Want to know Testking 70-686 Exam practice test features? Want to lear more about Microsoft Pro: Windows certification experience? Study High value Microsoft 70-686 answers to Avant-garde 70-686 questions at Testking. Gat a success with an absolute guarantee to pass Microsoft 70-686 (Pro: Windows) test on your first attempt.

Q81. Your network contains 5 servers that have the Remote Desktop Session Host role service installed. The servers host a Remote Desktop RemoteApp named App1. 

You need to recommend a solution for App1 that meets the following requirements: 

. Must ensure that users can connect to any Remote Desktop Session Host server 

. Must ensure that users are automatically reconnected to disconnected sessions 

What should you include in the recommendations? 

A. Windows Virtual PC and Windows XP Mode 

B. Remote Desktop Web Access 

C. Remote Desktop Gateway 

D. Windows Deployment Services 

E. Remote Desktop Connection Broker 

Answer:

Explanation: 

Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs. http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx 


Q82. Your company has client computers that run Windows Vista. The company plans to upgrade the Windows Vista computers to Windows 7. The current configuration of all client computers in your company is based on a common Windows Vista image. Some branch offices use WAN connections to connect to the main office. 

You have the following requirements: 

Transfer all user data from the original Windows Vista installation to the new Windows 7 installation. 

Use the least amount of bandwidth while transferring the user data. Support the same migration strategy for all offices. 

You need to design a user state migration strategy that supports the requirements. 

What should you do? 

A. Use the Deployment Image Servicing and Management (DISM) tool. 

B. Use the User State Migration Tool (USMT) and a hard-link migration store. 

C. Use Windows PE to perform an offline migration. 

D. Use the multicast feature of Windows Deployment Services (WDS). 

Answer:

Explanation: 

Hints: A and B is not use for user state migration C is the best tool to do that 


Q83. Your company has a main office and 5 branch offices. Each office contains 200 client computer. 

Each office has a direct connection to the Internet. The branch offices are connected to the main office through dedicated connections. 

You plan to deploy an update solution for all client computers by using Windows Server Update Services (WSUS). 

You need to recommend a WSUS deployment solution. The solution must minimize traffic over the dedicated connections. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Configure WSUS to download updates from an upstream server. 

B. Deploy BranchCache in distributed cache mode in each office. 

C. Deploy a WSUS server in each office. 

D. Configure WSUS to download updates from Microsoft Update. 

E. Deploy a WSUS server in the main office only. 

Answer: C,D 

Explanation: 

hints: 

Each office has a direct connection to the Internet. 

The branch offices are connected to the main office through dedicated connections. 


Q84. Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7. 

You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. 

Which tool should you use? 

A. Windows Compatibility Evaluator 

B. Setup Analysis Tool 

C. Inventory Collector 

D. Update Compatibility Evaluator 

Answer:

Explanation: 

http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx 

The Setup Analysis Tool (SAT) automates the running of application installations while monitoring the actions taken by each application’s installer. The standalone version of SAT can monitor any MSI-based installers and third-party installers. However, the Virtual SAT tool can only monitor MSI-based installers and third-party installers that run unattended. 

hints: 

You need to detect compatibility issues that can occur during the installation and configuration process for a specific application. 


Q85. HOTSPOT 

A company's server runs Windows 2008 R2 with Active Directory Domain Services (AD DS) and Windows Server Update Services (WSUS). All client computers run Windows 7 Enterprise. 

You need to automate the distribution of Windows security updates to all client computers by meeting the following requirements: 

1) Point all client computers to the WSUS server. 

2) Schedule updates to install at a specific time. 

3) Run the updates immediately after Windows starts if the computer missed the originally 

scheduled updates. 

You need to configure Group Policy to meet the requirements. 

Which settings should you configure? To answer, select the appropriate setting or settings in the work area. 

Answer: 


Q86. Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments. 

These network segments are shown in the following diagram. 

Your company plans to deploy Windows 7 to all client computers. 

You need to manage activation for client computers that are located in the high-security network segment. 

What should you do? 

A. Deploy the Key Management Service (KMS) in the core network segment. 

B. Deploy the Key Management Service (KMS) in the high-security network segment. 

C. Install the Volume Activation Management Tool (VAMT) in the core network segment. 

D. Install the Volume Activation Management Tool (VAMT) in the high-security network segment. 

Answer:

Explanation: 

Key Management Service (KMS) requires a count of 25 or higher from the KMS host to 

activate itself. 

refer to http://technet.microsoft.com/en-us/library/ee939272.aspx 

There is a firewall blocking, (VAMT) should setup at high-security network. 


Q87. You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators? 

A. Local Group Policy Editor 

B. GPOAccelerator Tool 

C. Remote Server Administration Tools 

D. Administration Tools Pack 

Answer:

Explanation: 

Group Polices were modified using the Group Policy Edit tool that was integrated with Active Directory Users and Computers Microsoft Management Console (MMC) snap-in, but it was later split into a separate MMC snap-in called the Group Policy Management Console (GPMC). The GPMC is now a user component in Windows Server 2008 and Windows Server 2008 R2 and is provided as a download as part of the Remote Server Administration Tools for Windows Vista and Windows 7. 

http://en.wikipedia.org/wiki/Group_Policy 


Q88. Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copy data from their computers to removable drives. You need to ensure that data that is copied to removable drives is protected. What should you do? 

A. Use Encrypting File System (EFS) 

B. Enable Trusted Platform Module (TPM) hardware on all client computers 

C. Use Active Directory Rights Management Services 

D. Configure a Group Policy to enforce the use of BitLocker To Go 

Answer:

Explanation: 

BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restricted with a passphrase. In addition to having control over passphrase length and complexity, IT administrators can set a policy that requires users to apply BitLocker protection to removable drives before being able to write to them. 

http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-7/features.aspx#bitlocker 


Q89. You have an image that is used to deploy Windows 7 on client computers. 

You need to add drivers to the Windows 7 image. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Use the Deployment Image Servicing and Management (DISM) tool offline. 

B. Use INF files for driver packages. 

C. Use executable files for driver packages. 

D. Use Windows Installer files for driver packages. 

E. Use the Deployment Image Servicing and Management (DISM) tool online. 

Answer: A,B 

Explanation: 

Deployment Image Servicing and Management able to attach INF driver file to image at offline mode 


Q90. You are managing data migration from an existing Windows 7 computer to a new Windows 7 computer. You need to migrate user and application data from the existing computer to the new computer. 

Which command should you run on the existing and new computers? (To answer, drag the appropriate commands to the correct location in the work area.) 

Answer: