Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-686 Exam - Cheat-Test.com

Free 70-686 Sample Questions:

1. Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments.
These network segments are shown in the following diagram.
(Diagram is not available in this demo)
Your company plans to deploy Windows 7 to all client computers.
You need to manage activation for client computers that are located in the high-security network segment.
What should you do?
A. Deploy the Key Management Service (KMS) in the core network segment.
B. Deploy the Key Management Service (KMS) in the high-security network segment.
C. Install the Volume Activation Management Tool (VAMT) in the core network segment.
D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment.
Answer: D

2. Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active Directory–integrated DNS.
You deploy the Key Management Service (KMS) on a Windows 7 computer.
You need to ensure that Windows 7 client computers can locate the KMS host and perform activation.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Deploy a Windows Server 2008 KMS host.
B. Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.
C. Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.
D. Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.
Answer: BD

3. Your company’s network is shown in the following diagram.
(Diagram is not available in this demo)
All client computers are members of the contoso.com Active Directory Domain Services (AD DS) domain.
Each network segment is represented by an AD DS site object that is named to match the network segment.
Your company plans to deploy Windows 7 to all client computers.
You need to manage the deployment to ensure that client computers in branch office C can activate Windows.
What should you do?
A. Deploy the Multiple Activation Key (MAK) in branch office C.
B. Deploy the Key Management Service (KMS) in branch office C.
C. Create a DNS service (SRV) resource record named _vlmcs._tcp.BranchOfficeC._sites.contoso.com.
D. Create a DNS service (SRV) resource record named _vlmcs._udp.BranchOfficeC._sites.contoso.com.
Answer: A

4. Your company’s network is shown in the following diagram.
(Diagram is not available in this demo)
The company plans to deploy Windows 7 to all client computers.
You need to manage the deployment to ensure that client computers in branch office A and in branch office B can activate Windows.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Deploy the Key Management Service (KMS) in branch office A.
B. Deploy the Key Management Service (KMS) in branch office B.
C. Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network.
D. Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network.
Answer: BC

5. Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.
You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.
You need to plan the most efficient method for activating all of the computers.
What should you do?
A. Use the Key Management Service (KMS) for all the computers.
B. Use Multiple Activation Key (MAK) Independent for all the computers.
C. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers.
D. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers.
Answer: A

6. Your company’s network has client computers that run Windows 7.
When a user attempts to log on to the domain from a computer named Client1, she receives the following message:
The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect.
You need to ensure that the user can log on to the domain from Client1.
What should you do?
A. Disjoin and rejoin Client1 to the domain.
B. Add the computer account for Client1 to the Domain Computers Active Directory group.
C. Reset the account password for Client1 through Active Directory Users and Computers.
D. Reset the account password for the user through Active Directory Users and Computers.
Answer: A

7. The client computers in your network run either Windows XP or Windows 7. All client computers are in a single Active Directory Domain Services (AD DS) organizational unit (OU) named MyClients.
You install Windows Software Update Services (WSUS). You create a Group Policy object (GPO) that enables automatic updates from the WSUS server, and you link the GPO to the MyClients OU. You place all client computers in a targeting group named MyClients.
Testing reveals that a security update that is applicable to both Windows XP and Windows 7 causes a line-of-business application to fail on the Windows XP client computers.
You need to ensure that the application runs on the Windows XP client computers and that the Windows 7 client computers receive the security update.
What should you do?
A. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
B. Remove the Windows XP client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
C. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the Unassigned Computers targeting group.
D. Create a targeting group named MyXPClients beneath the MyClients targeting group. Move the Windows XP client computers to the MyXpClients targeting group. Approve the update for installation to the MyClients targeting group.
Answer: C

8. Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates and service packs.
Microsoft releases a security update for Windows 7.
You have the following requirements:
·The security update must be deployed by 5:00 P.M. on Friday.
·Computers that are off when the security update is deployed must install the security update as soon as they are turned on.
You need to manage the software update process to meet the requirements.
What should you do?
A. Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00 P.M.
B. Approve the security update for installation through the WSUS console with no deadline.
C. Approve the security update for download through the WSUS console with a deadline of Friday at 5:00 P.M.
D. Approve the security update for download through the WSUS console with no deadline.
Answer: A

9. Your company has client computers that run Windows Vista and client computers that run Windows 7.
The client computers connect directly to the Microsoft Update Web site once per week and automatically install all available security updates.
Microsoft releases a security update for Windows 7.
You have the following requirements:
·Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed.
·Use the least amount of administrative effort.
You need to manage the software update process to meet the requirements.
What should you do?
A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation, and force a detection cycle on the client computers.
B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers.
C. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers. Configure MBSA to use the Microsoft Update site catalog.
D. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.
Answer: C

10. Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain, organizational unit (OU), and Group Policy object (GPO) design is shown in the following diagram.
(Diagram is not available in this demo)
You deploy a Microsoft Windows Server Update Services (WSUS) server.
You need to ensure that only client computers that are members of the NY Computers OU use the WSUS server for updates.
Where should you define Windows Update settings?
A. in the User Configuration settings of the New York Computers GPO
B. in the User Configuration settings of the New York Baseline GPO
C. in the Computer Configuration settings of the New York Computers GPO
D. in the Computer Configuration settings of the New York Baseline GPO
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved