You need to manage Windows 7 and Microsoft Office 2010 license keys for the VDI pool automatically. What should you do? (Choose all that apply.)
A. Install the Remote Desktop Licensing role service.
B. Install a ConfigMgr primary site server.
C. Install a MAK proxy server.
D. Install the Office 2010 KMS Host License Pack.
E. Activate the KMS host with the Office 2010 KMS key.
F. Install Volume Activation Management Tool 2.0.
G. Install a server core installation of Windows Server 2008 R2 Standard and add the AD DS role.
H. Activate the server with a MAK key.
I. Activate the server with a KMS key.
You are planning the deployment of a new engineering application in the Chicago office. You need to meet company requirements for application deployment. What should you recommend?
C. Remote Desktop Session Host
D. Remote Desktop RemoteApp
You run Sysprep on a base image for the company’s VDI pool. You plan to use Windows Deployment Services (WDS) for the deployment.
You need to recommend the Sysprep parameters to ensure that the base image is ready for deployment while meeting the company requirements.
Which parameters should you recommend? (Choose all that apply.)
You are planning to deliver VDI by using the companys virtualization infrastructure.
You need to ensure that VDI users are always reconnected to the same VDI session.
What should you recommend?
A. Deploy the App-V desktop client.
B. Add the VmHostAgent role service.
C. Deploy the App-V Sequencer.
D. Install Windows Server 2008 R2 Datacenter with the Hyper-V role.
Users with newly deployed Windows 7 computers see a security prompt when they attempt to upload documents to the company’s intranet site.
You need to suppress the prompt without creating a security risk for the company.
What should you do? (Choose all that apply).
A. Modify the GPO to set https://intranet.company.com with a value of 1 in the Site to Zone Assignment List.
B. Modify the default Windows 7 image to add the Internet Explorer Enhanced Security Configuration component.
C. Modify the default Windows 7 image to change the default Internet Explorer security level to Medium Low.
D. Modify the default Windows 7 image to disable the Internet Explorer Automatically Detect Intranet Network setting.
E. Create a GPO and link it to the root of the domain.
F. Modify the GPO to set the web server’s NEtBIOS name with a value of 2 in the Site to Zone Assignment List.
You are designing an implementation of BitLocker. You create a GPO with BitLocker settings that conform to company requirements.
You need to design an implementation strategy that supports the company requirements.
What should you do? (Choose all that apply.)
A. Link the GPO to the Munich-Computers OU. Use a security filter to apply the GPO to all Munich desktop computers.
B. Block the Munich-Computers OU from inheriting policies.
C. Link the GPO to the Madrid-Computers OU. Use a security filter to apply the GPO to all Madrid desktop computers.
D. Link the GPO to the Munich-Users OU.
E. Create and use a WMI filter that targets all portable computers with the GPO. Link the WMI filter to the GPO
F. Link the GPO to the root of the AD DS domain.
Your company plans to upgrade all client computers to Windows 7.
The company uses a custom line-of-business application. The application contains sensitive data.
The application will not run on Windows 7
You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application.
You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.
What should you do?
A. Using MED-V TrimTransfer technology, deploy the VM image over the network
B. In the MED-V console, configure the MED-V workspace to prevent offline operation
C. Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored
D. Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory
A user from the Finance department is testing applications in Windows 7 with Internet Explorer 9.
The company’s finance application accesses a vendor web page that does not function correctly in Windows 7. When the user enables Internet Explorer Compatibility Mode for the vendor web page, it works correctly.
You need to support the company’s future software deployments.
What should you recommend? (Choose all that apply.)
A. Package the new purchasing application and publish it by using a Group Policy object (GPO) that deploys to users of the new application.
B. Package the new purchasing application and assign it by using a Group Policy object (GPO) that deploys to all Windows XP computers in the Finance department.
C. Use a Group Policy object (GPO) to add the vendor website to the Trusted Sites list on all computers in the Finance department.
D. Use a Group Policy object (GPO) to add the vendor website to the local intranet zone for all Windows 7 computers.
E. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows XP computers in offices that use the old purchasing application.
F. Use a Group Policy object (GPO) to add the vendor website to the compatibility view for all Windows 7 computers.
You are the desktop architect for a company with 10,000 client computers. Client computers are either portable or desktop computers. All client computers run the 64-bit version of Windows 7
Your network consists of a main office and four regional offices. Your network has an Active
Directory Domain Services (AD DS) in a single-domain, single-forest model. The forest and domain functional levels are set to Windows Server 2008 R2. There are four domain controllers in the main office and two additional domain controllers in each regional office.
All servers run Windows Servers 2008 R2.
The regional offices are listed in the following table with users and WAN connection speeds.
Users in the New York office will have a Customer Relationship Management (CRM) application that is CPU-intensive and only runs on windows 2000 Professional. The Toronto office uses a network-intensive application. All users in the Toronto office use a legacy CRM application that runs on Windows XP only.
The existing client computers are managed with Microsoft System Center Configuration Manager (ConfigMgr) 2007 R3.
The following business requirements must be maintained or exceeded.
Software Asset Management
The company Software Asset Management (SAM) team has a policy that mandates that after operating systems are deployed, the operating system environment (OSE) must be activated automatically before any additional updates or software are installed in the OSE.
The Paris development group has a Key Management Server (KMS) in an isolated test network.
All engineering applications are required to maintain compliance with the license agreements of the application vendors.
You need to ensure that users can always receive operating system and application updates on the internal network and when away from the main office or branch offices.
The mobile staff uses portable computers.
In the next remote update of the client computers, you need to deploy an Enterprise Resource Planning (ERP) add-on to Microsoft Internet Explorer. This add-on must support a partner application and integrate with the remote users. The ERP Internet Explorer add-on does not support the 64-bit version of Windows 7.
You use Microsoft Application Virtualization (App-V) to deliver applications to computers.
You use Microsoft Hyper-V Server 2008 R2 to deliver VDI desktops in a pool. All client operating systems deployed in the VDI pool must be automatically joined to the domain during the deployment process.
The fewest number of servers should be added to the environment to meet the technical goals.
A new version of an existing engineering application must be deployed to the users. The new application requires a dedicated graphics processing unit (GPU) with 2 GB of memory.
The following technical requirements must be maintained or exceeded.
All applications and updates are required to be deployed with the same central management tool.
Detailed reporting for compliance audits are required to be available for all application and update deployments.
All current applications must be supported on Windows 7.
You are licensed for the latest version of the Microsoft Desktop and Optimization Pack (MDOP).
Operating System Environment (OSE) Requirements
You need to ensure that Internet Explorer 9 is not automatically installed on any of the computers in the Toronto office.
You need to ensure that the Internet Explorer Initial Wizard is not displayed on any Virtual Desktop Infrastructure (VDI) computers.
All remote access must be logged and auditable. All VDI desktops computers must not send Customer Experience Improvement Program (CEIP) for Internet Explorer or windows Live Messenger.
You are planning the deployment of the CRM application to the New York office.
You need to recommend a deployment method to maximize the performance of the application.
What should you recommend?
B. Unified Access Gateway
C. Remote Desktop Connection Broker
You are replacing the desktop computers in the Chicago office.
You need to automate the migration of user profile data to the new computers.
What should you recommend? (Choose all that apply.)
A. state migration point
B. Windows Client Operating System Management Pack
C. Background Intelligent Transfer Server
D. Windows Easy Transfer
E. ConfigMgr custom task sequence
Get Low Price of Pass4sure Microsoft 70-686 Exam PDF & VCE Dumps