Microsoft 70-697 Configuring Windows Devices Online Training
Microsoft 70-697 Online Training
The questions for 70-697 were last updated at Nov 23,2024.
- Exam Code: 70-697
- Exam Name: Configuring Windows Devices
- Certification Provider: Microsoft
- Latest update: Nov 23,2024
You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
- A . From Disk Management, create a new spanned volume.
- B . From Disk Management, convert all of the 3-terabyte disks to GPT.
- C . From PowerShell, run the NewCVirtualDisk cmdlet.
- D . From Disk Management, bring all disks offline.
- E . From Diskpart, run the Convert MBR command.
- F . From PowerShell, run the AddCPhysicalDisk cmdlet.
At home, you use a Windows 10 desktop computer. At work, you use a Windows 10 laptop that is connected to a corporate network. You use the same Microsoft account to log on to both computers.
You have a folder with some personal documents on your desktop computer. The folder must be available and synced between both computers.
You need to ensure that the latest version of these files is available.
What should you do?
- A . Create a folder by using OneDrive for Windows. Move all of the personal documents to the new folder.
- B . Move the folder to the Libraries folder. Go to PC Settings. Under Sync your settings, enable App settings.
- C . Right-click the folder and click Properties. Under Security, provide Full Control for the Microsoft account.
- D . Right-click the folder and select Share With, and then select Homegroup (view and edit).
You have 100 client Windows 10 computers. Users are NOT configured as local administrators. You need to prevent the users from running applications that they downloaded from the Internet, unless the applications are signed by a trusted publisher.
What should you configure in the Security settings from the Action Center?
- A . Virus protection
- B . User Account Control
- C . Windows SmartScreen settings
- D . Network Access Protection
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 10 HomeGroup.
The HomeGroup includes one shared printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?
- A . Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
- B . Change the Enterprise password and re-enter it on the computers of all members of the HomeGroup.
- C . Change the default sharing configuration for the shared folders on the HomeGroup computers.
- D . Reset your account password to match the HomeGroup password.
Your network contains an Active Directory domain. The domain contains 100 Windows 10 client computers. All of the computers secure all connections to computers on the internal network by using IPSec.
The network contains a server that runs a legacy application.
The server does NOT support IPSec.
You need to ensure that some of the Windows 8 computers can connect to the legacy server. The solution must ensure that all other connections are secured by using IPSec.
What should you do?
- A . Modify the settings of the Domain Profile.
- B . Create a connection security rule.
- C . Create an inbound firewall rule.
- D . Modify the settings of the Private Profile,
You administer Windows 10 Enterprise laptop and desktop computers. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS).
Your company decides that access to the company network for all users must be controlled by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?
- A . Install smart card readers on all computers. Issue smart cards to all users.
- B . Enable the Password must meet complexity requirements policy setting. Instruct users to logon by typing their user principal name (UPN) and their strong password.
- C . Create an Internet Protocol security (IPsec) policy on each Windows 10 Enterprise computer to encrypt traffic to and from the domain controller
- D . Issue photo identification to all users. Instruct all users to create and use a picture password.
Your network contains an Active Directory domain and 100 Windows 10 client computers. All software is deployed by using Microsoft Application Virtualization (App-V) 5.0.
Users are NOT configured as local administrators.
Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus.
You need to create an App-V package for Office 365 ProPlus.
What should you do?
- A . Run the Office Customization Tool (OCT), run the App-V Sequencer and then run Setup /Packager.
- B . Download the Office Deployment Tool for Click-to-Run, run the App-V Sequencer and then run Setup /Admin.
- C . Download the Office Deployment Tool for Click-to-Run, run Setup /Download and then run Setup /Packager.
- D . Run the Office Customization Tool (OCT), run Setup /Download and then run the App-V Sequencer.
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker.
The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume.
You need to provide a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
- A . Ask the user to run the manageCbdeCprotectorsCdisable e: command.
- B . Ask the user for his or her logon name.
- C . Ask the user to run the manageCbdeCunlock E:Cpw command.
- D . Ask the user for his or her computer name.
- E . Ask the user for a recovery key ID for the protected drive.
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro.
These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.
What should you do?
- A . Publish the application through a public file transfer protocol (FTP) site.
- B . Publish the application through an intranet web site.
- C . Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
- D . Publish the application to Windows Store.
You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory.
You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members.
You need to ensure that users that meet the membership criteria are added to the Windows Intune group.
What should you do?
- A . Force Active Directory replication within the domain.
- B . Ensure that all user accounts are identified as synchronized users.
- C . Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory.
- D . Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.