Microsoft 70-697 Configuring Windows Devices Online Training
Microsoft 70-697 Online Training
The questions for 70-697 were last updated at Dec 26,2024.
- Exam Code: 70-697
- Exam Name: Configuring Windows Devices
- Certification Provider: Microsoft
- Latest update: Dec 26,2024
You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet. The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot. You need to minimize data usage while connected to this hot spot.
What should you do?
- A . Turn on Airplane Mode.
- B . Disable File and Print Sharing for mobile broadband connections.
- C . Configure the interface metric of IP settings for Wi-Fi connection as1.
- D . Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.
- E . Configure the broadband connection as a metered network.
Topic 10, Mixed Questions
A company has client computers that run Windows 10.
The client computer systems frequently use IPSec tunnels to securely transmit data.
You need to configure the IPSec tunnels to use 256-bit encryption keys.
Which encryption type should you use?
- A . 3DES
- B . DES
- C . RSA
- D . AES
You administer a group of 10 client computers that run Windows 10. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts.
The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key.
Which two options can you use? (Each correct answer presents a complete solution. Choose two.)
- A . Save the recovery key to a file on the BitLocker-encrypted drive.
- B . Save the recovery key in the Credential Store.
- C . Save the recovery key to OneDrive.
- D . Print the recovery key.
You are using sysprep to prepare a system for imaging.
You want to reset the security ID (SID) and clear the event logs.
Which option should you use?
- A . /generalize
- B . /oobe
- C . /audit
- D . /unattend
Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users’ settings in an Active Directory environment.
In other words, Group Policy in part controls what users can and can’t do on a computer system.
Which one of these policies requires a reboot?
- A . Turn off Windows Defender
- B . Turn off Autoplay for non-volume devices
- C . Disable Active Desktop
- D . Turn off Data Execution Prevention for Explorer
Which term is used to refer to installing apps directly to a device without going through the Windows Store?
- A . SQL Injection
- B . BranchCache
- C . DLL Hijack
- D . Sideloading
IPv6 has a vastly larger address space than IPv4. This expansion provides flexibility in allocating addresses and routing traffic and eliminates the primary need for network address translation (NAT).
Do you know how many more bits there are in an IPv4 address compared to an IPv6 address?
- A . 4 times more
- B . 6 times more
- C . Twice as many
- D . 8 times more
You are using sysprep to prepare a system for imaging.
You want to enable end users to customize their Windows operating system, create user accounts, name the computer, and other tasks.
Which sysprep setting should you use?
- A . /oobe
- B . /audit
- C . /generalize
- D . /unattend
You have set up a new wireless network for one of your prestigious clients.
The director wants to ensure that only certain designated wireless laptops can connect to the new network to prevent misuse.
What do you need to do?
- A . Use MAC address control
- B . Use IPv4 address control
- C . Use WEP
- D . Use WPA
You administer computers that run Windows 10 Enterprise and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory.
A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? Each correct answer presents part of the solution.
- A . Ask the user for his computer name.
- B . Ask the user to run the manageCbde Cunlock E: Cpw command.
- C . Ask the user for his logon name.
- D . Ask the user for a recovery key ID for the protected volume.