Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-687
100% Free Download! 100% Pass Guaranteed!

Configuring Windows 8.1

Question No: 71 – (Topic 1)

You are employed as an administrator at contoso.com.

The network consists of a single Active Directory Domain Services (AD DS) domain, named contoso.com.

All workstations on the contoso.com network have Windows 8.1 installed. You need to configure files history on a client system.

You notice that the free storage space on the selected drive is low, but you do not have a spare drive to replace it.

What should you do?

  1. Configure the save copies of files setting to back up files once a day.

  2. Configure Size of offline cache setting to 2%

  3. Keep saved versions setting to be 1 month

  4. Keep saved versions setting until space is needed

Answer: D

Question No: 72 – (Topic 1)

A company has client computers that run Windows 8.1. You implement an AppLocker file hash rule that allows an application to run. You then apply a service pack to the application.

When users attempt to run the application, the application is blocked by Group Policy. You need to ensure that the application runs.

What should you do?

  1. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.

  2. Set the wired network connection to non-metered.

  3. Set the wired network connection to metered.

  4. Configure the Automatic Maintenance setting.

Answer: B

Question No: 73 – (Topic 1)

You are employed as an administrator at contoso.com. The contoso.com network is made up of an Active Directory Domain Services (AD DS) domain, named ABC.com.

All workstations on the contoso.com network, including laptops, have Windows 8.1 installed.

Your users have just been issued new laptops for use outside the office.

These users currently log in to their desktop workstations using a Windows domain account.

They would like their laptops to be set up exactly like their desktop workstations. Which of the following would easily allow them to achieve this?

  1. Transfer the user settings with the File and Transfer wizard

  2. Windows Easy Transfer

  3. Migrate the user profiles with USMT

  4. Link the Windows domain accounts to a Windows Live ID.

Answer: D Explanation:

http://blogs.msdn.com/b/b8/archive/2011/09/26/signing-in-to-windows-8-with-a-windows- live-id.aspx

Signing in with an ID allows you to:

Associate the most commonly used Windows settings with your user account. Saved settings are available when you sign in to your account on any Windows 8.1 PC. Your PC will be set up just the way you are used to!

Easily reacquire your Metro style apps on multiple Windows 8.1 PCs. The app’s settings and last-used state Persist across all your Windows 8.1 PCs.

Save sign-in credentials for the different apps and websites you use and easily get back into them without having to enter credentials every time.

Automatically sign in to apps and services that use Windows Live ID for authentication. http://windows.microsoft.com/en-us/windows-8/connect-microsoft-domain-account Connect your Microsoft account to your domain account

You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other Microsoft account settings that you see on your home PC. You#39;ll also be able to use Microsoft account services from your domain PC without signing in to them individually.

Question No: 74 – (Topic 1)

A company has client computers that run Windows 8.1. Users store data on company- issued USB flash drives.

You establish that users are able to store data on personally owned USB flash drives.

You need to ensure that users can save data on company flash drives but not on personal flash drives.

What should you do?

  1. Disable driver signature enforcement.

  2. Run Device Manager as an administrator.

  3. In the local Group Policy, modify the device installation restrictions.

  4. In the system properties for hardware, modify the device installation settings.

Answer: C Explanation:

You could prevent installation of mass storage devices but use the quot;Allow administrators to overridequot; setting to ensure an administrator could get the flash drive installed.

Ensurepass 2018 PDF and VCE

Further information:

http://msdn.microsoft.com/en-us/library/bb530324.aspx

Step-By-Step Guide to Controlling Device Installation Using Group Policy

Group Policy Settings for Device Installation

To enable control over device installation, Windows Vista and Windows Server 2008 introduce several policy settings. You can configure these policy settings individually on a single computer, or you can apply them to a large number of computers through the use of Group Policy in an Active Directory domain.

Whether you want to apply the settings to a stand-alone computer or to many computers in an Active Directory domain, you use the Group Policy Object Editor to configure and apply the policy settings.

The following is a brief description of the DMI policy settings that are used in this guide. Prevent installation of devices not described by other policy settings.

This policy setting controls the installation of devices that are not specifically described by any other policy setting. If you enable this policy setting, users cannot install or update the driver for devices unless they are described by either the Allow installation of devices that match these device IDs policy setting or the Allow installation of devices for these device classes policy setting. If you disable or do not configure this policy setting, users can install and update the driver for any device that is not described by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation of removable devices policy setting.

Allow installation of devices that match any of these device IDs. This policy setting specifies a list of Plug and Play hardware IDs and compatible IDs that describe devices that users can install. This setting is intended to be used only when the Prevent installation of devices not described by other policy settings policy setting is enabled and does not take precedence over any policy setting that would prevent users from installing a device. If you enable this policy setting, users can install and update any device with a hardware ID or compatible ID that matches an ID in this list if that installation has not been specifically prevented by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation of removable devices policy setting. If another policy setting prevents users from installing a device, users cannot install it even if the device is also described by a value in this policy setting. If you disable or do not configure this policy setting and no other policy describes the device, the Prevent installation of devices not described by other policy settings policy setting determines whether users can install the device.

Question No: 75 – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. Client computers in the Test department run Windows 8.1 and are connected to the domain.

You need to ensure that Windows updates are not automatically applied and cannot be enabled by users.

What should you do?

  1. Create a Group Policy object (GPO) to enable the Turn on recommended updates via Automatic Updates policy setting.

  2. Configure Windows Update to install updates automatically.

  3. Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update features policy setting.

  4. Create a Group Policy object (GPO) to configure the Configure Automatic Updates policy setting.

Answer: C Explanation:

Remove access to use all Windows Update features:

This Group Policy setting is located in User Configuration\Administrative Templates\Windows Components\Windows Update.

When you enable this setting, the operating system cannot be updated through Windows Update, and Automatic Updates is disabled. Users or administrators can still perform actions such as clicking the Windows Update option on the Start menu, and the Windows Update Web site will appear in the browser. However, it will not be possible to update the operating system through Windows Update, regardless of the type of account being used to log on.

Question No: 76 – (Topic 1)

A company has client computers that run Windows 8.1.

You need to create a baseline performance report that includes disk status by using the least amount of administrative effort.

What should you do?

  1. Start the System Diagnostics Data Collector Set.

  2. Create and start a custom Data Collector Set.

  3. Start the System Performance Data Collector Set.

  4. Add counters to Performance Monitor, and then print the Performance Monitor output.

Answer: A Explanation:

System Diagnostics and Performance Data Collector Set both deliver the same, 17 performance counters for disk.

Don#39;t get fooled by the word quot;Performance Baselinequot;

The System Diagnostics Report includes Basic System Checks (see below), where Disk status is listed.

This item does not appear in the System Performance Report.

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Question No: 77 DRAG DROP – (Topic 1)

A client laptop runs Windows 7 Professional and a custom application. The custom application is compatible with Windows 8.1.

You plan to migrate user settings and data from the client laptop to a new tablet PC that runs Windows 8.1 Pro. You install the User State Migration Toolkit (USMT) on a USB flash drive.

You need to ensure that the custom application settings are applied to the tablet PC after the migration is complete.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Ensurepass 2018 PDF and VCE

Ref: http://www.utilizewindows.com/7/basics/170-migrate-to-windows-7-using-usmt http://technet.microsoft.com/en-us/library/cc721992(v=ws.10).aspx

USMT Components

You use ScanState to collect the files and settings from the source computer. You use

LoadState to restore the user state onto the destination computer. USMT Components

ScanState.exe

ScanState scans the source computer, collects the files and settings and creates a store. ScanState does not modify the source computer. By default, ScanState compresses the files and stores them as an image file (USMT3.MIG).

LoadState.exe

LoadState migrates the files and settings from the store to the destination computer. LoadState migrates each file (one by one) from the store to a temporary location on the destination computer – the files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the file to the correct location, deletes the temporary copy, and begins migrating the next file.

Compression improves performance by reducing network bandwidth usage as well as the required space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.

Question No: 78 – (Topic 1)

A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History on.

A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.

You need to establish why the file history is not available and ensure that it is available in the future.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Set the Protection Settings for drive C to On.

  2. Restore the data files from the Previous

  3. Versions tab located in the folder properties.

  4. Review the File History backup log.

  5. Move the file into a library.

Answer: D,E Explanation:

File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.

Since File History is already on we can assume the drive doesn#39;t need to be changed. So we should review the log and move the file to a library.

Volume shadow copy has been replaced with File History: http://msdn.microsoft.com/en- us/library/windows/desktop/hh848072(v=vs.85).

http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to- backup-file-history-in-windows-8.aspx

A New Way to Backup: File History in Windows 8

File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.

Since File History is already on we can assume the drive doesn#39;t need to be changed. So we should review the log and move the file to a library.

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

Question No: 79 – (Topic 1)

You are configuring a computer that will be used in a kiosk in a public area. You install a new internal hard drive.

You need to protect the computer from starting an unauthorized operating system. What should you do?

A.

Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled.

Install Windows 8.1 Pro 64-bit using UEFI and install it on the internal hard drive.

B.

Install Windows 8.1 Pro 64-bit on the internal hard drive. Enable BitLocker on the internal hard disk.

C.

Partition the internal hard drive as MBR disk. Install Windows 8.1 Enterprise 64-bit.

D.

Partition the internal hard drive as GPT disk. Install Windows 8.1 Pro 64-bit.

Answer: A

Explanation: http://technet.microsoft.com/en-us/windows/dn168169.aspx Windows 8 Boot Security FAQ

What is UEFI?

UEFI (Unified Extensible Firmware Interface) is a specification that defines an interface between a PC’s firmware and an operating system. It replaces or can work in concert with the Basic Input/Output System (BIOS) firmware that PCs have traditionally used. For Windows 8, a key part of this specification is Secure Boot, which protects the PC from malware by allowing only authorized boot loaders to run when the computer starts.

How does Windows 8 prevent attackers from replacing boot components?

All systems with the Windows 8 certification use Secure Boot (part of the UEFI specification) to protect hardware-related firmware and the operating-system loader from tampering. Secure Boot can prevent the system from booting if unauthorized changes have been made or possibly even refresh the some boot components, such as the UEFI firmware, to a known good state.

What is Trusted Boot?

Trusted Boot is a Windows 8 feature that secures the entire Windows boot process. It prevents malware from hiding and taking up permanent residence within the PC by ensuring none of the Windows components loaded during boot have been tampered with. Trusted Boot also ensures that anti-malware software is loaded before any third-party drivers and applications using its Early Launch Anti-Malware (ELAM) capability. This prevents malware from inserting itself in front of the anti-malware engine so that it can compromise the anti-malware engine’s ability to protect the system. In the event that malware was able to successfully compromise the any of the Windows boot process, Trusted Boot will attempt to automatically remediate the issue.

What editions of Windows 8 will include Trusted Boot? All editions of Windows 8 include Trusted Boot.

Question No: 80 – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.

A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.

You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share.

Which permission should you grant to the Sales group?

  1. Manage queue

  2. Manage this printer

  3. Print

  4. Manage spooler

  5. Manage documents

Answer: E Explanation:

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx Group types

There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and security groups to assign permissions to shared resources.

Security groups

Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can:

Assign user rights to security groups in Active Directory Assign permissions to security groups on resources

http://my.safaribooksonline.com/book/operating-systems/9780133118025/sharing- printers/ch21lev2sec24

Setting Printer Permissions

If you have a workgroup network and have disabled Password Protected Sharing, or if you have set up a homegroup, you don’t need to worry about setting permissions for printers: anyone can use your shared printer. If you’re on a domain network or have chosen to use detailed user-level permissions on your workgroup network, you can control access to your shared printers with security attributes that can be assigned to users or groups, as shown in Figure 21.9 and described next:

Ensurepass 2018 PDF and VCE

Ensurepass 2018 PDF and VCE

The Security tab lets you assign printer-management permissions for users, groups, and the creator of each print job.

100% Ensurepass Free Download!
70-687 PDF
100% Ensurepass Free Guaranteed!
70-687 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.