70-698 Exam - Installing and Configuring Windows 10

certleader.com

Q1. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.

A user named User1 works from home and has a desktop computer that runs Windows 10 Pro. User1 has an application named App1 that requires access to a server on the corporate network. User1 creates a VPN connection on the computer.

You need to ensure that when User1 opens App1, App1 can access the required data. What should you do?

A. Click Turn on password protected sharing.

B. Disable Network Discovery.

C. Modify the Profile settings of an incoming firewall rule.

D. Run the Add-VpnConnectionTriggerApplication cmdlet.

E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.

F. Run the New-VpnConnection cmdlet.

G. Run the Set-NetConnectionProfile cmdlet.

H. Run the Set-VPNConnection cmdlet.

Answer: D

Explanation:

https://technet.microsoft.com/en-us/library/dn296460(v=wps.630).aspx

Q2. A user named User1 has a laptop that runs Windows 10 Pro.

At home, User1 connects to the home network by using an Ethernet connection User1 reports that he sometimes exceeds his Internet data limit.

You need to prevent the laptop from downloading Windows updates automatically. What should you do?

A. From a local Group Policy, modify the Windows Update settings.

B. From a local Group Policy, modify the Network Connections settings.

C. From the Settings app. configure a metered connection.

D. From the Settings app, selectDefer upgrades.

Answer: C

Explanation:

http://www.pcworld.com/article/3085136/windows/two-ways-to-control-or-stop-windows-10- updates.html

Q3. Your company is developing a Universal Windows Platform (UWP) app named App1. App1 is not published in the Windows Store.

You are provided with an AppX package for App1. You need to install App1 locally.

What should you do first?

A. From a Group Policy object (GPO), add a software installation package.

B. From the Settings app, modify the for developers setting.

C. Set the AppX Deployment Service (AppXSVC) to Automatic and restart the computer.

D. Disable User Account Control (UAC).

Answer: B

Explanation:

https://msdn.microsoft.com/windows/uwp/get-started/enable-your-device-for-development

Q4. In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that none of the solutions solve the problem.

Once you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals.

Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and Computer2.

A user named User1 is a member of the local Administrators group on Computer1 and Computer2.

User1 fails to access the Event Viewer logs on Computer2 from Computer1. User1 can connect to Computer2 remotely by using Computer Management.

You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer2.

Solution: You run winrm quickconfig on Computer2. Does this meet the goal?

A. Yes

B. No

Answer: B

Explanation:

https://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx

Q5. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

 

Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.

 

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table.

 

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements:

 

You need to recommend a solution to meet the requirements of User1. What should you include in the recommendation?

A. Remote Access Connection Manager

B. Remote Desktop

C. Remote Assistance

D. Windows PowerShell Remoting

Answer: C

Explanation:

http://www.technig.com/set-up-windows-remote-assistance/

Q6. You have a computer named Computer1 that has the Hyper V feature enabled.

You have two virtual machines named VM1 and VM2 hosted on Computer1. VM1 can communicate with VM2 and Compute1. VM1 tails to connect to the Internet- Computer1 can connect to the Internet.

You need to ensure that VM1 can connect to the Internet. What should you do?

A. On Computer 1, modify the network settings.

B. Enable port mirroring on VM1.

C. Create an external virtual switchand configure VM1 to use the switch.

D. On VM1, select Enable virtual LAN identification.

Answer: C

Explanation:

http://www.technig.com/connect-hyper-v-machines-to-internet/

Q7. Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all.

You have a computer that has a dual-boot configuration. Windows 10 Pro is installed on the local disk. Windows 10 Enterprise is installed in a VHDX file named Disk1.vhdx.

You start the computer to Windows 10 Pro, and then you download a driver package.

You need to ensure that the next time the Windows 10 Enterprise installation starts, the driver is installed already.

What should you run first?

A. Add-WindowsImage

B. bcdboot.exe

C. bcdedit.exe

D. bootcfg.exe

E. bootim.exe

F. bootsect.exe

G. G. diskpart.exe

H. Expand-WindowsImage

Answer: G

Explanation:

https://technet.microsoft.com/en-us/library/dd799267(v=ws.10).aspx#BKMK_addDrivers

Q8. You have set up a new wireless network for one of your prestigious clients.

The director wants to ensure that only certain designated wireless laptops can connect to the new network to prevent misuse.

What do you need to do?

A. Use MAC address control

B. UseIPv4 address control

C. Use WEP

D. Use WPA

Answer: A

Explanation:

http://www.belkin.com/PYRAMID/AdvancedInfo/F5D7633uk4A/Interfaces/UI2/English/wirel ess_mac_ctrl.html\

Q9. Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

 

Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table:

 

All of the servers run Windows Server 2012 R2.

Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA.

The network contains a mainframe computer that is administered by using the Telnet protocol.

The domain contains four client computers configured as shown in the following table:

 

All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA. Remote Desktop is enabled on Computer4.

Your company identifies the following requirements:

 

You need to meet the Credential Guard requirement of Computer2.

Which two Windows features should you install? Each correct answer presents part of the solution.

A. Windows Process Activation Service (WAS)

B. Embedded BootExperience

C. Isolated User Mode

D. Windows Identity Foundation 3.5

E. Hyper-V Hypervisor

Answer: C,E

Explanation:

https://technet.microsoft.com/en-us/itpro/windows/keep-secure/credential-guard

Q10. You have computers that run Windows 10.

You need to identify both active malware instances and past malware instances from the last three months.

Which command should you run?

A. Get-EventSubscriber

B. Get-MpThreatCatalog

C. Get-WindowsErrorReporting

D. Get-MpThreatDetection

Answer: D

Explanation:

https://technet.microsoft.com/en-us/library/dn433290.aspx