Microsoft 70-697 Practice Test 2021

Exam Code: 70-697 (microsoft 70 697), Exam Name: Configuring Windows Devices, Certification Provider: Microsoft Certifitcation, Free Today! Guaranteed Training- Pass 70-697 Exam.

Free demo questions for Microsoft 70-697 Exam Dumps Below:

NEW QUESTION 1
A company has client computer that run Win 10 enterprise. The corporate network is configured for IPv4 and IPv6.
You need to disable IPv6 on the client computer without affecting IPv4 communicatins.
What should you do on each computer?

  • A. Run the Set-NetIPv4Protocol Windows PowerShell cmdlet
  • B. Run the Set-NetIPv6Protocol Windows PowerShell cmdlet
  • C. Run Disable-NetAdapter Windows PowerShell cmdlet
  • D. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet

Answer: D

Explanation: References: http://juventusitprofessional.blogspot.co.za/2013/11/powershell-windows-2012-disable-ipv6.html

NEW QUESTION 2
You administer Windows 10 devices for an organization. All devices are joined to the domain contoso.com. All network printers are managed in the domain. You have a group named Printer Administrators. You grant this group permissions to manage all printer settings. You add all mobile users to the Printer Administrators group.
Each office locations has Web Services for Devices (WSD) printers available. Managers report that network printers are not available when they move between office locations. Managers
must be able to use printers in each office location.
You need to troubleshoot the manager's computer for printing issues.
Which three actions should you perform? Each correct answer is part of the solution. NOTE: Each correct selection is worth one point.

  • A. Ensure that the network type is set to domain.
  • B. Ensure that the network type is set to public.
  • C. Ensure that File and Printer Sharing is turned on.
  • D. Ensure that Network Discovery is turned on.
  • E. Update the Printing Preferences settings.

Answer: CDE

Explanation: References: http://support.brother.com/g/b/faqend.aspx?c=us_ot&lang=en&prod=p750weus&faqid=faqp00100003_000 https://support.microsoft.com/en-sg/help/4028622/windows-10-how-to-set-a-default- printer

NEW QUESTION 3
You are using sysprep to prepare a system for imaging.
You want to reset the security ID (SID) and clear the event logs. Which option should you use?

  • A. /generalize
  • B. /oobe
  • C. /audit
  • D. /unattend

Answer: A

Explanation: Generalize prepares the Windows installation to be imaged.
If this option is specified, all unique system information is removed from the Windows installation. The security ID (SID) resets, any system restore points are cleared, and event logs are deleted.
The next time the computer starts, the specialize configuration pass runs. A new security ID (SID)is created, and the clock for Windows activation resets, if the clock has not already been reset three times.

NEW QUESTION 4
You are a desktop support technician for your company.
You deliver new Windows 10 Enterprise laptops to the software developers. The software developers frequently use laptops to work remotely and are often disconnected from the corporate network. One of the software developers works on an application that must run on Windows XP, Windows Vista, Windows 7, and Windows 10 Enterprise. The software developer needs the ability to test the application natively on each of these operating systems.
You need to provide the software developer with a way to test the application on all operating system versions on the new laptop. The software developer must be able to perform the testing while working remotely without access to corporate resources. What should you do?

  • A. Use Hyper-V to create three virtual machines that provide Windows XP, Windows Vista, and Windows 7 environments.
  • B. Install the Windows PE version of Windows XP, Windows Vista, and Windows 7 on three USB drives and boot from each drive to test each operating system version.
  • C. Change the compatibility mode settings of the application to Windows XP, Windows Vista, and Windows 7 before testing each operating system version.
  • D. Create three virtual machines for Windows XP, Windows Vista, and Windows 7 on a company Windows Server 2012 that is running Hyper-V.

Answer: A

NEW QUESTION 5
HOTSPOT
Your network contains an Active Directory domain.
The Default Domain Policy contains the AppLocker settings configured as shown in the AppLocker Settings exhibit. (Click the Exhibit button.)
70-697 dumps exhibit
The Default Domain Policy contains the AppLocker properties configured as shown in the AppLocker properties exhibit. (Click the Exhibit button.)
70-697 dumps exhibit
Use the drop-down menus to select the answer choice that completes each statement.
NOTE: Each correct selection is worth one point.
70-697 dumps exhibit
70-697 dumps exhibit

    Answer:

    Explanation: App1.exe will be denied for everyone.
    The rule configured for App1.exe is an Executable rule. https://docs.microsoft.com/en-us/windows/device-security/applocker/understand-applocker-enforcement-settings
    https://docs.microsoft.com/en-us/windows/device-security/applocker/determine-your-application-control-objectives

    NEW QUESTION 6
    A company has Windows 10 Enterprise client computers.
    You install a new device on a client computer. The device installation includes an application that runs when the computer starts. You experience problems with the application.
    You need to prevent the application from the running when the computer starts, without affecting any other application.
    What should you do?

    • A. Configure the application by using Task Manager
    • B. Run the bcdedit command
    • C. Run the msconfig command
    • D. Configure the device by using Device Manager

    Answer: A

    Explanation: References: https://support.microsoft.com/en-za/help/4026268/windows-change-tartup-apps-in-windows-10

    NEW QUESTION 7
    DRAG DROP
    As part of its upgrade to Windows 10 Enterprise, your company is implementing additional security controls relating to data access.
    You need to implement a solution that meets the following requirements:
    Secure all data on local hard drives.
    Limit users’ ability to modify files.
    Which feature should you use to meet each requirement? To answer, drag the appropriate feature or features to the correct requirement or requirements. Each feature may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
    NOTE: Each correct selection is worth one point.
    70-697 dumps exhibit

      Answer:

      Explanation: 70-697 dumps exhibit

      NEW QUESTION 8
      You are an IT professional for a bank. All of the user’s files on the external drives are encrypted by using EFS.
      You replace a user’s computer with a new Windows 10 Enterprise computer. The user needs to connect her external hard drive to the new computer. You have the original computer’s certificate and key.
      You need to import the certificate and key onto the new computer.
      Into which certificate store should you import the certificate and key?

      • A. Untrusted Certificates
      • B. Trusted Root Certification Authorities
      • C. Personal
      • D. Trusted Publishers

      Answer: C

      NEW QUESTION 9
      DRAG DROP
      You are the system administrator for a small business. A developer runs Hyper-V on a Windows 10 device named PC-Dev1.
      The developer must deploy a Windows 7 virtual machine (VM) to PC-Dev1. You plan to use an existing Windows 7 device named PC1 to create the image for the VM. PC1 uses MBR for the partition style. This partition style must be used for the VM. You need to prepare and convert the VM.
      Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
      70-697 dumps exhibit

        Answer:

        Explanation:
        References: https://docs.microsoft.com/en-us/sysinternals/downloads/disk2vhd

        NEW QUESTION 10
        DRAG DROP
        You plan to use Microsoft Intune to manage application updates for non-Microsoft applications.
        You create a new Intune subscription.
        You need to test the deployment of the updates on a computer. The solution must ensure that the updates are deployed only if the test computer has the corresponding application installed already.
        Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
        70-697 dumps exhibit

          Answer:

          Explanation: 70-697 dumps exhibit

          NEW QUESTION 11
          Your company upgrades a research and development department workstation to a Windows 10 Enterprise computer. Two of the workstation’s folders need to be encrypted. The folders are named C:ProtectedFiles and C:Backups.
          You attempt to encrypt the folders. The output is shown in the following exhibit.
          70-697 dumps exhibit
          Use the drop-down menus to select the answer choice that completes each statement. NOTE: Each correct selection is worth one point.
          70-697 dumps exhibit
          70-697 dumps exhibit

            Answer:

            Explanation: We can see from the image below that all files and the ProtectedFiles folder were encrypted successfully (There are no errors and there is an [OK] message for each action).
            70-697 dumps exhibit
            The image below shows that the folder was encrypted successfully (Setting the directory Backups to encrypt new files [OK]).
            The file Backup.zip failed to encrypt because the file is read only. The other file, OldBackup.zip was encrypted successfully.
            70-697 dumps exhibit
            References: https://technet.microsoft.com/en-us/library/bb490878.aspx

            Topic 7, Manage remote access

            NEW QUESTION 12
            Your network contains an Active Directory domain named contoso.com. The domain contains Windows 10 Enterprise client computers.
            Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses.
            You need to add a third email address for each user. What should you do?

            • A. From Active Directory Users and Computers, modify the E-mail attribute for each user.
            • B. From Microsoft Azure Active Directory Module for Windows PowerShell, run the Set–Mailbox cmdlet.
            • C. From Active Directory Domains and Trust, add a UPN suffix for each user.
            • D. From the Office 365 portal, modify the Users settings of each user.

            Answer: B

            Explanation: We can use the Set–Mailbox cmdlet to modify the settings of existing mailboxes.
            The EmailAddresses parameter specifies all the email addresses (proxy addresses) for the recipient, including the primary SMTP address. In on-premises Exchange organizations, the primary SMTP address and other proxy addresses are typically set by email address policies. However, you can use this parameter to configure other proxy addresses for the recipient.
            To add or remove specify proxy addresses without affecting other existing values, use the following syntax:
            @{Add="[<Type>]:<emailaddress1>","[<Type>]:<emailaddress2>"...; Remove="[<Type>]:<emailaddress2>","[<Type>]:<emailaddress2>"...}.

            NEW QUESTION 13
            You are setting up a Windows 10 Enterprise computer.
            The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.)
            70-697 dumps exhibit
            The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.)
            70-697 dumps exhibit
            Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the Exhibit button.)
            70-697 dumps exhibit
            For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each correct selection is worth one point.
            70-697 dumps exhibit

              Answer:

              Explanation: The computer has a physical network adapter.
              70-697 dumps exhibit
              When you enable Hyper-V on a computer, a virtual network adapter connected to a virtual switch is added.
              70-697 dumps exhibit
              Therefore, the computer is a Hyper-V host.
              The computer has an IP address. The text in the image below shows that the network connection is not DHCP enabled. Therefore, this is a static IP address.
              70-697 dumps exhibit
              The computer is a Hyper-V host, not a Hyper-V virtual machine.

              NEW QUESTION 14
              You have a computer that runs Windows 10.
              You need to ensure that the next time the computer restarts, the computer starts in safe mode.
              What should you use?

              • A. the System Configuration utility
              • B. the Restore–Computer cmdlet
              • C. the Bcdboot command
              • D. System in Control Panel

              Answer: A

              Explanation: References: http://www.digitalcitizen.life/4-ways-boot-safe-mode-windows-10

              NEW QUESTION 15
              You administer computers that run Windows 10 Enterprise and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory.
              A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume.
              Which two actions should you perform? Each correct answer presents part of the solution.

              • A. Ask the user for his computer name.
              • B. Ask the user to run the manage–bde –unlock E: –pw command.
              • C. Ask the user for his logon name.
              • D. Ask the user for a recovery key ID for the protected volume.

              Answer: AB

              Explanation: A: To view the recovery passwords fora computer you would need the computer
              name:
              In Active Directory Users and Computers, locate and then click the container in which the computer is located.
              Right-click the computer object, and then click Properties.
              In the Properties dialog box, click the BitLocker Recovery tab to view the BitLocker recovery passwords that are associated with the particular computer.
              B: The Manage–bde: unlock command unlocks a BitLocker-protected drive by using a recovery password or a recovery key.

              NEW QUESTION 16
              You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365 ProPlus programs.
              You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation.
              Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
              70-697 dumps exhibit

                Answer:

                Explanation: The first step is to download the Office Deployment Tool.
                You then need to modify the configuration file. This will be used to specify the installation options for Word and Excel.
                You then run Setup.exe from the Office Deployment Tool with the /download option to download the required software based on the options in the configuration file.
                The final step is to install Word and Excel by running Setup.exe from the Office Deployment Tool with the
                /configure option to install the required software based on the options in the configuration file.

                NEW QUESTION 17
                You manage a branch office of a company named Contoso.
                The branch office contains 20 computers that run Windows 10 Enterprise.
                The main office of Contoso hosts a Win Server Update Service server. (WSUS). Branch office computers are configured to download updates from the Internet.
                You need to prevent computers in the branch office from sharing updates with other computers.
                What should you do?

                • A. Modify the branch cache hosted mode settings
                • B. Modify branch cache distributed cache mode settings
                • C. Modify the Chose how updates are delivered settings
                • D. Deploy a downstream WSUS server to the branch office

                Answer: C

                Explanation: References: https://www.howtogeek.com/223068/what-you-need-to-know-about-windows-update-on-windows-10/

                100% Valid and Newest Version 70-697 Questions & Answers shared by 2passeasy, Get Full Dumps HERE: https://www.2passeasy.com/dumps/70-697/ (New 338 Q&As)