[Pass Ensure VCE Dumps] PassLeader Offer 290q 70-687 PDF and VCE Dumps With New Update Questions (131-150)
New 70-687 Exam Questions Updated Today! PassLeader just released the latest Microsoft 70-687 pdf and vce exam dumps(Now Total 290q) with all new exam questions, which will help you 100% passing the newest 70-687 exam. This new questions are exactly the same as real test’s. Now visit passleader.com to get the newest 290q 70-687 pdf or vce exam dumps with 10% discount and FREE VCE TEST SOFTWARE!
keywords: 70-687 exam,290q 70-687 exam dumps,290q 70-687 exam questions,70-687 pdf dumps,70-687 vce dumps,70-687 study guide,70-687 practice test,Configuring Windows 8.1 Exam
You administer Windows 8.1 Enterprise (64-bit) computers in your company network. For some applications, some computers run a 32-bit version of the application, and other computers run a 64-bit version of the application. You want to distribute a package that contains updates for the 32-bit applications only. You need to determine if a particular computer is running 32-bit or 64-bit versions of the applications. From the Select columns window, which column should you add to Task Manager? (To answer, select the appropriate column name in the answer area.)
A company has client computers that run Windows XP or Windows Vista. The company plans to upgrade all client computers to Windows 8.1. You are planning a deployment strategy. You need to identify the elements that will be retained after the upgrades. Which elements will be retained? (To answer, drag the appropriate element or elements to the correct location or locations in the answer area. Elements may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. The company has three departments named Accounting, Human Resources (HR), and Marketing. User account objects are stored in their respective departmental AD security groups and have full access to shared folders for each department. A new company policy requires that the following access rules are in place:
– Users must have complete access only to their department’s shared folder.
– Accounting department users must be able to change files in the HR folder.
– HR department users must be able to change files in the Marketing folder.
– Marketing department users must be able to change files in the Accounting folder.
You need to comply with the company policy. Which permissions should you assign? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
You are troubleshooting communication issues on a computer that has Windows 8.1 Enterprise installed. The relevant portion of the computer configuration is displayed in the exhibit. (Click the Exhibit button.)
You need to find the Windows Firewall service startup and shutdown events. In the Event Viewer, which event log should you select? (To answer, select the appropriate log in the answer area.)
You are preparing to deploy a new computer that runs Windows 8.1. You plan to copy the user’s data from his current computer to the new computer. You need to generate a list of data that will be copied from his existing computer to the new computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 32-bit version of Windows 8.1. A workgroup contains client computers that run a 64-bit version of Windows 8.1. Computers in the workgroup can’t currently print to PRINTER1. You need to ensure that the workgroup computers can print to PRINTER1. Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange them in the correct order.)
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers. You are planning a remote management solution. You have the following requirements:
– Ensure that COMPUTER1 can run remote commands on COMPUTER2.
– Test the solution by successfully running a command from COMPUTER1 that executes on COMPUTER2.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has client computers that run Windows 8.1. All client computers allow incoming Remote Desktop connections. You attempt to connect from COMPUTER1 to COMPUTER2 by using Remote Desktop. Remote Desktop cannot connect to the remote computer. You establish that the firewall settings on COMPUTER2 have not been set to allow incoming connections. From COMPUTER1, you need to enable Remote Desktop traffic through Windows Firewall on COMPUTER2. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A desktop computer runs Windows 8.1. The computer is joined to an Active Directory Domain Services (AD DS) domain named contoso.com. You have two domain user accounts:
– A primary account named User1 that does not have domain administrative privileges.
– An account named Admin1 that has administrative privileges in the domain.
You are currently logged in as User1. You need to run an application named appl.exe. You have the following requirements:
– Start the application by using your administrative credentials.
– Ensure that the user environment is fully available to the application.
You need to complete the command to meet the requirements. Which command segments should you use to complete the command? (To answer, drag the appropriate command segments to the correct locations in the answer area. Command segments may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has a branch office with client computers that run Windows 8.1. Files are saved locally on the client computers and are not backed up regularly. You need to ensure that you can retrieve previous versions of locally saved files from each client computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
A company has client computers that run Windows 8.1 in a kiosk environment. You need to ensure that Windows updates are automatically applied and cannot be disabled by users. What should you do?
A. Configure Windows Update to install updates automatically.
B. In the local Group Policy, enable the Turn on recommended updates via Automatic Updates policy setting.
C. msiexec /i app1.msi /qn
D. In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.
Turn off access to all Windows Update features: This Group Policy setting is located in Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings. When you enable this setting, the operating system cannot be updated through Windows Update, and Automatic Updates is disabled. Users or administrators can still perform actions such as clicking the Windows Update option on the Start menu, and the Windows Update Web site will appear in the browser. However, it will not be possible to update the operating system through Windows Update, regardless of the type of account being used to log on. I think that is exactly what we want to happen in a kiosk environment. Kiosk Computers will still be able to receive their updates from a WSUS server.
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain. Employees in the human resources (HR) department are getting new Windows 8 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store. You need to ensure that all employees in the HR department can use Timesheet on their new computers. What should you do?
A. Use a Microsoft account to log on to each computer.
B. Use a local account to log on to each computer.
C. Activate the sideloading product key on each computer.
D. Install and run the Windows App Certification Kit.
You use a Windows 8.1 Pro computer. The computer stores research data in a folder named C:\Research. You turn on File History. You need to back up the Research folder. What should you do?
A. Create a new library and include the folder in the library.
B. Create a new volume mount point in the root of the folder.
C. Create a new storage space and move the folder to the storage space.
D. Create a new restore point.
Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It’s a feature introduced in Windows 8 that offers a new way to protect files for consumers.
It supersedes the existing Windows Backup and Restore features of Windows 7.
Before you start using File History to back up your files, you’ll need to set up a drive to save files to. We recommend that you use an external drive or network location to help protect your files against a crash or other PC problem.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you can add them to one of your existing libraries or create a new library.
Advanced settings can be accessed from the File History control panel applet.
File History also supports new storage features introduced in Windows 8. Users who have lots of data to back up can use Storage Spaces to create a resilient storage pool using off- the-shelf USB drives. When the pool fills up, they can easily add more drives and extra storage capacity to the pool.
Drag and Drop Questions
A company plans to upgrade its client computer operating systems from Windows 7 to Windows 8.1. You need to use the User State Migration Tool (USMT) to configure the migration profile to exclude all files in the users’ Documents folders. Which command should you run on the client computers before the upgrade? (To answer, drag the appropriate command elements to the correct location or locations in the answer area. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
You administer Windows 8.1 client computers in your company network. A guest at your company is connected to the Internet as shown in the following exhibit. (Click the Exhibit button.)
You need to ensure that the guest user is able to share network resources over Wi-Fi without lowering the overall security of the computer. What should you do?
A. Change the network location type to Work.
B. Configure File sharing connections settings for All networks.
C. Change the network location type to Private.
D. Configure File and printer sharing settings for Public networks.
Simple Questions: What are Network Locations in Windows 7 & Windows 8?
Network Locations in Windows 8: Private vs Public
Windows 8 further simplifies the concept of network locations, reducing them to only two choices:
Private network – This profile should be applied to your home network or to the network from your workplace. When this profile is assigned to a network connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections are allowed.
Public network – This profile is also named Guest. It is the more secure of the two because network discovery is turned off as well as file and printer sharing. This profile should be used when connecting to public networks you don’t trust, like those found in airports, coffee shops, bars, hotels, etc.
There’s also a third network location profile named Domain network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings applied to this profile are those set by your company and you cannot change them.
You administer Windows 8.1 computers in your company network. All computers include Windows 8.1 compatible Trusted Platform Module (TPM). You configure a computer that will run a credit card processing application. You need to ensure that the computer requires a user to enter a PIN code when starting the computer. Which policy should you configure? (To answer, select the appropriate policy in the answer area.)
A company has client computers that run Windows 8.1. When a user tries to print from his portable client computer while connected to the corporate network, he discovers that the default printer is set to his home printer instead of to the office printer. You need to ensure that the default printer for the computer is the office printer when the computer is connected to the corporate network and the user’s home printer when the computer is connected to his home network. What should you do on the portable computer?
A. In the printer properties of the corporate printer, configure the active port with the correct TCP/IP settings for the printer.
B. Install the corporate printer and set it as the default printer. Then add the home printer to the homegroup settings.
C. Connect to the home network and choose Connect from the shared printer object context menu. Then connect to the corporate network and choose Connect from the shared printer object context menu.
D. Set a default printer for each network.
1. Set or change your default printer.
2. To set a different default printer for each network.
3. Tap or click any printer, and then tap or click Manage default printers.
4. Select Change my default printer when I change networks.
5. Under Select network, choose the first network you want to set a printer for.
6. Under Select printer, choose the printer you want to be the default on that network, and then tap or click Add.
7. When you’re finished setting a default printer for each network, tap or click OK.
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least amount of administrative effort. Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)
A. Edit the local Group Policy to configure the Shut Down options.
B. Create a Group Policy object (GPO) that configures the Sleep Management settings.
C. Create a Group Policy object (GPO) that configures the Power Management settings.
D. Link the Group Policy object (GPO) to the organizational unit containing the portable computers.
E. Edit the local Group Policy to configure the Power Management settings.
Put the Laptops into an OU.
Create an appropriate GPO.
Link the GPO to the OU.
* Networking power management (not sleep management) refers to the set of features that you can configure to allow the computers in your network to save energy.
Local Group Policy would have to be edited locally on each laptop.
You install Windows 8.1 on a client computer. Several days later, you establish that the computer has been infected by malware. You are unable to establish when the computer was infected. You need to restore the client computer to full functionality. What should you do?
A. Start the computer using the Last Known Good Configuration option.
B. Use the Refresh your PC without affecting your files function.
C. Start the computer in Safe Mode.
D. Use the Remove everything and install Windows function.
How to refresh, reset, or restore your PC. If you’re having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC reinstalls Windows and keeps your personal files and settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps — except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you’ve made.
A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.1. You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)
See step 12 and 13 below.
Create Windows To Go on any edition of Windows 8:
1. Launch an administrative level command prompt.
2. Make sure that your USB Drive is plugged in and then type in diskpart and hit Enter.
3. List the available disks by running “list disk” and you should see your usb device.
4. Select your USB drive by typing “select disk #” and hit Enter. For example, “select disk 3”.
5. Clean the partitions on the disk by typing “clean” and hit Enter.
6. Now create the boot partition by running the following command:
create partition primary size=350
7. Now create the OS partition by running the following command to create a partition taking up all remaining space:
create partition primary
8. The boot partition needs to be formatted, configured and assigned a drive letter, run the following commands:
select partition 1
format fs=fat32 quick
(if the b drive letter is already in use on your PC, substitute a different letter and replace b with your letter throughout the rest of this guide)
9. The same must be done for the OS partition, run the following different commands:
select partition 2
format fs=ntfs quick
(if the o drive letter is already in use on your PC, substitute a different letter and replace o with your letter throughout the rest of this guide)
10. Exit Diskpart by typing Exit.
11. Extract the install.wim file from the \sources\ directory of the Windows 8 install ISO to
c:\wim\. On Windows 8 you can just double click an ISO to mount and then browse it.
12. Use DISM to deploy the Windows 8 files to the OS partition of the USB device by running:
dism /apply-image /imagefile:c:\wim\install.wim /index:1 /applydir:o:\
13. The boot manager needs to be installed on the boot partition with the help of the bcdboot utility. Run the following command:
o:\windows\system32\bcdboot o:\windows /f ALL /s b:
14. Reboot your computer and test your new Windows 8 To Go device built on Windows 8. Make sure the PC is configured to boot to USB before your local hard drive.
Reference: How to Create a Windows To Go USB Drive.