Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-689
100% Free Download! 100% Pass Guaranteed!

Upgrading Your Skills to MCSA Windows 8.1

Question No: 51

A company has Windows 8.1 client computers. A user stores files in multiple locations.

You need to determine which of the locations will be included in File History.

Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.)

  1. Public Documents and Public Pictures

  2. Contacts, Desktop, and Favorites

  3. All system files

  4. C:\Users and C:\ProgramData

  5. My Documents and My Pictures

  6. Desktop and Recycle Bin

Answer: A,B,E

Explanation: File History has a predefined set of items that it backs up automatically: all your libraries (both default libraries and custom libraries you created), the Desktop, your Contacts, Internet Explorer favorites and the SkyDrive.

Library example:

Ensurepass 2018 PDF and VCE

C:\Users\Chaudhry\Desktop\1.jpg

Question No: 52

You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise.

You are planning to add a guest wireless network.

You need to collect information about nearby wireless networks, including their encryption methods.

Which command should you include in the batch file?

  1. Netsh wlan set autoconfig enabled=no interface=quot;Wireless Network Connectionquot;

  2. ipconfig /allcompartments

  3. netsh wlan show networks

  4. netstat -a

  5. Get-WmiObject win32_networkadapterconfiguration -Filter #39;ipenabled = quot;truequot;#39;

  6. netsh wlan show hostednetwork

Answer: C

Question No: 53

Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration.

You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter.

You want to create an image of the reference desktop that retains the custom driver in the image.

You need to edit the unattended answer file.

Which setting in the unattended answer file should you edit?

  1. Microsoft-Windows-Shell-Setup | OEMInformation

  2. Microsoft-Windows-PnPSysprep | PersistAIIDeviceInstalls

  3. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices

  4. Microsoft-Windows-PnpCustomizationNonWinPE | DriverPaths

Answer: B Explanation:

The Microsoft-Windows-PnpSysprep component specifies whether all Plug and Play information persists during the generalize pass. Typically, during the generalize pass, all device information is removed from thecomputer.

If the device information is removed during the generalize pass, the next time the computer runs Plug and Play, the devices will be re-initialized. Typically, the next time the computer boots, the specialize pass runs, and Plug and Play runs.

PersistAllDeviceInstalls

Specifies whether all Plug and Play information persists during the generalize configuration pass.

http://technet.microsoft.com/en-us/library/cc766005(v=ws.10).aspx

Question No: 54 DRAG DROP

You administer computers that run Windows 8.

The computers on your network are produced by various manufacturers and often require custom drivers.

You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).

In which order should you perform the actions? (To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.)

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Explanation:

Box 1: Extract WinRE files from the Windows Assessment and Deployment Kit (ADK) Box 2: Mount the WinRE image file.

Box 3: Add additional drivers. Box 4: Unmount the image file Box 5: Commit changes

Box 6: Create a bootable WInRe Reocvery Media

Note:

  • The Windows庐 Assessment and Deployment Kit (Windows ADK) is a collection of tools and documentation that you can use to customize, assess, and deploy Windows operating systems to new computers.

  • Walkthrough: Create a Custom Windows PE Image

Step 1: Set Up a Windows PE Build Environment Step 2: Mount the Base Windows PE Image Step 3: Add Boot-Critical Drivers

Step 4: Add Optional Components

Step 5: Add Language Support (Optional) Step 6: Add More Customization (Optional) Step 7: Commit Changes

* Walkthrough: Create a Windows RE Recovery Media Step 1: Create a Windows RE Image

Step 2: Create a bootable media

The Windows Assessment and Deployment Kit (Windows ADK) is a collection of tools and documentation that

you can use to customize, assess, and deploy Windows operating systems to new computers.

Basic Windows Deployment Step-by-Step Guide Walkthrough: Create a Windows RE Image Walkthrough: Create a Custom Windows PE Image

Question No: 55

A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.

A client computer hosts a Windows 8 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

The VMs are unable to connect to the domain controller. You have the following requirements:

->Configure the test environment to allow VMs to communicate with the domain controller.

->Ensure that the VMs can communicate with other VMs in the test environment

when the domain controller is unavailable.

You need to meet the requirements. What should you do first?

  1. Change the connection type of the private virtual switch to Internal only.

  2. Create a new virtual switch with a Private Network connection type.

  3. Create a new virtual switch with an ExternalNetwork connection type.

  4. Create a new virtual switch with an Internal Network connection type.

Answer: C

Question No: 56

You are troubleshooting a computer that runs Windows 8.1. A third-party application no longer functions correctly.

You need to repair the application. What should you do?

  1. Run the reset /f command and specify the application#39;s .msi file.

  2. Run the msiexec /f command and specify the application#39;s .msi file.

  3. Use File History to revert the application#39;s .msifile to a previous version.

  4. Run the replace command, specify the application#39;s .msi file as the source, and then specify the application#39;s original installation directory as the destination.

Answer: B

Reference:http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx (search for ‘/f’)

Explanation:

http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx Msiexec (command-line options)

To repair a product Syntax

msiexec /f [p][o][e][d][c][a][u][m][s][v]{Package | ProductCode}

Question No: 57

You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.

Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:

->Users have offline access to the application only within the first seven days

following their latest online session.

->The application uses the least amount of disk space.

You need to deploy the new application to the tablets. What should you do?

  1. Deploy the application as an Application Virtualization (App-V) package. Install the App- V client on the tablets.

  2. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.

  3. Install the application on a local drive on the tablets.

  4. Install the application in a Windows To Go workspace.

  5. Install Hyper-V on tablets. Install the application on a virtual machine.

  6. Publish the application to Windows Store.

  7. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.

  8. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

Answer: A Explanation:

Microsoft Application Virtualization (App-V) enables enterprises to meet the needs of users and IT by empowering anywhere productivity and accelerated application deployment. App- V provides anywhere user access to applications that available on any authorized device without application installs. Virtual applications and user settings are preserved whether users are online or offline. App-V increases business agility through faster application deployment and updates with no user interruptions. It minimizes conflicts between applications, allowing enterprises to reduce application compatibility testing time. App-V together with Microsoft User State Virtualization (USV) provides users witha consistent experience and reliable access to applications and business data, no matter their location and connection to the Internet.

http://www.microsoft.com/en-us/windows/enterprise/products-and- technologies/virtualization/app-v.aspx

Question No: 58

A company has client computers that run Windows 8. You install a new printer on a client computer. The printer software installation includes an application that runs when the

computer starts.

You experience problems with the application.

You need to prevent the application from running when the computer starts, without affecting any other application.

What should you do?

  1. Configure the printer by using Device Manager.

  2. Configure the printer application by using Task Manager.

  3. Run the msconfig -p command.

  4. Run the bcdedit -p command.

    Answer: B Explanation:

    it’s a new feature of Windows 8

    http://pcworld.co.nz/pcworld/pcw.nsf/feature/20-essential-windows-8-tips-and-tricks

    Question No: 59 DRAG DROP

    You administer desktop computers in your company#39;s research department. The computers run Windows 8 Enterprise and are members of a workgroup.

    A new security policy states that all traffic between computers in the research department must be encrypted and authenticated.

    You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Security.

    Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

    Ensurepass 2018 PDF and VCE

    Answer:

    Ensurepass 2018 PDF and VCE

    Explanation:

    Box 1:

    Ensurepass 2018 PDF and VCE

    C:\Users\Chaudhry\Desktop\1.jpg Box 2:

    Ensurepass 2018 PDF and VCE

    C:\Users\Chaudhry\Desktop\1.jpg Box 3:

    Ensurepass 2018 PDF and VCE

    C:\Users\Chaudhry\Desktop\1.jpg

    Note:

    A connection security rule forces two peer computers to authenticate before they can establish a connection and to secure information transmitted between the two computers. Windows Firewall with Advanced Security uses IPsec to enforce these rules.

    To create a connection security rule

    1. In Windows Firewall with Advanced Security, in the console tree, click Connection Security Rules.

    2. In the Actions list, click New Rule.

      The Rule Type page, shown in the Figure below, allows you to select the type of rule you want to create. Select a type, and use the wizard to configure the new rule according to the information in the following sections.

      Ensurepass 2018 PDF and VCE

      C:\Users\Chaudhry\Desktop\1.jpg

      Isolation

      An isolation rule isolates computers by restricting inbound connections based on

      credentials, such as domain membership or compliance with policies that define the required software and system configurations. Isolation rules allow you to implement a server or domain isolation strategy. When you create an isolation rule, you will see the following wizard pages:

      * Requirements. You can choose when authentication is required:

      /Request authentication for inbound and outbound connections

      /Require authentication for inbound connections and request authentication for outbound connections

      /Require authentication for inbound and outbound connections

      *Authentication Method. You can select from the following authentication methods: Default. This selection uses the current computer default selections specified on the IPsec Settings tab of the Windows Firewall Properties page.

      Computer and user (Kerberos V5). This method uses both computer- and user-based Kerberos V5 authentication to restrict connections to domain-joined users and computers. User authentication, and therefore this method, is compatible only with computers running Windows Vista and later.

      Computer (Kerberos V5). This method uses Kerberos V5 authentication to restrict connections to domain-joined computers. This method is compatible with computers running Windows 2000 or later.

      Advanced. This setting allows you to designate multiple authentication methods, such as computer certificate, NTLMv2, and preshared key.

      • Profile. Choose the profiles (Domain, Public, and Private) to which the rule applies.

      • Name. Name the rule and type an optional description.

      Question No: 60

      You use a computer that has Windows 7 Professional (32-bit) installed. You need to migrate the computer to Windows 8.1 Pro (64-bit).

      Which installation method should you use?

      1. Start Windows 8.1 custom installation from a DVD.

      2. Open Windows Anytime Upgrade.

      3. Download and run Windows 7 Upgrade Advisor.

      4. Download and run Windows 8.1 Upgrade Assistant.

Answer: A

100% Ensurepass Free Download!
70-689 PDF
100% Ensurepass Free Guaranteed!
70-689 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.