(DAILY NEW UPDATED) Braindump2go Helps Pass 70-687 Exam Download Free 70-687 Practice Exam Questions Study from Today Now! (241-250)
Microsoft Exam Center Adds New Questions and Answers Details to Exam 70-687 Recently! Download Latest Free 70-687 Exam Questions and Answers from Braindump2go Now! Pass Your Exam 100%!
Vendor: Microsoft
Exam Code: 70-687
Exam Name: Configuring Windows 8.1
QUESTION 241
Hotspot Question
You are a system administrator for Contoso, Ltd.
You manage a remote site that consists of 50 users. Each user has a Windows 8.1 desktop computer.
You grant local admin rights to a small group of power users that have proven a level of proficiency with Windows 8.1.
This group helps with minor problems as needed.
One of the power users makes configuration changes on a desktop computer.
Now the computer freezes for two minutes during the boot process.
You need to use msconfig to change the boot options to meet the following requirements:
– Boot in safe mode
– Boot the computer with a minimal set of drivers
– Networking enabled
– See the splash startup screen
– Read drivers as they are loaded
Which three options should you select? (To answer, select the appropriate three options from the System Configuration Boot tab in the answer area.)
Answer:
QUESTION 242
Hotspot Question
You are the PC support specialist for Contoso, Ltd.
Your department upgrades your company’s laptops to Windows 8.1.
You need to use BitLocker to encrypt the system drives on these laptops.
You attempt to encrypt several laptops but receive an error message shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement.
Each correct selection is worth one point.
Answer:
QUESTION 243
Hotspot Question
You have a Windows 8 Pro laptop.
You set the Power Options so the laptop does not sleep when plugged in.
When the laptop is not plugged in, it will go to sleep but not always after the same amount of time. It also wakes itself up seemingly randomly without user intervention.
You need to confirm that the sleep settings are configured when the laptop is functioning on battery power, and you need to identify what may be causing the machine to wake up or is preventing it from sleeping.
You run the command Powercfg /devicequery.
The configuration is shown in the following exhibit (Click the Exhibit button.)
You open the Power Options, which are shown in the following exhibit. (Click the Exhibit button.)
Finally, you run powercfg /request from the command line.
The configuration is shown in the following exhibit. (Click the Exhibit button.)
Consider each of the following statements. Does the information in the three screenshots support the inference as stated? (Each correct selection is worth one point.)
Answer:
QUESTION 244
A company has an Active Directory Domain Services domain named contoso.com. The domain contains two sites that are named SiteA and SiteB. The company uses Windows 8.1 Pro laptop computers. The computer account objects are located in an Organizational Unit (OU) named Laptops.
The company plans to deploy a wireless network infrastructure.
You need to preconfigure all laptop computers with the wireless network access information by using a Group Policy Object (GPO).
What should you do?
A. Create and link a GPO to a group containing all laptop computers.
Edit the GPO and configure a Wireless Network Policy.
B. Create and link a GPO to the Laptops OU.
Edit the GPO and configure a Wireless Network Policy.
C. Create and link a GPO to a SiteA.
Edit the GPO and configure a Wireless Network Policy.
D. Create and link a GPO to a SiteB.
Edit the GPO and configure a Wireless Network Policy,
Answer: B
Explanation:
http://technet.microsoft.com/en-us/magazine/gg266419.aspx
Using Group Policy to Configure Wireless Network Settings
In an Active Directory Domain Services (AD DS) environment, you can use Group Policy settings to configure wireless network policies. (Note that you should have Windows Server 2003 SP1 or later installed on your domain controllers.)
http://technet.microsoft.com/en-us/library/cc738954%28v=ws.10%29.aspx
Link a Group Policy object to a site, domain, or organizational unit
Do one of the following:
* To link to a domain or an organizational unit, open Active Directory Users and Computers.
* To link to a site, open Active Directory Sites and Services.
In the console tree, right-click the site, domain, or organizational unit to which you want the Group Policy object to be linked.
Click Properties, and then click the Group Policy tab.
To add the Group Policy object to the Group Policy Object Links list, click Add. This opens the Add a Group Policy Object Link dialog box.
Click the All tab, click the Group Policy object that you want, and then click OK.
In the properties dialog box for the site, domain, or organizational unit, click OK.
QUESTION 245
You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT department configures all of them to use BitLocker on all fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?
A. A password
B. A startup key
C. A.tpm file
D. TPM
Answer: A
Explanation:
http://technet.microsoft.com/en-us/magazine/ff404223.aspx
Enable BitLocker on USB Flash Drives to Protect Data
Encrypting USB flash drives protects the data stored on the volume.
Any USB flash drive formatted with FAT, FAT32, or NTFS can be encrypted with BitLocker.
To enable BitLocker encryption on a USB flash drive, do the following:
3. On the Choose How You Want To Unlock This Drive page, choose one or more for the following options, and then click Next:
Use A Password To Unlock This Drive Select this option if you want the user to be prompted for a password to unlock the drive. Passwords allow a drive to be unlocked in any location and to be shared with other people.
Use My Smart Card To Unlock The Drive Select this option if you want the user to use a smart card and enter the smart card PIN to unlock the drive. Because this feature requires a smart card reader, it is normally used to unlock a drive in the workplace and not for drives that might be used outside the workplace.
4. On the How Do You Want To Store Your Recovery Key page, click Save The Recovery Key To A File.
QUESTION 246
You are the desktop administrator for your company, which uses Windows 8.1 computers.
The company decides to use virtual disks at your location so the programmers can build and test applications in a closed network.
You need to use the file given as a virtual hard disk and be able to boot to the vhd.
What should you do?
A. Copy the vhd file to the root of C;\ run bcdedit and add an entry to the boot options that includes the path to the vhd.
B. Attach the vhd in computer management and add it to the Boot Menu.
C. Copy the vhdfile to the root of C:\, open msconfig, and choose Safe Boot and Alternate Shell.
D. Move the vhd file to a network share, map the network share, and allow a network boot.
Answer: A
QUESTION 247
A company has an Active Directory Domain Services (AD DS) domain with Windows 8.1 client computers.
Internet Explorer does not display warning messages to some users when public websites install software or run other installed applications on the client computers.
You need to configure Internet Explorer to always display warning messages about websites that attempt to install software or run applications.
What should you do?
A. Enable the Turn on Protected Mode Group Policy setting.
B. Enable the Automatic prompting for file downloads Group Policy setting.
C. Disable the Allow software to run or install even if the signature is invalid Group Policy setting.
D. Disable the Launching applications and files in an IFRAME Group Policy setting,
Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows-vista/what-does-internet-explorer-protected-mode-do
What does Internet Explorer protected mode do?
Internet Explorer’s protected mode is a feature that makes it more difficult for malicious software to be installed on your computer.
In addition to helping protect your computer from malicious software, protected mode allows you to install wanted ActiveX controls or add-ons when you are logged in as an administrator.
In addition to warning you when webpages try to install software, Internet Explorer will warn you when webpages try to run certain software programs. You are warned when a software program would run outside of Internet Explorer and outside of protected mode, because that program might have more access to your computer than you prefer. This usually happens when a website is using an add-on to run a software program on your computer.
http://technet.microsoft.com/en-us/library/cc985351.aspx
Group Policy and Internet Explorer 8
Policy name:
Turn on Protected Mode
Policy path
Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
Further Information:
http://www.sevenforums.com/tutorials/63141-internet-explorer-protected-mode-turn-off.html
Internet Explorer Protected Mode – Turn On or Off
Protected mode in IE7, IE8, IE9, IE10, and IE11 is a feature that makes it more difficult for malicious software to be installed on your computer. In addition to helping protect your computer from malicious software, protected mode allows you to install wanted ActiveX controls or add-ons when you are logged in as an administrator.
QUESTION 248
You are the network administrator for Contoso.com and are creating an image for a Windows 8.1 implementation for all of your users.
You find out that an application your company has used for many years is not compatible with Windows 8.1. It has always worked on your Vista computers with SP2. The application requires administrator privileges.
You need to configure the correct settings so that the application can run on Windows 8.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Using the Application Compatibility toolkit run the Windows Vista Compatibility Evaluator for Windows 8, and select the Service Pack 2 option.
B. Modify the User Account Control Settings by adjusting the slider to Never Notify.
C. Assign the application to Run as administrator on the Security tab of the application executable file properties.
D. Using the Compatibility Troubleshooter, check Run this application in compatibility mode for and select Vista (Service Pack 2).
E. Select Run this program as an administrator in the Compatibility Troubleshooter.
Answer: DE
Explanation:
http://windows.microsoft.com/en-us/windows-8/older-programs-compatible-version-windows Make older programs compatible with this version of Windows
Most programs created for earlier versions of Windows will work in this version of Windows, but some older programs might run poorly or not at all. You can run the Program Compatibility Troubleshooter on most programs to detect and fix common compatibility problems.
Change compatibility settings manually
Compatibility mode
Runs the program using settings from a previous version of Windows. Try this setting if you know the program is designed for (or worked in) a specific version of Windows.
Run this program as an administrator.
Some programs require administrator privileges to run properly.
If you aren’t signed in to your PC as an administrator, this option is unavailable.
Further Information:
http://technet.microsoft.com/en-us/library/hh825181.aspx
Application Compatibility Toolkit (ACT) Technical Reference
The Microsoft Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows operating system. By using ACT, you can obtain compatibility information from Microsoft and software vendors, identify compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility issues before you deploy a version of Windows to your organization.
QUESTION 249
You provide IT support for a small business.
A member of the team needs the ability to use Remote Desktop and VPN to access a desktop computer from a laptop when traveling. This desktop computer is running Windows 8.1 Pro, while the laptop is running Windows 7 Professional.
You need to set up a secure Remote Desktop connection on the desktop computer.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Require Network Level Authentication.
B. Allow remote connections.
C. Disable Remote Assistance connections.
D. Make the user account a standard user.
Answer: AB
Explanation:
http://windows.microsoft.com/en-us/windows/remote-desktop-connection-faq#1TC=windows-8
Remote Desktop Connection: frequently asked questions
There are two remote settings options:
Don’t allow remote connections to this computer. This will prevent anyone from connecting to your PC remotely.
Allow remote connections to this computer. This will allow remote connections on your PC.
If you know that the people who will connect to your PC are running Windows 7, Windows 8, or Windows 8.1 on their PCs, check the Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended) box. These versions of Windows use Network Level Authentication, which is an authentication method that completes before you establish a full connection and the sign-in screen appears. This can help protect the remote PC from hackers and malware.
http://technet.microsoft.com/en-us/library/cc732713.aspx
Configure Network Level Authentication for Remote Desktop Services Connections
Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
The client computer must be using at least Remote Desktop Connection 6.0. The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol. The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
QUESTION 250
You provide tech support for a small home business. One of its Windows 8 computers is having occasional problems opening and saving files. You suspect that there is a problem with the hard drive but need to verify that it is not just a problem with one of the three volumes on the disk.
You start diskpart and set the focus to disk 0,
You need to obtain the properties of the hard disk as well as the health status of the volumes that reside on it.
Which command should you run next?
A. List partition
B. Detail volume
C. Detail disk
D. Attributes volume
Answer: A
Explanation:
http://msdn.microsoft.com/en-us/library/ff794606(v=winembedded.60).aspx
http://technet.microsoft.com/en-us/library/bb490893.aspx
DiskPart
DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using scripts or direct input from a command prompt. Before you can use DiskPart.exe commands on a disk, partition, or volume, you must first and then select the object to give it focus. When an object has focus, any DiskPart.exe commands that you type act on that object.
You can list the available objects and determine an object’s number or drive letter by using the list disk, list volume, and list partition commands. The list disk and list volume commands display all disks and volumes on the computer. However, the list partition command only displays partitions on the disk that has focus. When you use the list commands, an asterisk (*) appears next to the object with focus. You select an object by its number or drive letter, such as disk 0, partition 1, volume 3, or volume C.
When you select an object, the focus remains on that object until you select a different object. For example, if the focus is set on disk 0, and you select volume 8 on disk 2, the focus shifts from disk 0 to disk 2, volume 8. Some commands automatically change the focus. For example, when you create a new partition, the focus automatically switches to the new partition.
You can only give focus to a partition on the selected disk. When a partition has focus, the related volume (if any) also has focus. When a volume has focus, the related disk and partition also have focus if the volume maps to a single specific partition. If this is not the case, then focus on the disk and partition is lost.
DiskPart commands
…
list partition
Displays the partitions listed in the partition table of the current disk. On dynamic disks, these partitions may not correspond to the dynamic volumes on the disk. This discrepancy occurs because dynamic disks contain entries in the partition table for the system volume or boot volume (if present on the disk) and a partition that occupies the remainder of the disk in order to reserve the space for use by dynamic volumes.
..
detail volume
Displays the disks on which the current volume resides.
..
detail disk
Displays the properties of the selected disk and the volumes on that disk.
..
Guaranteed 100% Microsoft 70-687 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-687 Dumps PDF & VCE for Instant Download!