[2017 New] Lead2pass 100% Valid 70-697 Exam Questions PDF Free Download (1-20)

admin   June 12, 2017   Comments Off on [2017 New] Lead2pass 100% Valid 70-697 Exam Questions PDF Free Download (1-20)

2017 June Microsoft Official New Released 70-697 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Although the Microsoft 70-697 dumps are very popular, Lead2pass offers a wide range of Microsoft 70-697 exam dumps and will continue to release new study guide to meet the rapidly increasing demand of the IT industry.

Following questions and answers are all new published by Microsoft Official Exam Center: http://www.lead2pass.com/70-697.html

QUESTION 1
You administer a Windows 10 Enterprise computer that runs Hyper-V.
The computer hosts a virtual machine with multiple snapshots.
The virtual machine uses one virtual CPU and 512 MB of RAM.
You discover that the virtual machine pauses automatically and displays the state as paused-critical.
You need to identify the component that is causing the error.
Which component should you identify?

A.    no virtual switch defined
B.    insufficient memory
C.    insufficient hard disk space
D.    insufficient number of virtual processors

Answer: C
Explanation:
In this question, the VM has “multiple snapshots” which would use up a lot of disk space. Virtual machines will go into the “Paused-Critical” state in Hyper-V if the fregfe space on the drive that contains the snapshots goes below 200MB.
One thing that often trips people up is if they have their virtual hard disks configured on one drive – but have left their snapshot files stored on the system drive. Once a virtual machine snapshot has been taken – the base virtual hard disk stops expanding and the snapshot file stores new data that is written to the disk – so it is critical that there is enough space in the snapshot storage location.
Incorrect Answers:
A: No virtual switch being defined would not cause the Pause-Critical state.
B: Insufficient memory would not cause the Pause-Critical state.
D: An insufficient number of virtual processors would not cause the Pause-Critical state.
http://blogs.msdn.com/b/virtual_pc_guy/archive/2009/04/22/why-is-my-virtual-machine-paused-critical-hyper-v.aspx

QUESTION 2
You have a Microsoft Intune subscription.
You have three security groups named Security1, Security2 and Security3.
Security1 is the parent group of Security2. Security2 has 100 users.
You need to change the parent group of Security2 to be Security3.
What should you do first?

A.    Edit the properties of Security1.
B.    Edit the properties of Security2.
C.    Delete security2.
D.    Remove all users from Security2.

Answer: C
Explanation:
You cannot change the parent group of a security group in Microsoft Intune.
You can only delete the group and recreate another group with the correct parent.
Deleting a group does not delete the users that belong to that group.
Therefore, you do not need to remove the users from the group; you can just delete the group and recreate it.
Incorrect Answers:
A: You cannot change the parent of a group by modifying the properties of the parent group.
B: You cannot change the parent of a group by modifying the properties of the group.
D: Deleting a group does not delete the users that belong to that group. Therefore, you do not need to remove the users from the group; you can just delete the group and recreate it.
https://technet.microsoft.com/en-gb/library/dn646990.aspx

QUESTION 3
A company has 10 portable client computers that run Windows 10 Enterprise.
The portable client computers have the network connections described in the following table.

 

None of the computers can discover other computers or devices, regardless of which connection they use.
You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections.
What should you do on the client computers?

A.    For the CorpWifi connection, select Yes, turn on sharing and connect to devices.
B.    Turn on network discovery for the Public profile.
C.    Change the CorpWired connection to public.
Turn on network discovery for the Public profile.
For the HotSpot connection, select No, don’t turn on sharing or connect to devices.
D.    For the CorpWired connection, select Yes, turn on sharing and connect to devices.
E.    Turn on network discovery for the Private profile.

Answer: C
Explanation:
Of the answers given, this is the only single answer that meets the requirements.
Network discovery is a network setting that affects whether your computer can see (find) other computers and devices on the network and whether other computers on the network can see your computer. By default, Windows Firewall blocks network discovery, but you can enable it.
When we change the CorpWired connection to public, all networks will be in the Public profile. Enabling network discovery for the Public profile will enable the computers to see other computers on each network (including HotSpot).
To prevent network discovery on the HotSpot network, we can select No, don’t turn on sharing or connect to devices for that network. This will disable Network discovery for the computer’s connection to the HotSpot network.
Incorrect Answers:
A: This solution would enable network discovery for the CorpWifi network, but not the CorpWired network.
B: This solution would enable network discovery for the CorpWifi and HotSpot networks, but not the CorpWired network.
D: This solution would enable network discovery for the CorpWired network, but not the CorpWifi network.
E: This solution would enable network discovery for the CorpWired network, but not the CorpWifi network.

QUESTION 4
Hotspot Question
Your company upgrades a research and development department workstation to a Windows 10 Enterprise computer. Two of the workstation’s folders need to be encrypted. The folders are named C:\ProtectedFiles and C:\Backups.
You attempt to encrypt the folders. The output is shown in the following exhibit.

 

Use the drop-down menus to select the answer choice that completes each statement.
NOTE: Each correct selection is worth one point.

 

Answer:

 

Explanation:
We can see from the image below that all files and the ProtectedFiles folder were encrypted successfully (There are no errors and there is an [OK] message for each action).

 

The image below shows that the folder was encrypted successfully (Setting the directory Backups to encrypt new files [OK]).
The file Backup.zip failed to encrypt because the file is read only. The other file, OldBackup.zip was encrypted successfully.

 

https://technet.microsoft.com/en-us/library/bb490878.aspx

QUESTION 5
You have a computer named Computer1 that runs Windows 10 Enterprise.
You add a 1 TB hard drive and create a new volume that has the drive letter D.
You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit.
Which three actions should you perform? Each correct answer presents part of the solution.

A.    Run fsutil quota violations D:.
B.    Enable the Deny disk space to users exceeding quota limit setting.
C.    Enable the Enable Quota Management setting.
D.    Set a default quota limit.
E.    Run convert D: /FS:NTFS.
F.    Add a quota entry.

Answer: BCD
Explanation:
To limit the amount of space that each user can consume, you should enable the Enable Quota Management setting, and then enter the appropriate values in the Limit Disk Space To text box and the Set Warning Level To text box, and then select the Deny Disk Space To Users Exceeding Quota Limit check box to enforce identical quota limits for all users.
Incorrect Answers:
A: The fsutil quota violations D: command will search the system and application logs and display a message to indicate that quota violations have been detected or that a user has reached a quota threshold or quota limit. It will not, however, set the quota limit.
E: The convert D: /FS:NTFS command will convert the volume to NTFS. It will not set the quota limit.
F: A default quota entry exists for administrators so answer F is not required.
https://technet.microsoft.com/en-us/library/dd277427.aspx
https://technet.microsoft.com/en-us/library/cc788136.aspx
https://technet.microsoft.com/en-us/library/bb490885.aspx

QUESTION 6
Drag and Drop Question
You have a computer that runs Windows 10 Enterprise that contains the following folders:

 

You have a local user named User1. User1 has read and execute permission to Folder1.
You need to ensure that User1 can perform the following tasks.

– Create new files in Folder2.
– Edit all files in Folder3.
– Change the permissions of files in Folder5.

The solution must use the principle of least privilege.
Which permissions should you assign to User1 on each folder? To answer, drag the appropriate permissions to the correct folders. Each permission may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

Answer:

 

Explanation:
Advanced permissions are detailed permissions that are grouped together to create the standard permissions. The permissions in this question are standard permissions. Folder2: To create new files in a folder, you need Write permission to the folder. The `Write’ standard permission includes the `Create files / write data’ advanced permission. Folder3: To edit existing files in a folder, you need Modify permission. Folder5: To change the permissions of files in a folder, you need the `Change Permissions’ advanced permission. The Change Permission advanced permission is in the `Full Control’ standard permission group. Therefore, the answer for Folder5 is Full Control.
http://windows.microsoft.com/en-gb/windows/before-applying-permissions-file-folder#1TC=windows-7

QUESTION 7
You have a Windows 10 Enterprise computer.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows.

 

UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network. You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?

A.    Full Control
B.    Read and Execute
C.    Read
D.    Modify

Answer: D
Explanation:
UserA is a member of both the Everyone group and the Marketing group and UserA must access C:
\Marketing from across the network.
When accessing a file locally, you combine the NTFS permissions granted to your account either directly or by way of group membership. The `least’ restrictive permission is then the permission that applies.
In this question, the NTFS permission is the least restrictive of Read/Execute and Modify… so Modify is the effective permission.
When accessing a folder or file across the network, you combine the effective NTFS permissions (Modify in this case) with the effective Share permissions granted to your account either directly or by way of group membership (Full Control in this case). The `most’ restrictive permission is then the permission that applies.
Modify is more restrictive than Full Control so Modify is the effective permission.
Incorrect Answers:
A: The effective permission is Modify, not Full Control.
B: The effective permission is Modify, not Read and Execute.
C: The effective permission is Modify, not Read.

QUESTION 8
A company has Windows 10 Enterprise client computers. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource by using the local Windows installation from their home computers.
Which setting should you configure on the home computers?

A.    Virtual Private Network connection
B.    Remote Desktop local resources
C.    DirectAccess connection
D.    Remote Desktop Gateway IP address

Answer: D
Explanation:
The solution is to deploy Remote Desktop Gateway in the office. Remote users can then connect to their computers on the office network by using Remote Desktop client on their home computers configured with the IP address of the Remote Desktop Gateway.
Remote Desktop Gateway (RD Gateway) is a role service that enables authorized remote users to connect to resources on an internal corporate or private network, from any Internet-connected device that can run the Remote Desktop Connection (RDC) client. The network resources can be Remote Desktop Session Host (RD Session Host) servers, RD Session Host servers running RemoteApp programs, or computers with Remote Desktop enabled.
RD Gateway uses the Remote Desktop Protocol (RDP) over HTTPS to establish a secure, encrypted connection between remote users on the Internet and the internal network resources on which their productivity applications run.
RD Gateway provides a comprehensive security configuration model that enables you to control access to specific internal network resources. RD Gateway provides a point-to-point RDP connection, rather than allowing remote users access to all internal network resources.
Incorrect Answers:
A: Virtual Private Network connections would enable remote access to the office network but this solution would not prevent users accessing other corporate network resources.
B: Remote Desktop local resources determine which local resources (printers, drives etc.) are available in a Remote Desktop connection. However, this solution makes no provision for actually connecting to the office network.
C: DirectAccess connections would enable remote access to the office network but this solution would not prevent users accessing other corporate network resources.
https://technet.microsoft.com/en-gb/library/cc731150.aspx

QUESTION 9
Drag and Drop Question
You have a desktop computer and a tablet that both run Windows 10 Enterprise.
The desktop computer is located at your workplace and is a member of an Active Directory domain. The network contains an Application Virtualization (App-V) infrastructure. Several App-V applications are deployed to all desktop computers.
The tablet is located at your home and is a member of a workgroup.
Both locations have Internet connectivity.
You need to be able to access all applications that run on the desktop computer from you tablet.
Which actions should you perform on each computer? To answer, drag the appropriate action to the correct computer. Each action may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

 

Answer:

 

Explanation:
You can connect to your work computer by using Remote Desktop. You first need to enable Remote Desktop on the work computer. You then run the Remote Desktop Client on the home computer to connect to the work computer.
With Remote Desktop Connection, you can connect to a computer running Windows from another computer running Windows that’s connected to the same network or to the Internet. For example, you can use all of your work computer’s programs, files, and network resources from your home computer, and it’s just like you’re sitting in front of your computer at work. To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the Internet), and you must have permission to connect. For permission to connect, you must be on the list of users. Before you start a connection, it’s a good idea to look up the name of the computer you’re connecting to and to make sure Remote Desktop connections are allowed through its firewall.
Incorrect Answers:
Remote assistance is not required. This enables remote users to connect to a computer for `assistance’. APP-V is not required. The App-V client is already running on the work computer and the App-V packages have already been deployed to the work computer.

QUESTION 10
You manage a network that includes Windows 10 Enterprise computers.
All of the computers on the network are members of an Active Directory domain.
The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts.
You need to enforce these security policy requirements on the computers.
What should you do?

A.    On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add Microsoft accounts.
B.    On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can’t add or log on with Microsoft accounts.
C.    From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
D.    From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.

Answer: B
Explanation:
The computers are members of a domain so the users should be using domain user accounts. We need to block the use of Microsoft accounts.
We could use the Users can’t add Microsoft accounts setting which would mean that users will not be able to create new Microsoft accounts on a computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account.
Alternatively, we can also deny the ability to log on to a domain computer with a Microsoft account (and sync computer settings) by using the Users can’t add or log on with Microsoft accounts. This will ensure that the company policy is enforced.
Incorrect Answers:
A: If we only applied the Users can’t add Microsoft accounts setting, users would still be able to log on with existing Microsoft accounts and sync their settings.
C: It is not necessary to change the sync settings on every client computer. Furthermore, this would not prevent the users from simply changing the sync settings back again. This solution does not `enforce’ the company policy.
D: It is not necessary to change the sync settings on every client computer. Furthermore, this would not prevent the users from simply changing the sync settings back again. This solution does not `enforce’ the company policy.
https://technet.microsoft.com/en-us/library/jj966262.aspx

QUESTION 11
Drag and Drop Question
You manage 50 computers that run Windows 10 Enterprise.
You have a Microsoft Azure RemoteApp deployment. The deployment consists of a hybrid collection named Collection1.
All computers have the Hyper-V feature installed and have a virtual machine that runs Windows 7.
You plan to install applications named App1 and App2 and make them available to all users. App1 is a 32-bit application. App2 is a 64-bit application.
You need to identify the installation method for each application.
The solution needs to minimize the number of installations.
Which deployment method should you identify for each application? To answer, drag the appropriate deployment methods to the correct applications. Each deployment method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.

 

Answer:

 

Explanation:
Azure RemoteApp supports streaming 32-bit or 64-bit Windows-based applications. Therefore, we can minimize the number of installations by installing the applications on Azure and making them available as Azure RemoteApps. This would mean one installation for App1 and one installation for App2.
Incorrect Answers:
The two other installation options (client Hyper-V and Local installation) would involve installing the application once for each computer: 50 installations for each app.
https://azure.microsoft.com/en-gb/documentation/articles/remoteapp-appreqs/

QUESTION 12
You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Office 365 ProPlus apps.
You need to ensure that multiple users can run Office 365 ProPlus from the custom template image simultaneously.
What should you include in the configuration file?

A.    <Property Name = “FORCEAPPSHUTDOWN” Value = “FALSE” />
B.    <Product ID = “0365ProPlusRetail” />
C.    <Property Name = “SharedComputerLicensing” Value = “1” />
D.    <Property Name = “AUTOACTIVATE” Value = “1” />

Answer: C
Explanation:
To make Microsoft Office 365 ProPlus apps available as RemoteApps, you need to enable Shared computer activation. You do this by including the following text in the configuration file:
<Property Name = “SharedComputerLicensing” Value = “1” />
Shared computer activation lets you to deploy Office 365 ProPlus to a computer in your organization that is accessed by multiple users. For example, several nurses at a hospital connect to the same remote server to use their applications or a group of workers share a computer at a factory.
The most common shared computer activation scenario is to deploy Office 365 ProPlus to shared computers by using Remote Desktop Services (RDS). By using RDS, multiple users can connect to the same remote computer at the same time. The users can each run Office 365 ProPlus programs, such as Word or Excel, at the same time on the remote computer.
Incorrect Answers:
A: This setting determines how click-to-run apps are shutdown when an app is open. This setting is not required to ensure that multiple users can run Office 365 ProPlus using RemoteApp.
B: This setting is used for the installation of Office 365. This setting is not required to ensure that multiple users can run Office 365 ProPlus using RemoteApp.
D: This setting determines how Office 365 is activated. This setting is not required to ensure that multiple users can run Office 365 ProPlus using RemoteApp.
https://technet.microsoft.com/en-us/library/dn782858.aspx

QUESTION 13
Hotspot Question
You have a server that runs Windows Server 2012 R2 server named Server1. Server1 has Remote Desktop Services (RDS) installed.
You create a session collection named Session1 and publish a RemoteApp in Session1.
Server1 has an application named App1. The executable for App1 is C:\Apps\App1.exe.
You need to ensure that App1 is available as a RemoteApp in Session1.
What command should you run? To answer, select the appropriate options in the answer area.

 

Answer:

 

Explanation:
We need to publish App1 as a RemoteApp. We do this with the New-RDRemoteApp cmdlet.
The -CollectionName parameter allows us to specify the session as “Session1”. The display name for the App1 will be “App1”.
The -FilePath parameter allows us to specify the path to the executable for App1.
Incorrect Answers:
Get-RDRemoteApp just retrieves information about existing RemoteApps. Set-RDRemoteApp is used to reconfigure an existing RemoteApp. This question does not ask us to reconfigure the existing RemoteApp; it asks us to make App1 available as (another) RemoteApp. Set-RDSessionCollectionConfiguration is used to modify a session collection. It is not used to deploy a RemoteApp to a session collection.
https://technet.microsoft.com/en-us/library/jj215450.aspx

QUESTION 14
Drag and Drop Question
You plan to deploy a Microsoft Azure RemoteApp collection by using a custom template image. The image will contain Microsoft Word and Excel Office 365 ProPlus programs.
You need to install the Word and Excel programs. The solution must minimize the amount of Internet traffic used during installation.
Which four actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

Answer:

 

Explanation:
The first step is to download the Office Deployment Tool.
You then need to modify the configuration file. This will be used to specify the installation options for Word and Excel.
You then run Setup.exe from the Office Deployment Tool with the /download option to download the required software based on the options in the configuration file. The final step is to install Word and Excel by running Setup.exe from the Office Deployment Tool with the / configure option to install the required software based on the options in the configuration file.
Incorrect Answers:
You do not need the Office 365 Deployment Readiness Tool. This is used to check if your environment can support Office 365.
Setup.exe with the /packager option is used to create App-V packages. We are not using App-V in this question.
http://blogs.technet.com/b/odsupport/archive/2014/07/11/using-the-office-deployment-tool.aspx https://technet.microsoft.com/library/Dn782858.aspx

QUESTION 15
You have a computer named Computer1 that runs Windows 10 Enterprise.
You need to identify the locations that you can select as a File History drive.
What are two possible locations? Each correct answer presents a complete solution?

A.    the operating system volume
B.    an unformatted partition
C.    a non-system volume
D.    a network share

Answer: CD
Explanation:
You can use a non-system volume as a File History drive. This can be a volume on a hard drive in a computer, a Virtual Hard Drive (VHD) or an external USB drive.
You can also use a network share as a File History drive.
In the File History Control Panel item, you can click the “Select Drive” option. This will display a list of all detected drives that are suitable for use as the File History drive. Under the list of drives, there is a link “Add Network Location”. You can click the link and browse to or enter the path to the network share.
Incorrect Answers:
A: You cannot use the operating system volume (usually the C: drive) as the File History drive.
B: The volume used for the File History drive must be a formatted volume.
http://computerbeginnersguides.com/blog/2015/08/23/enable-file-history-backups-in-windows-10/

QUESTION 16
You have a computer named Computer1 that runs Windows 10 Enterprise.
Computer1 is configured to receive Windows updates from the Internet.
If a user is logged on to Computer1, you need to prevent Computer1 from automatically restarting without the logged on user’s consent after the installation of the Windows updates.
What should you do?

A.    Enable the Defer upgrades setting.
B.    Edit the Automatic App Update scheduled task.
C.    Configure the Choose how updates are delivered setting.
D.    Configure the Choose how updates are installed setting.

Answer: D
Explanation:
In the Choose how updates are installed setting, you can use the drop-down menu to choose an option:
– Schedule a restart
– Automatically restart
The Schedule a restart option will allow the user to choose when the computer is restarted. Of the answers given, this is the only way to prevent Computer1 from automatically restarting without the logged on user’s consent after the installation of the Windows updates.
Incorrect Answers:
A: The Defer Upgrades setting delays feature upgrades for several months while allowing security updates through. It does not prevent a computer from automatically restarting without the logged on user’s consent after the installation of the Windows updates.
B: The Automatic App Update scheduled task is for updating Windows Store Apps, not the operating system. Furthermore, there is no setting in the Automatic App Update scheduled task that can prevent a computer from automatically restarting without the logged on user’s consent after the installation of updates.
C: The Choose how updates are delivered setting can be used to enable or disable peer-to-peer updates.
This is where one computer on the network downloads the updates from Microsoft and other computers on the network download the updates from that computer. This setting cannot prevent a computer from automatically restarting without the logged on user’s consent after the installation of the Windows updates.
http://windows.microsoft.com/en-gb/windows-10/getstarted-choose-how-updates-are-installed

QUESTION 17
Hotspot Question
You have a computer that runs Windows 10 Enterprise that has a local group policy as shown in the following graphic.

 

Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the graphic.
NOTE: Each correct selection is worth one point.

 

Answer:

 

Explanation:
Windows Updates will be downloaded from Windows Server Update Services only. This is determined by the “Specify Intranet Microsoft Update Service Location” setting and the “Do not connect to any Windows Update Internet locations” setting both being `Enabled’.
In the “Specify Intranet Microsoft Update Service Location” setting, you can specify the name of the Windows Server Updates Services server.
If a user is logged into the computer and an update requires a restart, the computer will restart when the user signs out. This is determined by the “No auto-restart with logged on users for schedule automatic updates” setting being enabled. This group policy setting creates a registry key named NoAutoRebootWithLoggedOnUsers and sets the value of the key to 1 (enabled). With this setting enabled, you should be aware that the computer should be restarted at the earliest opportunity in order to complete the installation of the Windows Updates.
Incorrect Answers:
The “restart with a maximum delay of 3 hours or 3 days” answers are incorrect. The computer will never restart for as long as a user is logged in. The user could be logged in indefinitely and the computer will not restart.

QUESTION 18
You use a Windows 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet.
The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot spot.
You need to minimize data usage while connected to this hot spot.
What should you do?

A.    Turn on Airplane Mode.
B.    Disable File and Print Sharing for mobile broadband connections.
C.    Configure the interface metric of IP settings for Wi-Fi connection as 1.
D.    Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.
E.    Configure the broadband connection as a metered network.

Answer: E
Explanation:
You can limit the bandwidth used by the broadband connection by configuring it as a metered network. A metered network is a network where data downloaded is `metered’ (measured) and you are charged for the amount of data downloaded.
Setting a connection as metered prevents Windows from automatically using bandwidth in a number of ways including the following:
Disables automatic downloading of Windows updates: Windows won’t automatically download updates from Windows Update on metered Internet connections. You’ll get a “Download” button you can click whenever you want to install updates.
Disables automatic downloading of app updates: The Windows Store won’t automatically download updates for your installed “Store apps” on metered connections, either. Desktop apps like Chrome, Firefox, and others will continue updating themselves normally.
Tiles may not update: Microsoft says that the live tiles on your Start menu or Start screen “may” stop updating on a metered connection:
Incorrect Answers:
A: Turning on Airplane Mode would disable the Wi-Fi connection which would prevent you from connecting to the Internet. It would `minimize data usage’ but you would lose your connection to the Wi-Fi hotspot.
B: Disabling File and Print Sharing for mobile broadband connections is not best way to minimize data usage. It is very unlikely that data usage while connected to a 3G mobile broadband Wi-Fi hot spot is network sharing traffic.
C: Modifying the metric of the Wi-Fi connection will have no effect on the amount of data used.
An interface metric is used to determine which interface will be used when there are multiple active connections.
D: Disabling Internet Control Message Protocol (ICMP) traffic on the firewall is not best way to minimize data usage. The data usage will not be caused by ICMP traffic.
http://www.howtogeek.com/226722/how-when-and-why-to-set-a-connection-as-metered-on-windows-10/

QUESTION 19
You support Windows 10 Enterprise computers that are members of an Active Directory domain. Your company policy defines the list of approved Windows Store apps that are allowed for download and installation.
You have created a new AppLocker Packaged Apps policy to help enforce the company policy.
You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company.
What should you do?

A.    From Group Policy, enforce the new AppLocker policy in Audit Only mode.
B.    From Group Policy, run the Group Policy Results Wizard.
C.    From Group Policy, run the Group Policy Modeling Wizard.
D.    From PowerShell, run the Get-AppLockerPolicy -effective command to retrieve the AppLocker effective policy.

Answer: A
Explanation:
You can test an AppLocker Packaged Apps policy by running it in audit mode.
After AppLocker rules are created within the rule collection, you can configure the enforcement setting to Enforce rules or Audit only.
When AppLocker policy enforcement is set to Enforce rules, rules are enforced for the rule collection and all events are audited. When AppLocker policy enforcement is set to Audit only, rules are only evaluated but all events generated from that evaluation are written to the AppLocker log.
Incorrect Answers:
B: The Group Policy Results Wizard is used to determine which group policy settings are applied to a user or computer object and the net results when multiple group policies are applied.
The Group Policy Results Wizard is not used to test an AppLocker Packaged Apps policy.
C: The Group Policy Modeling Wizard calculates the simulated net effect of group policies.
Group Policy Modeling can also simulate such things as security group membership, WMI filter evaluation, and the effects of moving user or computer objects to a different Active Directory container. The Group Policy Modeling Wizard is not used to test an AppLocker Packaged Apps policy.
D: The Get-AppLockerPolicy -Effective command returns the effective AppLocker policy on the local computer. The effective policy is the merge of the local AppLocker policy and any applied domain policies on the local computer. The Get-AppLockerPolicy -effective command is not used to test an AppLocker Packaged Apps policy.
https://technet.microsoft.com/en-us/library/ee791796(v=ws.10).aspx

QUESTION 20
You support Windows 10 Enterprise computers.
Your company has started testing Application Virtualization (App-V) applications on several laptops.
You discover that the App-V applications are available to users even when the laptops are offline.
You need to ensure that the App-V applications are available to users only when they are connected to the company network.
What should you do?

A.    Change user permissions to the App-V applications.
B.    Disable the Disconnected operation mode.
C.    Configure mandatory profiles for laptop users.
D.    Reset the App-V client FileSystem cache.

Answer: B
Explanation:
Disconnected operation mode is enabled by default and allows App-V applications to be available to users even when the laptops are offline. We need to disable Disconnected operation mode to prevent offline access.
The disconnected operation mode settings –accessible by right-clicking the Application Virtualization node, selecting Properties, and clicking the Connectivity tab–enables the Application Virtualization Desktop Client or Client for Remote Desktop Services (formerly Terminal Services) to run applications that are stored in the file system cache of the client when the client is unable to connect to the Application Virtualization Management Server.
Incorrect Answers:
A: The ability to run an App-V application while the computer is offline is not determined by user permissions.
C: Mandatory profiles prevent users from making changes to their user profile. They do not prevent offline access to App-V applications.
D: When an App-V application is downloaded, it is stored in the App-V client FileSystem cache. Resetting the App-V client FileSystem cache will clear the contents of the cache and prevent the users from running the App-V application while their computers are offline. However, next time they connect to the network, they will download the App-V application again and will be able to run it offline again.
https://technet.microsoft.com/en-gb/library/cc843712.aspx

Lead2pass offers the latest Microsoft 70-697 dumps and a good range of Microsoft Certification 70-697 answers. Most of our Microsoft 70-697 exam dumps are exclusively prepared by the best brains and highly skilled professionals from the IT domain to ensure 100% pass in your Microsoft 70-697 Exam.

70-697 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDNV91YXU2blBtY0U

2017 Microsoft 70-697 exam dumps (All 199 Q&As) from Lead2pass:

http://www.lead2pass.com/70-697.html [100% Exam Pass Guaranteed]

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back