptops and tablets support Virtual Smart Cards.
What should you do?
A. Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
B. Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.
C. Ensure that each laptop and tablet can read a physical smart card.
D. Ensure that the laptops and tablets are running Windows 10 Enterprise edition.
Answer: A
Explanation:
A Trusted Platform Module (TPM) chip of version 1.2 or greater is required to support Virtual Smart Cards.
Virtual smart card technology from Microsoft offers comparable security benefits to physical smart cards by using two-factor authentication. Virtual smart cards emulate the functionality of physical smart cards, but they use the Trusted Platform Module (TPM) chip that is available on computers in many organizations, rather than requiring the use of a separate physical smart card and reader. Virtual smart cards are created in the TPM, where the keys that are used for authentication are stored in cryptographically secured hardware.
Incorrect Answers:
B: BitLocker Drive Encryption does not need to be enabled on a system drive of the laptops and tablets to support Virtual Smart Cards.
C: The ability to read a physical smart card does not ensure support for Virtual Smart Cards.
D: Windows 10 Enterprise edition is not a requirement for Virtual Smart Cards; other versions of Windows 10 (and Windows 8) can use Virtual Smart Cards.
https://technet.microsoft.com/en-GB/library/dn593708.aspx
QUESTION 32
Your network contains an Active Directory domain named contoso.com. Contoso.com is synchronized to a Microsoft Azure Active Directory.
You have a Microsoft Intune subscription.
Your company plans to implement a Bring Your Own Device (BYOD) policy.
You will provide users with access to corporate data from their personal iOS devices.
You need to ensure that you can manage the personal iOS devices.
What should you do first?
A. Install the Company Portal app from the Apple App Store.
B. Create a device enrollment manager account.
C. Set a DNS alias for the enrollment server address.
D. Configure the Intune Service to Service Connector for Hosted Exchange.
E. Enroll for an Apple Push Notification (APN) certificate.
Answer: E
Explanation:
An Apple Push Notification service (APNs) certificate must first be imported from Apple so that you can manage iOS devices. The certificate allows Intune to manage iOS devices and institutes an accredited and encrypted IP connection with the mobile device management authority services.
Incorrect Answers:
A: Users can only install the Company Portal app after they have been added as Intune users, which require the Apple Push Notification (APN) certificate to be in place.
B: The device enrollment manager account is a special Intune account that has permission to enroll more than five corporate-owned devices. It is not used for BYOD.
C: The Set a DNS alias for the enrollment server address setting is an optional setting for enrolling Windows devices.
D: The Configure Intune service to service connector for hosted Exchange setting is used to connect Microsoft Intune and hosted Exchange without an on-premises infrastructure.
https://technet.microsoft.com/library/dn408185.aspx
https://technet.microsoft.com/en-us/library/dn764961.aspx
https://technet.microsoft.com/en-us/library/mt346003.aspx
https://technet.microsoft.com/en-us/library/dn646988.aspx
QUESTION 33
You manage Microsoft Intune for a company named Contoso. Intune client computers run Windows 10 Enterprise.
You notice that there are 25 mandatory updates listed in the Intune administration console.
You need to prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
Which policy template should you use?
A. Microsoft Intune Agent Settings
B. Windows Configuration Policy
C. Microsoft Intune Center Settings
D. Windows Custom Policy (Windows 10 and Windows 10 Mobile)
Answer: A
Explanation:
To configure the Prompt user to restart Windows during Intune client agent mandatory updates update policy setting you have to configure the Microsoft Intune Agent Settings policy. Setting the Prompt user to restart Windows during Intune client agent mandatory updates setting to No would prevent users from receiving prompts to restart Windows following the installation of mandatory updates.
Incorrect Answers:
B: You make use of the Microsoft Intune Windows general configuration policy to configure settings for enrolled devices, but not the policy setting in question.
C: The Microsoft Intune Center allows users to get applications from the company portal, check for updates, manage Microsoft Intune Endpoint Protection, and request remote assistance. It does not allow users to configure settings to prevent users from receiving prompts to restart Windows following the installation of mandatory updates
D: You can make use of the Microsoft Intune custom configuration policy for Windows 10 and Windows 10 Mobile to deploy OMA-URI (Open Mobile Alliance Uniform Resource Identifier) settings.
http://blogs.technet.com/b/windowsintune/archive/2013/01/09/policy-settings-for-mandatory-updates.aspx https://technet.microsoft.com/en-us/library/dn646989.aspx
QUESTION 34
Drag and Drop Question
You manage Microsoft Intune for a company named Contoso.
You have 200 computers that run Windows 10. The computers are Intune clients.
You need to configure software updates for the clients.
Which policy template should you use to configure each software updates setting? To answer, drag the appropriate policy templates to the correct settings. Each policy template may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
Answer:
Explanation:
You must make use of the Microsoft Intune Windows general configuration policy to configure settings for enrolled devices. The system settings that can be configured using this policy include the following:
– Require automatic updates.
– Require automatic updates – Minimum classification of updates to install automatically.
– User Account Control.
– Allow diagnostic data submission.
To configure the Allow immediate installation of updates that do not interrupt Windows update policy setting you have to configure and deploy a Microsoft Intune Agent Settings policy.
Incorrect Answers:
You can make use of the Microsoft Intune custom configuration policy for Windows 10 and Windows 10 Mobile to deploy OMA-URI (Open Mobile Alliance Uniform Resource Identifier) settings, which can be used to control features on Windows 10 and Windows 10 Mobile devices.
https://technet.microsoft.com/en-us/library/dn646968.aspx
https://technet.microsoft.com/en-us/library/mt147409.aspx
QUESTION 35
You have an Active Directory domain named contoso.com that contains a deployment of Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1).
You have a Microsoft Intune subscription that is synchronized to contoso.com by using the Microsoft Azure Active Directory Synchronization Tool (DirSync.)
You need to ensure that you can use Configuration Manager to manage the devices that are registered to your Microsoft Intune subscription.
Which two actions should you perform? Each correct answer presents a part of the solution.
A. In Microsoft Intune, create a new device enrollment manager account.
B. Install and configure Azure Active Directory Synchronization Services (AAD Sync.)
C. In Microsoft Intune, configure an Exchange Connector.
D. In Configuration Manager, configure the Microsoft Intune Connector role.
E. In Configuration Manager, create the Microsoft Intune subscription.
Answer: DE
Explanation:
To allow Configuration Manager to manage mobile devices in the same context as other devices, it requires you to create a Windows Intune subscription and synchronize user accounts from Active Directory to Microsoft Online. to achieve that, you are required to complete the following tasks:
Sign up for a Windows Intune organizational account
Add a public company domain and CNAME DNS entry
Verify users have public domain User Principal Names (UPNs)
If you plan to use single sign-on, deploy and configure Active Directory Federated Services
(ADFS)
Deploy and Configure Active Directory Synchronization
Reset users Microsoft Online password – If not using ADFS*
Configure Configuration Manager for mobile device management
Create the Windows Intune Subscription in the Configuration Manager console
Add the Windows Intune Connector Site System role
Verify that Configuration Manager successfully connects to Windows Intune
QUESTION 36
You purchase a new Windows 10 Enterprise desktop computer. You have four external USB hard drives.
You want to create a single volume by using the four USB drives.
You want the volume to be expandable, portable and resilient in the event of failure of an individual USB hard drive.
You need to create the required volume.
What should you do?
A. From Control Panel, create a new Storage Space across 4 USB hard drives.
Set resiliency type to Three-way mirror.
B. From Control Panel, create a new Storage Space across 4 USB hard drives.
Set resiliency type to Parity.
C. From Disk Management, create a new spanned volume.
D. From Disk Management, create a new striped volume.
Answer: B
Explanation:
Storage Spaces can combine multiple hard drives into a single virtual drive. To create a storage space, you’ll have to connect two or more additional internal or external drives to your computer to create a storage pool. You can also specify an arbitrarily large logical size. When your existing drive begins to fill up and nears the physical limit, Windows will display a notification in the Action Center, prompting you to add additional physical storage space. Selecting the Parity resiliency type allows Windows to store parity information with the data, thereby protecting you from a single drive failure.
Incorrect Answers:
A: The Three-way mirror resiliency type allows Windows to store three copies of your data. Mirroring uses drive space less efficiently than parity.
C: Spanned volumes are not fault tolerant
D: Striped volumes are not fault tolerant
http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirror-combine-drives/ https://technet.microsoft.com/en-us/library/cc772180.aspx
https://technet.microsoft.com/en-us/library/cc732422.aspx
QUESTION 37
Drag and Drop Question
You have a Windows 10 Enterprise computer.
You have a 1-terabyte external hard drive.
You purchase a second 1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives.
You also need to ensure that additional external hard drives can be added to the volume.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
Explanation:
Storage Spaces can combine multiple hard drives into a single virtual drive. To create a storage space, you’ll have to connect two or more additional internal or external drives to your computer to create a storage pool. When creating the pool, any existing data on the disks will be lost. It is therefore important to back up the data if you do not want to lose it. You can also specify an arbitrarily large logical size. When your existing drive begins to fill up and nears the physical limit, Windows will display a notification in the Action Center, prompting you to add additional physical storage space. Selecting the Two-way mirror resiliency type allows Windows to store two copies of your data, so that you won’t lose your data if one of your drives fails.
http://www.howtogeek.com/109380/how-to-use-windows-8s-storage-spaces-to-mirror-combine-drives/
QUESTION 38
Hotspot Question
You manage 50 computers that run Windows 10 Enterprise.
You have a Windows To Go workspace installed on a USB drive named USB1.
You need to configure USB1 to meet the following requirements:
– When you run Windows To Go from USB1, you can see the contents of the computer’s internal drives from File Explorer.
– When you connect USB1 to a computer that runs Windows 10, you can automatically view the content of USB1 from File Explorer.
In the table below, select the action that must be performed to achieve each requirement.
NOTE: Make only one selection in each column. Each correct selection is worth one point.
Answer:
Explanation:
If you want to view the contents of the computer’s internal drives from File Explorer when you run Windows To Go from USB1, you have to launch an elevated command prompt, run diskpart and then execute the List disk command. You now have to select the internal disk using the sel disk command, and then enter the online disk command.
Configuring the attributes volume option from DiskPart allows you to display, set, or clear the attributes of a volume.
Incorrect Answers:
Configuring the attributes disk option from DiskPart allows you to display, set, or clear the attributes of a disk.
Fsutil volume is used to dismount a volume, query to see how much free space is available on a disk, or find a file that is using a specified cluster.
Fsutil behavior is used to query or set NTFS volume behaviour.
http://www.verboon.info/2012/12/how-to-access-data-from-the-local-disk-when-running-a-windows-to-go-workspace/
https://technet.microsoft.com/en-us/library/cc732970.aspx
https://technet.microsoft.com/en-us/library/cc753059.aspx
QUESTION 39
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user’s computer to prevent possible user data loss in the future.
What should you do?
A. Remove the .man extension from the user profile name.
B. Configure Folder Redirection by using the domain group policy.
C. Configure the user’s documents library to include folders from network shares.
D. Add the .dat extension to the user profile name.
Answer: B
Explanation:
Folder Redirection allows administrators to redirect the path of a folder to a new location, which can be a folder on the local computer or a directory on a network file share. Users can then work with documents on a server as if the documents were based on a local drive, but are available to the user from any computer on the network. Folder Redirection can be found under Windows Settings in the console tree by editing domain-based Group Policy via the Group Policy Management Console (GPMC).
Incorrect Answers:
A: A super mandatory profile is a roaming profile in which the profile path ends in .man. Removing the .man extension will create a roaming profile, which will not solve the problem.
C: A super mandatory profile prevents users from saving any changes to their profile, which includes the user’s documents library.
D: A super mandatory profile is a roaming profile in which the profile path ends in .man. Adding the .dat extension will result in an error.
https://technet.microsoft.com/en-gb/library/cc732275.aspx
http://windowsitpro.com/systems-management/inside-user-profiles
QUESTION 40
You have a client Windows 10 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed.
You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive.
Which Group Policy object (GPO) setting should you configure?
A. Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
B. Require additional authentication at startup.
C. Allow network unlock at startup.
D. Configure use of hardware-based encryption for operating system drives.
Answer: B
Explanation:
To make use of BitLocker on a drive without TPM, you should run the gpedit.msc command.
You must then access the Require additional authentication at startup setting by navigating to Computer Configuration \Administrative Templates\Windows Components\Bit Locker Drive Encryption\Operating System Drives under Local Computer Policy. You can now enable the feature and tick the Allow BitLocker without a compatible TPM checkbox.
Incorrect Answers:
A: The Allow access to BitLocker-protected fixed data drives from earlier version of Windows policy setting is used to control whether access to drives is allowed via the BitLocker To Go Reader, and if the application is installed on the drive.
C: The Allow network unlock at startup policy allows clients running BitLocker to create the necessary network key protector during encryption.
D: The Configure use of hardware-based encryption for operating system drives policy controls how BitLocker reacts when encrypted drives are used as operating system drives http://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/ https://technet.microsoft.com/en-us/library/jj679890.aspx#BKMK_depopt4
Microsoft Certification 70-697 certificate are those engaged in IT industry’s dream. You need to choose the professional training by Lead2pass Microsoft 70-697 dumps. Lead2pass will be with you, and to ensure the success wherever you may increase pursuit your career. Let Lead2pass take all your heart, let the dream to reality!
70-697 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDNV91YXU2blBtY0U
2017 Microsoft 70-697 exam dumps (All 199 Q&As) from Lead2pass:
http://www.lead2pass.com/70-697.html [100% Exam Pass Guaranteed]