100% Real Microsoft 70-688 Exam Questions & Answers, Accurate & Verified By IT Experts
Instant Download, Free Fast Updates, 99.6% Pass Rate
Microsoft 70-688 Practice Test Questions in VCE Format
File | Votes | Size | Date |
---|---|---|---|
File Microsoft.BrainDumps.70-688.v2015-11-06.by.Ronny.200q.vce |
Votes 15 |
Size 5.82 MB |
Date Nov 06, 2015 |
File Microsoft.Braindumps.70-688.v2015-06-15.by.spider.160q.vce |
Votes 13 |
Size 6.4 MB |
Date Jul 03, 2015 |
File Microsoft.Braindumps.70-688.v2014-06-02.by.PAMELA.160q.vce |
Votes 170 |
Size 5.86 MB |
Date Jun 02, 2014 |
File Microsoft.Exact-Exams.70-688.v2014-04-08.by.Peggy.42q.vce |
Votes 10 |
Size 2.34 MB |
Date Apr 08, 2014 |
File Microsoft.Pass4Sure.70-688.v2013-03-01.by.Nada.73q.vce |
Votes 24 |
Size 3.9 MB |
Date Mar 03, 2013 |
Archived VCE files
File | Votes | Size | Date |
---|---|---|---|
File Microsoft.Selftestengine.70-688.vv2014-11-12.by.Kirby.160q.vce |
Votes 14 |
Size 5.87 MB |
Date Nov 12, 2014 |
File Microsoft.BrainDump.70-688.v2013-02-10.by.Anonymous.19q.vce |
Votes 2 |
Size 1.32 MB |
Date Feb 10, 2013 |
Microsoft 70-688 Practice Test Questions, Exam Dumps
Microsoft 70-688 (Supporting Windows 8.1) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. Microsoft 70-688 Supporting Windows 8.1 exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the Microsoft 70-688 certification exam dumps & Microsoft 70-688 practice test questions in vce format.
The Microsoft 70-688 exam, "Supporting Windows 8.1," was a key certification for IT professionals responsible for desktop administration and support in an enterprise environment. As part of the MCSA: Windows 8 certification path, this exam validated a candidate's ability to handle the complex challenges of supporting Windows 8.1 users, from installation and configuration to security and remote access. It focused on practical, real-world skills needed to maintain a healthy, secure, and productive desktop environment. The exam was designed for individuals working as help desk technicians, desktop support engineers, or IT generalists.
Unlike its counterpart, the 70-687 "Configuring Windows 8.1" exam, which focused on initial setup, the 70-688 exam was centered on the ongoing operational tasks of support. This included troubleshooting user issues, managing data access, securing devices against threats, and supporting a mobile workforce. The questions were often scenario-based, requiring candidates to analyze a problem and determine the most appropriate course of action. A successful candidate needed not only technical knowledge of Windows 8.1 features but also a strong understanding of best practices for enterprise IT support.
This series will serve as a comprehensive guide to the topics covered in the 70-688 exam. We will explore the core objective domains, from managing user identities and hardware to implementing robust security and recovery strategies. While Windows 8.1 is no longer a mainstream operating system, the fundamental support principles and troubleshooting methodologies covered in this exam remain highly relevant for supporting modern Windows desktops. Understanding these concepts provides a solid foundation for any IT professional tasked with managing a Windows-based end-user computing environment.
A core competency for the 70-688 exam was understanding how to support different Windows 8.1 installation strategies within a corporate setting. While a support professional might not design the initial deployment image, they are responsible for reimaging machines, troubleshooting failed installations, and deploying new systems. This involves understanding the difference between an in-place upgrade from a previous Windows version and a clean "wipe-and-load" installation. A support technician needs to know how to advise a user on which method is appropriate and how to back up their data before proceeding.
Another key aspect was supporting different installation media and sources. This could include installing from a USB drive, a network share, or using more advanced enterprise tools like the Microsoft Deployment Toolkit (MDT) or System Center Configuration Manager (SCCM). For the 70-688 exam, a candidate needed to know how to initiate an installation from these sources and how to troubleshoot common failures, such as missing network drivers during a network-based installation or problems with unattended answer files that automate the setup process.
Part of this strategy also involves managing application deployment post-installation. A support professional is often the first point of contact when an application fails to install or run correctly. This requires knowledge of both traditional desktop application installers (.msi, .exe) and the newer Windows Store app format. The ability to diagnose installation errors, check application compatibility, and understand the difference between installing an application per-user versus per-machine was a critical skill set tested on the 70-688 exam.
Supporting Windows 8.1 in an enterprise requires a deep understanding of the different user identity models. The 70-688 exam thoroughly tested a candidate's ability to manage and troubleshoot issues related to local accounts, domain accounts, and Microsoft accounts. Local accounts are stored on the individual computer and are used for standalone machines or in workgroup environments. A support professional needs to know how to create local accounts, reset forgotten passwords using administrative tools, and manage their permissions.
Domain accounts are the standard for any corporate network. These accounts are stored centrally in Active Directory, allowing users to log on to any computer in the domain with a single set of credentials. A key support task is troubleshooting domain join issues, such as when a computer cannot contact a domain controller. It also involves helping users with domain password policies, lockouts, and ensuring they have the correct permissions to access network resources. Understanding the relationship between the local machine and the domain was fundamental.
Windows 8.1 introduced a much deeper integration with Microsoft accounts (formerly Windows Live ID). These cloud-based accounts allow users to sync settings, themes, and passwords across multiple devices and are required for downloading apps from the Windows Store. In an enterprise, this created a new support challenge. The 70-688 exam expected candidates to know how to connect a domain account with a Microsoft account, manage the associated privacy and sync settings, and troubleshoot sign-in issues related to the cloud service. Supporting this hybrid identity model was a key feature of the exam.
To effectively support Windows 8.1, a technician must be proficient with its suite of administrative tools. The 70-688 exam required hands-on knowledge of these utilities. The Control Panel remained a central hub for many configuration tasks, but Windows 8.1 also introduced the PC Settings app, a more touch-friendly interface for common settings. A support professional needed to know which tool to use for a specific task, as some settings were only available in one or the other.
The Microsoft Management Console (MMC) was another critical tool. Technicians needed to be comfortable using pre-built MMC consoles like Computer Management, which consolidates tools like Event Viewer, Disk Management, and Device Manager. Event Viewer is particularly important for troubleshooting, as it contains logs that record errors, warnings, and informational events from the operating system and applications. A key skill tested was the ability to filter event logs to find the root cause of a specific problem.
Other essential tools included the Task Manager, which was significantly enhanced in Windows 8.1 to better manage startup programs and analyze performance. The Resource Monitor provides a more detailed, real-time view of CPU, memory, disk, and network usage, which is invaluable for diagnosing performance bottlenecks. Finally, proficiency with the command line, including both the traditional Command Prompt (cmd.exe) and the more powerful Windows PowerShell, was necessary for scripting and performing advanced administrative tasks. Familiarity with this entire toolkit was a prerequisite for the 70-688 exam.
A user profile is a collection of folders and settings that defines a user's environment on a computer. Supporting user profiles is a common and critical task for any desktop support professional, and it was a key topic on the 70-688 exam. A profile contains the user's personal data folders (like Documents, Desktop, and Pictures) and their application settings, which are stored in the AppData folder. When a user logs on for the first time, a new profile is created for them on the local machine.
A frequent support issue is a corrupt user profile, which can prevent a user from logging on or cause their settings to be lost. A technician needs to know how to diagnose a corrupt profile and the steps to rebuild it. This involves logging on as an administrator, renaming the user's old profile folder, and having the user log on again to create a fresh profile. The technician would then need to assist the user in migrating their data from the old, corrupt profile to the new one.
In a managed enterprise environment, two technologies are often used to centralize user data: Roaming User Profiles and Folder Redirection. Roaming Profiles store the user's profile on a network share, so their settings follow them from one computer to another. Folder Redirection is a more granular technology that redirects specific folders (like Documents) to a network share, while the rest of the profile remains local. The 70-688 exam required candidates to understand how to support users in this environment, including troubleshooting synchronization issues and problems accessing redirected folders.
Group Policy is the primary mechanism for centrally managing and configuring Windows computers in an Active Directory environment. While designing Group Policy Objects (GPOs) is a more advanced task, the 70-688 exam required support professionals to understand how Group Policy affects a user's machine and how to troubleshoot it. A technician must understand that GPOs can control everything from the user's desktop background and Start screen layout to complex security settings and software installation.
A common support scenario is a user reporting that they cannot perform a certain action or that a setting is "grayed out." This is often because a Group Policy is enforcing that setting. A support professional needs to know how to use tools like gpresult (Resultant Set of Policy) to see which GPOs are being applied to a specific user and computer. This command-line tool can show which policy is responsible for a particular setting, which is the first step in diagnosing the issue.
Troubleshooting Group Policy also involves understanding the process of how policies are applied. This includes knowing that policies are refreshed in the background periodically and that they can be manually refreshed using the gpupdate /force command. Technicians should also be able to investigate issues where a GPO is not applying as expected, which could be due to problems with network connectivity to a domain controller, issues with AD replication, or incorrect security filtering on the GPO itself. This level of troubleshooting was a key expectation for the 70-688 exam.
The Windows 8.1 user interface, with its introduction of the Start screen and modern apps, was a significant departure from previous versions and a common source of user support calls. The 70-688 exam tested a candidate's ability to help users navigate and customize this new environment. This included tasks like pinning and unpinning apps to the Start screen and taskbar, organizing tiles into groups, and understanding how to use the Charms bar for searching, sharing, and accessing settings.
A support professional needed to be able to configure common UI settings on behalf of a user. This could involve changing the screen resolution, setting up multiple displays, or customizing the lock screen. Many of these settings were managed through the PC Settings app, and familiarity with its layout was essential. For enterprise environments, administrators often used Group Policy to standardize the Start screen layout, and a support technician needed to understand how to troubleshoot issues where these layouts were not applying correctly.
Another key area was supporting the interaction between the traditional desktop and the modern UI. This included understanding how to set default programs, so that, for example, a specific desktop application opens pictures instead of the modern Photos app. It also involved assisting users with the new features in File Explorer, such as the ribbon interface and the improved file copy dialog. Being able to efficiently guide a user through these UI elements to solve their problem was a core "soft skill" implicitly tested by the scenario questions on the 70-688 exam.
A fundamental role for any desktop support professional is troubleshooting hardware and device issues, a practical skill heavily featured in the 70-688 exam. This begins with Device Manager, the central tool for viewing and managing all hardware components installed on a system. A candidate needed to be able to use Device Manager to identify devices that are not working correctly (often indicated by a yellow exclamation mark), update drivers, disable devices, or roll back a driver to a previous version if a recent update caused a problem.
Driver management is a critical part of this process. A technician must know the different sources for drivers, including Windows Update, the manufacturer's website, and drivers provided on installation media. They need to understand the concept of driver signing, which ensures that a driver has been verified by Microsoft and has not been tampered with. Supporting issues related to printers was also a common task, including installing local and network printers, managing print queues, and troubleshooting printing failures.
The exam also covered supporting a range of peripheral devices. This included configuring and troubleshooting input devices like keyboards and mice, as well as external storage devices like USB flash drives and external hard drives. With the rise of mobile computing, supporting devices connected via Bluetooth, such as headsets and speakers, also became an important skill. The ability to methodically diagnose a hardware problem, whether it was a faulty device, a driver conflict, or an incorrect configuration, was a core competency for anyone preparing for the 70-688 exam.
A core responsibility for any support professional is ensuring users can connect to the network, making this a foundational topic for the 70-688 exam. This requires a solid understanding of both IPv4 and IPv6 addressing. A technician must be able to view a computer's IP configuration using tools like ipconfig at the command line or through the Network and Sharing Center. This includes identifying the IP address, subnet mask, default gateway, and DNS server addresses.
A common support task is troubleshooting a "Limited" or "No-connectivity" error. This involves a logical, step-by-step process. A technician should know how to check for a physical connection, verify that the network adapter is enabled, and use ipconfig /release and ipconfig /renew to attempt to get a new IP address from a DHCP server. They also need to understand Automatic Private IP Addressing (APIPA), recognizing that an address in the 169.254.x.x range indicates the computer could not contact a DHCP server.
The 70-688 exam also expected familiarity with basic network troubleshooting commands. The ping command is essential for testing basic connectivity to another device on the network, such as the default gateway or a DNS server. The tracert (trace route) command helps identify the path that network traffic is taking and can pinpoint where a connection is failing along the route. Proficiency in using these tools to quickly diagnose and resolve the most common network connectivity issues was a must-have skill.
With the prevalence of laptops and mobile devices, supporting wireless networking was a critical skill tested on the 70-688 exam. A technician needs to know how to connect a Windows 8.1 device to a wireless network, which involves finding the network name (SSID) and entering the correct security key or passphrase. They must also understand the different types of wireless security, such as WPA2-Personal and WPA2-Enterprise. WPA2-Enterprise is used in corporate environments and requires more complex authentication, often using user credentials rather than a shared key.
Managing wireless network profiles is a key support task. Windows saves a profile for each wireless network it connects to, including the SSID and security settings. A common troubleshooting step for a device that fails to connect to a known network is to "forget" the wireless profile and then reconnect, as the saved profile may have become corrupt or the security key may have changed. A support professional needs to know how to view, prioritize, and remove these profiles.
In a corporate environment, wireless network settings are often deployed via Group Policy. This ensures that all company-owned devices have the correct profiles and security settings to connect to the corporate Wi-Fi automatically. A support technician's role is to troubleshoot why a device may not be receiving or applying these settings. This could involve forcing a Group Policy update, checking the device's domain membership, or verifying that the device has the necessary certificates for enterprise-level authentication. This level of troubleshooting was a key expectation for the 70-688 exam.
The 70-688 exam went beyond basic configuration and required a deep understanding of how to troubleshoot complex network issues. A systematic approach is crucial. When a user reports they "can't access the internet," a support professional should follow a logical path to isolate the problem. This starts with checking the local machine's IP configuration using ipconfig. If the IP address is valid, the next step is to test connectivity to the default gateway using ping. If that succeeds, the next step is to test name resolution by pinging a well-known internet site.
Name resolution is a frequent source of problems. If a user can ping an external IP address but cannot browse to any websites by name, the issue is likely with the Domain Name System (DNS). Troubleshooting DNS involves verifying the DNS server addresses provided to the client and using the nslookup command-line tool to test if the DNS server can resolve names correctly. A technician might also try flushing the local DNS cache on the client using ipconfig /flushdns to resolve issues caused by stale or incorrect cached entries.
For issues related to accessing specific network resources, such as a file share, the problem might be with authentication or permissions rather than basic connectivity. A technician needs to be able to differentiate between these types of problems. They should verify that the user is logged into the domain correctly and has the necessary permissions for the resource. Understanding this layered approach to troubleshooting, from the physical connection up to the application level, was a core competency required to pass the 70-688 exam.
Securing network connections is just as important as establishing them, and the 70-688 exam included topics on Windows 8.1's built-in security features. The primary tool for this is the Windows Firewall with Advanced Security. A support professional needs to understand the purpose of the firewall, which is to block unsolicited incoming network traffic to protect the computer from threats. They should know how the firewall operates with different network profiles: Private, Public, and Domain. The firewall rules are automatically adjusted to be more or less restrictive depending on which profile is active.
A common support task is troubleshooting issues caused by the firewall blocking a legitimate application. A technician must know how to create exceptions, or rules, in the Windows Firewall to allow a specific program or network port through. This can be done through the simple interface in the Control Panel or through the more powerful Windows Firewall with Advanced Security MMC snap-in, which allows for the creation of very granular inbound and outbound rules.
In an enterprise setting, Windows Firewall settings are almost always managed centrally via Group Policy. This ensures that all client machines have a consistent and secure baseline configuration. A technician's role in this environment is to identify when a connectivity issue is being caused by a centrally managed firewall policy. Using tools like gpresult can help identify which GPO is applying the firewall settings. The technician would then need to escalate the issue to the network or security team to have an exception created if necessary. Understanding this interaction between local settings and Group Policy was key.
Effective support requires proficiency in managing local storage, a practical skill area covered in the 70-688 exam. The primary tool for this is the Disk Management console. A technician needs to be able to perform basic disk operations, such as initializing new disks, creating and formatting partitions (volumes), and assigning drive letters. They must also understand the difference between the two partition styles: Master Boot Record (MBR) and the more modern GUID Partition Table (GPT), and know their respective limitations.
Windows 8.1 introduced a powerful new feature called Storage Spaces. This technology allows you to group multiple physical disks (including USB drives) into a storage pool. From this pool, you can create virtual disks, called spaces, that can provide resiliency against disk failure. A technician should understand the different types of resiliency offered, such as two-way mirror (which requires at least two disks and protects against a single disk failure) and parity (which is more space-efficient and requires at least three disks). Supporting users who use Storage Spaces was a new and important topic.
Another aspect of storage management is maintaining disk health. This includes using tools like Check Disk (chkdsk) to scan for and repair file system errors and bad sectors. Technicians should also be familiar with the Disk Defragmenter and Optimizer tool to maintain the performance of traditional hard disk drives (HDDs). While solid-state drives (SSDs) do not need defragmenting, the optimizer tool performs other maintenance on them, like the TRIM command, to ensure their longevity and performance. A solid understanding of these maintenance tools was expected for the 70-688 exam.
Once a user is connected to the network, they need access to data, which is often stored on network file shares. The 70-688 exam required a deep understanding of how to manage and troubleshoot access to these resources. This involves understanding the two sets of permissions that work together to control access: NTFS permissions and share permissions. Share permissions are applied when a user connects to the folder over the network, while NTFS permissions are always in effect, whether the user is accessing the file locally or over the network.
A key concept to master is that when both sets of permissions are present, the most restrictive permission is the one that applies. For example, if a user has "Full Control" in the share permissions but only "Read" in the NTFS permissions, they will only be able to read the file. A common support task is to diagnose why a user cannot access a file or folder. This requires checking both the share permissions on the server and the NTFS permissions on the file or folder itself, as well as any group memberships the user has.
The concept of permission inheritance is also crucial. By default, files and subfolders inherit permissions from their parent folder. A technician needs to know how to check for and manage inherited permissions and how to set explicit permissions when needed. The "Effective Access" tab in the advanced security settings of a file or folder is an invaluable tool. It allows a technician to select a specific user and see exactly what their calculated permissions are, taking into account all their group memberships and any "Deny" permissions.
To support a mobile workforce, it is essential to provide users with access to their network files even when they are disconnected from the corporate network. The feature that enables this in Windows 8.1 is Offline Files. The 70-688 exam expected candidates to know how to configure and support this feature. When Offline Files is enabled, a user can mark specific network files or folders as "Always available offline." Windows then creates a local copy of these files in a cache on the user's computer.
When the user is connected to the network, they are working with the live files on the server. When they disconnect, Windows automatically switches them to the local cached copies. Any changes they make while offline are saved to the local cache. When the user reconnects to the network, the Sync Center in Windows automatically synchronizes the changes made offline with the server copies. A support professional needs to understand this process and be able to guide a user through it.
Troubleshooting synchronization issues is a major part of supporting Offline Files. Sometimes, a sync conflict can occur, for example, if the user modified a file offline and another user modified the same file on the server. The Sync Center provides an interface to resolve these conflicts, allowing the user to choose which version to keep. A technician also needs to know how to manage the Offline Files cache, including viewing its size, clearing it out if it becomes corrupt, and encrypting it for security.
Protecting sensitive data stored on user computers is a critical security function, and the 70-688 exam covered the built-in technologies for this. The Encrypting File System (EFS) is a feature of the NTFS file system that allows users to encrypt individual files and folders. When a file is encrypted with EFS, it is tied to that user's specific certificate. Only that user can open the file. Even an administrator logged onto the same machine cannot view the contents of the encrypted file.
A support professional's role is to assist users in using EFS and to help them with recovery. A major risk with EFS is that if a user's profile becomes corrupt or their certificate is lost, the encrypted data can become permanently inaccessible. To prevent this, enterprises implement a Data Recovery Agent (DRA). A DRA is a special administrative account whose certificate is also added to the encrypted file. This allows the DRA to open any EFS-encrypted file in the organization for recovery purposes.
A technician needs to be able to assist a user in encrypting a file or folder, which is done through the advanced attributes of its properties. They should also know how to back up the user's EFS certificate and private key, which is a critical step to prevent data loss. Understanding the visual cues, such as the file name turning green in File Explorer to indicate it is encrypted, is also part of the support role. The 70-688 exam required an understanding of both the use and the recovery mechanisms for EFS.
A significant portion of a support professional's time is spent assisting users with applications, making this a central domain in the 70-688 exam. This involves supporting the installation of traditional desktop applications, which typically come as .exe or .msi installer packages. A technician needs to know the difference between these two, understanding that .msi packages (Windows Installer) offer more control for automated deployment and management in an enterprise environment. Common troubleshooting steps include running the installer as an administrator to overcome permission issues.
Once an application is installed, it may need to be configured. This can range from setting up a connection to a database to configuring user preferences. A support professional must be able to guide users through these configuration steps. In a managed environment, many application settings are controlled by Group Policy using Administrative Templates. A technician needs to be aware of this and be able to explain to a user why a particular setting might be grayed out or enforced by the organization.
Uninstalling applications is another common task. This is typically done through the "Programs and Features" applet in the Control Panel. Technicians should be able to assist users in cleanly removing software. They should also be aware of situations where a standard uninstall fails and know about tools that can help clean up a failed installation. The ability to manage the full lifecycle of an application—install, configure, and uninstall—was a practical skill set required for the 70-688 exam.
One of the biggest challenges in any Windows migration is ensuring that older, business-critical applications continue to work on the new operating system. The 70-688 exam required candidates to know how to troubleshoot application compatibility issues. Windows 8.1 included several built-in tools for this purpose. The simplest is the Program Compatibility Troubleshooter, which can automatically apply settings to make an older application run as if it were on a previous version of Windows, such as Windows 7 or Windows XP.
A support professional needs to be able to manually configure these compatibility settings as well. This is done from the properties of the application's executable file, on the "Compatibility" tab. From here, a technician can set the compatibility mode, run the program in a lower screen resolution, or force it to run as an administrator every time. These simple tweaks can often resolve common issues with legacy applications that were not designed for the security model or user interface of a modern operating system.
For more complex, enterprise-wide compatibility analysis, Microsoft provided the Application Compatibility Toolkit (ACT). While a support technician might not be responsible for running the entire toolkit, they should understand its purpose. The ACT is used to inventory applications across the organization and test them for compatibility with a new version of Windows. It helps identify which applications will have problems and provides solutions, known as "shims," to fix them without modifying the application's code. Awareness of this enterprise-level tool was part of the scope for the 70-688 exam.
Windows 8.1 introduced a new type of application, the Windows Store app (also known as a modern or immersive app). These apps were typically acquired through the public Windows Store and ran in a sandboxed, secure environment. The 70-688 exam tested a candidate's ability to support these new applications. This included assisting users with finding and installing apps from the Store, which required the user to be signed in with a Microsoft account. Troubleshooting often involved issues with the Store itself, such as clearing its cache or running the built-in app troubleshooter.
In a corporate environment, organizations often need to deploy their own custom, line-of-business (LOB) apps without making them public. The process for this is called "sideloading." Sideloading allows an organization to install a Windows Store app directly onto a device without going through the public Store. A support professional needed to understand the requirements for sideloading, which included enabling a specific setting in Group Policy and, in some cases, using a special sideloading product key.
Managing these apps also involved controlling which apps users could install. Enterprises could use features like the Windows Store for Business to create a private, curated portal of approved apps for their users. Technicians would support users in accessing this private store. They also needed to know how to update and uninstall Windows Store apps. Unlike desktop apps, these were typically managed through the Store interface or via PowerShell commands, making the process different from what they were used to. Proficiency with both app models was essential.
In high-security environments, it is often necessary to control exactly which applications users are allowed to run. The technology in Windows 8.1 for achieving this is AppLocker. Understanding the purpose and effect of AppLocker was an important security topic for the 70-688 exam. AppLocker allows an administrator to create rules that specify which executables, scripts, or installer files are allowed or denied. This is a much more secure approach than trying to block known malicious software; instead, it works on the principle of only allowing known good software to run.
AppLocker rules can be based on several criteria. The most common is the file's path, but this can be brittle if a user renames a file. A more robust method is to use publisher rules, which are based on the digital signature of the application. For example, an administrator could create a rule that allows any application signed by a specific software vendor to run. Hash rules, which are based on a unique fingerprint of the file, are the most secure but also the most difficult to maintain, as the hash changes with every update.
While the configuration of AppLocker is done by administrators via Group Policy, the support professional is the one who deals with the user impact. When a user tries to run an application that is blocked by AppLocker, they will receive a specific error message. A technician needs to be able to recognize this message and understand that the issue is due to a security policy. Their role would be to explain the policy to the user and, if the application is legitimate and required for business, escalate the issue through the proper channels to have a new AppLocker rule created.
User Account Control (UAC) is a fundamental security feature in Windows, and a deep understanding of its function was required for the 70-688 exam. UAC helps prevent unauthorized changes to the computer by requiring administrative privileges for any task that could affect the system's stability or security. When a standard user tries to perform such a task (like installing software), UAC prompts them to enter the credentials of an administrator. When an administrator performs the same task, they receive a simpler consent prompt, asking them to confirm the action.
The goal of UAC is to encourage users and even administrators to run in a standard user context for their day-to-day work, only elevating their privileges when absolutely necessary. This significantly reduces the computer's attack surface. A support professional needs to be able to explain the purpose of UAC to users and guide them through the prompts. They also need to be able to troubleshoot issues with older applications that were not designed to work with UAC and may require special compatibility settings to run correctly.
The behavior of UAC is configurable through Group Policy. An administrator can change the level of prompting, from always prompting to never prompting (which is highly discouraged). In a support role, a technician should be aware of the configured UAC level in their environment. If a user complains about excessive UAC prompts, the technician needs to investigate whether it is due to a misbehaving application or a specific policy setting. Understanding UAC is key to supporting the modern Windows security model.
Protecting data at rest, especially on mobile devices like laptops, is a critical security requirement for any organization. The primary technology for this in Windows 8.1 is BitLocker Drive Encryption. The 70-688 exam required a thorough understanding of how to support a BitLocker-protected environment. BitLocker provides full-volume encryption for the operating system drive and for fixed or removable data drives. For the OS drive, it typically uses a Trusted Platform Module (TPM) chip on the motherboard to store the encryption keys and protect the system's integrity during boot.
A support professional's role involves several key tasks. They may need to assist a user in enabling BitLocker on a new device. This process includes saving the crucial BitLocker recovery key. This key is essential; if the TPM detects a change in the boot environment (like a BIOS update or a hardware change), it will lock the drive and require the recovery key to unlock it. A technician must know how to guide a user through this recovery process.
In an enterprise, BitLocker is managed via Group Policy. Policies can be set to enforce BitLocker encryption on all devices, require a specific encryption strength, and automatically back up the recovery keys to Active Directory. This centralized key storage is vital for recovery. A technician needs to know how to retrieve a recovery key from Active Directory on behalf of a user who is locked out of their device. They also need to be familiar with BitLocker To Go, which provides encryption for removable USB drives.
Protecting systems from viruses, spyware, and other malicious software is a fundamental support task. The 70-688 exam expected candidates to be proficient with the built-in anti-malware solution in Windows 8.1, which was Windows Defender. In this version of Windows, Windows Defender provided real-time protection against a full spectrum of malware, replacing the more limited Microsoft Security Essentials from previous versions. A technician needs to understand how Windows Defender works and how to manage it.
This includes knowing how to manually initiate a scan (Quick, Full, or Custom), how to check for and apply new malware definition updates, and how to view the quarantine and history tabs to see what threats have been detected and dealt with. A key support skill is being able to configure exclusions. If a legitimate business application is being incorrectly flagged as malware (a false positive), a technician can add an exclusion for that file, folder, or process to prevent Windows Defender from scanning it.
In a corporate environment, Windows Defender is typically managed centrally using tools like Group Policy or System Center Configuration Manager. This ensures that all settings, such as scan schedules and definition update sources, are consistent across the organization. A support technician needs to be aware of these centrally managed settings. If a user reports an issue with Windows Defender, the technician must be able to determine if it is a local problem or one caused by a corporate policy.
Group Policy is the backbone of security configuration in a Windows domain environment. The 70-688 exam required support professionals to understand the impact of these policies on a client machine. While technicians may not create the policies, they are on the front lines, troubleshooting their effects. Security settings deployed via Group Policy can cover a vast range of areas, including password policies, account lockout policies, and user rights assignments.
For example, a password policy can enforce complexity requirements, a minimum length, and how often a user must change their password. An account lockout policy can automatically disable an account after a certain number of failed logon attempts. A user rights assignment policy can determine which users or groups are allowed to perform specific actions, such as shutting down the system or logging on locally. A technician needs to understand these concepts to explain them to users and diagnose related issues.
Another critical area is the use of Security Templates. These are pre-defined collections of security settings that can be imported into a Group Policy Object. They provide a way to apply a consistent security baseline to different types of computers, such as desktops and laptops. When troubleshooting a security-related issue, a technician should be aware that these templates are often the source of the settings applied to their machine. Being able to correlate a user's problem with a specific security setting enforced by Group Policy was a key skill for the 70-688 exam.
Supporting users who work outside the office is a critical function for a modern IT department, and the 70-688 exam placed a strong emphasis on remote access technologies. The most common method for providing secure remote access is a Virtual Private Network (VPN). A support professional must be proficient in configuring a VPN connection on a Windows 8.1 client. This involves knowing where to go in the Network and Sharing Center or PC Settings to create a new connection and entering the correct server address and authentication details.
A key part of supporting VPN users is troubleshooting connection problems. This can be a complex task involving many potential points of failure. A technician should have a systematic approach, starting with verifying the user's internet connection, checking the VPN server address, and ensuring the user is entering their credentials correctly. They also need to understand the different VPN protocols (like PPTP, L2TP/IPsec, and SSTP) and know that firewalls at the user's location (e.g., on a home router) can sometimes block the ports required for the VPN to connect.
Once connected, users may experience issues accessing internal resources. This could be due to DNS name resolution problems over the VPN link or specific firewall rules on the corporate network. A technician needs to be able to diagnose these issues. They should also be familiar with advanced VPN features like split tunneling, which determines whether all of the user's internet traffic is routed through the corporate network or if only traffic destined for the corporate network goes through the VPN. This setting has significant security and performance implications.
DirectAccess was a flagship remote access technology from Microsoft, and understanding its client-side support was an advanced topic on the 70-688 exam. Unlike a traditional VPN, which requires the user to manually initiate a connection, DirectAccess is designed to be "always on." As soon as a DirectAccess-enabled laptop detects it has an internet connection, it automatically establishes a secure, bidirectional connection back to the corporate network. This provides a seamless experience for the user and allows IT to manage the remote machine as if it were on the LAN.
While the server-side configuration of DirectAccess is complex, the support professional's role is to troubleshoot the client. A technician should know how to check the status of the DirectAccess connection using the network connectivity assistant icon in the system tray. They also need to be familiar with the command-line tools and PowerShell cmdlets that can provide detailed diagnostic information about the connection state, including the status of the underlying IPv6 transition technologies (like Teredo or IP-HTTPS) that DirectAccess uses to tunnel traffic.
Common user-reported issues include the connection being stuck in a "Connecting" state or an inability to access specific internal resources. Troubleshooting involves checking for prerequisites, such as ensuring the machine is part of the domain and is in the correct security group to receive the DirectAccess Group Policy settings. It also involves verifying network connectivity to the Network Location Server (NLS), which is an internal-only server that the client uses to determine if it is inside or outside the corporate network.
A common challenge for users who work on multiple devices is keeping their data synchronized. Windows 8.1 introduced a feature called Work Folders to address this. The 70-688 exam expected candidates to understand how to support this technology. Work Folders allows a user to sync files from a folder on a corporate file server to a designated folder on their personal and corporate devices. It provides a user experience similar to consumer cloud storage services but keeps the data stored on the organization's own servers, giving IT full control.
A support professional needs to know how to set up Work Folders on a client device. This is done through the Control Panel and requires the user to enter their email address or a specific server URL provided by the IT department. The technician would then guide the user through the initial synchronization process and explain how to use the "Work Folders" location that appears in File Explorer.
Troubleshooting Work Folders involves diagnosing synchronization problems. This could be due to connectivity issues with the Work Folders server, authentication problems, or file conflicts. The Work Folders applet in the Control Panel provides status information and error logs that can help pinpoint the cause of the problem. A technician also needs to be aware of the security policies that can be enforced, such as requiring the Work Folders directory on the client device to be encrypted, to protect corporate data.
Go to testing centre with ease on our mind when you use Microsoft 70-688 vce exam dumps, practice test questions and answers. Microsoft 70-688 Supporting Windows 8.1 certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using Microsoft 70-688 exam dumps & practice test questions and answers vce from ExamCollection.
Top Microsoft Certification Exams
Site Search:
SPECIAL OFFER: GET 10% OFF
Pass your Exam with ExamCollection's PREMIUM files!
SPECIAL OFFER: GET 10% OFF
Use Discount Code:
MIN10OFF
A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.