BrainDupms.70-687.341Questions

BrainDupms.70-687.341Questions
BrainDupms.70-687.341Questions
Number: 70-687
Passing Score: 800
Time Limit: 120 min
File Version: 15.3
http://www.gratisexam.com/
WOW I passed today with 92%.I finished my exam in 28 minutes but have to sit for 40 minutes as per requirement. Really thanks to my friend.
Very accurate, I've passed two days ago
This dumps is valid n awesome, I passed Today,971/1000, just 2days practice.
THANK VERY MUCH!!!! I just passed with score of 933 - ALL the question were from this dump - still valid in USA :-) They were almost word for
word,amazing!!!
Modified few questions, fixed few spelling mistakes and typos.
Exam A
QUESTION 1
You manage computers that run Windows 8.1.
You plan to install a desktop app named App1 on one of the client computers.
You need to install the app without any user interaction and without displaying a progress bar.
Which command should you run?
A.
B.
C.
D.
msiexec /i appl.msi /qb
msiexec /x appl.msi /qb
msiexec /i appl.msi /qn
msiexec /x appl.msi /qn
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx Msiexec (command-line options)
Provides the means to install, modify, and perform operations on Windows Installer from the command line.
/i installs or configures a product
/qn displays no user interface
Further information:
/x uninstalls a product.
QUESTION 2
You update the video card driver on a portable computer that runs Windows 8.1.
When a user connects the portable computer to an external monitor, the external monitor duplicates the display on the portable computer screen.
You need to ensure that the user can display additional desktop space on the external monitor.
What should you do?
A.
B.
C.
D.
Run the DisplaySwitch /extend command.
Start the computer from the Windows 8.1 installation media and perform a system image recovery.
Roll back the video card driver to the previous version.
Run the sic /scannow command.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://jeffwouters.nl/index.php/2012/06/switch-your-display-through-the-command-line/ Switch your display through the command line
displayswitch.exe parameters:
QUESTION 3
A company has client computers that run Windows 8.1.
You attempt to roll back a driver for a specific device on a client computer.
The Roll Back Driver button is unavailable in Device Manager.
You need to roll back the driver to the previous version.
What should you do first?
A.
B.
C.
D.
In the system properties for hardware, modify the device installation settings.
Disable driver signature enforcement.
In the local Group Policy, modify the device installation restrictions.
Run Device Manager as an administrator.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc732648.aspx
Roll Back a Device Driver to a Previous Version
Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure. Review the details in "Additional considerations" in
this topic.
QUESTION 4
A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.1.
A client computer hosts a Windows 8.1 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the
Virtual Switch Manager exhibit. (Click the Exhibit button.)
You have the following requirements:
Configure the test environment to allow VMs to communicate with the host machine.
Minimize impact on the host machine.
You need to meet the requirements.
What should you do?
A.
B.
C.
D.
Create a new virtual switch with a Private Network [CP1] connection type.
Create a new virtual switch with an ExternalNetwork connection type.
Change the VLAN ID of the private virtual switch to Enable Virtual LAN identification.
Create a new virtual switch with an Internal Network connection type.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-2-configure-hardware-and- applications-16/
Virtual switches/ Hyper-V VLAN you can create 3 different types of virtual switches depending the needs of your virtual machines and one single machine can use
multiple virtual NICs that is member of different Virtual Switches.
External This virtual switch binds to the physical network adapter and create a new adapter you can 1.
see in Control Panel\Network and Internet\Network Connections so if a virtual machine needs contact outside the host machine this one is a must.
Internal This virtual switch can be used to connect all virtual machines and the host machine but can- 2.
not go outside that.
Private This virtual switch can only be used by the virtual host 3.
Further information:
http://technet.microsoft.com/en-us/library/cc816585%28v=ws.10%29.aspx Configuring Virtual Networks
Private will not allow communication with the host machine. External will allow communication with the host machine but also allow access to other machines on the
host machine's network which is not a re- quirement.
QUESTION 5
A company has client computers that run Windows 8.1. On all client computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled
and the Download updated compatibility lists from Microsoft option disabled.
The corporate website was designed for a previous version of Internet Explorer. When viewed on the client computers, menus and image on the corporate website
are displayed out of place.
You need to ensure that the corporate website displays correctly on the client computers without negatively impacting the display of any other website.
What should you do?
http://www.gratisexam.com/
A.
B.
C.
D.
Manually add the corporate website to the compatibility view settings.
Enable the Display all websites in Compatibility View option.
Disable the Display intranet sites in Compatibility View option.
Manually download an updated compatibility list from Microsoft.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 6
A portable computer that runs Windows 8.1 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate
network connection. The computer successfully downloads Windows updates when connected to either network. You need to ensure that the computer
automatically downloads updates by using Windows Update only while connected to the wired corporate network connection.
What should you do?
A.
B.
C.
D.
Set the corporate wireless network to metered.
Set the corporate wireless network to non-metered.
Configure the Specify intranet Microsoft update service location local Group Policy setting.
Configure a Windows Firewall connection security rule.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.eightforums.com/tutorials/5371-wireless-network-set-unset-metered-connection-windows-8- a.html
http://www.windowsnetworking.com/articles_tutorials/Using-Wireless-Networks-Windows-8.html
To help you gauge the amount of data usage on networks, Windows 8.1 includes a new data usage tracking and metering feature. This is especially useful when
using mobile broadband networks, as your service likely has a limit to the amount of data you can use before you're charged overage fees or the speed is throttled,
or maybe you're even on a pay-as-you-go plan that charges per usage.
By default, Windows 8.1 tracks the amount of data you transfer over Wi-Fi and mobile broadband networks. The running total (in MBs or GBs) and the time or day
since it's been tracked is displayed when you click (or tap) on a network name from the new network list, as shown in the figure below:
You can also set particular networks as a metered connection, which will then disable Windows Update from downloading updates (except for critical security
patches) and possibly disable or reduce data usage from other Microsoft and non-Microsoft applications as well.
QUESTION 7
You manage client computers that run Windows 7 and Windows 8.1.
You are configuring Windows updates for all client computers.
You have the following requirements:
All client computers must use a specific Windows Server Update Services (WSUS) server for updates.
All client computers must check for updates each hour.
You need to configure local Group Policy settings to meet the requirements.
Which three actions should you perform? (Each answer presents part of the solution. Choose three.)
A.
B.
C.
D.
E.
Configure the Automatic Maintenance Activation Boundary policy setting.
Configure the Automatic Updates detection frequency policy setting.
Enable the Specify intranet Microsoft update service location policy setting.
Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.
Enable the Reschedule Automatic Updates scheduled installations policy setting.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/dn595129.aspx
Step 5: Configure Group Policy Settings for Automatic Updates
Automatic Updates detection frequency
Specifies the hours that Windows will use to determine how long to wait before checking for available up- dates. The exact wait time is determined by using the
hours specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20 hour detection frequency, all clients to
which this policy is applied will check for updates anywhere between 16 and 20 hours. Note: The "Specify intranet Microsoft update service location" setting must be
enabled for this policy to have effect.
Specify intranet Microsoft update service location
Specifies an intranet server to host updates from Microsoft Update. You can then use WSUS to automati- cally update computers on your network.
Configure Automatic Updates
Specifies specify whether automatic updates are enabled on this computer.
Further Information:
http://technet.microsoft.com/en-us/library/dn595129.aspx
Step 5: Configure Group Policy Settings for Automatic Updates
Automatic Maintenance Activation Boundary
Starting Windows 8, you can set updates to install during automatic maintenance instead of using a spe- cific schedule tied to Windows Update. Automatic
maintenance will install updates when the computer is not in use, and avoid installing updates when the computer is running on battery power. If automatic
maintenance is unable to install updates within days, Windows Update will install updates right away. Users will then be notified about a pending restart. A pending
restart will only take place if there is no po- tential for accidental data loss.
Reschedule Automatic Updates scheduled installations
Specifies the amount of time for Automatic Updates to wait following a computer startup, before proceed- ing with a scheduled installation that was previously
missed. If the status is set to Not Configured, a missed scheduled installation will occur one minute after the com- puter is next started.
QUESTION 8
A company has client computers that run Windows 8.1.
You need to create a baseline performance report that includes disk status by using the least amount of administrative effort.
What should you do?
A.
B.
C.
D.
Start the System Diagnostics Data Collector Set.
Create and start a custom Data Collector Set.
Start the System Performance Data Collector Set.
Add counters to Performance Monitor, and then print the Performance Monitor output.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
System Diagnostics and Performance Data Collector Set both deliver the same, 17 performance counters for disk.
Don't get fooled by the word "Performance Baseline"
The System Diagnostics Report includes Basic System Checks (see below), where Disk status is listed.
This item does not appear in the System Performance Report.
QUESTION 9
A company has client computers that run Windows 8.1 in a kiosk environment.
You need to ensure that Windows updates are automatically applied and cannot be disabled by users.
What should you do?
A.
B.
C.
D.
Configure Windows Update to install updates automatically.
In the local Group Policy, enable the Turn on recommended updates via Automatic Updates policy setting.
msiexec /i app1.msi /qn
In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you enable the Remove access to use all Windows Update features policy setting:
Changing the Windows Update settings will be grayed out:
Further information:
If you enable the Turn on recommended updates via Automatic Updates policy setting, even when logged with a limited rights user, you can still change the
Automatic Updates settings:
QUESTION 10
A company has client computers that run Windows 8.1. Each computer has two hard drives.
You need to create a dynamic volume on each computer that maximizes write performance.
Which kind of dynamic volume should you create?
A.
B.
C.
D.
Striped volume
RAID 5 volume
Spanned volume
Mirrored volume
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx What Are Dynamic Disks and Volumes?
..
Types of Dynamic Volumes
A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.
Striped Volumes
Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal
size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks. Striped volumes cannot be extended or
mirrored and do not offer fault tolerance. If one of the disks con- taining a striped volume fails, the entire volume fails, and all data on the striped volume becomes
inacces- sible. The reliability for the striped volume is less than the least reliable disk in the set.
Further Information:
RAID-5 Volumes
A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one
disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the
RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the lost data. RAID-5 volumes are well-suited to
storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a
RAID-5 volume.
Spanned Volumes
Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned
volumes require two disks, and you can use up to 32 disks.
Mirrored Volumes
A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the
information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one
of the disks fails, the data on the failed disk becomes unavailable, but the system continues to oper- ate by using the unaffected disk.
Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy
of their data on the second disk. Mirrored vol- umes provide better write performance than RAID-5 volumes.
QUESTION 11
A company has client computers that run Windows 8.1.
The company implements the following security requirements:
All client computers must use two-factor authentication.
At least one authentication method must include exactly
four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
PIN
Biometric authentication
Picture password
Microsoft account
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Something the user knows: PIN (4 digits)
One might be tempted to think the photo for the picture password is something the User has.
But it is something the User knows, too:
He knows how to draw the gestures (maximum 3 gestures supported with picture password), and it is no physical object (like a token, smart card ...)
The MS Account is too something the user knows.
So the answer must be Biometric authentication.
Two-factor authentication requires the use of two of the three authentication factors:
Something the user knows (e.g., password, PIN);
Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint). The factors
are identified in the standards and regulations for access to U.S. Federal Government systems.
http://en.wikipedia.org/wiki/Multi-factor_authentication
Multi-factor authentication
..
Two-factor authentication requires the use of two of the three authentication factors. The factors are iden- tified in the standards and regulations for access to U.S.
Federal Government systems. These factors are:
Something only the user knows (e.g., password, PIN, pattern); Something only the user has (e.g., ATM card, smart card, mobile phone); and Something only the
user is (e.g., biometric characteristic, such as a fingerprint).
1. Something the user knows: PIN
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to- resources-14/
Sign in with PIN code (4-digit code) is not possible for a domain user, it is not even visible in PC Settings -> Users (if machine is not domain joined you see it). To
enable it for even domain joined computer/users you can enable the policy Turn on PIN sign-in and it becomes visible.
2. Something only the user is: Biometric authentication
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to- resources-14/
Biometric in Windows 8 is built on Windows Biometric Framework and relies on Windows Biometric ser- vice that is set to start up manual by default.
Further information:
Something the user knows: Picture password
Problem: limited to 3 gestures
Something the user knows: Microsoft account
Problem: not limited to 4 characters
QUESTION 12
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs.
Which permission should you grant to the Sales group?
A.
B.
C.
D.
E.
Manage queue
Print
Manage documents
Manage this printer
Manage spooler
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc781446%28v=ws.10%29.aspx Group types
There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and
security groups to assign permissions to shared resources.
Security groups
Used with care, security groups provide an efficient way to assign access to resources on your network.
Using security groups, you can:
Assign user rights to security groups in Active Directory
Assign permissions to security groups on resources
http://my.safaribooksonline.com/book/operating-systems/9780133118025/sharing-printers/ch21lev2sec24 Setting Printer Permissions
If you have a workgroup network and have disabled Password Protected Sharing, or if you have set up a homegroup, you don't need to worry about setting
permissions for printers: anyone can use your shared printer. If you're on a domain network or have chosen to use detailed user-level permissions on your
workgroup network, you can control access to your shared printers with security attributes that can be as- signed to users or groups, as shown in Figure 21.9 and
described next:
The Security tab lets you assign printer-management permissions for users, groups, and the creator of each print job.
QUESTION 13
Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
Users from the Supervisors AD security group must be able to open files, but not modify them.
Users from the Marketing AD security group must be able to create, modify, and delete files.
Users from both groups must not be able to delete the folder.
Which permissions should you set?
A. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special
permission.
B. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission.
C. Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special
permission.
D. Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/bb727008.aspx
File and Folder Permissions
On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders.
File and Folder Permissions:
Special Permissions for Files:
Special Permissions for Folders:
QUESTION 14
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows Vista and are members of the domain. A Group Policy
object (GPO) configuring a software restriction policy is implemented in the domain to block a specific application.
You upgrade a computer to Windows 8.1 and implement a GPO that configures an AppLocker rule in the domain. The blocked application runs on the Windows 8.1
computer but not on the Windows Vista computers.
You need to ensure that the application is blocked from running on all computers and the AppLocker rule is applied to the computers in the domain.
What should you do?
A. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
B. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
C. Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
D. Configure the software restriction policy as a local policy on the Windows 8.1 computer.
E. Add the blocked application as a software restriction policy to the GPO that configures AppLocker.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/library/hh994614
Use AppLocker and Software Restriction Policies in the Same Domain
AppLocker is supported on systems running Windows 7 and above. Software Restriction Policies (SRP) is supported on systems running Windows Vista or earlier.
You can continue to use SRP for application con- trol on your pre-Windows 7 computers, but use AppLocker for computers running Windows Server 2008 R2,
Windows 7 and later. It is recommended that you author AppLocker and SRP rules in separate GPOs and target the GPO with SRP policies to systems running
Windows Vista or earlier. When both SRP and AppLocker policies are applied to computers running Windows Server 2008 R2, Windows 7 and later, the SRP
policies are ignored.
http://technet.microsoft.com/en-us/library/ee791851%28v=ws.10%29.aspx Both SRP and AppLocker use Group Policy for domain management. However, when
SRP policies and AppLocker policies exist in the same domain and applied through Group Policy, AppLocker policies will take precedence over SRP policies on
computers running Windows Server 2012, Windows Server 2008 R2, Windows 8 or Windows 7.
As an example of how both types of policy would affect the bank's "Teller software" application, consider the following scenario where the application is deployed on
different Windows desktop operating systems and managed by the Tellers GPO.
Further Information:
http://technet.microsoft.com/en-us/library/hh847214.aspx
Get-AppLockerPolicy
The Get-AppLockerPolicy cmdlet retrieves the AppLocker policy from the local Group Policy Object (GPO), a specified Group Policy Object (GPO), or the effective
policy on the computer. By default, the output is an AppLockerPolicy object. If the XML parameter is used, then the output will be the AppLocker policy as an XML-
formatted string.
technet.microsoft.com/en-us/library/hh849812.aspx
Set-ExecutionPolicy
The Set-ExecutionPolicy cmdlet changes the user preference for the Windows PowerShell execution pol- icy.
The execution policy is part of the security strategy of Windows PowerShell. It determines whether you can load configuration files (including your Windows
PowerShell profile) and run scripts, and it determines which scripts, if any, must be digitally signed before they will run.
QUESTION 15
A company has client computers that run Windows 8.1. Users store data on company-issued USB flash drives.
You establish that users are able to store data on personally owned USB flash drives.
You need to ensure that users can save data on company flash drives but not on personal flash drives.
What should you do?
A.
B.
C.
D.
Disable driver signature enforcement.
Run Device Manager as an administrator.
In the local Group Policy, modify the device installation restrictions.
In the system properties for hardware, modify the device installation settings.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You could prevent installation of mass storage devices but use the "Allow administrators to override" setting to ensure an administrator could get the flash drive
installed.
Further information:
http://msdn.microsoft.com/en-us/library/bb530324.aspx
Step-By-Step Guide to Controlling Device Installation Using Group Policy
Group Policy Settings for Device Installation
To enable control over device installation, Windows Vista and Windows Server 2008 introduce several policy settings. You can configure these policy settings
individually on a single computer, or you can apply them to a large number of computers through the use of Group Policy in an Active Directory domain. Whether
you want to apply the settings to a stand-alone computer or to many computers in an Active Di- rectory domain, you use the Group Policy Object Editor to configure
and apply the policy settings.
The following is a brief description of the DMI policy settings that are used in this guide. Prevent installation of devices not described by other policy settings. This
policy setting controls the installation of devices that are not specifically described by any other pol- icy setting. If you enable this policy setting, users cannot install
or update the driver for devices unless they are described by either the Allow installation of devices that match these device IDs policy setting or the Allow
installation of devices for these device classes policy setting. If you disable or do not con- figure this policy setting, users can install and update the driver for any
device that is not described by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device
classes policy setting, or the Prevent installation of removable devices policy setting.
...
Allow installation of devices that match any of these device IDs. This policy setting specifies a list of Plug and Play hardware IDs and compatible IDs that describe
devices that users can install. This setting is intended to be used only when the Prevent installation of devices not described by other policy settings policy setting is
enabled and does not take precedence over any policy setting that would prevent users from installing a device. If you enable this policy setting, users can install
and update any device with a hardware ID or compatible ID that matches an ID in this list if that installation has not been specifically prevented by the Prevent
installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation
of removable devices policy setting. If another policy setting prevents users from installing a device, users cannot install it even if the device is also described by a
value in this policy setting. If you disable or do not configure this policy setting and no other policy describes the device, the Prevent installation of de- vices not
described by other policy settings policy setting determines whether users can install the de- vice.
QUESTION 16
You manage computers that run Windows 8.1.
You plan to install a desktop app named MarketingApp on one of the client computers.
You need to display a progress bar to the user while installing the app.
Which command should you run?
A.
B.
C.
D.
msiexec /i marketingapp.msi Jqn
msiexec /i marketingapp.msi /qb
msiexec /x marketingapp.msi /qb
msiexec /x marketingapp.msi /qn
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx /i installs or configures a product
/qb displays a basic user interface
/qn Displays no user interface.
/x Uninstalls a product.
QUESTION 17
A company has 10 client computers that run Windows 8.1. You are responsible for technical support. You purchase a support tool from the Windows Store while
logged in with your Microsoft account.
You install the support tool on several client computers.
Three months later, you attempt to install the support tool on another client computer. The installation fails.
You need to ensure that you can install the support tool on the client computer.
What should you do?
A. Log in with your Microsoft account and remove a computer from the Windows Store device list.
B. On the computer on which you want to install the tool, synchronize the Windows Store application licenses.
C. Disassociate your Microsoft account from the computer on which you want to install the tool.
Then reassociate your Microsoft account with the computer.
D. Reset your Microsoft account password.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You could prevent installation of mass storage devices but use the "Allow administrators to override" setting to ensure an administrator could get the flash drive
installed.
http://windows.microsoft.com/en-us/windows-8/windows-store-install-apps-multiple-pcs You can remove a PC from your account when you're signed in to the Store
on any PC. After you've removed a PC from your account, you won't be able to use the apps that were installed from the Store on that PC.
Further information:
http://windows.microsoft.com/en-us/windows-8/what-troubleshoot-problems-app Troubleshoot problems with an app
Sync app licenses
If a license for an app is out of sync with the license installed on your PC, the app might stop working.
QUESTION 18
You update the video card driver on a computer that runs Windows 8.1.
You can no longer configure the display settings to extend the display to a projector.
You need to restore the display options as quickly as possible and retain all user data.
What should you do?
A.
B.
C.
D.
Roll back the video card driver to the previous version.
Run the DisplaySwitch/extend command.
Run the sic /scannow command.
Start the computer from the Windows 8.1 installation media and perform a system image recovery.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Rolling back the driver is the simplest and fastest solution.
Example:
Further Information:
The DisplaySwitch /extend command might not work is the driver is broken. The sfc /scannow command checks system files for consistency.
And a system image recovery will affect the user data.
QUESTION 19
A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.1.
A client computer hosts a Windows 8.1 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the
Virtual Switch Manager exhibit. (Click the Exhibit button.)
The VMS are unable to connect to the domain controller. You have the following requirements:
Configure the test environment to allow VMs to communicate with the domain controller.
Ensure that the VMs can communicate with other VMS fl the test environment when the domain controller is unavailable.
You need to meet the requirements.
What should you do first?
A.
B.
C.
D.
Create a new virtual switch with an Internal Network connection type.
Create a new virtual switch with a Private Network connection type.
Create a new virtual switch with an External Network connection type.
Change the connection type of the private virtual switch to Internal only.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-2-configure-hardware-and- applications-16/
Virtual switches/ Hyper-V VLAN you can create 3 different types of virtual switches depending the needs of your virtual machines and one single machine can use
multiple virtual NICs that is member of different Virtual Switches.
External This virtual switch binds to the physical network adapter and create a new adapter you can 1.
see in Control Panel\Network and Internet\Network Connections so if a virtual machine needs contact outside the host machine this one is a must.
Internal This virtual switch can be used to connect all virtual machines and the host machine but can- 2.
not go outside that.
Private This virtual switch can only be used by the virtual host 3.
Further information:
http://technet.microsoft.com/en-us/library/cc816585%28v=ws.10%29.aspx Configuring Virtual Networks
..
Private will not allow communication with the host machine. External will allow communication with the host machine but also allow access to other machines on the
host machine's network.
QUESTION 20
A company has an Active Directory Domain Services domain. All client computers run Windows 8.1 and are joined to the domain.
You run the ipconfiq command on a client computer. The following output depicts the results.
Ethernet adapter Local Area Connection 3:
You need to ensure that you can establish a DirectAccess connection from the client computer to the network.
What should you do?
A. Create a new VPN connection.
B. Remove the computer from the domain.
C. Enable IPv6 on the network adapter.
D. Configure a static IPv4 address.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/dd637767%28v=ws.10%29.aspx DirectAccess Connections
DirectAccess overcomes the limitations of VPNs by automatically establishing a bi-directional connection from client computers to the corporate network.
DirectAccess is built on a foundation of proven, stan- dards-based technologies: Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Further Information:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3-configure-network- connectivity-15/
A few Windows 8 functions only work with IPv6 such as DirectAccess and HomeGroup.
QUESTION 21
An organization has client computers that run Windows 7. You upgrade the client computers to Windows 8.1 without migrating the local user profiles. You install the
Windows Assessment and Deployment Kit (ADK) in the environment.
You need to migrate the user profiles from the Windows 7 installation to the Windows 8.1 installation.
What should you do first on each client computer?
A.
B.
C.
D.
E.
Run the scanstate command.
Run Windows Easy Transfer and select the user profile to migrate
Run the Ioadstate command.
Copy the Default Profile to a folder on drive C.
Run the ImaqeX command.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh825093.aspx
The ScanState command is used with the User State Migration Tool (USMT) 5.0 to scan the source computer, collect the files and settings, and create a store.
QUESTION 22
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share.
Which permission should you grant to the Sales group?
A.
B.
C.
D.
E.
Manage queue
Manage this printer
Print
Manage spooler
Manage documents
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc781446%28v=ws.10%29.aspx Group types
There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and
security groups to assign permissions to shared resources.
Security groups
Used with care, security groups provide an efficient way to assign access to resources on your network.
Using security groups, you can:
Assign user rights to security groups in Active Directory
Assign permissions to security groups on resources
http://my.safaribooksonline.com/book/operating-systems/9780133118025/sharing-printers/ch21lev2sec24 Setting Printer Permissions
If you have a workgroup network and have disabled Password Protected Sharing, or if you have set up a homegroup, you don't need to worry about setting
permissions for printers: anyone can use your shared printer. If you're on a domain network or have chosen to use detailed user-level permissions on your
workgroup network, you can control access to your shared printers with security attributes that can be as- signed to users or groups, as shown in Figure 21.9 and
described next:
The Security tab lets you assign printer-management permissions for users, groups, and the creator of each print job.
QUESTION 23
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
A notification appears when domain users change Windows settings and when applications try to make changes to client computers.
You need to ensure that a notification appears only when an application tries to make changes to the computer.
What should you do?
A.
B.
C.
D.
Configure the Notification Area Icons settings on the client computers.
Create a Group Policy object (GPO) that enables the Admin Approval Mode for the built-in Administrator account policy.
Configure the User Account Control (UAC) settings on the client computers.
Create a Group Policy object (GPO) that disables the Run all administrators in Admin Approval Mode policy.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.thewindowsclub.com/change-user-account-settings-windows-8 Change User Account Control settings in Windows 8
The User Account Control basically notifies you before changes are made to your PC not all changes, but only those which require Administrator level permissions.
These changes could have been initiated by the user, by the operation system, by a genuine software or even malware! Every time such an adminis- trator level
change is initiated, Windows UAC will prompt the user for approval or denial. If the user ap- proves the change, the change is made; in not, no changes are made
to the system.
Settings:
Always notify me
Notify me only when apps try to make changes to my computer (default) Notify me only when apps try to make changes to my computer (don't dim my desktop)
Never notify me
QUESTION 24
Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
Users from the Marketing security group must be able to open files, but not modify them.
Users from the Supervisors security group must be able to create, modify, and delete files.
Users from both groups must not be able to delete the folder.
Which permissions should you set?
A. Assign the Marketing group the Read permission.
Assign the Supervisors group the Read and Write permissions and the Delete Subfolders and Files special permission.
B. Assign the Marketing group the Read and Write permissions.
Assign the Supervisors group the Full Control permission.
C. Assign the Marketing group the Read and Write permissions.
Assign the Supervisors group the Modify permission and the Delete Subfolders and Files special permission.
D. Assign the Marketing group the Read permission.
Assign the Supervisors group the Read and Write permissions and the Delete special permission.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/bb727008.aspx
File and Folder Permissions
..
On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders.
File and Folder Permissions:
Special Permissions for Files:
Special Permissions for Folders:
QUESTION 25
You deploy several tablet PCs that run Windows 8.1.
You need to minimize power usage when the user presses the sleep button.
What should you do?
A.
B.
C.
D.
In Power Options, configure the sleep button setting to Hibernate.
Disable the C-State control in the computer's BIOS.
Configure the active power plan to set the system cooling policy to passive.
In Power Options, configure the sleep button setting to Sleep.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://www.howtogeek.com/102897/whats-the-difference-between-sleep-and-hibernate-in-windows/ If you're using a laptop computer, the best option is most likely
Hibernate, because it saves the most power compared to Sleep and Hybrid Sleep.
http://windows.microsoft.com/en-us/windows7/sleep-and-hibernation-frequently-asked-questions Sleep and hibernation: frequently asked questions
..
What's the difference between sleep, hibernate, and hybrid sleep?
Sleep is a power-saving state that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again.
Putting your computer into the sleep state is like pausing a DVD player -- the computer immediately stops what it's doing and is ready to start again when you want
to resume working.
Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and set- tings in memory and draws a small amount of power,
hibernation puts your open documents and pro- grams on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hi- bernation
uses the least amount of power. On a laptop, use hibernation when you know that you won't use your laptop for an extended period and won't have an opportunity to
charge the battery during that time.
Hybrid sleep is designed primarily for desktop computers. Hybrid sleep is a combination of sleep and hi- bernate -- it puts any open documents and programs in
memory and on your hard disk, and then puts your computer into a low-power state so that you can quickly resume your work. That way, if a power fail- ure occurs,
Windows can restore your work from your hard disk. When hybrid sleep is turned on, putting your computer into sleep automatically puts your computer into hybrid
sleep. Hybrid sleep is typically turned on by default on desktop computers.
Further information:
http://www.hardwaresecrets.com/article/611
Everything You Need to Know About the CPU C-States Power Saving Modes
In order to save energy when the CPU is idle, the CPU can be commanded to enter a low-power mode. Each CPU has several power modes and they are
collectively called "C-states" or "C-modes".
QUESTION 26
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry.
What should you do?
A. Enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 for the Configure TPM validation profile for native UEFI firmware configuration policy
setting.
B. Create a Group Policy object (GPO) that disables the Configure the level of TPM owner authorization information available to operating system policy setting.
C. Create a Group Policy object (GPO) that sets the Configure the level of TPM owner authorization information available to operating system policy setting to
None.
D. Create a Group Policy object (GPO) that enables the Turn on TPM Local Encryption policy setting.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj679889.aspx#BKMK_tpmgp_oauthos Configure the level of TPM owner authorization information available to the
operating system
This policy setting configures how much of the TPM owner authorization information is stored in the reg- istry of the local computer. Depending on the amount of
TPM owner authorization information that is stored locally, the Windows operating system and TPM-based applications can perform certain actions in the TPM that
require TPM owner authorization without requiring the user to enter the TPM owner pass- word.
There are three TPM owner authentication settings that are managed by the Windows operating system.
You can choose a value of Full, Delegate, or None.
Full - This setting stores the full TPM owner authorization, the TPM administrative delegation blob, and the TPM user delegation blob in the local registry. With this
setting, you can use the TPM without re- quiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios that do
not require you to reset the TPM anti-hammering logic or change the TPM owner au- thorization value. Some TPM-based applications may require that this setting
is changed before fea- tures that depend on the TPM anti-hammering logic can be used. Delegated - This setting stores only the TPM administrative delegation
blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM antihammering
logic. When you use this setting, we recommend using external or remote storage for the full TPM owner authorization value--for example, backing up the value in
Active Direc- tory Domain Services (AD DS).
None - This setting provides compatibility with previous operating systems and applications. You can also use it for scenarios when TPM owner authorization cannot
be stored locally. Using this setting might cause issues with some TPM-based applications.
Further Information:
http://technet.microsoft.com/en-us/library/cc770660.aspx
Active Directory Domain Services (AD DS) can be used to store Trusted Platform Module (TPM) recovery information.
There is only one TPM owner password per computer; therefore, the hash of the TPM owner password is stored as an attribute of the computer object in AD DS.
The attribute has the common name (CN) of ms- TPM-OwnerInformation.
http://www.group-policy.com/ref/policy/2859/Configure_TPM_platform_validation_profile Configure TPM platform validation profile
This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the BitLocker encryption key. This policy
setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.
If you enable this policy setting before turning on BitLocker, you can configure the boot components that the TPM will validate before unlocking access to the
BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM will not release the encryption key to
unlock the drive and the computer will instead display the BitLocker Recovery console and require that either the recovery password or recovery key be provided to
unlock the drive.
If you disable or do not configure this policy setting, the TPM uses the default platform validation profile or the platform validation profile specified by the setup
script. A platform validation profile consists of a set of Platform Configuration Register (PCR) indices ranging from 0 to 23, The default platform validation profile
secures the encryption key against changes to the Core Root of Trust of Measurement (CRTM), BIOS, and Platform Extensions (PCR 0), the Option ROM Code
(PCR 2), the Master Boot Record (MBR) Code (PCR 4), the NTFS Boot Sector (PCR 8), the NTFS Boot Block (PCR 9), the Boot Manager (PCR 10), and the
BitLocker Access Control (PCR 11). The descriptions of PCR settings for computers that use an Ex- tensible Firmware Interface (EFI) are different than the PCR
settings described for computers that use a standard BIOS. The BitLocker Drive Encryption Deployment Guide on Microsoft TechNet contains a com- plete list of
PCR settings for both EFI and standard BIOS.
Warning: Changing from the default platform validation profile affects the security and manageability of your computer. BitLocker's sensitivity to platform
modifications (malicious or authorized) is increased or decreased depending upon inclusion or exclusion (respectively) of the PCRs.
QUESTION 27
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain.
You have the following requirements:
Ensure that files in shared network folders are
available offline.
Minimize all data access times.
Reduce network bandwidth usage.
You need to configure Group Policy settings to meet the requirements.
What should you do first?
A.
B.
C.
D.
Enable the Enable file synchronization on costed networks policy setting.
Enable and configure the Configure slow-link mode policy setting.
Enable and configure the specify administratively assigned Offline Files policy setting.
Enable the Synchronize all offline files when logging on policy setting.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To enable the Always Offline mode, use Group Policy to enable the Configure slow-link mode policy setting and set the latency to 1 (millisecond). Doing so causes
client computers running Windows 8.1 or Windows Server 2012 to automatically use the Always Offline mode. Computers running Windows 7, Windows Vista,
Windows Server 2008 R2, or Windows Server 2008 mightcontinue to transition to the Online mode if the latency of the network connection drops below one
millisecond.
Specify administratively assigned Offline Files - This will not minimize data access times, nor reduce network bandwidth usage.
QUESTION 28
A company has client computers that run Windows 8.1. The company uses Windows BitLocker Drive Encryption with the data-only option o all client computers.
You need to remove data fragments that exist in the free space on the local computer disk drives, without affecting current user data.
Which command should you run on the computers?
A.
B.
C.
D.
BdeHdCfg
diskpart
chkdsk
manage-bde
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj647761.aspx
Manage-bde WipeFreeSpace|-w [<Drive>] [-Cancel] [-computername<Name>] [{-?|/?}] [{- help|-h}]
Wipes the free space on the volume removing any data fragments that may have existed in the space. Running this command on a volume that was encrypted
using the "Used Space Only" encryption method provides the same level of protection as the "Full Volume Encryption" encryption method.
http://technet.microsoft.com/en-us/library/ff829850.aspx
Bdehdcfg
Prepares a hard drive with the partitions necessary for BitLocker Drive Encryption
QUESTION 29
A company has 100 client computers that run Windows 8.1.
The client computers are connected to a corporate private network.
Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate
network resource from their home computers.
What should you do?
A. Configure a Virtual Private Network connection.
B. Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.
C. Configure the local resource settings of the Remote Desktop connection.
D. Configure a DirectAccess connection.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
You install Windows 8.1 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app.
You need to remove only the most recently installed third-party desktop app.
You start the computer from a system repair disk.
Which troubleshooting option should you use?
A.
B.
C.
D.
System Image Recovery
Remove everything and install Windows
System Restore
Refresh your PC without affecting your files
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you think an app or driver that you recently installed caused problems with your PC, you can restore Windows back to an earlier point in time, called a restore
point. System Restore doesn't change your per- sonal files, but it might remove recently installed apps and drivers.
QUESTION 31
A company has a main office and three branch offices. The company has 20 portable computers that run Windows 8.1. Portable computer users can install local
devices while in any branch office.
Your manager has instructed you to collect information about faulty devices and drivers within the company's branch offices.
You need to create a performance report that includes a list of incorrectly installed devices by using the least amount of administrative effort.
What should you do?
http://www.gratisexam.com/
A.
B.
C.
D.
Add counters from each portable computer to Performance Monitor, and then print the Performance Monitor output.
Start the System Performance Data Collector Set on each portable computer.
Start the System Diagnostics Data Collector Set on each portable computer.
Create and start a custom Data Collector Set on each portable computer.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
System Diagnostics You can use this DCS when troubleshooting reliability problems such as problematic hardware, driver failures, or STOP errors. It logs all the
information included in the System Performance DCS, plus detailed system information.
Explanation:
http://technet.microsoft.com/en-us/library/cc722173%28v=ws.10%29.aspx Windows Vista Performance and Reliability Monitoring Step-by-Step Guide
Microsoft® Windows Vista® includes Windows Reliability and Performance Monitor, which is a Microsoft Management Console (MMC) snap-in that combines the
functionality of previous stand-alone tools includ- ing Performance Logs and Alerts, Server Performance Advisor, and System Monitor. It provides a graphi- cal
interface for customizing Data Collector Sets and Event Trace Sessions.
..
What is performance and reliability monitoring?
..
The reliability of a system is the measure of how often the system operates as it is configured and ex- pected to perform. Reliability can be reduced when
applications stop responding, services stop and restart, drivers fail to initialize, or in the worst case, when operating systems fail.
Reliability Monitor provides you with a quick, visual view of the average stability of your system. In addi- tion, it tracks events that will help you identify what causes
reductions in reliability. By recording not only failures (including memory, hard disk, application, and operating system failures), but also key events re- garding the
configuration of your system (including the installation of new applications and operating sys- tem updates), you can see a timeline of changes in both the system
and reliability, and can identify how to get your system back to optimal reliability when it does not behave as expected.
..
Data Collector Sets
An important new feature in Windows Reliability and Performance Monitor is the Data Collector Set, which groups data collectors into reusable elements for use
with different performance monitoring scenar- ios. Once a group of data collectors is stored as a Data Collector Set, operations such as scheduling can be applied
to the entire set through a single property change. You can schedule repeated collection of a Data Collector Set to create logs, load it in Performance Monitor to see
the data in real time, and save it as a template to use on other computers.
Windows Reliability and Performance Monitor also includes default Data Collector Set templates to help you begin collecting performance data immediately.
...
Further Information:
http://blogs.interfacett.com/how-to-use-windows-7-performance-tools How to use Windows 7 Performance Tools
..
We can go to data collector sets, there's some system defined ones or you can create your own. I'm go- ing to do system diagnostics.
All of these elements are going to be monitored.
I'm going to start this and run it for 10 seconds. I'm going to stop it.
That's going to generate a report that's under the system defined system diagnostics. There's the report I ran.
And it's generating a report of this system for me to take a look at. It's going to tell me whether the diag- nostics passed or failed.
QUESTION 32
A company has an Active Directory Domain Services (AD DS) domain. Client computers in the Test department run Windows 8.1 and are connected to the domain.
You need to ensure that Windows updates are not automatically applied and cannot be enabled by users.
What should you do?
A. Create a Group Policy object (GPO) to enable the Turn on recommended updates via Automatic Updates policy setting.
B. Configure Windows Update to install updates automatically.
C. Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update features policy setting.
D. Create a Group Policy object (GPO) to configure the Configure Automatic Updates policy setting.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Remove access to use all Windows Update features:
This Group Policy setting is located in User Configuration\Administrative Templates\Windows Components\Windows Update.
When you enable this setting, the operating system cannot be updated through Windows Update, and Automatic Updates is disabled. Users or administrators can
still perform actions such as clicking the Windows Update option on the Start menu, and the Windows Update Web site will appear in the browser. However, it will
not be possible to update the operating system through Windows Update, regardless of the type of account being used to log on.
QUESTION 33
You administer Windows 8.1 client computers in your company network.
You receive a virtual hard disk (VHD) file that has Windows 8.1 Pro preinstalled, along with several business applications.
You need to configure your client computer to start from either the VHD file or from your current operating system.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A.
B.
C.
D.
E.
F.
Import the contents of the system store from a file.
Export the contents of the system store into a file.
Attach the VHD file by using Disk Management.
Make the VHD disk bootable.
Create a new empty boot configuration data store.
Create a new entry in the boot configuration data store.
Correct Answer: CDF
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/gg318049%28v=ws.10%29.aspx Creating Bootable Virtual Hard Disks
Using the Disk Management Tools
This section describes how to create a bootable VHD by using the Disk Management tools. You create a VHD and then apply a Windows image from a .wim file to a
partition in the VHD. After you complete the steps in this section, you can configure the VHD for native boot or configure it to boot in a virtual machine by following
the instructions in Preparing Virtual Hard Disks for Boot.
http://blogs.technet.com/b/haroldwong/archive/2012/08/18/how-to-create-windows-8-vhd-for-boot-to-vhd-using- simple-easy-to-follow-steps.aspx
How to Create Windows 8 VHD for Boot to VHD using simple, easy to follow steps
...
I. Once I make a backup copy of the VHD file for future use, I will go ahead and Mount the VHD again to add that installation to the boot menu. To do this, I will right
click Disk Management and select Attach VHD. The Attach VHD Wizard will start. I can either browse to the VHD or just type it in the Location field.
J. The VHD will be mounted and will be assigned a drive letter by the system. In my case, it is drive F:
again.
K. Go back to the Administrative Command Prompt and type the following command to add the installa- tion to the Boot Menu:
bcdboot F:\windows
L. Once the command finishes, you will now have the new Windows 8 entry in your boot menu.
Further Information:
F: Commands to add an existing VHD to your boot menu:
bcdedit /copy {originalguid} /d "New Windows 7 Installation" bcdedit /set {newguid} device vhd=[D:]\Im- age.vhd
bcdedit /set {newguid} osdevice vhd=[D:]\Image.vhd
bcdedit /set {newguid} detecthal on
QUESTION 34
A company has client computers that run Windows 8.1. The client computer systems frequently use IPSec tunnels to securely transmit data.
You need to configure the IPSec tunnels to use 256-bit encryption keys.
Which encryption type should you use?
A.
B.
C.
D.
3DES
DES
RSA
AES
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/dd125356%28v=ws.10%29.aspx Descriptions of the IPsec Algorithms and Methods
..
Encryption algorithms
Data encryption algorithms are used to provide confidentiality to the data payload of an IPsec-protected network packet. Encryption algorithms can be very
computationally intensive and can significantly impact computer performance. We recommend that you only encrypt network traffic that requires encryption. If you
find that encryption impacts performance more than expected, consider using a network adapter that supports IPsec task offload.
DES
DES is a block cipher encryption protocol that uses a 56-bit key and is documented in Federal Informa- tion Processing Standards Publication 46-3 (http://
go.microsoft.com/fwlink/?linkid=128014). A block ci- pher is an encryption algorithm that operates on a fixed size block of data. DES encrypts data in 64-bit blocks
using a 64-bit key. The key appears to be a 64-bit key, but one bit in each of the 8 bytes is used for error checking, resulting in 56 bits of usable key.
3DES
Triple-DES or 3DES is an encryption protocol that provides stronger encryption than DES. It is docu- mented in Federal Information Processing Standards
Publication 46-3 (http://go.microsoft.com/fwlink/? linkid=128014). 3DES is a block cipher that uses a three-step encryption process that is more secure than DES. A
block cipher is an encryption algorithm that operates on a fixed size block of data.
AES-CBC 128, 192, and 256
The AES in Cipher Block Chaining mode (AES-CBC) encryption algorithms are part of the NSA "Suite B" and are documented in RFC 3602 (http://
go.microsoft.com/fwlink/?linkid=127990). AES is documented in Federal Information Processing Standards Publication 197 (http://go.microsoft.com/fwlink/?
linkid=127986). The AES algorithm is a symmetric block cipher that can encrypt and decrypt information in data blocks of 128 bits, using cipher keys with lengths of
128, 192, and 256 bits. Longer key lengths provide better security at the cost of CPU performance due to the more intensive computational re- quirements. Cipher
block chaining (CBC) is used to hide patterns of identical blocks of data within a packet. An initialization vector (an initial random number) is used as the first
random block to encrypt and decrypt a block of data. Different random blocks are used in conjunction with the secret key to en- crypt each successive block. This
ensures that identical sets of unsecured data (plaintext) result in unique, encrypted data blocks.
AES-GCM 128, 192, and 256
AES-GCM is both an integrity and encryption algorithm and is described in the Integrity algorithms sec- tion.
QUESTION 35
You are configuring a computer that will be used in a kiosk in a public area. You install a new internal hard drive.
You need to protect the computer from starting an unauthorized operating system.
What should you do?
A. Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled.
Install Windows 8.1 Pro 64-bit using UEFI and install it on the internal hard drive.
B. Install Windows 8.1 Pro 64-bit on the internal hard drive.
Enable BitLocker on the internal hard disk.
C. Partition the internal hard drive as MBR disk.
Install Windows 8.1 Enterprise 64-bit.
D. Partition the internal hard drive as GPT disk.
Install Windows 8.1 Pro 64-bit.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/windows/dn168169.aspx
Windows 8 Boot Security FAQ
What is UEFI?
UEFI (Unified Extensible Firmware Interface) is a specification that defines an interface between a PC's firmware and an operating system. It replaces or can work
in concert with the Basic Input/Output System (BIOS) firmware that PCs have traditionally used. For Windows 8, a key part of this specification is Se- cure Boot,
which protects the PC from malware by allowing only authorized boot loaders to run when the computer starts.
How does Windows 8 prevent attackers from replacing boot components? All systems with the Windows 8 certification use Secure Boot (part of the UEFI
specification) to protect hardware-related firmware and the operating-system loader from tampering. Secure Boot can prevent the system from booting if
unauthorized changes have been made or possibly even refresh the some boot components, such as the UEFI firmware, to a known good state.
What is Trusted Boot?
Trusted Boot is a Windows 8 feature that secures the entire Windows boot process. It prevents malware from hiding and taking up permanent residence within the
PC by ensuring none of the Windows compo- nents loaded during boot have been tampered with. Trusted Boot also ensures that anti-malware software is loaded
before any third-party drivers and applications using its Early Launch Anti-Malware (ELAM) ca- pability. This prevents malware from inserting itself in front of the
anti-malware engine so that it can com- promise the anti-malware engine's ability to protect the system. In the event that malware was able to successfully
compromise the any of the Windows boot process, Trusted Boot will attempt to automatically remediate the issue.
What editions of Windows 8 will include Trusted Boot?
All editions of Windows 8 include Trusted Boot.
QUESTION 36
A desktop computer that runs Windows 8.1 downloads updates but does not install them. The computer is connected to the corporate network by using a wired
network connection.
You need to ensure that the computer automatically installs updates.
What should you do?
A.
B.
C.
D.
Set the wired network connection to non-metered.
Configure the Automatic Maintenance setting.
Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
Set the wired network connection to metered.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://msdn.microsoft.com/en-us/library/windows/desktop/hh848037%28v=vs.85%29.aspx Automatic Maintenance
Windows depends on execution of inbox and third party maintenance activity for much of its value-add, in- cluding Windows Update, and automatic disk
defragmentation, as well as antivirus updates and scans.
The goal of Automatic Maintenance is to combine all background maintenance activity in Windows and help third-party developers add their maintenance activity to
Windows without negatively impacting perfor- mance and energy efficiency. Additionally, Automatic Maintenance enables users as well as enterprises to be in
control of maintenance activity scheduling and configuration.
http://blogs.msdn.com/b/olivnie/archive/2013/04/05/updates-and-maintenance.aspx Windows 8: Updates and Maintenance
Automatic Maintenance
One of the most important maintenance-related improvements in Windows 8 is Automatic Maintenance. This is a new system maintenance service that can be
used by Windows components and apps to sched- ule maintenance activities on the PC in one scheduled window per day.
Automatic Maintenance is shown in Action Center in the Maintenance section.
The Maintenance Settings interface is shown below.
Further Information:
http://technet.microsoft.com/en-us/library/cc720539%28v=ws.10%29.aspx Configure Automatic Updates by Using Group Policy
Reschedule Automatic Update Scheduled Installations
This policy specifies the amount of time for Automatic Updates to wait, following system startup, before proceeding with a scheduled installation that was missed
previously. If the status is set to Enabled, a scheduled installation that did not take place earlier will occur the speci- fied number of minutes after the computer is
next started.
If the status is set to Disabled, a missed scheduled installation will occur with the next scheduled installa- tion.
If the status is set to Not Configured, a missed scheduled installation will occur one minute after the com- puter is next started.
This policy applies only when Automatic Updates is configured to perform scheduled installations of up- dates. If the Configure Automatic Updates policy is
disabled, this policy has no effect.
To reschedule Automatic Update scheduled installation
In Group Policy Object Editor, expand Computer Configuration, expand Administrative Templates, ex- pand Windows Components, and then click Windows
Update.
In the details pane, click Reschedule Automatic Update scheduled installations, click Enable, and type a value in minutes.
Click OK.
QUESTION 37
You administer a group of 10 client computers that run Windows 8.1. The client computers are members of a local workgroup. Employees log on to the client
computers by using their Microsoft accounts.
The company plans to use Windows BitLocker Drive Encryption.
You need to back up the BitLocker recovery key.
Which two options can you use? (Each correct answer presents a complete solution. Choose two.)
A.
B.
C.
D.
Save the recovery key to a file on the BitLocker-encrypted drive.
Save the recovery key in the Credential Store.
Save the recovery key to SkyDrive.
Print the recovery key.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
BitLocker in Windows 8 has added support to back up a BitLocker recovery key to Microsoft SkyDrive if the com- puter is NOT a member of a domain and the
Windows Live ID user account is used to log on.
Ref: http://windowsitpro.com/windows-8/q-i-heard-bitlocker-windows-8-can-save-recovery-key- skydrive-so-why-dont-i-have-option
QUESTION 38
You administer Windows 8.1 computers in your company network.
You install a new video driver. The computer will not start properly after restart. You are able to enter Safe Mode with Command Prompt.
You need to be able to start normally. You also need to ensure that user data is not lost.
What should you do?
A.
B.
C.
D.
Run the rstrui.exe command.
Roll back the driver.
Turn on File History.
Create a restore point.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Personal comment:
Creating a restore point will not help you at this moment.
Nor will File History.
You cannot roll back the driver, only disable it from starting - see the Further information section. Your only hope is using System Restore to restore the system to
the state previous to the driver installa- tion. This will also preserve the user data. This has been available since Windows XP. One can only hope it still works in
Windows 8...
Explanation:
http://support.microsoft.com/kb/304449
How to start the System Restore tool by using the safe mode option with the Command prompt in Windows XP
How to start System Restore by using the Command prompt
..
5. At the command prompt, type %systemroot%\system32\restore\rstrui.exe, and then press ENTER.
6. Follow the instructions that appear on the screen to restore your computer to a functional state.
Further Information:
http://support.microsoft.com/kb/927525
After you install a device or update a driver for a device, Windows Vista or Windows 7 may not start
...
Use the Windows Recovery Environment to repair Windows Vista or Windows 7 ..
3. Use the Command Prompt option in the Windows Recovery Environment to disable the driver that stops the operating system from starting.
QUESTION 39
You administer Windows 8.1 Pro client computers in your company network.
You need to configure a backup and recovery solution that meets the following requirements:
Recovers the system if it doesn't start.
Recovers the system if the hard drive fails.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Turn on File History.
Create a storage space.
Configure system protection.
Create a system repair disk.
Create a system image backup.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
http://www.techrepublic.com/blog/windows-and-office/restore-windows-8-with-system-image-recovery/ Restore Windows 8 with System Image Recovery
What you need
In order to run the System Image Recovery tool as I'll describe in this article, you'll need to have created a Recovery Drive as I showed you in the article Create a
Recovery Drive in Windows 8. You'll also need a set of optical discs or on an external drive on which to create a system image of your hard disk.
Launching System Image Recovery
In the case of a hard drive failure, you can restore Windows 8 by running the System Image Recovery tool from the Recovery Drive.
QUESTION 40
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows
8.1 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution.
Choose two.)
A. Use the Volume Activation Management Tool.
B. Use the Microsoft Deployment Toolkit.
C. Use the Windows 8.1 online upgrade tool.
D. Create a catalog (.clg) file by using Windows System Image Manager (SIM).
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh824953.aspx
Volume Activation Management Tool (VAMT) Overview
Applies To: Windows 8, Windows 8.1
The Volume Activation Management Tool (VAMT) enables network administrators and other IT profes- sionals to automate and centrally manage the Windows®,
Microsoft® Office, and select other Microsoft products volume and retail-activation process. VAMT can manage volume activation using Multiple Acti- vation Keys
(MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft
Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
Windows® 7
Windows® 8
Windows 8.1
Windows Server 2008 R2
Windows Server® 2012
Windows Server 2012 R2
http://blogs.technet.com/b/askpfeplat/archive/2013/09/16/getting-started-with-windows-deployment-for-windows- server-2012-or-windows-8-using-microsoftdeployment-toolkit-mdt.aspx Getting Started with Windows Deployment for Windows Server 2012 or Windows 8 Using Microsoft De- ployment Toolkit (MDT)
Use the Microsoft Deployment Toolkit (MDT) to accelerate and automate deployments of Windows 8, Windows Server 2012, Windows 7, Office 2010, and
Windows Server 2008 R2.
Here's a table from the MDT .chm file that lists the available wizard pages and which properties need to be configured in order to skip each wizard page:
QUESTION 41
You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The
network includes Windows Server 2012 servers located in a perimeter network.
You add a new Windows 8.1 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8.1 computer from other computers
located outside the perimeter network.
You need to use the Windows 8.1 computer to manage the Windows servers in the perimeter network.
What should you do?
A.
B.
C.
D.
Add the Windows 8.1 computer as a Trusted Host to the servers.
Enable PowerShell Remoting on the Windows 8.1 computer.
Add the Windows 8.1 computer as a Trusted Host to computers outside the perimeter network.
Install Remote Server Administration Tools for Windows 8.1 (RSAT) on the Windows 8.1 computer.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.microsoft.com/en-gb/download/details.aspx?id=28972 Remote Server Administration Tools for Windows 8
Remote Server Administration Tools for Windows 8 enables IT administrators to manage roles and fea- tures that are installed on computers that are running
Windows Server 2012 from a remote computer that is running Windows 8.
Further Information:
http://searchnetworking.techtarget.com/tip/Perimeter-networks Perimeter networks
A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of
your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter
networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ
(Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when decid- ing where to place
systems and services.
http://technet.microsoft.com/en-us/library/hh849694.aspx
Enable-PSRemoting
The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote com- mands that are sent by using the WS-Management
technology.
On Windows Server® 2012, Windows PowerShell remoting is enabled by default. You can use En- able-PSRemoting to enable Windows PowerShell remoting on
other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled.
You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands.
Because the configuration activates listeners, it is pru- dent to run it only where it is needed.
http://technet.microsoft.com/en-us/magazine/ff700227.aspx
Enable and Use Remote Commands in Windows PowerShell
The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that
implements WS-Management in Windows.
...
In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer
might not be able to authenticate your creden- tials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the lo- cal
computer in WinRM.
...
QUESTION 42
A company has 10 portable client computers that run Windows 8.1.
The portable client computers have the network connections described in the following table.
None of the computers can discover other computers or devices, regardless of which connection they use.
You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi
connections.
What should you do on the client computers?
A. For the CorpWired connection, select yes, turn on sharing and connect to devices.
B. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the HotSpot connection, select No, don't turn on sharing or
connect to devices.
C. For the CorpWifi connection, select yes, turn on sharing and connect to devices.
D. Turn on network discovery for the Public profile.
E. Turn on network discovery for the Private profile.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
The CorpWifi and HotSpot connections are already set properly. The private profile has network discovery enabled by default. So we need to deal with the
CorpWired without breaking anything else. CorpWired connection is already public so it doesn't make sense to set it again to public. Also, enabling network
discovery for the Public profile is a dangerous practice. Ideally it would be to set the CorpWired connection to private. However, since this is not one of the available options, turning on sharing basically does the same thing.
Explanation:
http://www.7tutorials.com/network-locations-explained
Simple Questions: What are Network Locations in Windows 7 & Windows 8?
Network Locations in Windows 8: Private vs Public
Windows 8 further simplifies the concept of network locations, reducing them to only two choices:
Private network - This profile should be applied to your home network or to the network from your work- place. When this profile is assigned to a network
connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections are allowed. Public network - This profile is also
named Guest. It is the more secure of the two because network dis- covery is turned off as well as file and printer sharing. This profile should be used when
connecting to public networks you don't trust, like those found in airports, coffee shops, bars, hotels, etc. There's also a third network location profile named Domain
network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings ap- plied to this
profile are those set by your company and you cannot change them.
http://www.tekrevue.com/tip/change-network-location-windows-8/ How to Change a Network Location in Windows 8
Let's get back to the Networks list: right click or press and hold your active network connection. A menu is displayed with several options, depending on the network
type.
Click or tap "Turn sharing on or off" (the only option common to both wired and wireless networks). For wired networks you will see less options being displayed din
the contextual menu. You are asked if you want to turn on sharing between PCs and connect to devices on this network.
Selecting "No, don't turn on sharing or connect to devices" is the equivalent of applying the Public profile. Selecting "Yes, turn on sharing and connect to devices" is
the equivalent of applying the Private profile.
Make your choice and the appropriate settings are applied.
QUESTION 43
You administer Windows 8.1 Pro laptops in your company network. Your network has a Remote Access Server (RAS) in a perimeter network that runs Windows
Server 2012.
All laptop users have a PPTP VPN configured on their computer. Users report that their VPN disconnects when they switch between WLAN and WWAN networks.
You need to ensure that if a VPN is disconnected, the laptop will automatically attempt to reconnect.
What should you do?
A.
B.
C.
D.
Create a new VPN connection, and the open Local Computer Policy and define Files not cached policy.
Run the netsh.exe command and include the wlan parameter
Create a new VPN connection, and disable offline files
Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB)
Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?
A.
B.
C.
D.
Use a Microsoft account to log on to each computer.
Use a local account to log on to each computer.
Activate the side loading product key on each computer.
Install and run the Windows App Certification Kit.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://msdn.microsoft.com/en-us/library/windows/apps/jj657971.aspx Deploying enterprise apps
Preparing your PCs
Windows Server 2012 and Windows 8 Enterprise editions are classified as "enterprise sideloading en- abled." This means that the PCs are ready to receive the
apps that you deploy outside of the Windows Store. To make sure a PC is ready, verify that:
The PC is domain joined.
The group policy is set to Allow trusted apps to install.
If you are deploying apps to Windows 8 Pro, Windows RT, or Windows 8 Enterprise, you can configure them for sideloading apps by:
Activating the product key for enterprise sideloading on each PC.
Setting the group policy to Allow trusted apps to install.
Further Information:
http://technet.microsoft.com/en-US/windows/jj874388.aspx
Try It Out: Sideload Windows Store Apps
By now, you are familiar with Windows Store apps. There are some pretty cool ones available in the store, and publishers are adding more every week. A great
thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish
them through the Windows Store since that would make them publically available. Instead, you can sideload LOB apps. Sideloading simply means installing a
Windows Store app without publishing it in and downloading it from the store. You install it directly.
...
Verify the Requirements
There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8
Enterprise:
The computer running Windows 8 Enterprise must be joined to the domain. You must enable the "Allow all trusted apps to install" Group Policy setting. The app
must be signed by a \ certificate that is chained to a trusted root certificate. In many cases, the only thing you will have to do is enable the policy setting. Your
computers running Windows 8 Enterprise are already joined to the domain, and your developers will sign the app.
...
Sideload the App for a User
As promised when we started this article, sideloading the sample app is no more difficult than running a few commands in Windows PowerShell. In fact, the first
command should not really count, as it just im- ports the AppX module into Windows PowerShell.
...
Sideload the App for All Users
DISM is a command-line tool that you can use to service a Windows image -- online or offline. You can use DISM to provision a Windows Store app in an online
Windows image for all users who share the computer. To do that, you use the Add-ProvisionedAppxPackage option.
...
Use a Sideloading Product Key
Earlier in this article, we listed the requirements for sideloading Windows Store apps. The computer must be running Windows 8 Enterprise. It must be joined to the
domain, and you must enable the policy setting "Allow all trusted apps to install." This is great if in a typical enterprise scenario where you use the Enter- prise
editions and join computers to the domain. What about increasingly common Bring Your Own De- vice (BYOD) scenarios, where Windows RT devices and
computers running Windows 8 Pro are more common; and devices are not always joined to the domain?
Easy.
You can enable sideloading for these additional scenarios by installing a sideloading product key on the computers.
...
Conclusion
We hope that experiencing how to sideload Windows Store apps firsthand showed you how simple the process really is. You enable sideloading on computers
running Windows 8 Enterprise by simply joining them to the domain and enabling the "Allow all trusted apps to install" policy setting. You can enable app
sideloading in the scenarios that Table 1 describes by using a sideloading product key. To sideload an app for an individual user, you use the add-appxpackage
cmdlet in Windows PowerShell, and to provision an app for all users, you use the Add-ProvisionedAppxPackage DISM option.
Figure 3. Sideloading Requirements
http://msdn.microsoft.com/en-us/windows/apps/bg127575.aspx
Windows App Certification Kit
Before you submit your app for certification and listing in the Windows Store, use the Windows App Certi- fication Kit to test your app and make sure it's ready to go.
QUESTION 45
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Review the File History backup log.
Move the file into a library.
Restore the data files from the Previous Versions tab located in the folder properties.
Set the Protection Settings for drive C to On.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to-backup-file-history-in- windows-8.aspx
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.
Since File History is already on we can assume the drive doesn't need to be changed. So we should re- view the log and move the file to a library.
QUESTION 46
A company has client computers that run Windows 8.1. Each computer has two hard drives.
You need to create a dynamic volume on each computer to support the following features:
Fault tolerance
Fast write performance
What kind of dynamic volume should you create?
A.
B.
C.
D.
Striped volume
Spanned volume
RAID 5 volume
Mirrored volume
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx What Are Dynamic Disks and Volumes?
..
Types of Dynamic Volumes
A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.
Mirrored Volumes
A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the
information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one
of the disks fails, the data on the failed disk becomes unavailable, but the system continues to oper- ate by using the unaffected disk.
Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy
of their data on the second disk. Mirrored vol- umes provide better write performance than RAID-5 volumes.
Further Information:
Striped Volumes
Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal
size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks. Striped volumes cannot be extended or
mirrored and do not offer fault tolerance. If one of the disks con- taining a striped volume fails, the entire volume fails, and all data on the striped volume becomes
inacces- sible. The reliability for the striped volume is less than the least reliable disk in the set.
RAID-5 Volumes
A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one
disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the
RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the lost data. RAID-5 volumes are well-suited to
storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a
RAID-5 volume.
Spanned Volumes
Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned
volumes require two disks, and you can use up to 32 disks.
QUESTION 47
A portable computer that runs Windows 8.1 uses a mobile broadband connection. The computer successfully downloads Windows updates only when not
connected to the corporate wireless network.
You need to ensure that the computer automatically downloads updates by using Windows Update while connected to the corporate wireless network.
What should you do?
A.
B.
C.
D.
Configure the Specify intranet Microsoft update service location local Group Policy setting.
Set the corporate wireless network to metered.
Set the corporate wireless network to non-metered.
Configure a Windows Firewall connection security rule.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-US/windows-8/metered-internet-connections-frequently-asked-questions Metered Internet connections: FAQ
What's a metered Internet connection?
Internet service providers can charge by the amount of data used (the amount of data sent and received by your PC). That's called a metered Internet connection.
These plans often have a data limit, and if you exceed the limit you might have to pay extra. In some cases, you aren't charged extra but your connec- tion speed
becomes slower until the billing cycle ends.
If you have a metered Internet connection, setting your network connection to metered in Windows can help you reduce the amount of data you send and receive.
How does setting my network connection to metered affect my PC? Any app that relies on an Internet connection to update or display info might be limited in the
amount of data it can download or display. You might notice these and other effects:
Windows Update will only download priority updates.
...
Further Information:
Setting a Wireless network to METERED allows only critical Windows Updates using that connection. Setting a Wireless network to NON-METERED allows all
Windows Updates using that connection.
QUESTION 48
A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all
computers.
You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A.
B.
C.
D.
E.
F.
G.
Start the Windows Event Collector service on COMPUTER1.
Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.
Start the Windows Event Log service on all computers other than COMPUTER1.
Create and configure a source computer-initiated subscription.
Add the COMPUTER1 machine account to the Event Log Readers local group on all computers.
Start the Windows Event Collector service on all computers other than COMPUTER1.
Create and configure a collector-initiated subscription.
Correct Answer: AEG
Section: (none)
Explanation
Explanation/Reference:
http://blog.oneboredadmin.com/2012/06/windows-event-collection.html Windows Event Collection
The only basic rules are that the source machine should have Winrm2 installed and running on it, and the Event Collector Service should be running on the collector
machine. There are two methods available to complete this challenge - collector initiated and source initiated.
Collector Initiated
When defining such a subscription, you instruct the collector to open a WinRM session to the source ma- chine(s) using a specified set of credentials (or the
computer account) and ask for a subscription.
Further Information:
For best management we want a collector-initiated subscription--meaning we'll be setting up the subscrip- tion at the collecting computer instead of at each
individual computer. The Windows Event Collector ser- vice is requested for subscriptions to work on the computer doing the collecting. The collecting computer
must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.
http://msdn.microsoft.com/en-us/library/windows/desktop/bb427443%28v=vs.85%29.aspx Windows Event Collector
You can subscribe to receive and store events on a local computer (event collector) that are forwarded from a remote computer (event source).
The following list describes the types of event subscriptions:
Source-initiated subscriptions: allows you to define an event subscription on an event collector computer without defining the event source computers. Multiple
remote event source computers can then be set up (using a group policy setting) to forward events to the event collector computer. This subscription type is useful
when you do not know or you do not want to specify all the event sources computers that will forward events.
Collector-initiated subscriptions: allows you to create an event subscription if you know all the event source computers that will forward events. You specify all the
event sources at the time the subscrip- tion is created.
http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription
You can subscribe to receive events on a local computer (the event collector) that are forwarded from re- mote computers (the event sources) by using a collectorinitiated subscription. In a collector-initiated sub- scription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to
events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.
http://technet.microsoft.com/en-us/library/cc748890.aspx
Configure Computers to Forward and Collect Events
Before you can create a subscription to collect events on a computer, you must configure both the collect- ing computer (collector) and each computer from which
events will be collected (source).
In a workgroup environment, you can follow the same basic procedure described above to configure com- puters to forward and collect events. However, there are
some additional steps and considerations for workgroups:
You can only use Normal mode (Pull) subscriptions.
You must add a Windows Firewall exception for Remote Event Log Management on each source com- puter.
You must add an account with administrator privileges to the Event Log Readers group on each source computer. You must specify this account in the Configure
Advanced Subscription Settings dialog when creating a subscription on the collector computer.
Type winrm set winrm/config/client @{TrustedHosts="<sources>"} at a command prompt on the collector computer to allow all of the source computers to use
NTLM authentication when communicating with WinRM on the collector computer. Run this command only once.
QUESTION 49
You administer Windows 8.1 Enterprise computers in your company's Active Directory Domain Services (AD DS) domain.
Your company uses several peripheral devices. The drivers for these devices are not available on Windows Update.
You need to ensure that the drivers install when users connect these devices to their computers.
What should you do?
A. For the Group Policy setting Prioritize all digitally signed drivers equally during the driver ranking and selection process, select Disabled.
B. From Device Manager, find the detected scanner device and select Update Driver.
C. Add the following registry key to the computers:
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/DevicePath. Add °/osystemroot%\inf and t he UNC path to the drivers share.
D. For the Group Policy setting Configure driver search locations, select Enabled. Make the drivers available on the UNC path to the driver's share.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc753716.aspx
Configure Windows to Search Additional Folders for Device Drivers
To configure Windows to Search Additional Folders for Device Drivers Start Registry Editor. Click Start, and in the Start Search box type regedit.
1.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, 2.
and then click Yes.
Navigate to the following registry key:
3.
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version In the details pane, double-click DevicePath.
4.
Add additional folder paths to the setting, separating each folder path with a semi-colon. Ensure that 5.
%systemroot%\inf is one of the folders included in the value.
Caution:
Do not remove %systemroot%\inf from the DevicePath registry entry. Removal of that folder can break device driver installation.
Further Information:
http://msdn.microsoft.com/en-us/library/windows/hardware/ff553973%28v=vs.85%29.aspx Where Windows Searches for Drivers
After a device is attached, Windows attempts to locate a matching driver package from which it can install a driver for the device. Windows searches for driver
packages from various locations and performs this search in two phases, as described in the following table.
Starting with Windows 7, Windows automatically downloads matching driver packages from Windows Up- date without prompting the user for permission. If a
matching driver package is found, Windows down- loads the package and stages it to the driver store.
If a matching driver package cannot be downloaded, Windows searches for matching driver packages in the driver store. This includes in-box drivers, installed
drivers other than in-box drivers, and preinstalled drivers.
Windows also searches for driver packages that were preloaded in the locations that are specified by the DevicePath registry value. This value is under the
following subkey of the registry.
HKEY_LOCAL_MACHINE
Software
Microsoft
Windows
CurrentVersion
By default, the DevicePath value specifies the %SystemRoot%\INF directory.
If a matching driver package is found either on Windows Update or in a location that is specified by the DevicePath value, Windows first stages the driver package
to the driver store before the driver is in- stalled. In this way, Windows always installs drivers from the driver store.
QUESTION 50
You use a Windows 8.1 Pro computer. The computer stores research data in a folder named
C:\Research.
You turn on File History.
You need to back up the Research folder.
What should you do?
A.
B.
C.
D.
Create a new library and include the folder in the library.
Create a new volume mount point in the root of the folder.
Create a new storage space and move the folder to the storage space.
Create a new restore point.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It's a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of
Windows 7.
Before you start using File History to back up your files, you'll need to set up a drive to save files to. We recommend that you use an external drive or network
location to help protect your files against a crash or other PC problem.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you
can add them to one of your existing libraries or create a new library.
Advanced settings can be accessed from the File History control panel applet.
File History also supports new storage features introduced in Windows 8. Users who have lots of data to back up can use Storage Spaces to create a resilient
storage pool using off-the-shelf USB drives. When the pool fills up, they can easily add more drives and extra storage capacity to the pool.
Further Information:
http://blogs.msdn.com/b/b8/archive/2012/01/05/virtualizing-storage-for-scale-resiliency-and-efficiency.aspx Virtualizing storage for scale, resiliency, and efficiency
Windows 8 provides a new capability called Storage Spaces enabling just that. In a nutshell, Storage Spaces allow:
Organization of physical disks into storage pools, which can be easily expanded by simply adding disks. These disks can be connected either through USB, SATA
(Serial ATA), or SAS (Serial Attached SCSI). A storage pool can be composed of heterogeneous physical disks different sized physical disks ac- cessible via
different storage interconnects.
Usage of virtual disks (also known as spaces), which behave just like physical disks for all purposes. However, spaces also have powerful new capabilities
associated with them such as thin provisioning (more about that later), as well as resiliency to failures of underlying physical media.
QUESTION 51
You administer 100 Windows 8.1 laptops, all of which have PowerShell Remoting enabled. You run the following command on a computer named Computer1.
Invoke-Command -filepath \\Computer2\Share\MyScript.ps1 -computer name Computer2 MyScriptl.psl fails to execute.
You verify that you are able to access it from the network.
You need to be able to execute MyScriptl.psl on Computer1.
What should you do?
A. Copy MyScriptl.psl to a local drive on Computer1 and run the Invoke-Command cmdlet on Computer1.
B. Run the Set-ExecutionPolicycmdlet on Computer1.
C. Run the Enter-PSSessioncmdlet on Computer1.
D. Run the Set-ExecutionPolicycmdlet on Computer2.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh849719.aspx
Invoke-Command
Runs commands on local and remote computers.
..
The Invoke-Command cmdlet runs commands on a local or remote computer and returns all output from the commands, including errors. With a single InvokeCommand command, you can run commands on multiple computers.
..
Parameters
..
-ComputerName<String[]>
Specifies the computers on which the command runs. The default is the local computer. When you use the ComputerName parameter, Windows PowerShell
creates a temporary connection that is used only to run the specified command and is then closed.
..
-FilePath<String>
Runs the specified local script on one or more remote computers. Enter the path and file name of the script, or pipe a script path to Invoke-Command. The script
must reside on the local computer or in a directory that the local computer can access. Use the ArgumentList parameter to specify the values of parameters in the
script.
..
Further Information:
http://technet.microsoft.com/en-us/library/ee176961.aspx
Using the Set-ExecutionPolicy Cmdlet
The Set-ExecutionPolicy cmdlet enables you to determine which Windows PowerShell scripts (if any) will be allowed to run on your computer. Windows PowerShell
has four different execution policies:
Restricted - No scripts can be run. Windows PowerShell can be used only in interactive mode. AllSigned - Only scripts signed by a trusted publisher can be run.
RemoteSigned - Downloaded scripts must be signed by a trusted publisher before they can be run. Unrestricted - No restrictions; all Windows PowerShell scripts
can be run. To assign a particular policy simply call Set-ExecutionPolicy followed by the appropriate policy name.
http://technet.microsoft.com/en-us/library/hh849812.aspx
Set-ExecutionPolicy
The Set-ExecutionPolicy cmdlet changes the user preference for the Windows PowerShell execution pol- icy.
The execution policy is part of the security strategy of Windows PowerShell. It determines whether you can load configuration files (including your Windows
PowerShell profile) and run scripts, and it determines which scripts, if any, must be digitally signed before they will run.
http://technet.microsoft.com/en-us/library/hh849707.aspx
Enter-PSSession
The Enter-PSSession cmdlet starts an interactive session with a single remote computer. During the ses- sion, the commands that you type run on the remote
computer, just as though you were typing directly on the remote computer. You can have only one interactive session at a time.
QUESTION 52
You administer Windows 8.1 computers for a software development company.
The marketing department is going to meet a potential customer to demonstrate the product. You want to configure a laptop that has a stand-alone virtual machine
that runs Windows 8.1 Enterprise and the latest build of your software.
You need to enable BitLocker on the system drive of the virtual machine.
What should you do first?
A.
B.
C.
D.
Activate Windows.
Join the virtual machine to an Active Directory Domain Services (AD DS) domain.
Turn on the Require additional authentication at startup local policy.
Turn off the Require additional authentication at startup local policy.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://rc.partners.org/kbase?cat_id=9&art_id=245
How to setup BitLocker Encryption on Windows 8 without TPM
BitLocker is a full disk encryption software that comes standard with PCs running Windows 8 Pro or higher.
This document provides instructions for encrypting the hard drive without Trusted Platform Module (TPM - integrated security chip) present or enabled, and
bypasses the USB flash drive encryption key require- ment.
From the Metro UI or the search box, type GPEDIT.MSC and press enter 1.
Open Computer Configuration => Administrative Templates => Windows Components => BitLocker 2.
Drive Encryption => Operating System Drives. From the right pane double-click "Require additional au- thentication at startup"
Select Enabled radio button and check the box for "Allow BitLocker without a compatible TPM...". Click 3.
OK and close the policy editor.
Right-click your C drive in the Computer folder, click Turn on BitLocker 4.
....
QUESTION 53
A company has a main office and several branch offices. The company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8.1. All printers are deployed to all client computers by using Group Policy.
When a user attempts to print from his portable client computer while at a branch office, the main office printer is set as his default printer.
You need to ensure that a location-specific default printer for each branch office is set for the user.
What should you do?
A.
B.
C.
D.
Create a Group Policy object (GPO) that enables the Computer location policy setting.
In the Manage Default Printers dialog box, select the Always use the same printer as my default printer option.
In the Manage Default Printers dialog box, select the Change my default printer when I change networks option.
Create a Group Policy object (GPO) that enables the Allow Print Spooler to accept client connections policy setting.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/set-change-your-default-printer Set or change your default printer
To set a different default printer for each network
..
3. Tap or click any printer, and then tap or click Manage default printers.
4. Select Change my default printer when I change networks.
5. Under Select network, choose the first network you want to set a printer for.
6. Under Select printer, choose the printer you want to be the default on that network, and then tap or click Add.
7. When you're finished setting a default printer for each network, tap or click OK.
Further Information:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3-configure-network- connectivity-15/
configure location-aware printing
Location-aware printing is not a new feature, it existed already in Windows 7, it works that your default printer follows you, so at work you can have one default
printer and another at home without manually switching.
Just click on an installed printer in control panel and select Manage default printers.
Be sure Change my default printer when I change Networks is selected and then manage per network which printer you want to be default.
Location-Aware Printing is dependent upon the Network List Service and the Network Location Aware- ness service. If either one of these services are stopped or
malfunctioning, then Windows will not be able to detect network changes and may not switch default printers as expected
QUESTION 54
You use many Windows Store apps on a computer that runs Windows 8.1.
You are planning a performance audit on the computer.
You need to establish the volume of data upload from each app over a five-day period.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A.
B.
C.
D.
E.
On the fifth day, review the upload statistics in Task Manger.
Configure Task Manager to save usage data to a file.
Configure Task Manager to record data upload from each Windows Store app.
On the first day, delete any existing application usage history
Open Task Manager and add the Uploads column.
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.7tutorials.com/windows-8-task-manager-which-apps-use-most-system-resources The Windows 8 Task Manager - Which Apps Use the Most
Resources? ...
Before you get in to tweak settings, the app history tab will display five columns:
Name - The name of the process or app.
CPU Time - Total amount of CPU time the selected app has taken up. Network - Total network utilization in MB for the selected app. Metered Network - Total
network utilization on a network that is marked as metered. Tile Updates - Amount of network usage for updating the chosen app's live tile.
...
By default, the App History tab will only display usage for modern Windows 8 apps.
...
While the default view displays a pretty good picture of your data using apps, you can take it farther by adding more columns. Right-click or long-press an existing
column header to view a list of available data points. You can deselect any of the existing columns to hide them, or select any of the following columns to add them
to your view:
Non-Metered Network - Network usage on networks that aren't marked as metered.
Downloads - Amount of downloads done for the selected app.
Uploads - Amount of uploads done for the selected app.
..
How to Clear your App History Data
When viewing your app history data, it can be difficult to discern how quickly your apps are racking up network usage. You may see that Netflix has used gigs of
data, but if that's over a long period that may not be so bad. However, if it's only been a few minutes since data logging began, you're in trouble.
If you want to clear your data and start counting again from zero, go ahead and click or tap "Delete usage history."
All of your recorded history will be deleted and all columns will be zeroed out. With careful monitoring you can now see how quickly your heavy users chew up data.
QUESTION 55
A computer runs Windows 8.1. You install an application by running an .msi file.
You need to apply a patch to the application.
Which command should you run?
A.
B.
C.
D.
dism /Online /add-package:C:\MyPatch.msp
dism /get-AppPatches /get-PackageInfo:C:\MyPatch.msp
msiexec /x "C:\MyPatch.msp"
msiexec/p "C:\MyPatch.msp"
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx Msiexec (command-line options)
To apply an update
Syntax
msiexec /p UpdatePackage
Parameters
/p Applies an update.
UpdatePackage Specific update.
QUESTION 56
A company has client computers that run Windows 8.1.
Users can run applications that have been downloaded from the Internet only with administrator approval.
You need to ensure that users can run downloaded applications without administrator approval.
What should you do?
A.
B.
C.
D.
Set the Internet zone privacy level to Low.
Set the Internet zone security level to Medium.
Set the User Account Control (UAC) settings to Never notify.
Turn off Windows SmartScreen.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://www.howtogeek.com/75356/how-to-turn-off-or-disable-the-smartscreen-filter-in-windows-8/
Further Information:
The Privacy Level has no relation to running downloaded applications:
The Security Level is no much help either:
And the UAC does not distinguish if an application is downloaded or not. For more details about UAC lev- els see this article:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html How to Change User Account Control (UAC) Settings in
Windows 8 and 8.1
QUESTION 57
You are configuring two client computers that run Windows 8.1: A desktop computer named COMPUTER1 and a portable computer named COMPUTER2.
You have the following requirements:
Store all personal data in a folder named Data on
COMPUTER1.
Ensure that you can access all personal data from
COMPUTER2, even when a network connection is
unavailable.
Synchronize personal data between the computers
twice a day.
You need to configure the computers to meet the requirements.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
In Sync Center. configure a schedule for offline files.
From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be available offline.
From COMPUTER2, map a network driver to the Data folder on COMPUTER1.
In Sync Center, set up a new sync partnership.
From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be available offline
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
A: A sync partnership is a set of rules that tells Sync Center how and when to sync files or other information between two or more locations. A sync partnership
typically controls how files sync between your computer and mobile devices, network servers, or compatible programs.
D: To make files and folders available offline
To be able to work with a file offline, you first need to make it available offline.
Locate the network file or folder that you want to make available offline.
Right-click the file or folder, and then click Always Available Offline.
The Always Available Offline command
The next time you try to access this file or folder, you will be able to open it even if the network version is unavailable.
Reference: Working with network files when you are offline
Offline files and the Sync Center work pretty much the same in Windows 8 as they do in Windows 7.
http://www.7tutorials.com/use-network-folders-and-files-while-offline-sync-center-offline-files Use Network Files While Offline with Sync Center & Offline Files
http://www.7tutorials.com/how-sync-offline-files-network-folders-set-schedule How to Sync Offline Files & Network Folders on a Set Schedule
You can choose to schedule the sync at a specific time or when an event occurs.
If you select the first option - "At a scheduled time", you can set the exact day and time when the sync be- gins and how often it is repeated.
If you select the second option - "When an event occurs", you can set the events when the sync is per- formed.
QUESTION 58
A company has client computers that run Windows 8.1. You set up new virtual private network (VPN) connections on all client computers. The VPN connections
require the use of a smart card for authentication.
Users are unable to connect to the corporate network by using the VPN connections. The connection properties are configured as shown in the exhibit. (Click the
Exhibit button.)
You need to ensure that the client computers can connect to the corporate network.
What should you do?
A. Enable Challenge Handshake Authentication Protocol (CHAP).
B. Change the VPN type to IKEv2.
C. In the advanced settings, select Use preshared key for authentication.
D. Change the authentication setting to Use Extensible Authentication Protocol (EAP).
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://support.microsoft.com/kb/259880
Configuring a VPN to Use Extensible Authentication Protocol (EAP)
EAP can be used to provide an added layer of security to VPN technologies such as Point-to-Point Tun- neling Protocol (PPTP) and Layer 2 Tunneling Protocol
(L2TP). EAP enables this functionality through Certificate Authority (CA) and SmartCard technologies, which provide mutual authentication of the client and the
server.
http://technet.microsoft.com/en-us/library/cc739449%28v=ws.10%29.aspx Smart cards and remote access VPN connections
Smart cards and remote access VPN connections
The use of smart cards for user authentication is the strongest form of authentication in the Windows Server 2003 family. For remote access VPN connections, you
must use Extensible Authentication Proto- col (EAP) with the Smart card or other certificate (TLS) EAP type, also known as EAP-Transport Level Security (EAPTLS).
QUESTION 59
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Change the File History drive.
Review the File History backup log.
Move the file into a library.
Start the Volume Shadow Copy Service.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
B: Configuring Advanced Settings of Windows 8.1 File History To set some more detailed options, or to clean up File History, click Advanced settings. The Event
logs section includes the Open File History event logs to view recent events or errors command that opens File History backup log in Applications and Services
Logs section of Event Viewer.
C:
* File History automatically backs up files that are in your libraries, contacts, favorites, Microsoft SkyDrive and on your desktop.
* Do not expect File History to cover all your folders or whole drives - it backs up all your default and custom Libraries (including Public Folders), plus Contacts,
Desktop and Favorites folders. Your only way to include other folders is to create your own custom Libraries. http://blogs.windows.com/windows/b/extremewindows/
archive/2012/12/20/a-new-way-to-backup-file- history-in-windows-8.aspx
A New Way to Backup: File History in Windows 8
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.
Since File History is already on we can assume the drive doesn't need to be changed. So we should re- view the log and move the file to a library.
QUESTION 60
A company has client computers that run Windows 8.1. File History is on.
An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History.
What should you do?
A.
B.
C.
D.
Create a library named History and add the Archives folder to the library.
Start the Windows Backup service.
Turn on the Volume Shadow Copy Service.
Start the Block Level Backup Engine service.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx What is File History?
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to-backup-file-history-in- windows-8.aspx
A New Way to Backup: File History in Windows 8
File History is a new feature in Windows 8 that helps to ensure that your personal files are safe. In addi- tion to being a backup solution, File History also provides
the capability to restore multiple backup copies (versions) of your files. File history in Windows 8 is easy to setup, powerful, and reliable. This means you can have
more confidence when working with files, and also keep less redundant copies around for your own personal "data history". You can easily configure File History to
protect some or all of the files that are in your libraries on Windows 8. You can add folders to your libraries easily in Windows 8, giving you the ability to use File
History with any group of folders and files that you choose.
QUESTION 61
You administer Windows 8.1 client computers in you company network.
You deploy an application that requires a specific Windows update to be installed on the computers.
You need to verify that the update is installed on specific computers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two)
A.
B.
C.
D.
E.
Run The system update readiness tool
Open View updates history
Open the Check for updates applet
Run the DISM command with the /image and /get-packageinfoswiches
Run the DISM command with the /online and /get-packageinfoswiches
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
http://www.sevenforums.com/tutorials/24367-windows-update-view-update-history-details.html Windows 7: Windows Update - View Update History Details
http://technet.microsoft.com/en-us/library/dd744382%28v=ws.10%29.aspx Deployment Image Servicing and Management Command-Line Options
/Online
Specifies that the action is to be taken on the operating system that is currently running. This option cannot be used with the /Image or the /WinDir option. When /
Online is used the Windows di- rectory for the online image is automatically detected.
/Image:<path_to_offline_image_directory>
This is the full path to the root directory of the offline Windows image that you will service. If the directory named Windows is not a subdirectory of the root
directory, /WinDir must be specified.
This option cannot be used with /Online.
http://technet.microsoft.com/en-us/library/hh825265.aspx
DISM Operating System Package Servicing Command-Line Options
/Get-PackageInfo {/PackageName:< name_in_image> | /PackagePath:< path_to_cabfile>} Displays detailed information about a package provided as a .cab file.
Only .cab files can be specified. You cannot use this command to obtain package information for .msu files. /PackagePath can point to ei- ther a .cab file or a folder.
You can use the /Get-Packages option to find the name of the package in the image, or you can specify the path to the .cab file. The path to the .cab file should
point to the original source of the package, not to where the file is installed on the offline image.
Further Information:
http://blogs.msdn.com/b/olivnie/archive/2013/04/05/updates-and-maintenance.aspx Windows 8: Updates and Maintenance
http://windows.microsoft.com/en-us/windows7/what-is-the-system-update-readiness-tool What is the System Update Readiness Tool?
The System Update Readiness Tool can help fix problems that might prevent Windows updates and ser- vice packs from installing. For example, an update might
not install if a damaged system file prevents the update from recognizing the version of Windows that's running on your computer.
QUESTION 62
You administer Windows 8.1 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting file systems (EFS) A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2
What should you do?
A.
B.
C.
D.
Configure Advanced Attributes
Configure Effective Access
Configure Advanced Security Settings
Share the folder that contains file.txt.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Further Information:
http://www.howtogeek.com/178912/how-to-encrypt-files-and-folders-in-windows-8.1-using-efs/ How to Encrypt Files and Folders in Windows 8.1 Pro Using EFS
If you are concerned about other users of your system having access to your files, there has been a sim- ple way to encrypt files and folders in every version of
Windows since XP called Encrypted File Service (EFS). We will show you how to apply EFS to your files and folders.
NOTE: Files and folders you encrypt using EFS can only be decrypted using the Windows login that en- crypted the file. Other users on the system will be able to
see the files but will not be able to open them, even if they are running as administrator. That means that you also need to be careful you do not forget your login, or
you will be locked out of your own files.
http://technet.microsoft.com/en-us/library/bb457007.aspx
How to Share Files Using Encrypting File System
This article describes how to share files using EFS, and is intended to assist system architects and ad- ministrators in developing best practices for creating data
recovery and data protection strategies using Windows XP.
..
In Windows XP, EFS supports file sharing between multiple users on a single file. This provides an oppor- tunity for data recovery by adding additional users to an
encrypted file. Although the use of additional users cannot be enforced through policy or other means, it is a useful and easy method for enabling re- covery of
encrypted files by multiple users without actually using groups, and without sharing private keys between users.
Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before
additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Indi- vidual users
may add other users (not groups) from the local machine or from the Active Directory, pro- vided the user has a valid certificate for EFS.
..
To add users
1. Click the Add button as shown in Figure 2 below.
Figure 2. Adding users
A new dialog box will be presented showing the existing users and certificates that are cached in the "Other People" certificate store of the local machine. It will also
allow new users to be added from the Ac- tive Directory by clicking the Find User button.
Note A user must have a valid EFS certificate in the Active Directory to be added.
2. Click the Find User button to find new users as shown in Figure 3 below.
Figure 3. Finding new users from Active Directory
The standard object picker dialog box will be displayed and a search will be conducted.
...
QUESTION 63
You plan to purchase new Windows 8.1 tablets for you company network.
You need to ensure that tablet users are able to use the Windows 8.1 Snap feature.
Which hardware specifications should you meet in choosing tablets?
A.
B.
C.
D.
monitor and video adapter that support a minimum screen resolution of 1366 x 768
monitor that supports at least three simultaneous touches
monitor that supports at least five simultaneous touches
monitor and video adapter that support a minimum screen resolution of 1024 x 768
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://winsupersite.com/article/windows8/windows-8-feature-focus-snap-142986 Windows 8 Feature Focus: Snap
While Metro-styled apps are advertised as being full-screen experiences only, they can also support a less-well-known snapped mode, in which they can be used
side-by-side onscreen with a second Metro- styled app or the Windows desktop. This Windows 8 feature, not coincidentally, is called Snap, and it's named after a
similar desktop feature that debuted in Windows 7.
http://windowsitpro.com/windows-8/q-what-resolution-do-windows-8-metro-ui-and-snap-feature-require
Q: What resolution do the Windows 8 Metro UI and Snap feature require? ..
To use the Snap application capability, which allows two Metro applications to appear on the screen at the same time with one application using up most of the
screen and the other giving a summary view, you need a resolution of 1366x768.
..
QUESTION 64
You have a computer that runs Windows 8.1. You install a custom application by using an .msi file that is located in your Documents library.
The computer begins to experience performance issues. You decide to reinstall the custom application. When you run the .msi file, you receive an error message
about a corrupted file.
You need to ensure that you can reinstall the application.
What should you do?
A.
B.
C.
D.
Run the replace command, specify the application's .msi file as the source, and then specify the application's original installation directory as the destination.
Use file History to revert the application's .msi file to a previous version.
Run the msiexec /f command and specify the application's .msi file.
Run the reset /f command and specify the application's .msi file.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx What is File History?
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
Further information:
http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx Msiexec (command-line options)
To repair a product
Syntax
msiexec /f [p][o][e][d][c][a][u][m][s][v]{Package | ProductCode}
QUESTION 65
You administer Windows 8.1 computers in you company network. all computers include Windows 8.1 compatible trusted platform modele (TPM).
You configure a computer that will run a credit processing application.
You need to ensure that the computer requires a user to enter a PIN code when starting the computer.
Which policy should you configure? (To answer, select the appropriate policy in the answer area.)
A.
B.
C.
D.
Allow Secure Boot for Integrity validation
Require Additional authentication at startup
Allow enhanced PINs for Startup
Configure minimum PIN length for startup a local
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
How to enable BitLocker to prompt for PIN during startup
You can do this after BitLocker has encrypted the entire drive. First you have to enable the local policy to require a PIN during startup. You could also do that
centrally enterprise wide through Group Policy (GPO). To do this:Click Start > Run.
Type "gpedit.msc"
Go to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.
One the right pane, double-click on Require additional authentication at startup.
Choose Enabled
Uncheck the Allow BitLocker without a compatible TPM
Under Configure TPM startup PIN:, choose Require startup PIN with TPM http://technet.microsoft.com/en-us/library/jj679890.aspx
BitLocker Group Policy Settings
Require additional authentication at startup
This policy setting is used to control which unlock options are available for operating system drives. With this policy setting, you can configure whether BitLocker
requires additional authentication each time the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This pol- icy setting is
applied when you turn on BitLocker.
..
On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the
computer starts, it can use:
only the TPM for authentication
insertion of a USB flash drive containing the startup key
the entry of a 4-digit to 20-digit personal identification number (PIN) a combination of the PIN and the USB flash drive
There are four options for TPM-enabled computers or devices:
* Configure TPM startup
Allow TPM
Require TPM
Do not allow TPM
* Configure TPM startup PIN
Allow startup PIN with TPM
Require startup PIN with TPM
Do not allow startup PIN with TPM
* Configure TPM startup key
Allow startup key with TPM
Require startup key with TPM
Do not allow startup key with TPM
* Configure TPM startup key and PIN
Allow TPM startup key with PIN
Require startup key and PIN with TPM
Do not allow TPM startup key with PIN
Further Information:
Allow Secure Boot for integrity validation
This policy controls how BitLocker-enabled system volumes are handled in conjunction with the Secure Boot feature. Enabling this feature forces Secure Boot
validation during the boot process and verifies Boot Configuration Data (BCD) settings according to the Secure Boot policy.
Secure Boot ensures that the computer's preboot environment loads only firmware that is digitally signed by authorized software publishers. Secure Boot also
provides more flexibility for managing preboot config- urations than BitLocker integrity checks prior to Windows Server 2012 and Windows 8.
When this policy is enabled and the hardware is capable of using Secure Boot for BitLocker scenarios, the Use enhanced Boot Configuration Data validation profile
Group Policy setting is ignored, and Secure Boot verifies BCD settings according to the Secure Boot policy setting, which is configured separately from BitLocker.
Allow enhanced PINs for startup
This policy setting permits the use of enhanced PINs when you use an unlock method that includes a PIN.
Enhanced startup PINs permit the use of characters (including uppercase and lowercase letters, symbols, numbers, and spaces). This policy setting is applied
when you turn on BitLocker. Not all computers support enhanced PIN characters in the preboot environment. It is strongly recom- mended that users perform a
system check during the BitLocker setup to verify that enhanced PIN char- acters can be used.
Configure minimum PIN length for startup
This policy setting is used to set a minimum PIN length when you use an unlock method that includes a PIN.
This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits.
http://4sysops.com/archives/bitlocker-group-policy-changes-in-windows-8/ BitLocker Group Policy changes in Windows 8
"Allow Secure Boot for integrity validation" allows you to configure the use of Secure Boot on computers that have UEFI firmware. More specifically, it lets you
disable it since the default is to use Secure Boot when it is available on a computer. In the event you do disable it, you can configure the "use enhanced Boot
Configuration Data validation profile" to choose specific BCD settings to verify.
Allow Secure Boot for integrity validation
QUESTION 66
You administer Windows 8.1 client computers in your company network.
A guest at your company is connected to the Internet as shown in the following exhibit. (Click the Exhibit button.)
You need to ensure that the guest user is able to share network resources over Wi-Fi without lowering the overall security of the computer.
What should you do?
A.
B.
C.
D.
Change the network location type to Work.
Configure File sharing connections settings for All networks.
Change the network location type to Private.
Configure File and printer sharing settings for Public networks.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.7tutorials.com/network-locations-explained
Simple Questions: What are Network Locations in Windows 7 & Windows 8?
Network Locations in Windows 8: Private vs Public
Windows 8 further simplifies the concept of network locations, reducing them to only two choices:
Private network - This profile should be applied to your home network or to the network from your work- place. When this profile is assigned to a network
connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections are allowed. Public network - This profile is also
named Guest. It is the more secure of the two because network dis- covery is turned off as well as file and printer sharing. This profile should be used when
connecting to public networks you don't trust, like those found in airports, coffee shops, bars, hotels, etc. There's also a third network location profile named Domain
network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings ap- plied to this
profile are those set by your company and you cannot change them.
http://www.tekrevue.com/tip/change-network-location-windows-8/ How to Change a Network Location in Windows 8
Let's get back to the Networks list: right click or press and hold your active network connection. A menu is displayed with several options, depending on the network
type.
Click or tap "Turn sharing on or off" (the only option common to both wired and wireless networks). For wired networks you will see less options being displayed din
the contextual menu. You are asked if you want to turn on sharing between PCs and connect to devices on this network.
Selecting "No, don't turn on sharing or connect to devices" is the equivalent of applying the Public profile. Selecting "Yes, turn on sharing and connect to devices" is
the equivalent of applying the Private profile.
Make your choice and the appropriate settings are applied.
QUESTION 67
A company has client computers that run Windows 8.1.
When a user tries to print from his portable client computer while connected to the corporate network, he discovers that the default printer is set to his home printer
instead of to the office printer.
You need to ensure that the default printer for the computer is the office printer when the computer is connected to the corporate network and the user's home
printer when the computer is connected to his home network.
What should you do on the portable computer?
A. In the printer properties of the corporate printer, configure the active port with the correct TCP/IP settings for the printer.
B. Install the corporate printer and set it as the default printer. Then add the home printer to the homegroup settings.
C. Connect to the home network and choose Connect from the shared printer object context menu. Then connect to the corporate network and choose Connect
from the shared printer object context menu.
D. Set a default printer for each network.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/set-change-your-default-printer Set or change your default printer
To set a different default printer for each network
..
3. Tap or click any printer, and then tap or click Manage default printers.
4. Select Change my default printer when I change networks.
5. Under Select network, choose the first network you want to set a printer for.
6. Under Select printer, choose the printer you want to be the default on that network, and then tap or click Add.
7. When you're finished setting a default printer for each network, tap or click OK.
Further Information:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3-configure-network- connectivity-15/
configure location-aware printing
Location-aware printing is not a new feature, it existed already in Windows 7, it works that your default printer follows you, so at work you can have one default
printer and another at home without manually switching.
Just click on an installed printer in control panel and select Manage default printers.
Be sure Change my default printer when I change Networks is selected and then manage per network which printer you want to be default.
Location-Aware Printing is dependent upon the Network List Service and the Network Location Aware- ness service. If either one of these services are stopped or
malfunctioning, then Windows will not be able to detect network changes and may not switch default printers as expected
QUESTION 68
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least
amount of administrative effort.
Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)
http://www.gratisexam.com/
A.
B.
C.
D.
E.
Edit the local Group Policy to configure the Shut Down options.
Create a Group Policy object (GPO) that configures the Sleep Management settings.
Create a Group Policy object (GPO) that configures the Power Management settings.
Link the Group Policy object (GPO) to the organizational unit containing the portable computers.
Edit the local Group Policy to configure the Power Management settings.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Put the Laptops into an OU.
Create an appropriate GPO.
Link the GPO to the OU.
Note:
* Networking power management (not sleep management) refers to the set of features that you can configure to allow the computers in your network to save
energy.
Incorrect:
Local Group Policy would have to be edited locally on each laptop.
http://blogs.technet.com/b/askds/archive/2008/03/19/managing-power-with-group-policy-part-2-or-3.aspx Managing Power with Group Policy: Part 2 of 3
Another related policy setting is Specify the System Sleep Timeout, only the value entered (in seconds) indicates how much idle time elapses before Windows
enters sleep mode.
..
Further Information:
Put the Laptops into an OU.
Create an appropriate GPO.
Link the GPO to the OU.
QUESTION 69
You install Windows 8.1 on a client computer.
Several days later, you establish that the computer has been infected by malware. You are unable to establish when the computer was infected.
You need to restore the client computer to full functionality.
What should you do?
A.
B.
C.
D.
Start the computer using the Last Known Good Configuration option.
Use the Refresh your PC without affecting your files function.
Start the computer in Safe Mode.
Use the Remove everything and install Windows function.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
QUESTION 70
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
You need to ensure that only administrators can access removable storage devices on client computers.
Which two Group Policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
E.
Enable the Prevent installation of removable devices policy.
Disable the Allow only USB root hub connected Enhanced Storage Features policy.
Create an AppLocker deny rule with a path condition of %HOT%.
Start the Application Identity service.
Enable the Allow administrators to override Device Installation Restriction policies policy.
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
Prevent installation of all devices.
In this scenario, the administrator wants to prevent standard users from installing any device but allow administrators to install or update devices. To implement this
scenario, you must configure two computer policies: one that prevents all users from installing devices (A) and a second policy to exempt administrators from the
restrictions (E).
* A growing variety of external storage devices can be connected to personal computers and servers that are running the Windows operating system. Many users
now expect to be able to install and use these devices in the office, at home, and in other locations. For administrators, these devices pose potential security and
manageability challenge.
The Group Policy settings discussed in this section can be used to limit, prevent, or enable these situations. The default value for these policy settings is Not
configured. These policy settings are located in the following locations under Computer Configuration\Administrative Templates\System:
/ (E) Device Installation\Device Installation Restrictions
Device Redirection\Device Redirection Restrictions
Driver Installation
Enhanced Storage Access
Removable Storage Access
Reference: Threats and Countermeasures Guide: External Storage Devices
http://technet.microsoft.com/en-us/library/cc753539%28v=ws.10%29.aspx Prevent Installation of Removable Devices
You can use this procedure to prevent installation of any removable device. A device is considered removable when its device driver, or the device driver for the bus
to which the de- vice is attached, reports that it is a removable device.
If this policy is enabled, in addition to preventing installation of the affected devices, it also prevents users from updating the device drivers for already installed
devices that match the policy.
http://technet.microsoft.com/en-us/library/cc753015%28v=ws.10%29.aspx Allow Administrators to Override Device Installation Restriction Policies
You can use this procedure to ensure that the device installation restriction policies you apply to a com- puter do not affect members of the Administrators group.
By default, a device installation restriction policy affects all users of the computer, including members of the local Administrators group. By enabling this policy, you
exempt administrators from the effects of the policy, and allow them to do the device installation tasks they need to do.
Further Information:
http://www.group-policy.com/ref/policy/242/Allow_only_USB_root_hub_connected_Enhanced_Storage_devices Allow only USB root hub connected Enhanced
Storage devices
..
If you disable or do not configure this policy setting, USB Enhanced Storage devices connected to both USB root hubs and non-root hubs will be allowed.
http://technet.microsoft.com/en-us/library/dd723678%28v=ws.10%29.aspx AppLocker
You can use AppLocker as part of your overall security strategy for the following scenarios:
Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.
Prevent users from installing and using unauthorized applications. Implement application control policy to satisfy security policy or compliance requirements in your
organi- zation.
http://technet.microsoft.com/en-us/library/ee791779%28v=ws.10%29.aspx Configure the Application Identity Service
The Application Identity service determines and verifies the identity of an application. Stopping this ser- vice will prevent AppLocker policies from being enforced.
QUESTION 71
A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at
home.
The company has applications that run only on Windows 8.1.
You need to deploy Windows To Go so that employees can run the applications on their home computers.
Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
bcdedit
DISM
bcdboot
ImageX
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
See step 12 and 13 below.
Create Windows To Go on any edition of Windows 8.1:
1. Launch an administrative level command prompt.
2. Make sure that your USB Drive is plugged in and then type in diskpart and hit Enter.
3. List the available disks by running "list disk" and you should see your usb device.
4. Select your USB drive by typing "select disk #" and hit Enter. For example, "select disk 3".
5. Clean the partitions on the disk by typing "clean" and hit Enter.
6. Now create the boot partition by running the following command:
create partition primary size=350
7. Now create the OS partition by running the following command to create a partition taking up all remaining space:
create partition primary
8. The boot partition needs to be formatted, configured and assigned a drive letter, run the following commands:
select partition 1
format fs=fat32 quick
active
assign letter=b
(if the b drive letter is already in use on your PC, substitute a different letter and replace b with your letter throughout the rest of this guide)
9. The same must be done for the OS partition, run the following different commands:
select partition 2
format fs=ntfs quick
assign letter=o
(if the o drive letter is already in use on your PC, substitute a different letter and replace o with your letter throughout the rest of this guide)
10. Exit Diskpart by typing Exit.
11. Extract the install.wim file from the \sources\ directory of the Windows 8.1 install ISO to c:\wim\. On Windows 8.1 you can just double click an ISO to mount and
then browse it.
12. Use DISM to deploy the Windows 8.1 files to the OS partition of the USB device by running:
dism /apply-image /imagefile:c:\wim\install.wim /index:1 /applydir:o:\
13. The boot manager needs to be installed on the boot partition with the help of the bcdboot utility.
Run the following command:
o:\windows\system32\bcdboot o:\windows /f ALL /s b:
14. Reboot your computer and test your new Windows 8.1 To Go device built on Windows 8.1. Make sure the PC is configured to boot to USB before your local
hard drive.
Reference: How to Create a Windows To Go USB Drive
http://technet.microsoft.com/en-us/library/jj721578.aspx
Deploy Windows To Go in Your Organization
http://www.thomasmaurer.ch/2012/03/windows-8-how-to-create-a-windows-to-go-usb-drive/ Windows 8: How to create a Windows To Go USB drive
Microsoft released a new feature called "Windows To Go" with Windows 8. With this feature it is possible to boot your Windows 8 from a USB drive on any PC. In
this post I show you how you can do this.
Run diskpart
1.
With "list disk" you can list all your disk
2.
Now select your usb drive (select disk 1) and clean it. After that you can create a new partition and for- 3.
mat that and close diskpart.
Now in my case the ISO is mounted as drive F:. Now with dism I can apply the Windows Image to my 4.
USB drive (E:)
Now you have to make this drive bootable
5.
now you are done. You can now boot your USB drive. The first boot will take some time to setup.
6.
QUESTION 72
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All Sales department
employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers.
You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the
Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run.
You need to quickly ensure that the application can run.
What should you do?
A.
B.
C.
D.
Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
Configure the AppLocker properties to enforce rules.
Run the gpupdate /force command.
Create a new AppLocker file hash condition.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/bb490983.aspx
Gpupdate
Refreshes local and Active Directory-based Group Policy settings, including security settings.
/force : Ignores all processing optimizations and reapplies all settings.
http://technet.microsoft.com/en-us/library/cc940895.aspx
Group Policy refresh interval for computers
Specifies how often Group Policy for computers is updated while the computer is in use (in the back- ground). This policy specifies a background update rate only
for Group Policies in the Computer Configu- ration folder.
By default, computer Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes. In addition to background updates,
Group Policy for the computer is always updated when the system starts.
Further Information:
http://technet.microsoft.com/en-us/library/ee460964.aspx
Get-AppLockerPolicy
The Get-AppLockerPolicy cmdlet gets the AppLocker policy from the local Group Policy object (GPO), from a specified GPO, or from the effective AppLocker policy
on the computer. The output is an AppLock- erPolicy object or an XML-formatted string.
QUESTION 73
You administer Windows 8.1 laptops in your company network.
You install several custom desktop applications on the laptops. You need to create a custom recovery image for Windows to use when selecting the Refresh your
PC option. The custom recovery image must include the custom desktop applications.
Which command should you use to create the custom recovery image?
A.
B.
C.
D.
Recdisc.exe
Recover.exe
Recimg.exe
RecoveryDrive.exe
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/matt-harrington/archive/2012/04/01/create-a-windows-8-refresh-image-with- recimg-exe.aspx
Create a Windows 8 image with recimg.exe to preserve your Desktop apps after a refresh
Windows 8 supports two new ways to revert your system to an earlier state. From the Settings charm, access More PC settings and then click General. Towards
the bottom, you'll see these two choices:
Refresh your PC without affecting your files. This choice keeps your personal data, system settings, 1.
and Metro style applications. Desktop applications will be removed, unless you create a custom image as I detail below.
Reset your PC and start over. This choice is like a factory reset. All of your personal files, Metro style 2.
apps, and Desktop apps will be removed. You can optionally write random data to your drive for added security.
Use option 2 if you're going to sell or give away your system. All of your personal files will be erased.
The rest of this post is about option 1.
Option 1, refreshing your PC, keeps your personal data and reinstalls Metro style applications. Desktop apps will be removed, and their names will be placed in a
file on your desktop called Removed Apps.
Reinstalling all of your Desktop apps can be time consuming, so Windows 8 offers a command called rec- img.exe to make this easier. recimg creates an image
which is used by the refresh facility when restoring Windows. Not only will your personal data and Metro style apps be saved, but so will Desktop apps you have
installed at the time you create the image. This can save you a lot of time.
http://support.microsoft.com/kb/2748351
How to create a system image to refresh your Windows 8 PC
"Refresh your PC" is a new feature in Windows 8. By default, desktop apps are removed when you re- fresh a Windows 8-based computer, unless you create a
custom image. After you create a custom sys- tem image, the image is used as the refresh image. This means that any existing image or OEM restore image is not
used when you refresh your computer.
To create a custom image, use the Recimg.exe command-line tool that is included in Windows 8. To do this, follow these steps:
1. Create a destination folder for the custom image. For example, create a folder named "Refreshimage" on drive C.
2. Open an elevated command prompt. To do this, follow these steps:
On the Start page, type cmd, press and hold or right-click Command Prompt, and then tap or click Run as administrator.
3. Type the following command, and then press Enter:
recimg -CreateImage drive:\folder
For example, if you create "C:\Refreshimage" in step 1, run the following command:
recimg -CreateImage C:\Refreshimage
QUESTION 74
You administer Windows 8.1 client computers in your company network. A computer that is used by non-administrator users has a directory named C:\Folder1.
A shared collection of Microsoft Excel files is stored in the C:\Folder directory, with non- administrator users being granted modify permissions to the directory.
You discover that some files have been incorrectly modified by a user.
You need to determine which user made changes to the directory's folder's files.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Failure.
From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission.
From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success for the Modify permission.
Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Success.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
We must audit for success, as we want to know which user has modified the file. http://technet.microsoft.com/en-us/library/cc776774%28v=ws.10%29.aspx Audit
object access
This security setting determines whether to audit the event of a user accessing an object--for example, a file, folder, registry key, printer, and so forth--that has its
own system access control list (SACL) specified.
If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry
when a user successfully accesses an object that has an appropriate SACL specified. Failure audits generate an audit entry when a user unsuccess- fully attempts
to access an object that has a SACL specified.
https://blogs.manageengine.com/product-blog/eventloganalyzer/2012/06/20/object-access-auditing-simplified-find- the-who-what-where-when-of-file-folderaccess.html
Object Access Auditing Simplified Find the `Who, What, Where, When' of File & Folder Access Most administrators face the challenge of knowing what actually
happened to their files and folders who accessed them, deleted them, edited them, moved them, where the files and folders went, etc. Object ac- cess auditing can
help administrators to meet this challenge head-on.
If you do not enable the above setting, you will have no record when a file or folder was accessed. Most administrators would like to know only the failure attempts
when someone tries to access the file or folder but failed because of improper permission. But it is highly recommended to enable both failure attempts and
success attempts. The reason for enabling success attempts is that sometimes hackers can use ad- ministrator privilege and gain access to confidential files and
folders.
Your enterprise will have crucial data stored in files and folders such as financial data, employee data, pa- tient records, bank account data, etc. The next step is to
go to such files and folders to enable auditing on them. Each file / folder's auditing settings must be modified to include those users you wish to audit.
These are enabled in Properties->Security->Advanced->Auditing. If you want to audit all access events by everyone, add everyone group, and select Success>Full
Control. (See Screen Shot Below)
Note:
Select the attributes based on your requirement. Delete and Modify attributes are most recommended. Enabling all the attributes to users will flood the event viewer
in few seconds, and consume more band- width. So judiciously select the attributes required for your auditing needs.
There are no objects configured to be audited by default. Once this auditing setting for an object is config- ured, log entries on access attempts (Successful and
Failed) start getting recorded and you will be able to view the object access related events in the security log in Event Viewer. (See Screen Shot Below)
The events must be opened up individually to inspect their contents, which is a painful process and is to- tally impossible in an IT enterprise network.
QUESTION 75
A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1 contains computers that run Windows 7. Workgroup2 contains
computers that run Windows 8.1.
You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers.
You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers by using Windows PowerShell Remoting.1
Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)
A.
B.
C.
D.
E.
Install Windows PowerShell 2.0 on the Workgroup1 computers.
Run the winrmquickconfig command on the Workgroup2 computers.
On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM).
Run the winrrnquickconfig command on the Workgroup1 computers.
On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in Windows Remote Management (WinRM).
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/magazine/ff700227.aspx
Enable and Use Remote Commands in Windows PowerShell
The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that
implements WS-Management in Windows. Comput- ers running Windows 7 and later include WinRM 2.0 or later. On computers running earlier versions of
Windows, you need to install WinRM 2.0 or later as appropriate and if supported. Currently, remoting is supported on Windows Vista with Service Pack 1 or later,
Windows 7, Windows Server 2008, and Windows Server 2008 Release 2.
..
In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer
might not be able to authenticate your creden- tials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the lo- cal
computer in WinRM. To do so, type:
winrm s winrm/config/client '@{TrustedHosts="RemoteComputer"}' Here, RemoteComputer should be the name of the remote computer, such as:
winrm s winrm/config/client '@{TrustedHosts="CorpServer56"}'
When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts
configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the
following command on the remote host:
winrm quickconfig
This command analyzes and configures the WinRM service.
...
http://msdn.microsoft.com/en-us/library/aa384372%28v=vs.85%29.aspx Installation and Configuration for Windows Remote Management
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start. Configures a listener for the ports that send and receive WS-Management protocol
messages using ei- ther HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
Note: The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm
quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not be enabled.
Further Information:
http://technet.microsoft.com/en-us/library/hh849694.aspx
Enable-PSRemoting
The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote com- mands that are sent by using the WS-Management
technology.
You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands.
Because the configuration activates listeners, it is pru- dent to run it only where it is needed.
http://msdn.microsoft.com/en-us/library/ee309369%28v=vs.85%29.aspx What's New in WinRM 2.0
WinRM 2.0 is included in Windows Server 2008 R2 and Windows 7.
http://msdn.microsoft.com/en-us/library/ff637750%28v=azure.10%29.aspx Install Windows PowerShell 2.0
Windows PowerShell 2.0 needs to be installed on Windows Server 2008 and Windows Vista only. It is al- ready installed on Windows Server 2008 R2 and Windows
7.
QUESTION 76
A computer that runs Windows B has two hard disk drives. The user stores data files in specific storage locations outside of the standard libraries on both drives.
File search results are delayed.
You need to return relevant search results more quickly.
What should you do?
A.
B.
C.
D.
Remove all directories from indexed locations.
Add the specific storage locations to indexed locations.
Allow indexing of file contents in non-indexed locations.
Add encrypted files to the index.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 77
You administer Windows 8.1 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the
configuration settings into a Group Policy object later.
What should you do?
A.
B.
C.
D.
Run the netshadvfirewall export c:\settings.xrnl command.
Run the netshadvfirewall export c:\settings.txt command.
Run the netshadvfirewall export c:\settinqs.wfw command.
Run the netsh firewall export c:\settings.xml command.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
* Netshadvfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows
Firewall and IPsec settings and provides an alternative to console-based management. T
* Export subcommand
Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the
Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer.
Syntax
export [ Path ] FileName
Parameters
[ Path ] FileName
Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configuration will be written. If the path, file name, or both contain
spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name extension is
.wfw.
Example
In the following example, the command exports the complete Windows Firewall with Advanced Security service configuration to the file C:\temp\wfas.wfw.
export c:\temp\wfas.wfw
Reference: Netsh Commands for Windows Firewall with Advanced Security
QUESTION 78
You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and
Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer. Your solution must ensure that the user can read the files on Server1.
What should you do?
A.
B.
C.
D.
Create a new VPN connection. Disable local drive mappings.
Create a new Remote Desktop connection.
Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
Create a new Remote Desktop connection. Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc725887%28v=ws.10%29.aspx Device and Resource Redirection
Policy settings in this node control access to devices and resources on a client computer in Terminal Ser- vices sessions.
Do not allow drive redirection
This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Ser- vices session (drive redirection).
By default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My
Computer in the format <driveletter> on <computer- name>. You can use this policy setting to override this behavior. If you enable this policy setting, client drive
redirection is not allowed in Terminal Services sessions. If you disable this policy setting, client drive redirection is always allowed. If you do not configure this policy
setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal
Services Configu- ration tool.
QUESTION 79
A company has 10 client computers that run Windows 8.1.
An employee updates a device driver on her computer and then restarts the computer. Windows does not start successfully. You start the computer in Safe Mode.
You need to identify the most recently installed driver and gather the maximum amount of information about the driver installation.
What should you do?
A.
B.
C.
D.
In Device Manager, run a scan for hardware changes.
In the Event Viewer console, display the Hardware Events log.
In the Programs and Features Control Panel item, display the installed updates.
Display the contents of the Windows\inf\setupapi.dev.log file.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://support.microsoft.com/kb/927521
Windows 7, Windows Server 2008 R2, and Windows Vista setup log file locations
C:\WINDOWS\INF\setupapi.dev.log
Contains information about Plug and Play devices and driver installation.
QUESTION 80
Employees are permitted to bring personally owned portable computers that run Windows 8.1 to the office. They are permitted to install corporate applications by
using the management infrastructure agent and access corporate email by using Windows Mail.
An employee's personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Prevent the computer from connecting to the corporate wireless network.
Disconnect the computer from the management infrastructure.
Change the user's password.
Initiate a remote wipe.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
http://support.microsoft.com/kb/2847619
Win8: Security: Device wipe and device lock behavior across operating system versions and devices
Device wipe (also known as "remote wipe") is an Exchange ActiveSync (EAS) directive in which a user or administrator triggers a wipe of a device. Specifically, a
user goes to Outlook Web App and then triggers the device wipe behavior, or a Microsoft Exchange administrator invokes device wipe.
Remote device wipe may be triggered when a standard user account uses OWA or when an administrator uses the Exchange administrator tools. The following
screen shot shows the device wipe UI in Outlook Web App for a Windows Mobile phone. The UI is triggered by clicking the "device wipe" button (high- lighted in
red).
The following table shows the behavior of a mail app when the app receives a device wipe directive from a server.
...
http://windowsitpro.com/windows-8/doing-activesync-remote-wipe-windows-8-or-windows-rt-device Doing an ActiveSync Remote Wipe of a Windows 8 or Windows
RT Device
Q: If an ActiveSync Remote Wipe is initiated against a Windows 8 or Windows RT device via the built-in Mail application, what's deleted?
A: A Remote Wipe is the process where a device is selected from a central Microsoft Exchange or man- agement console and chosen to be wiped, for example if
the device has been lost by the owner. The Re- mote Wipe command is then sent to the device via ActiveSync.
For a device such as a Windows Phone, all data is deleted, including email, contacts, calendar for all ac- counts and other data on the device such as documents
and picture.
However, when ActiveSync Remote Wipe is performed against a Windows 8 or Windows RT device, the scope of the wipe is more limited. Only the email, contacts,
and calendar for information stored in the built-in Mail applicationare deleted. Other data on the system is not deleted, including information from the Microsoft
Office Outlook client.
QUESTION 81
A company has lab computers that run Windows 8.1. On all lab computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled and
the Download updated compatibility lists from Microsoft option disabled. All lab computers access only internal corporate websites.
A corporate website was designed for a previous version of Internet Explorer. When viewed on the lab computers, menus and images on the website are displayed
out of place.
You need to ensure that all corporate websites display correctly on the lab computers.
What should you do?
A. Enable the Display all websites in Compatibility View option.
B. Manually add the corporate website to the compatibility view settings.
C. Manually download an updated compatibility list from Microsoft.
D. Disable the Display intranet sites in Compatibility View option.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Fix site display problems with Compatibility View
Sometimes websites don't look like you expect them toimages might not appear, menus might be out of place, and text could be jumbled together. This might be
caused by a compatibility problem between Internet Explorer and the site you're on. Sometimes this can be fixed by adding the site to your Compatibility View list.
QUESTION 82
You administer Windows 8.1 Pro computers in your company network. The computers are configured to allow remote connections. You attempt to create a Remote
Desktop Connection to a computer named Computer1. You receive the following message: ''Remote Desktop can't connect to the remote computer."
You are able to ping Computer1. You discover that Remote Desktop Firewall rules are not present on Computer1.
You need to connect to Computer1 by using Remote Desktop.
Which PowerShell commands should you run on Computer1?
A.
B.
C.
D.
New-NetFirewallRule -DisplayNameRdpTCPin -localPort 3389 -Protocol TCP
Set-NetFirewallRule -Name RemoteSvcAdmin-In-TCP -Enabled True
New-NetFirewallRule -DisplayNameRdpTCPout -localPort 3389 -Protocol TCP -Direction Out -Action Allow
Set-NetFirewallRule -Name RemoteFwAdmin-In-TCP -Enabled True
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj554908.aspx
New-NetFirewallRule
Creates a new inbound or outbound firewall rule and adds the rule to the target computer.
Syntax
New-NetFirewallRule -DisplayName <String> [-Action <Action> ] [-AsJob] [-Authentication <Authentica- tion> ] [-CimSession <CimSession[]> ] [-Description
<String> ] [-Direction <Direction> ] [-DynamicTarget <DynamicTransport> ] [-EdgeTraversalPolicy <EdgeTraversal> ] [-Enabled <Enabled> ] [-Encryption <Encryption> ] [-GPOSession <String> ] [-Group <String> ] [-IcmpType <String[]> ] [-InterfaceAlias <Wildcard- Pattern[]> ] [-InterfaceType <InterfaceType> ] [LocalAddress <String[]> ] [-LocalOnlyMapping <Boolean> ] [-LocalPort <String[]> ] [-LocalUser <String> ] [-LooseSourceMapping <Boolean> ] [-Name <String> ] [OverrideBlockRules <Boolean> ] [-Owner <String> ] [-Package <String> ] [-Platform <String[]> ] [-PolicyStore <String> ] [-Profile <Profile> ] [-Program <String> ] [Protocol <String> ] [-RemoteAddress <String[]> ] [-RemoteMachine <String> ] [-RemotePort <String[]> ] [-RemoteUser <String> ] [-Service <String> ] [-ThrottleLimit
<Int32> ] [-Confirm] [-WhatIf] [ <CommonParameters>]
The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.
http://en.wikipedia.org/wiki/Remote_Desktop_Protocol
Remote Desktop Protocol
By default, the server listens on TCP port 3389 and UDP port 3389.
QUESTION 83
A client computer runs Windows 8.1 and has a 1 TB hard disk drive. You install several third- party desktop apps on the computer. The hard disk drive has very little
available space.
After you install an app update, the computer becomes unresponsive.
You have the following requirements:
Return the computer and applications to an operational state.
Free additional hard disk space.
You need to meet the requirements by using the least amount of administrative effort.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Run the Remove everything and install Windows feature.
Configure the maximum disk space usage for System Restore to 1%.
Configure the maximum disk space usage for System Restore to 5%.
Run the Refresh your PC without affecting your files feature.
Perform a system restore on the client computer.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
The default value for System Restore is 5%. In order to free up some space, we need to lower it, in this case to 1%.
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
QUESTION 84
A company has a client computer that runs Windows 8.1 with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE).
You need to ensure that the computer starts normally.
What should you do?
A.
B.
C.
D.
Install a Trusted Platform Module (TPM) chip.
Start the computer in Safe Mode. Then update the adapter drivers.
Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
Create a self-signed certificate. Associate the certificate with the third-party adapter.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh824987.aspx
Secure Boot Overview
Secure Boot is a security standard developed by members of the PC industry to help make sure that your PC boots using only software that is trusted by the PC
manufacturer.
When the PC starts, the firmware checks the signature of each piece of boot software, including firmware drivers (Option ROMs) and the operating system. If the
signatures are good, the PC boots, and the firmware gives control to the operating system.
Frequently asked questions:
Q: What happens if my new hardware isn't trusted?
A:
Your PC may not be able to boot. There are two kinds of problems that can occur:
The firmware may not trust the operating system, option ROM, driver, or app because it is not trusted by the Secure Boot database.
Some hardware requires kernel-mode drivers that must be signed. Note: many older 32-bit (x86) drivers are not signed, because kernel-mode driver signing is a
recent requirement for Secure Boot.
Q: How can I add hardware or run software or operating systems that haven't been trusted by my manu- facturer?
A:
You can check for software updates from Microsoft and/or the PC manufacturer. You can contact your manufacturer to request new hardware or software to be
added to the Secure Boot database.
For most PCs, you can disable Secure Boot through the PC's BIOS.
Q: How do I edit my PC's Secure Boot database?
A: This can only be done by the PC manufacturer.
QUESTION 85
A company has an Active Directory Domain Services (AD DS) domain. The company has 100 client computers and tablets that run Windows 8.1. Each user has a
unique local user account on each device he or she uses.
The company wants to simplify the logon process for atl users.
You have the following requirements:
Reduce the number of unique user accounts for each user.
Unify the initial Windows 8.1 theme across all Windows 8.1
devices.
Ensure that Windows Store apps maintain the last used state across all Windows 8.1 devices.
You need to configure an authentication method that meets the requirements.
Which authentication method should you configure?
A.
B.
C.
D.
Pin
Microsoft account
Active Directory user account
Picture password
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://windows.about.com/od/windowsforbeginners/fl/How-to-Synchronize-Account-Data-and-More-with- Windows-8-and-81.htm
How to Synchronize Account Data and More with Windows 8 and 8.1
While Windows 8 has a lot of cool features to entice users, arguable the coolest is Account sync. For those who choose to log in to their Windows 8 devices with a
Microsoft account, Windows 8 can synchro- nize a ton of information from one device to the next. You can choose to sync everything from basic set- tings to
themes and wallpapers. Windows 8.1 users can even sync modern applications between ac- counts.
http://windows.microsoft.com/en-us/windows-8/connect-microsoft-domain-account Connect your Microsoft account to your domain account
You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account
in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other
Microsoft account settings that you see on your home PC. You'll also be able to use Microsoft account services from your domain PC without signing in to them
individually.
QUESTION 86
You administer Windows 7 client computers in your company network. The computers are members of an Active Directory Domain Services (AD DS) domain and
have 16-bit applications installed.
You plan to upgrade all of the computers from Windows 7 to Windows 8.1.
You need to ensure that the 16-bit applications will continue to run on Windows 8.1.
What are two version of Windows 8.1 that you could use to achieve this goal? (Each correct answer presents a complete of the solution. Choose two.)
A.
B.
C.
D.
E.
Windows 8.1 Pro (64-bit)
Windows 8.1 Enterprise (64-bit)
Windows 8.1 Pro (32-bit)
Windows RT
Windows 8.1 Enterprise (32-bit)
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
http://www.neowin.net/news/microsoft-windows-8-32-bit-can-still-run-16-bit-apps Microsoft: Windows 8 32-bit can still run 16-bit apps
In response to a comment from a user, Microsoft has revealed in a new post on the Building Windows 8 Twitter page that people interested in running much older
software can still do so on the 32-bit version of Windows 8. Microsoft states: " ... you can run 16 bit apps on 32 bit Windows 8. 64 bit doesn't include the subsystem
at all for a variety of reasons."
QUESTION 87
You use a computer that has Windows 8.1 Pro installed.
Your personal files are stored in a storage pool that is distributed across multiple USB drives.
You need to configure a daily backup solution that meets the following requirements:
Automatically backs up all of your personal files that are located in the storage pool.
Automatically backs up operating system files.
Ensures that you can restore any file.
What should you do?
A. Create a recovery drive.
B. Turn on File History.
C. Configure Windows 7 File Recovery.
D. Configure system protection.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
A computer that runs Windows 8.1 is configured with a 2 TB storage pool. The storage pool currently shows 1 TB of available space.
You try to save 100 MB of files to the storage drive. An error message states that the drive is full.
You need to make an additional 1 TB of space available in the storage pool.
What should you do?
A.
B.
C.
D.
Connect a 1 TB drive to the computer and add the new drive to the storage pool.
Connect a 1 TB drive to the computer and assign a drive letter to the new drive.
Set the resiliency type of the storage pool to Parity.
Set the logical size of the storage pool to 2 TB.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Ref: http://blogs.msdn.com/b/b8/archive/2012/01/05/virtualizing-storage-for-scale-resiliency- and-efficiency.aspx
QUESTION 89
You are troubleshooting a computer that runs Windows 8.1. The computer is not joined to a domain.
You are unable to change any of the advanced Internet options, which are shown in the Advanced Internet Options exhibit. (Click the Exhibit button.)
You need to ensure that you can change the advanced Internet options.
Which tool should you use?
A.
B.
C.
D.
Credential Manager
Authorization Manager
Group Policy Object Editor
Ease of Access Center
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc731745.aspx
Open the Local Group Policy Editor
To open the Local Group Policy Editor from the command line Click Start , type gpedit.msc in the Start Search box, and then press ENTER .
http://technet.microsoft.com/en-us/library/gg699401.aspx
Group Policies in Internet Explorer 9
Group Policy provides a secure way to control Microsoft® Windows® Internet Explorer® 9 configurations.
QUESTION 90
You use a Windows 8.1 computer. You pin some of your favorite websites to the Start screen.
When you click a pinned website, the site opens in Internet Explorer.
You need to ensure that the pinned websites open in Internet Explorer for the desktop.
What should you do?
A.
B.
C.
D.
In Internet Options, set Choose how you open links to Always in Internet Explorer on the desktop.
In Internet Options, select Open Internet Explorer tiles on the desktop.
In Internet Options, select Enable flip ahead.
In Internet Options, set Choose how you open links to Let Internet Explorer decide.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/ie/archive/2012/03/26/launch-options-for-internet-explorer-10-on-windows-8.aspx Launch Options for Internet Explorer 10 on Windows 8
Opening Internet Explorer from the Start Screen
In addition to controlling how Windows opens links, the Browser Launch Settings also provide users with options on how Internet Explorer application tiles launch
from the Start screen. Internet Explorer's applica- tion tile is the default launching point for the browser on the Start screen. You create pinned site tiles when you pin
sites to the Start screen. The setting "Open Internet Explorer tiles on the desktop" controls what happens when you click the Internet Explorer or pinned site tile.
QUESTION 91
You administer Windows 8.1 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.
You need to save the windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the
configuration settings into a Group Policy object later.
What should you do?
A.
B.
C.
D.
Open Local Group Policy Editor, select the Local Policies node, and then select the Export List action.
Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action.
Run the netshadvfirewall export c:\settings.wfw command.
Run the netshadvfirewall export c:\settings.xml command.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
* Netshadvfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows
Firewall and IPsec settings and provides an alternative to console-based management. T
* Export subcommand
Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the
Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer.
Syntax
export [ Path ] FileName
Parameters
[ Path ] FileName
Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configuration will be written. If the path, file name, or both contain
spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name extension is
.wfw.
Example
In the following example, the command exports the complete Windows Firewall with Advanced Security service configuration to the file C:\temp\wfas.wfw.
export c:\temp\wfas.wfw
Reference: Netsh Commands for Windows Firewall with Advanced Security
QUESTION 92
A company is setting up a new branch office. You deploy 10 new Windows 8.1 64-bit client computers in the branch office.
The computers cannot connect to the Internet. You run the ipconfig command on one computer.
The following output depicts a portion of the results.
You need to ensure that the computers can connect to the Internet.
What should you do?
A.
B.
C.
D.
Deploy a Dynamic Host Configuration Protocol (DHCP) server. Configure all computers to use DHCP.
Deploy an Internet Information Services (IIS) server. Configure all computers to use IIS.
Deploy a Domain Name System (DNS) server. Configure all computers to use DNS.
Deploy a Windows Internet Name Service (WINS) server. Configure all computers to use WINS.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://packetlife.net/blog/2008/sep/24/169-254-0-0-addresses-explained/ 169.254.0.0/16 addresses explained
Occasionally you may encounter a host which has somehow assigned itself an IP address in the 169.254.0.0/16 range. This is a particularly common symptom of
Windows machines which have been configured for DHCP but for whatever reason are unable to contact a DHCP server. When a host fails to dynamically acquire
an address, it can optionally assign itself a link-local IPv4 address in accordance with RFC 3927. Microsoft's term for this is Automatic Private Internet Protocol
Addressing (APIPA).
QUESTION 93
A company has an Active Directory Domain Services (AD DS) domain. All client computers are joined to the domain and run Window 8.1. You set up a
management computer named COMPUTER1.
You plan to administer COMPUTER1 by using Windows Remote Shell (WinRS) from your client computer.
You are unable to connect to COMPUTER1 by running the winrs command.
You need to ensure that you can manage only COMPUTER1 by using WinRS.
What should you do?
A.
B.
C.
D.
E.
Run the winrsnetdom join command on all client computers.
Run the winrsnetdom join command only on COMPUTER1.
Run the winrmquickconfig command on all client computers.
Run the winrmquickconfig command only on COMPUTER1.
Run the winrs /ad /u:administrator command on COMPUTER1.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://clintboessen.blogspot.com/2010/01/what-is-winrm.html What is WinRM?
...
The easiest way to start the WinRM server unless you want to do custom configuration is by using the "winrm quickconfig" command.
Hit "Y" to make the change. Next it asks you if you want to allow it to make a HTTP listener and create a windows firewall exception.
Hit "Y" to make the change. WinRM is now running and can be remotely managed by WinRS (the WinRM client).
Now re-run the "winrm enumerate winrm/config/listener" command to see if WinRM is working:
We see it listening on port 5985, this is because I'm running Windows 7 on this PC so its using WinRM 2.0.
Now from another PC I can use the WinRS client to remotely execute commands against that worksta- tion/server by using "winrs -r:https://myserver.com"
command. Please note that you need to run the com- mand as a user in the remote computers "Administrators" group. By default WinRS will use your active
windows credentials. However I do not run my computer as administrator for security purposes so I will need to specify a user account with Domain Admins rights to
ensure I have correct access by using the
-u: switch.
http://msdn.microsoft.com/en-us/library/aa384372%28v=vs.85%29.aspx Installation and Configuration for Windows Remote Management
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start. Configures a listener for the ports that send and receive WS-Management protocol
messages using ei- ther HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
Note: The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm
quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not be enabled.
QUESTION 94
You administer Windows 8.1 client computers in your company network.
A user reports that her Internet connection is slower than usual.
You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet.
Which command should you run?
A.
B.
C.
D.
E.
netstat -an
jpconfig /showclassid
netstat -o
netsh set audit-logging
netsh show netdlls
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/bb490947.aspx
Netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP rout- ing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP
protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP
connections.
Syntax
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
Parameters
-a : Displays all active TCP connections and the TCP and UDP ports on which the computer is listening. -n : Displays active TCP connections, however, addresses
and port numbers are expressed numerically and no attempt is made to determine names.
-o : Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in
Windows Task Manager. This parameter can be combined with -a, -n, and -p.
...
Further Information:
netstat -an - there is no "an" parameter
http://technet.microsoft.com/en-us/library/cc940124.aspx
Ipconfig
/showclassid < adapter >
Displays all the DHCP class IDs allowed for the adapter specified.
http://technet.microsoft.com/sv-se/library/cc785383%28v=ws.10%29.aspx The Netsh Command-Line Utility
set audit-logging
Turns on or off the logging facility.
show netdlls
Displays the current version of installed Netsh helper DLLs.
QUESTION 95
You administer Windows 8.1 computers in your company network.
You need to configure remote computers to receive Windows Remote Shell commands.
Which cmdlet should you run on the remote computers?
A.
B.
C.
D.
Enable-PSRemoting
Set-PSSessionConfiguration
New-PSSession
Set-NetConnectionProfile
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
The Enable-PSRemotingcmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management
technology.
http://technet.microsoft.com/en-us/library/hh849694.aspx
Enable-PSRemoting
The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote com- mands that are sent by using the WS-Management
technology.
On Windows Server® 2012, Windows PowerShell remoting is enabled by default. You can use En- able-PSRemoting to enable Windows PowerShell remoting on
other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled.
You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands.
Because the configuration activates listeners, it is pru- dent to run it only where it is needed.
Further Information:
http://technet.microsoft.com/en-us/library/hh849726.aspx
Set-PSSessionConfiguration
The Set-PSSessionConfiguration cmdlet changes the properties of the session configurations on the local computer.
http://technet.microsoft.com/en-us/library/hh849717.aspx
New-PSSession
The New-PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows
PowerShell establishes a persistent connection to the remote computer.
http://technet.microsoft.com/en-us/library/jj899565.aspx
Set-NetConnectionProfile
The Set-NetConnectionProfile cmdlet changes the network category setting of a connection profile. A connection profile represents a network connection.
QUESTION 96
You administer Windows 8.1 Pro computers in your company network.
A user reports that her computer experiences frequent STOP errors.
You need to repair the Windows 8.1 installation. Your solution must ensure that the user retains her current documents and settings.
What should you do?
A. Create a recovery drive.
B. Reinstall Windows 8.1. Restore the user's personal files from a backup.
C. Run Reset your PC.
D. Run Refresh your PC.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
QUESTION 97
You administer a Windows 8.1 Pro client computer. You disable system protection, install custom drivers, and create a system image.
You test a new application and discover that the computer becomes unresponsive. You need to return your computer to the state that existed prior to the installation
of the application.
What should you do?
A.
B.
C.
D.
Start the computer from a system recovery drive, and then perform System Restore.
Start the computer from a system repair disk, and then perform System Image Recovery.
Start the computer from the system repair disk, and then from the command prompt, run the BCDEdit /copy command.
Run Reset your PC.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
If you can't access Control Panel and you don't have a Windows installation disc or a system repair disc, use this method to restore your computer:
1. Restart your computer using the computer's power button.
2. Do one of the following:
If your computer has only one operating system installed,
hold down the F8 key as your computer restarts. You need to press F8 before the Windows logo appears. If the Windows
logo appears, try again.
If your computer has more than one operating system
installed, use the arrow keys to highlight the operating
system that you want to start, and then press F8.
3. On the Advanced Boot Options screen, use the arrow keys to highlight Repair your computer, and then press Enter.
4. Select a keyboard layout, and then click Next.
5. Select a user name, type the password, and then click OK.
6. On the System Recovery Options menu, click System Image Recovery, and then follow the instructions.
QUESTION 98
A company has Windows 8.1 client computers. Users store data files in their user profile libraries.
You need to ensure that you can restore data files to any date while minimizing system overhead.
Which two actions should you perform? (Each answer presents part of the solution. Choose two.)
A.
B.
C.
D.
Enable Storage Spaces.
Configure settings to save copies of files daily.
Turn on File History.
Configure Windows 7 File Recovery.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It's a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of
Windows 7.
Before you start using File History to back up your files, you'll need to set up a drive to save files to. We recommend that you use an external drive or network
location to help protect your files against a crash or other PC problem.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you
can add them to one of your existing libraries or create a new library.
..
No schedule
File History wakes up once an hour and looks for personal files that have changed. Versions of all files that have changed are replicated to a dedicated storage
device. This approach eliminates the need to set up a schedule and leave a computer idle for an extended period of time. One hour frequency offers a good
balance between the level of protection and amount of storage space consumed by file versions. Enthusiasts can change the frequency from 10 min to 1 day in
order to increase the level of protection or reduce storage consumption.
QUESTION 99
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. A client computer named COMPUTER1 has a shared
printer named PRINTER1 installed and Remote Desktop enabled.
A user named Intern is a member of a security group named Sales. The Sales group is a member of the Remote Desktop Users group on COMPUTER1. Only the
Sales group has access to PRINTER1.
You need to configure COMPUTER1 to meet the following requirements:
Allow all members of the Sales group other than Intern to establish Remote Desktop connections to COMPUTER1.
Allow Intern to print to PRINTER1.
What should you do?
A.
B.
C.
D.
Assign Intern the Deny access to this computer from the network user right. Assign the Sales group the Allow log on locally user right.
Assign Intern the Deny log on through Remote Desktop Services user right.
Remove the Sales group from the Remote Desktop Users group.
Remove Intern from the Sales group.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
The Deny log on through Remote Desktop Services user right on COMPUTER1 will prevent In- tern from establishing a Remote Desktop connection to
COMPUTER1. This will override the user rights assigned to Intern through his or her membership of the Sales group.
QUESTION 100
A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server.
All client computers run Windows 8.1 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement.
After deploying Windows Updates to the computers, the web application stops responding. You establish that a specific optional update installed by Windows
Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable.
You need to remove only the optional update from one client computer.
What should you do?
A.
B.
C.
D.
E.
Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.
From the c:\Windows folder, open the $NTUninstallKBxxxx folder for the update and run the uninstall command.
Start the computer by using the Last Known Good Configuration option.
use System Restore to restore the computer to a point before the update was installed.
Run the Update-Sources Windows PowerShell cmdlet.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj713340.aspx
Getting Started with DaRT 8.0
How to Get DaRT 8.0
DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part of Microsoft Soft- ware Assurance.
http://technet.microsoft.com/en-us/library/jj713326.aspx
Overview of the Tools in DaRT 8.0
From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you
include when you create the DaRT 8.0 re- covery image.
Exploring the DaRT tools
...
Hotfix Uninstall
The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool
when a hotfix or service pack is suspected in pre- venting the operating system from starting.
QUESTION 101
You add two hard drives to a Windows 8.1 computer. The computer does not have a RAID controller.
You plan to store data only on the two new hard drives.
You need to ensure that data loss will not occur if only one hard drive fails.
What should you do?
A.
B.
C.
D.
Create a spanned volume.
Create a storage pool that contains both drives and set the resiliency type to Two-way mirror.
Create a storage pool that contains both drives and set the resiliency type to Parity.
Create a storage pool that contains one drive, and then add the second drive to the pool.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools Storage Spaces: FAQ
What is Storage Spaces?
Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to cre- ate storage spaces.
Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it's easy to work with files on them.
You can create large storage spaces and add more drives to them when you run low on pool capacity. If you have two or more drives in the storage pool, you can
create storage spaces that won't be affected by a drive failure--or even the failure of two drives, if you create a three-way mirror storage space.
http://blogs.msdn.com/b/olivnie/archive/2013/02/05/windows-8-storage.aspx Windows 8: Storage
Storage Spaces
Storage Spaces is a new feature for Windows® 8 that allows a user to combine several disks into a single pool of storage that provides for easier management of
multiple disks and resiliency against hardware fail- ure on any of those disks. The disks that you use for Storage Spaces can be a mix of different-sized disks, and
these can be connected to Microsoft® Windows using both internal and external connections, making it easy to turn the collection of drives you already have into a
safe and easy-to-manage place to store things like your home videos or photos.
...
The table below describes the different options for resiliency:
QUESTION 102
A company plans to deploy Windows 8.1 to 100 client computers. Each client computer has 8 GB of memory.
You have the following requirements:
Ensure that the operating system fully utilizes the available memory.
Ensure that the operating system can be activated by using a Key Management Service (KMS) client setup key.
Minimize the operating system space requirements.
You need to identify the appropriate edition of Windows 8.1 to install on the client computers.
Which edition should you install?
A.
B.
C.
D.
E.
F.
Windows 8.1 Enterprise 32-bit
Windows 8.1 64-bit
Windows 8.1 Pro 32-bit
Windows 8.1 Enterprise 64-bit
Windows 8.1 Pro 64-bit
Windows 8.1 32-bit
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://msdn.microsoft.com/enus/library/windows/desktop/aa366778%28v=vs.85%29.aspx#physical_memory_limits_windows_8 Memory Limits for Windows and Windows Server Releases
Physical Memory Limits: Windows 8
The following table specifies the limits on physical memory for Windows 8.
http://windows.microsoft.com/en-us/windows-8/system-requirements System requirements
If you want to run Windows 8.1 on your PC, here's what it takes:
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more info) RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8-1/compare/default.aspx Compare Windows 8.1 Editions
For enterprise features like Domain Join and Group Policy you will need the Enterprise version of Windows 8.1.
Further Information:
http://technet.microsoft.com/en-us/library/ff793434.aspx
Understanding KMS
KMS activates computers on a local network, eliminating the need for individual computers to connect to Microsoft. To do this, KMS uses a clientserver topology.
KMS client computers can locate KMS host computers by using Domain Name System (DNS) or a static configuration. KMS clients contact the KMS host by using
remote procedure call (RPC).
QUESTION 103
A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run
an edition of Windows 8.1.
The company plans to use the following programs and features on the Windows 8.1 computers:
32-bit and 64-bit software
Desktop apps
Windows Media Player
Storage Spaces
You need to identify the installation or upgrade paths that support the programs and features.
Which three paths meet the requirements? (Each correct answer presents a complete solution.
Choose three.)
A.
B.
C.
D.
E.
F.
Attach the VHD file by using Disk Management.
Import the contents of the system store from a file.
Export the contents of the system store into a file.
Make the VHD disk bootable.
Create a new empty boot configuration data store.
Create a new entry in the boot configuration data store.
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
http://www.gratisexam.com/
You administer desktop computers in your company network.
You are developing User State Migration Tool (USMT) procedures.
You need to ensure that the files located in C:\projects are included in the migration package.
What should you do?
A.
B.
C.
D.
Option A
Option B
Option C
Option D
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc766056%28v=ws.10%29.aspx How To Include Files and Settings
To migrate a specific folder
The following examples show how to migrate a folder from a specific drive, and from any location on the computer.
..
Including subfolders. The following .xml file migrates all files and subfolders from C:\EngineeringDrafts to the destination computer.
<migration urlid="http://www.microsoft.com/migration/1.0/migxmlext/test"> <component type="Documents" context="System">
<displayName>Component to migrate all Engineering Drafts Documents including subfolders</display- Name>
<role role="Data">
<rules>
<include>
<objectSet>
<pattern type="File">C:\EngineeringDrafts\* [*]</pattern>
</objectSet>
</include>
</rules>
</role>
</component>
QUESTION 105
A company has a Windows 8.1 client computer with secure boot enabled. You install a third- party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE).
You need to ensure that the computer starts normally.
What should you do?
A.
B.
C.
D.
E.
Configure a system boot password from the system BIOS.
Disable C-State configuration from the system BIOS.
Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
Enable hardware virtualization from the system BIOS.
Activate the Trusted Platform Module (TPM).
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh824987.aspx
Secure Boot Overview
Secure Boot is a security standard developed by members of the PC industry to help make sure that your PC boots using only software that is trusted by the PC
manufacturer.
When the PC starts, the firmware checks the signature of each piece of boot software, including firmware drivers (Option ROMs) and the operating system. If the
signatures are good, the PC boots, and the firmware gives control to the operating system.
Frequently asked questions:
Q: What happens if my new hardware isn't trusted?
A:
Your PC may not be able to boot. There are two kinds of problems that can occur:
The firmware may not trust the operating system, option ROM, driver, or app because it is not trusted by the Secure Boot database.
Some hardware requires kernel-mode drivers that must be signed. Note: many older 32-bit (x86) drivers are not signed, because kernel-mode driver signing is a
recent requirement for Secure Boot.
Q: How can I add hardware or run software or operating systems that haven't been trusted by my manu- facturer?
A:
You can check for software updates from Microsoft and/or the PC manufacturer. You can contact your manufacturer to request new hardware or software to be
added to the Secure Boot database.
For most PCs, you can disable Secure Boot through the PC's BIOS.
Q: How do I edit my PC's Secure Boot database?
A: This can only be done by the PC manufacturer.
QUESTION 106
A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer. Windows does not start successfully. You establish that the updated driver is
the cause of the problem. You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?
A.
B.
C.
D.
Use the Windows 8.1 PC Reset feature.
Reset the computer to the manufacturer's system image.
Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.
Use the File History feature.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj713340.aspx
Getting Started with DaRT 8.0
How to Get DaRT 8.0
DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part of Microsoft Soft- ware Assurance.
http://technet.microsoft.com/en-us/library/jj713326.aspx
Overview of the Tools in DaRT 8.0
From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you
include when you create the DaRT 8.0 re- covery image.
Exploring the DaRT tools
...
Hotfix Uninstall
The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool
when a hotfix or service pack is suspected in pre- venting the operating system from starting.
QUESTION 107
You administer an installation of Windows 8.1 that runs as a virtual machine. The virtual machine has one 60-GB fixed size virtual hard disk with a single partition
assigned as Volume C.
The virtual machine runs out of disk space. You increase the size of the virtual hard disk file to 200 GB to support an application demand for increased storage on
Volume C.
You discover that Volume C is still 60 GB in File Explorer of the virtual machine.
You need to ensure that Volume C is configured to use 200 GB.
What should you do?
A.
B.
C.
D.
Configure the Virtual Disk type from fixed size to dynamic disk.
From Disk Management of the virtual hard disk, run the Extend the volume action task.
From Disk Management of the host computer, extend the Volume C.
Create a new storage space of Simple (no resiliency) type.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/dn282286.aspx
Online Virtual Hard Disk Resizing Overview
Expanding a virtual hard disk
Expanding a virtual hard disk increases the disk capacity of the virtual hard disk. However, to make the additional disk space available to the virtual machine
requires some extra configuration. From the per- spective of the virtual machine, the virtual hard disk expansion is reflected under Disk Manager as an un- allocated
disk volume. The size of this unallocated volume is the difference between the original virtual hard disk and the nominated size of the expanded virtual hard disk.
To make the full virtual hard disk capacity available to the virtual machine, you need to use Disk Manager to expand the volume within the virtual machine. You can
do this by using the Extend Volume Wizard within Disk Manager. After this is complete, you will be able to view the expanded disk capacity in the op- erating system
of the virtual machine.
QUESTION 108
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB)
Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?
A.
B.
C.
D.
Set the Allow all trusted applications to install group policy to Enabled.
Set the Turn off the Store application group policy to Enabled.
Install and run the Microsoft Deployment Toolkit.
Install and run the Windows App Certification Kit.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Currently, the Consumer Preview and Windows Server 8 Beta are classified as "enterprise sideloading enabled." This means that when a PC is domain joined, it
can be configured to accept non-Windows Store apps from their IT admin. Moving forward, this functionality to install non-Windows Store Metro style apps will be
available for Windows 8.1 Enterprise Edition and Windows 8.1 Server editions.
On an enterprise sideloading enabled edition, the IT admins needs to verify:
The PC is domain joined.
The group policy is set to "Allow all trusted apps to install".
The app is signed by a CA that is trusted on the target PCs
Note: While the Windows Store will be a great way to deploy apps to business customers, there are apps that IT admins will want to distribute directly to the endusers. This option makes sense for custom and proprietary line-of-business (LOB) apps, or enterprise software purchased directly from an ISV.
QUESTION 109
You are troubleshooting a Windows 8.1 computer. The computer is not joined to a domain.
You are unable to change any of the advanced Internet options, which are shown in the Advanced Internet Options exhibit. (Click the Exhibit button.)
You need to ensure that you can change the advanced Internet options.
What should you do?
A.
B.
C.
D.
Use the Group Policy Object Editor.
Use the Internet Explorer Administration Kit (IEAK).
Run Internet Explorer and use the Settings charm to change options.
Run the iexplore -k command.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc731745.aspx
Open the Local Group Policy Editor
To open the Local Group Policy Editor from the command line Click Start , type gpedit.msc in the Start Search box, and then press ENTER .
http://technet.microsoft.com/en-us/library/gg699401.aspx
Group Policies in Internet Explorer 9
Group Policy provides a secure way to control Microsoft® Windows® Internet Explorer® 9 configurations.
Further Information:
http://msdn.microsoft.com/en-us/library/ie/hh826025%28v=vs.85%29.aspx IE Command-Line Options
-k Starts Internet Explorer in kiosk mode. The browser opens in a maximized window that does not dis- play the address bar, the navigation buttons, or the status
bar.
http://technet.microsoft.com/en-us/ie/bb219517.aspx
Internet Explorer Administration Kit (IEAK) Information and Downloads
The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment and management of customized Internet Explorer packages.
QUESTION 110
You administer Windows 8.1 Enterprise client computers in your company network.
You need to prevent users from installing applications published by a specific publisher in Windows Store.
Which type of AppLocker rule should you create?
A.
B.
C.
D.
Packaged app
Windows Installer
Executable
Script
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh831350.aspx
Packaged Apps and Packaged App Installer Rules in AppLocker
Commonly known as Windows apps, packaged apps can be installed through the Microsoft AppStore or can be side loaded using the Windows PowerShell cmdlets
if you have an Enterprise license. Packaged apps can be installed by a standard user unlike some desktop applications that sometimes require admin- istrative
privileges for installation. In this topic, desktop applications refer to Win32 apps that run on the classic user desktop.
In Windows Server 2012 and Windows 8, AppLocker enforces rules for packaged apps separately from desktop applications. A single AppLocker rule for a
packaged app can control both the installation and the running of an app. Because all packaged apps are signed, AppLocker supports only publisher rules for
packaged apps. A publisher rule for a packaged app is based on the following attributes of the app:
Publisher name
Package name
Package version
http://www.grouppolicy.biz/2012/08/how-manage-published-a-k-a-metro-apps-in-windows-8-using-group-policy/ How manage Published (a.k.a Metro) Apps in
Windows 8 using Group Policy
Windows 8 is coming REALLY SOON and of course one of the big new things to computer with that is the new (Metro) Packaged Apps that run in the start screen.
However these apps are very different and do not install like traditional apps to a path or have a true "executable" file to launch the program. Of course enterprises
need a way to control these packaged apps and therefore Microsoft has added a new feature Packaged Apps option to the AppLocker feature.
An administrator can use this feature to only allow certain apps to download from the Windows App Store and/or use it to control what inbuilt Packaged Apps are
allowed to run.
QUESTION 111
A company has an Active Directory Domain Services (AD DS) domain. All company employees work on their personally owned computers, which are not members
of the domain. The computers are running Windows XP Home, Windows Vista Business, Windows 7 Home Premium, or Windows 8.1. The company is a volume
license subscriber.
The company plans to deploy Group Policies to all computers.
You need to ensure that every employee's computer is subject to the Group Policies.
What should you do first?
A.
B.
C.
D.
Join all the computers to the same homegroup.
Start each computer from a USB flash drive on which you have installed Windows To Go.
Start each computer from a USB flash drive on which you have installed BitLocker To Go.
Join all the computers to the domain.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj592685.aspx#BKMK_wtggp Deployment Considerations for Windows To Go
From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB
drive. Given that Windows To Go was de- signed as an enterprise solution, extra consideration was given to the deployment workflows that enter- prises already
have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs.
Management of Windows To Go using Group Policy
In general, management of Windows To Go workspaces is same as that for desktop and laptop comput- ers. There are Windows To Go specific Group Policy
settings that should be considered as part of Windows To Go deployment. Windows To Go Group Policy settings are located at \\Computer Configura- tion
\Administrative Templates\Windows Components\Portable Operating System\ in the Local Group Pol- icy Editor.
The use of the Store on Windows To Go workspaces that are running Windows 8 can also be controlled by Group Policy. This policy setting is located at \
\Computer Configuration\Administrative Templates\Windows Components\Store\ in the Local Group Policy Editor.
QUESTION 112
A company has Windows 8.1 client computers. The company uses Windows BitLocker Drive Encryption and BitLocker Network Unlock on all client computers.
Your need to collect information about BitLocker Network Unlock status.
Which command should you run?
A.
B.
C.
D.
Run the BitLockerWizard command.
Run the bitsadmin command.
Run the manage-bde command.
Run the BdeHdCfg command.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj574173.aspx
BitLocker: How to enable Network Unlock
Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock enables
easier management for BitLocker enabled desk- tops and servers in a domain environment by providing automatic unlock of operating system volumes at system
reboot when connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware.
Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from
hibernation (for example, by Wake on LAN). This can make it difficult to enterprises to roll out software patches to unattended desktops and remotely adminis- tered
servers.
Network Unlock allows BitLocker-enabled systems with TPM+PIN and that meet the hardware require- ments to boot into Windows without user intervention.
Network Unlock works in a similar fashion to the TPM+StartupKey at boot. Rather than needing to read the StartupKey from USB media, however, the key for
Network Unlock is composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure
session.
....
Files to gather when troubleshooting BitLocker Network Unlock include:
1. The Windows event logs. Specifically the BitLocker event logs and the Microsoft-Windows-Deploy- ment-Services-Diagnostics-Debug log
..
2. The DHCP subnet configuration file (if one exists).
3. The output of the BitLocker status on the volume, this can be gathered into a text file using man- age-bde -status or Get-BitLockerVolume in Windows
PowerShell
4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address
Further Information:
There's no such thing as a BitLockerWizard command.
http://technet.microsoft.com/en-us/library/ff829850.aspx
Bdehdcfg
Prepares a hard drive with the partitions necessary for BitLocker Drive Encryption.
http://msdn.microsoft.com/en-us/library/aa362813%28v=vs.85%29.aspx BITSAdmin Tool
BITSAdmin is a command-line tool that you can use to create download or upload jobs and monitor their progress.
QUESTION 113
You connect a portable Windows 8.1 computer to a corporate network by using a VPN connection.
You are unable to access websites on the Internet only when you are using the VPN connection.
You need to ensure that you can access websites when connected to the corporate network.
What should you do?
A.
B.
C.
D.
E.
Configure the VPN connection to use only L2TP/IPSec.
In the TCP/IPv4 properties of the VPN connection, disable the Use default gateway on remote network setting.
Configure the VPN connection to use only PPTP.
In the TCP/IPv4 properties of the VPN connection, enable the Use default gateway on remote network setting.
In the TCP/IPv4 properties of the local area connection, disable the Automatic metric setting.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://support.microsoft.com/kb/317025
You Cannot Connect to the Internet After You Connect to a VPN Server
After you use a Virtual Private Network (VPN) connection to log on to a server that is running Routing and Remote Access, you may be unable to connect to the
Internet.
This issue may occur if you configure the VPN connection to use the default gateway on the remote net- work. This setting overrides the default gateway settings
that you specify in your Transmission Control Protocol/Internet Protocol (TCP/IP) settings.
To resolve this issue, configure the client computers to use the default gateway setting on the local net- work for Internet traffic and a static route on the remote
network for VPN-based traffic.
..
To disable the Use Default Gateway on Remote Network setting in the VPN dial-up connection item on the client computer:
Double-click My Computer, and then click the Network and Dial-up Connections link.
1.
Right-click the VPN connection that you want to change, and then click Properties.
2.
Click the Networking tab, click Internet Protocol (TCP/IP) in the Components checked are used by this 3.
connection list, and then click Properties.
Click Advanced, and then click to clear the Use default gateway on remote network check box.
4.
Click OK, click OK, and then click OK.
5.
...
Further information:
http://www.mydigitallife.info/disable-windows-tcpip-routing-automatic-metric-calculation-feature/ Disable Windows TCP/IP Routing Automatic Metric Calculation
Feature
TCP/IP, which Internet depending on, is a packet switching network that relies on routing to get data packets forward and transmit to the destination address.
Routing, or routeing, is a process of selecting paths in the network along intermediate nodes such as routers, bridges, gateways, firewalls, switches, or hubs, which
to send network traffic.
During routing, the selection of path is based on a routing metric, if there are more that one routes to the destination, such as in computers with multiple network
cards. Path selection selects or predicts the best and optimized route metric wihch is computed by a routing algorithm which takes into account information such as
bandwidth, network delay, hop count, path cost, load, MTU, reliability, and communication cost.
In Windows, metric calculation is automatically been done for each network interface or connection avail- able. In the automatic metric calculation does not result in
best network performance and routing cost, user can disable the automatic metric calculation feature and manually set a metric value.
QUESTION 114
You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and
Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer.
Your solution must ensure that the user can read the files on Server1.
What should you do?
http://www.gratisexam.com/
A.
B.
C.
D.
Create a new VPN connection. Disable local drive mappings.
Create a new VPN connection. Disable offline files.
Create a new Remote Desktop connection. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
Create a new Remote Desktop connection. Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc725887%28v=ws.10%29.aspx Device and Resource Redirection
Policy settings in this node control access to devices and resources on a client computer in Terminal Ser- vices sessions.
Do not allow drive redirection
This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Ser- vices session (drive redirection).
By default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My
Computer in the format <driveletter> on <computer- name>. You can use this policy setting to override this behavior. If you enable this policy setting, client drive
redirection is not allowed in Terminal Services sessions. If you disable this policy setting, client drive redirection is always allowed. If you do not configure this policy
setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal
Services Configu- ration tool.
QUESTION 115
A company has an Active Directory Domain Services (AD DS) domain. The company has 20 Windows 8.1 tablet PCs that are connected to the domain.
You need to configure an authentication method that simplifies the process of logging on to the tablet PCs and maximizes the security.
Which authentication method should you configure?
A.
B.
C.
D.
Active Directory user account
PIN
Picture password
Microsoft account
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/connect-microsoft-domain-account Connect your Microsoft account to your domain account
You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account
in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other
Microsoft account settings that you see on your home PC. You'll also be able to use Microsoft account services from your domain PC without signing in to them
individually.
Further Information:
http://windows.microsoft.com/en-gb/windows-8/join-or-create-a-workgroup Joining a domain, workgroup or homegroup
Applies to Windows 8.1, Windows RT 8.1
QUESTION 116
You install a new hard drive as drive D on a Windows 8.1 computer. The computer is shared by two users.
You need to prevent either user from using more than half the available space on drive D of the computer.
What should you do?
A. Reconfigure drive D and create two volumes of equal size.
B. Create a share for each user on drive D.
C. Configure quota management on drive D.
D. Configure Storage Spaces on drive D.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access- to-resources-14/
configure disk quotas
Disk quotas are set at disk level (not folder/files level) and take properties and go to the Quota tab.
By default it is disabled, you enable it by checking Enable quota management and then specify options such if it should only be warning/logging or an actual
consequence when you reach the quota such as checking Deny disk space to users exceeding quota limit.
Disk Quota is limited to only one per disk and one level for all users, running Windows Server 2012 you can set different limit per users.
QUESTION 117
A company has 10 Windows 8.1 (64-bit) client computers.
You plan to create backup resources to allow the recovery of Windows 8.1 on any of the client computers.
You need to ensure that you can recover the computers from bootable media.
What should you do?
A.
B.
C.
D.
E.
Turn on File History.
Create a new pool and storage space.
Run the Remove everything and install Windows feature.
Run the bcdboot command.
Run the recdisc command.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
A company has Windows 8.1 client computers. Employees use multiple Windows Store apps on the computers.
An employee installs a legacy app on his portable computer and then experiences problems with the computer. He installs two additional legacy apps and the
problems increase. You need to return the computer to its default state and retain all user data and Windows Store apps.
What should you do?
A.
B.
C.
D.
Run the Remove everything and install Windows feature.
Perform a system restore to the most recent restore point.
Use Windows 7 File Recovery to restore all Windows system files.
Run the Refresh your PC without affecting your files feature.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you think an app or driver that you recently installed caused problems with your PC, you can restore Windows back to an earlier point in time, called a restore
point. System Restore doesn't change your per- sonal files, but it might remove recently installed apps and drivers.
QUESTION 119
A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.)
A.
B.
C.
D.
E.
F.
Public Documents and Public Pictures
Contacts, Desktop, and Favorites
All system files
C:\Users and C:\ProgramData
My Documents and My Pictures
Desktop and Recycle Bin
Correct Answer: ABE
Section: (none)
Explanation
Explanation/Reference:
* File History has a predefined set of items that it backs up automatically: all your libraries (both default libraries and custom libraries you created), the Desktop, your
Contacts, Internet Explorer favorites and the SkyDrive.
* Library example:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It's a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of
Windows 7.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you
can add them to one of your existing libraries or create a new library.
http://www.dummies.com/how-to/content/back-up-your-computer-with-windows-8-file-history.html Back Up Your Computer with Windows 8 File History
..
File History backs up everything in your libraries: Documents, Music, Pictures, and Videos, as well as the Public folders. That's natural because that's where you
store your files.
...
Further Information:
Default settings:
QUESTION 120
You administer Windows 8.1 client computers in your company network. The company has an Active Directory Domain Services (AD DS) domain. The network
uses a DHCP server.
You want to assign a static dynamic host configuration protocol (DHCP) reservation for a client computer.
You need to identify the media access control (MAC) address of the client computer.
Which command should you use?
A.
B.
C.
D.
ipconfig /allcompartments /all
ipconfig /renew
ipconfig /all
ipconfig /flushdns
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Further Information:
http://technet.microsoft.com/en-us/library/dd197434.aspx
Ipconfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Pro- tocol (DHCP) and Domain Name System (DNS) settings.
Used without parameters, ipconfig displays In- ternet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask, and default gateway for all adapters.
Syntax
ipconfig [/allcompartments] [/all] [/renew [<Adapter>]] [/release [<Adapter>]] [/renew6[<Adapter>]] [/re- lease6 [<Adapter>]] [/flushdns] [/displaydns] [/registerdns] [/
showclassid <Adapter>] [/setclassid <Adapter> [<ClassID>]]
Parameters
/all
Displays the full TCP/IP configuration for all adapters. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as
dial-up connections.
/allcompartments
Displays the full TCP/IP configuration for all compartments.
/flushdns
Flushes and resets the contents of the DNS client resolver cache. During DNS troubleshooting, you can use this procedure to discard negative cache entries from
the cache, as well as any other entries that have been added dynamically.
/renew [<Adapter>]
Renews DHCP configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is available
only on computers with adapters that are configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when
you use ipconfig without parameters.
QUESTION 121
You administer Windows 8.1 laptops. The laptops are configured to connect to an unsecured wireless access point.
You plan to configure the wireless access point to encrypt wireless traffic and turn off SSID broadcast.
You need to ensure the laptops will join the secured wireless network automatically after the configuration changes.
What should you do?
A.
B.
C.
D.
Set Network Discovery to Enabled for the Public profile.
Create an ad hoc network.
Set the Unidentified Networks Properties User permissions to User can change location.
Create a network profile.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://www.eightforums.com/tutorials/37737-wireless-network-connect-disconnect-windows-8-a.html How to Connect To or Disconnect from a Wireless Network in
Windows 8 and 8.1
Connect To a Hidden Wireless Network in Networks (Connect To) ..
4. Click/tap on Hidden network at the bottom. (see screenshot below)
..
Further Information:
http://www.7tutorials.com/how-connect-hidden-wireless-networks-windows-8 How to Connect to Hidden Wireless Networks in Windows 8
http://blogs.technet.com/b/canitpro/archive/2014/03/05/windows-8-1-tips-manage-wireless-network-profiles.aspx Windows 8.1 tips: Managing Wireless Network
Profiles
QUESTION 122
You are working with a virtual machine (VM) named NYC-DC1 on a Windows 8.1 computer.
The status of NYC-DC1 in Hyper-V Manager is shown in the following graphic.
You plan to create a snapshot of NYC-DC1. You select the VM in Hyper-V Manager. The Snapshot option is not available in the Actions pane or in the context
menu.
You need to ensure that the Snapshot option is available.
What should you do?
A.
B.
C.
D.
E.
Resume the VM.
Specify a location in which Hyper-V Manager should save snapshot files.
Save the VM.
Connect to the VM.
Increase the Assigned Memory to at least 2048 MB.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.virtuatopia.com/index.php/Creating_and_Managing_Hyper-V_Snapshots Creating and Managing Hyper-V Snapshots
What is a Hyper-V Virtual Machine Snapshot?
yper-V virtual machine snapshots allow the status of a virtual machine (and the corresponding guest oper- ating system) at a particular time to be saved such that it
can be reverted to that state at any point in the future. Hyper-V snapshots contain both the configuration settings of the virtual machine, and the state of the guest
operating system at the point the snapshot is taken. Snapshots may be taken of virtual ma- chines when they are running, stopped or saved. It is not possible,
however, to take a snapshot of a paused Hyper-V virtual machine.
When a snapshot is taken of a saved or running virtual machine, the snapshot contains the status of both the file system and the memory used by the guest
operating system. As such, when the virtual machine is reverted to the snapshot everything, including applications running at the time the snapshot was taken, will
be restored to the snapshot status.
Virtual machines are reverted to a snapshot status by applying the desired snapshot to the virtual ma- chine.
QUESTION 123
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB)
Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?
A.
B.
C.
D.
Use a local account to log on to each computer.
Set the Turn off the Store application group policy to Enabled.
Activate the sideloading product key on each computer.
Set the Allow Store to install apps on Windows To Go workspaces group policy setting to Enabled.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://msdn.microsoft.com/en-us/library/windows/apps/jj657971.aspx Deploying enterprise apps
Preparing your PCs
Windows Server 2012 and Windows 8 Enterprise editions are classified as "enterprise sideloading en- abled." This means that the PCs are ready to receive the
apps that you deploy outside of the Windows Store. To make sure a PC is ready, verify that:
The PC is domain joined.
The group policy is set to Allow trusted apps to install.
If you are deploying apps to Windows 8 Pro, Windows RT, or Windows 8 Enterprise, you can configure them for sideloading apps by:
Activating the product key for enterprise sideloading on each PC.
Setting the group policy to Allow trusted apps to install.
Further Information:
http://technet.microsoft.com/en-US/windows/jj874388.aspx
Try It Out: Sideload Windows Store Apps
By now, you are familiar with Windows Store apps. There are some pretty cool ones available in the store, and publishers are adding more every week. A great
thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish
them through the Windows Store since that would make them publically available. Instead, you can sideload LOB apps. Sideloading simply means installing a
Windows Store app without publishing it in and downloading it from the store. You install it directly.
...
Verify the Requirements
There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8
Enterprise:
The computer running Windows 8 Enterprise must be joined to the domain. You must enable the "Allow all trusted apps to install" Group Policy setting. The app
must be signed by a \ certificate that is chained to a trusted root certificate. In many cases, the only thing you will have to do is enable the policy setting. Your
computers running Windows 8 Enterprise are already joined to the domain, and your developers will sign the app.
...
Sideload the App for a User
As promised when we started this article, sideloading the sample app is no more difficult than running a few commands in Windows PowerShell. In fact, the first
command should not really count, as it just im- ports the AppX module into Windows PowerShell.
...
Sideload the App for All Users
DISM is a command-line tool that you can use to service a Windows image -- online or offline. You can use DISM to provision a Windows Store app in an online
Windows image for all users who share the computer. To do that, you use the Add-ProvisionedAppxPackage option.
...
Use a Sideloading Product Key
Earlier in this article, we listed the requirements for sideloading Windows Store apps. The computer must be running Windows 8 Enterprise. It must be joined to the
domain, and you must enable the policy setting "Allow all trusted apps to install." This is great if in a typical enterprise scenario where you use the Enter- prise
editions and join computers to the domain. What about increasingly common Bring Your Own De- vice (BYOD) scenarios, where Windows RT devices and
computers running Windows 8 Pro are more common; and devices are not always joined to the domain?
Easy.
You can enable sideloading for these additional scenarios by installing a sideloading product key on the computers.
...
Conclusion
We hope that experiencing how to sideload Windows Store apps firsthand showed you how simple the process really is. You enable sideloading on computers
running Windows 8 Enterprise by simply joining them to the domain and enabling the "Allow all trusted apps to install" policy setting. You can enable app
sideloading in the scenarios that Table 1 describes by using a sideloading product key. To sideload an app for an individual user, you use the add-appxpackage
cmdlet in Windows PowerShell, and to provision an app for all users, you use the Add-ProvisionedAppxPackage DISM option.
Figure 3. Sideloading Requirements
http://blogs.msdn.com/b/hyperyash/archive/2012/08/15/enabling-windows-store-on-windows-to-go-machines.aspx Enabling Windows Store on Windows To Go
machines
Windows To Go is a new feature that is introduced in Windows 8 Enterprise version. It enables users to boot directly into an enterprise level Operating System from
their external hard-drives. Windows To Go is not intended to replace desktops, laptops or supplant other mobility offerings. Rather, it provides support for efficient
use of resources for alternative workplace scenarios. One of the restrictions that is applied to Windows To Go machines is that the Windows Store is disabled by
default. .. But, it is not that you cannot enable it at all. It is possible, and you do it via the group policies. This can be through the Active Directory Group Policy (true
for enterprise environments); or through local group policies (true for small environments).
http://newsignature.com/blog/2013/01/17/disabling-the-windows-8-app-store/ Disabling the Windows 8 App store
Once the Group Policy is applied to a workstation, then a user will see the following message if they try to access the App store:
QUESTION 124
A company has 10 client computers that run Windows 7. All client computers have the same hardware configuration. The hardware configuration includes custom
hardware components manufactured by the company.
The computer hard drives are configured as shown in the Disk Management window exhibit.
(Click the Exhibit button.)
The company plans to upgrade the client computers to Windows 8.1.
You need to test hardware compatibility with Windows 8.1 on one client computer and leave the existing Windows 7 installation intact.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Insert the Windows 8.1 installation media into the computer, and then run the Setup program.
Shrink the current hard drive partition, and then create a new partition for the Windows 8.1 installation.
Change the hard drive to a dynamic disk and create a new dynamic volume.
Start the computer from the Windows 8.1 installation media and then select the Custom installation option.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows/install-multiple-operating-system-multiboot#1TC=windows-7 Install more than one operating system (multiboot)
If your computer's hard disk has adequate free disk space, you can install a newer version of Windows on a separate partition and keep the earlier version of
Windows on your computer. This is called a multiboot or dual-boot configuration. Whenever you start your computer, you can then choose which version of
Windows to run.
Multibooting requires separate partitions on your computer's hard disk for each operating system.
Example of a multiboot disk configuration
Further Information:
http://www.pcmag.com/article2/0,2817,2425418,00.asp
How to Dual Boot Windows 8.1 and Windows 7
..
Step 2: Partition
You'll have to create a partition of at least 16GB (20GB for 64-bit Windows 8.1) for your side-by-side Windows 8.1 and 7 installation. To do this, type "disk
management" in the Start button's text box, which will display a "Create and format hard disk partitions" choice at the top of the Start panel. Click on that to open the
Disk Management utility. You'll probably have two partitions. Right-click on the largest one, and choose Shrink Volume from the context menu.
A "Querying Shrink Space" dialog will appear for a while, and then another message will tell you how much free space can be squeezed out of the drive in MB.
Enter a size above 16GB for the 32-bit version of Windows 8.1 and over 20GB for the 64-bit flavor, and then hit the Shrink button. This will create an Un- allocated
section equal to the size you chose in the chart at the bottom of the window. Leave it be for now, we'll let the Windows 8.1 installer take over from here.
...
Step 4: Run the Windows 8.1 Installer
Pop in the installer DVD you burned or the USB stick you prepared, and restart your PC. Choose your language, then "Install Now." You'll need a product key that
matches your installer ISO. For the Windows 8.1 Preview installer, for example, the key is NTTX3-RV7VB-T7X7F-WQYYY-9Y92F. Accept the software license, and
after this, choose Custom, not Upgrade. Now is when you're presented with the choice of partitions, click "Drive options (advanced)" and then select the Unallocated
space we created in step 2. Next, click New from the drive options icons below. Accept the full size displayed, and hit Apply.
Now we've got a freshly formatted partition to install Windows 8 on.
QUESTION 125
You administer Windows 8.1 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting File System (EFS).
A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2.
What should you do?
A. Configure Advanced Security Settings.
B. Share the folder that contains file.txt.
C. Configure Advanced Attributes.
D. Configure Effective Access.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Further Information:
http://www.howtogeek.com/178912/how-to-encrypt-files-and-folders-in-windows-8.1-using-efs/ How to Encrypt Files and Folders in Windows 8.1 Pro Using EFS
If you are concerned about other users of your system having access to your files, there has been a sim- ple way to encrypt files and folders in every version of
Windows since XP called Encrypted File Service (EFS). We will show you how to apply EFS to your files and folders.
NOTE: Files and folders you encrypt using EFS can only be decrypted using the Windows login that en- crypted the file. Other users on the system will be able to
see the files but will not be able to open them, even if they are running as administrator. That means that you also need to be careful you do not forget your login, or
you will be locked out of your own files.
http://technet.microsoft.com/en-us/library/bb457007.aspx
How to Share Files Using Encrypting File System
This article describes how to share files using EFS, and is intended to assist system architects and ad- ministrators in developing best practices for creating data
recovery and data protection strategies using Windows XP.
..
In Windows XP, EFS supports file sharing between multiple users on a single file. This provides an oppor- tunity for data recovery by adding additional users to an
encrypted file. Although the use of additional users cannot be enforced through policy or other means, it is a useful and easy method for enabling re- covery of
encrypted files by multiple users without actually using groups, and without sharing private keys between users.
Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before
additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Indi- vidual users
may add other users (not groups) from the local machine or from the Active Directory, pro- vided the user has a valid certificate for EFS.
..
To add users
1. Click the Add button as shown in Figure 2 below.
Figure 2. Adding users
A new dialog box will be presented showing the existing users and certificates that are cached in the "Other People" certificate store of the local machine. It will also
allow new users to be added from the Active Directory by clicking the Find User button.
Note A user must have a valid EFS certificate in the Active Directory to be added.
2. Click the Find User button to find new users as shown in Figure 3 below.
Figure 3. Finding new users from Active Directory
The standard object picker dialog box will be displayed and a search will be conducted.
QUESTION 126
You use a Windows 8.1 laptop.
You want to back up the Pictures library.
You need to configure a backup strategy that backs up the Pictures library to a network drive every day. Additionally, you need to be able to recover a copy of any
files from the library that have been changed within the last month.
What should you do?
A.
B.
C.
D.
Create a system image.
Configure File History.
Create a Storage Pool.
Configure computer restore points.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
...
As described above, to start protecting your libraries, you need to attach an external drive or select a net- work location. File History will store versions of your files
on this device.
...
Further Information:
QUESTION 127
A company has client Windows Vista and Windows 8.1.
You need to ensure that the client computers can share local resources.
Which two actions should you perform on the client computers? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
E.
Disable IPv6.
Enable network discovery.
Configure IPSec.
Enable IPv6.
Configure the Windows Firewall.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
By changing your network location to Home or Work, network discovery is automatically turned on . You can also turn on these sharing options individually:
Network discovery
File sharing (in Windows 7, this is automatically turned on when you share a file or folder)
Public folder sharing
When you turn on these options, your computer can:
Find other computers and devices on your home network and have other computers find your computer
Share its files and folders
Share its Public folders
http://windows.microsoft.com/en-us/windows/what-is-network-discovery#1TC=windows-vista What is network discovery?
Network discovery is a network setting that affects whether your computer can see (find) other computers and devices on the network and whether other computers
on the network can see your computer.
There are three network discovery states:
On - This state allows your computer to see other network computers and devices and allows people on other network computers to see your computer. This
makes it easier to share files and printers. Off - This state prevents your computer from seeing other network computers and devices and prevents people on other
network computers from seeing your computer. Custom - This is a mixed state in which some settings related to network discovery are enabled, but not all of them.
For example, network discovery could be turned on, but you or your system administrator might have disabled a firewall exception that affects network discovery.
Network discovery requires that the dnscache, fdrespub, ssdpsrv, and upnphost services are started, that the Windows Firewall exception for network discovery is
enabled, and that other firewalls are not interfer- ing with network discovery.
Further Information:
http://www.dummies.com/how-to/content/how-to-browse-for-a-network-in-windows-81.html How to Browse for a Network in Windows 8.1
..
3. If you see the message Network discovery and file sharing are turned off. Network computers and de- vices are not visible. Click to change... just below the
ribbon, select that message. Then select Turn On Network Discovery and File Sharing on the pop-up menu. This option enables your computer to find other
computers and to be found by others.
...
http://windowsitpro.com/windows-81/turning-device-discovery-windows-81 Turning on Device Discovery for Windows 8.1
Some of you may be used to being able to locate other PCs and devices connected to the network through Windows. By default, this function is turned off in
Windows 8.1 to ensure security and privacy.
However, it can be a pain to locate.
...
5. Turn on the Find devices and content selection.
QUESTION 128
You administer Windows 8.1 client computers in your company network. The company has an Active Directory Domain Services (AD DS) domain named
contoso.com. The domain contains a domain controller configured to lease DHCP and DHCPv6 addresses.
A client computer named Computer1 is configured to obtain IPv4 and IPv6 addresses automatically.
A user reports that an IPv6-enabled application named App1 is not working on Computer1.
You discover that Computer1 has an IPv6 address prefix of FE80::. You are able to ping Computer1 successfully by using IPv4, but when you use IPv6, your ping
requests time out.
You need to ensure that Computer1 will support Appl.
Which command should you use?
A.
B.
C.
D.
jpconfig /allcompartments /all
jpconfig /renew
jpconfig /renew6
jpconfig /release6
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://en.wikipedia.org/wiki/Link-local_address
Link-local address
In a computer network, a link-local address is a network address that is valid only for communications within the network segment (link) or the broadcast domain
that the host is connected to. Link-local addresses are usually not guaranteed to be unique beyond a single network segment. Routers therefore do not forward
packets with link-local addresses.
Link-local addresses for IPv4 are defined in the address block 169.254.0.0/16, in CIDR notation. In IPv6, they are assigned with the FE80::/10 prefix.
http://technet.microsoft.com/en-us/library/dd197434.aspx
Ipconfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Pro- tocol (DHCP) and Domain Name System (DNS) settings.
Used without parameters, ipconfig displays In- ternet Protocol version 4 (IPv4) and IPv6 addresses, subnet mask, and default gateway for all adapters.
Syntax
ipconfig [/allcompartments] [/all] [/renew [<Adapter>]] [/release [<Adapter>]] [/renew6[<Adapter>]] [/re- lease6 [<Adapter>]] [/flushdns] [/displaydns] [/registerdns] [/
showclassid <Adapter>] [/setclassid <Adapter> [<ClassID>]]
Parameters
/allcompartments
Displays the full TCP/IP configuration for all compartments.
/renew [<Adapter>]
Renews DHCP configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is available
only on computers with adapters that are configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when
you use ipconfig without parameters.
/renew6 [<Adapter>]
Renews DHCPv6 configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is
available only on computers with adapters that are configured to obtain an IPv6 address automatically. To specify an adapter name, type the adapter name that
appears when you use ipconfig without parameters.
/release6[<Adapter>]
Sends a DHCPRELEASE message to the DHCPv6 server to release the current DHCP configuration and discard the IPv6 address configuration for either all
adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter disables TCP/IP for adapters configured to
obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters.
QUESTION 129
You administer Windows 8.1 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the
configuration settings into a Group Policy object later.
What should you do?
A.
B.
C.
D.
Run the netshadvfirewall export c:\settings.xml command.
Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and then select the Export Policy action.
Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action.
From Control Panel, open Windows Firewall, click Advanced Settings, and then select the Export Policy action.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
The export netsh file format is wfw, not .xml .
Also, the export works just fine from the "Advanced Settings", which actually launches the full fledged Windows Firewall with Advanced Security:
Explanation:
http://www.howtogeek.com/100409/group-policy-geek-how-to-control-the-windows-firewall-with-a-gpo/ Group Policy Geek: How to Control the Windows Firewall
With a GPO
...
Exporting the Policy
To export the policy, in the left hand pane click on the root of the tree which says Windows Firewall with Advanced Security. Then click on Action and select Export
Policy from the Menu
You should save this to either a network share, or even a USB if you have physical access to your server.
We will go with a network share.
Importing the Policy Into Group Policy
....
To import the firewall policy you need to open an existing GPO or create a new GPO and link it to an OU that contains computer accounts
..
Now navigate to:
Open Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Ad- vanced Security
Click on Windows Firewall with Advanced Security and then click on Action and Import Policy
You will be told that if you import the policy it will overwrite all existing settings, click yes to continue and then browse for the policy that you exported in the previous
section of this article. Once the policy has fin- ished being Imported you will be notified.
...
Further Information:
http://technet.microsoft.com/en-us/library/cc771920%28v=ws.10%29.aspx Netsh Commands for Windows Firewall with Advanced Security
Netsh advfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows
Firewall and IPsec settings and provides an alterna- tive to console-based management.
..
To start the advfirewall context at an elevated command prompt, type netsh, press ENTER, then type ad- vfirewall and press ENTER.
..
export
Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the
Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer. The Windows Firewall with Advanced Se- curity
configuration on which the export command works is determined by the set store command. This command is the equivalent to the Export Policy command in the
Windows Firewall with Advanced Secu- rity MMC snap-in.
Syntax
export [ Path ] FileName
Parameters
[ Path ] FileName
Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configura- tion will be written. If the path, file name, or both contain
spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name ex- tension
is .wfw.
QUESTION 130
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain.
An employee is unable to connect his portable client computer to his home office homegroup.
You need to ensure that the network adapter settings of the client computer support joining a homegroup.
What should you do?
A.
B.
C.
D.
Disable IPv6.
Enable IPv4.
Enable IPv6.
Disable IPv4.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/4515.homegroup-and-ipv6-troubleshooting-guide.aspx HomeGroup and IPv6 Troubleshooting Guide
..
Your router and all computers must be IPv6 capable (hardware, firmware, and drivers) to use Home- Group.
...
Further Information:
http://blogs.technet.com/b/askpfeplat/archive/2013/06/17/ipv6-for-the-windows-administrator-why-you-need-to- care-about-ipv6.aspx
IPv6 for the Windows Administrator: Why you need to care about IPv6 ...
Moreover, applications that you might not think are using IPv6--such as Remote Assistance, Home- Group, DirectAccess, and Windows Mail--could be.
...
QUESTION 131
You administer a Windows 8.1 Pro computer. The computer has File History turned on, and system protection turned on for drive C.
You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut.
You need to restore the most recent version of the folder to its original location.
Which approach should you use to restore the folder?
A.
B.
C.
D.
Recycle Bin
The latest restore point
File History
A manually selected restore point
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It's a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of
Windows 7.
Before you start using File History to back up your files, you'll need to set up a drive to save files to. We recommend that you use an external drive or network
location to help protect your files against a crash or other PC problem.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you
can add them to one of your existing libraries or create a new library.
Advanced settings can be accessed from the File History control panel applet.
File History also supports new storage features introduced in Windows 8. Users who have lots of data to back up can use Storage Spaces to create a resilient
storage pool using off-the-shelf USB drives. When the pool fills up, they can easily add more drives and extra storage capacity to the pool.
QUESTION 132
You use a computer that has Windows 7 Professional (32-bit) installed.
You need to migrate the computer to Windows 8.1 Pro (64-bit).
Which installation method should you use?
A.
B.
C.
D.
Download and run Windows 7 Upgrade Advisor.
Download and run Windows 8.1 Upgrade Assistant.
Start Windows 8.1 custom installation from a DVD.
Open Windows Anytime Upgrade.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/upgrade-to-windows-8 Update to Windows 8.1: FAQ
Can I update from a 32-bit version of Windows to a 64-bit version of Windows 8.1? If your PC has a 64-bit capable processor (CPU) but is currently running a 32-bit
version of Windows, you can install a 64-bit version of Windows 8.1, but you'll need to buy it as a DVD and perform a clean instal- lation. You won't be able to keep
any files, settings, or apps when you update from a 32-bit to a 64-bit ver- sion.
QUESTION 133
A company has Windows 8.1 client computers. All user data is stored locally. Each data file has a system access control list (SACL).
You need to ensure that an event is generated when a user modifies a local file.
Which audit policy setting should you configure?
A.
B.
C.
D.
Audit process tracking
Audit policy change
Audit object access
Audit privilege use
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc776774%28v=ws.10%29.aspx Audit object access
This security setting determines whether to audit the event of a user accessing an object--for example, a file, folder, registry key, printer, and so forth--that has its
own system access control list (SACL) specified.
If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry
when a user successfully accesses an object that has an appropriate SACL specified. Failure audits generate an audit entry when a user unsuccess- fully attempts
to access an object that has a SACL specified.
Further Information:
https://blogs.manageengine.com/product-blog/eventloganalyzer/2012/06/20/object-access-auditing-simplified-find- the-who-what-where-when-of-file-folderaccess.html
Object Access Auditing Simplified Find the `Who, What, Where, When' of File & Folder Access
QUESTION 134
A company has Windows 8.1 client computers. A client computer named COMPUTER1 has a shared folder named Computer1 located in the user's Downloads
folder. Computer1 is shared only with employees in the Marketing department. All Marketing employees can connect to Computer1 from their client computers.
A Marketing employee is unable to connect to Computer1 from a legacy device that is not compatible with the Windows 8.1 default sharing settings. The device is
able to connect to resources on other client computers.
You need to configure COMPUTER1 to allow the device to connect to Computer1.
Which setting should you enable?
A.
B.
C.
D.
E.
Turn off network discovery
Use 128-bit encryption to help protect file sharing connections
Turn on sharing so anyone with network access can read and write files in the Public folders
Enable file sharing for devices that use 40- or 56-bit encryption
Turn off password protected sharing
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.eightforums.com/tutorials/9925-file-sharing-connections-encryption-change-settings-windows-8-a.html How to Change File Sharing Connections
Encryption Settings in Windows 8 and 8.1
Windows 8 uses 128-bit encryption to help protect file sharing connections. Some devices don't support 128-bit encryption and must use 40- or 56-bit encryption.
QUESTION 135
You administer Windows 8.1 computers in your company network.
Music files with the MP3 extension are opening in the Music Windows Store app.
You need to ensure that MP3 files always open in the Windows Media Player desktop application.
What should you do?
A. From Control Panel, open Default Programs, open Set your default programs, and then in associations for Music, clear the .mp3 selection.
B. From Windows Media Player, select Options, and then on the Player tab, select the Add local media files to library when played option.
C. Right-click an MP3 file, select Open With, choose default program, and then select Windows Media Player with the use this app for all .MP3 files option
selected.
D. From Control Panel, open Default Programs, open Change AutoPlay setting, and then select the Play (Windows Media Player) setting for Music.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The default program for mp3 files is the Music metro app. You can even notice the icon for the mp3 file:
But you can change the default file association:
And notice at once the different file icon:
Further Information:
http://anewdomain.net/2013/07/29/how-to-change-file-associations-in-windows-8-open-files-dirct-from-desktop- easy/
How to Change File Associations in Windows 8.1, Open Files From the Desktop
http://blogs.technet.com/b/mniehaus/archive/2014/01/10/configuring-file-associations-in-windows-8-1.aspx Configuring file associations in Windows 8.1
QUESTION 136
A Windows 8.1 computer hosts multiple virtual machines. The computer contains one hard drive with two partitions.
You need to configure a new virtual machine to use the second physical partition of the host computer as the primary boot device.
What kind of virtual hard disk should you use?
A.
B.
C.
D.
Pass-through
Fixed-size
Differencing
Dynamic
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windowsitpro.com/virtualization/hyper-v-disk-configuration-options Hyper-V Disk Configuration Options
..
VHDs: Fixed, Dynamic, Differencing
By default, new VMs are created with an attached VHD. These disks represent Microsoft's open format for virtual disks, and they have some very useful benefits.
..
Another important consideration with Hyper-V disks is managing storage capacity. Hyper-V has three op- tions for creating new VHDs: fixed size, dynamically
expanding, and differencing. As you can probably guess, fixed-size VHDs provision the entire disk size as the disk is created. Dynamically expanding disks
consume only as much space as is actually used by data on the disk.
..
Differencing VHDs let you link multiple VHDs to one another.
..
Pass-Through Disks
Yet another type of disk, called a pass-through disk, isn't a VHD at all. These disks are created by attach- ing a disk volume to a Hyper-V host, typically through
either an iSCSI or Fibre Channel connection. After the disk volume is attached to the Hyper-V host, the disk is then passed through to an awaiting VM-- hence the
name.
Further Information:
http://blogs.technet.com/b/askcore/archive/2008/10/24/configuring-pass-through-disks-in-hyper-v.aspx Configuring Pass-through Disks in Hyper-V
QUESTION 137
You attach an external drive to a Windows 8.1 computer.
You need to ensure that scheduled defragmentation does not run on the external drive.
What should you do?
A.
B.
C.
D.
Disable write caching on the external drive.
Run the defrag command and configure the schedule settings.
Run the diskpart command and select the external drive.
Configure the Optimize Drives setting to exclude the external drive.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.eightforums.com/tutorials/8616-optimize-drives-schedule-change-windows-8-a.html How to Change "Optimize Drives" Schedule Settings in Windows 8
and 8.1
Optimize Drives, previously called Disk Defragmenter, helps to optimize the different types of drives that PCs use today. No matter which type of drive your PC
uses, Windows automatically chooses the opti- mization that's right for your drive.
By default, Optimize Drives runs automatically on a weekly schedule during the time you have set for au- tomatic maintenance. But you can also optimize drives on
your PC manually.
..
3. To Turn Off Scheduled Optimization of All Drives in Windows 8
A) Under Scheduled optimization, click/tap on the Change Settings button. (see screenshot below)
B) If prompted by UAC, then click/tap on Yes.
C) Uncheck the Run on a schedule box, and click/tap on OK. (see screenshot below)
QUESTION 138
You administer Windows RT tablets in your company network. All users in the company have Microsoft Exchange Server 2010 mailboxes and access them by
using Outlook Web Access or Outlook 2010. All tablets are registered on the Microsoft Exchange server as mobile devices.
A user informs you that he has lost his tablet. The user is able to connect to the company network from his home computer.
You need to delete Microsoft Exchange information from the lost tablet.
Which application should you use?
A.
B.
C.
D.
Outlook 2010
Outlook Web Access
Active Directory Users and Computers
Routing and Remote Access Server
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://office.microsoft.com/en-us/outlook-help/delete-all-information-from-your-lost-phone-or-tablet- HA102834573.aspx
Delete all information from your lost phone or tablet
If you use your phone or tablet to access your mailbox, your phone or tablet likely stores a lot of sensitive information, such as personal identification or confidential
communications.
If you lose your phone, you should immediately remove all information from the phone. You can do that from your mailbox by using a process called remote device
wipe.
Important
You can only clear the data from a device if it was set up to use Exchange ActiveSync. If you're not sure whether your phone was set up to use Exchange
ActiveSync, you can simply try the procedure below and find out. For more information, see "What else do I need to know?" later in this topic.
Remove all data from your phone or tablet
Sign in to your account using Outlook Web App. For help signing in to your account, see Sign in to 1.
Outlook Web App.
In Outlook Web App, on the toolbar, click Settings GearIcon > Options < phone < mobile devices.
2.
Select the phone or tablet that you want to wipe.
3.
Click Wipe Device.
4.
Click OK.
5.
Click Remove Phone from List.
6.
Further Information:
http://oxfordsbsguy.com/2014/05/19/how-to-remote-wipe-a-mobile-phone-using-outlook-web-access/ How to remote wipe a mobile phone using Outlook Web
Access
In this post I walk through how to remote wipe your mobile phone using Microsoft Outlook Web Access. This can be useful if you have lost your phone or it had it
stolen, or if you have just replaced it with a new one.
..
Highlight the device you want to wipe (it is quite possible you have a number of devices here if you have had several company phones). You can check the last sync
date, or highlight the phone and click the De- tails button for further information on the phone. Next click Wipe Device.
Click Yes at the "Are you sure you want to wipe your device?" prompt.
Once your phone is wiped you can highlight it and click the Delete button, to remove it from your account.
QUESTION 139
Two Windows 8.1 computers named COMPUTER1 and COMPUTER2.
You connect from COMPUTER1 to COMPUTER2 by using Remote Desktop. You are unable to copy any files between COMPUTER1 and COMPUTER2 during the
Remote Desktop session.
You need to ensure that you can copy files between the computers during the Remote Desktop session.
What should you do?
A.
B.
C.
D.
On COMPUTER1, open Remote Desktop Connection and configure the Local devices and resources settings.
On COMPUTER2, add COMPUTER1 to the trusted hosts in Windows Remote Management (WinRM).
On COMPUTER2, open Remote Desktop Connection and configure the Local devices and resources settings.
On COMPUTER1, add COMPUTER2 to the trusted hosts in Windows Remote Management (WinRM).
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc770631.aspx
Make Local Devices and Resources Available in a Remote Session
Remote Desktop Services provides users the ability to access their local devices and resources in remote sessions. Users can access resources such as local
drives, printers, the Clipboard, and supported Plug and Play devices. This is usually referred to as redirection.
http://windows.microsoft.com/en-us/windows7/how-can-i-use-my-devices-and-resources-in-a-remote-desktop- session
How can I use my devices and resources in a Remote Desktop session?
Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect
most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital
cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
Further Information:
http://www.technicaloverload.com/access-local-drives-over-remote-desktop-connection/ Access Local Drives over Remote Desktop Connection
It's possible to access your local drives over a Remote Desktop Connection by enabling a setting which is disabled by default. First open the RDC client and click
the Show Options button at the bottom. Go to the Local Resources tab and then the More... button in the Local devices and resources section:
In the local devices and resources window, expand the Drives tree and select the local drives you would like to have access to.
Now you can open a connection and access the drive like any other. Below is a screenshot of a local drive labeled C on `Computer Name' in Windows Explorer.
QUESTION 140
You administer Windows 8.1 Pro computers in your company network. All computers are members of an Active Directory Domain Services (AD DS) domain.
A server named Server1 runs Windows Server 2012 and has an IP address of 10.10.10.20. Server1 is configured to use port 10987 for Remote Desktop
connections.
From your Windows 8.1 computer, you need to create a Remote Desktop connection to Server1.
What should you do?
A.
B.
C.
D.
From the General tab of your Remote Desktop connection, enter 10.10.10.20 port: 10987.
Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the server authentication field.
Run mstsc.exe /v:10.10.10.20:10987.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows/command-line-parameters-remote-desktop- connection#1TC=windows-7
Use command line parameters with Remote Desktop Connection
Syntax
mstsc [<connection file>] [/v:<server[:port]>] [/admin] [/f[ullscreen]] [/w:<width>] [/h:<height>] [/public] | [/span] [/edit "connection file"] [/migrate] [/?]
Command line parameters for Remote Desktop Connection
/v:<server[:port]>
Specifies the remote computer that you want to connect to.
....
QUESTION 141
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All client computers are
shared. Employees can log on to any client computer by using individual accounts.
The company implements a new security policy.
You have the following requirements:
Ensure that each employee can log on to all computers by using his or her account.
Ensure that employees can reset their credentials from any client computer.
You need to choose authentication methods that meet the requirements.
Which two authentication methods meet the requirements? (Each correct answer presents a complete solution. Choose two.)
A.
B.
C.
D.
E.
Active Directory user account
Local user account
Microsoft account
Pin
Picture password
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/connect-microsoft-domain-account Connect your Microsoft account to your domain account
You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account
in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other
Microsoft account settings that you see on your home PC. You'll also be able to use Microsoft account services from your domain PC without signing in to them
individually.
QUESTION 142
A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.)
A.
B.
C.
D.
%appdata%
Public Documents and Public Pictures
My Documents and My Pictures
Contacts, Desktop, and Favorites
E. C:\Program Files
F. All user profile folders
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It's a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of
Windows 7.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you
can add them to one of your existing libraries or create a new library.
http://www.dummies.com/how-to/content/back-up-your-computer-with-windows-8-file-history.html Back Up Your Computer with Windows 8 File History
..
File History backs up everything in your libraries: Documents, Music, Pictures, and Videos, as well as the Public folders. That's natural because that's where you
store your files.
...
Further Information:
Default settings:
QUESTION 143
You use a Window 8.1 tablet. The tablet receives Windows Update updates automatically from the Internet. The tablet has Wi-Fi and is connected to a 3G mobile
broadband Wi-Fi hot spot.
You need to minimize data usage while connected to this hot spot.
What should you do?
A. Edit the Inbound Rule of Windows Firewall, and then disable Internet Control Message Protocol (ICMP) traffic.
B.
C.
D.
E.
Configure the broadband connection as a metered network.
Configure the interface metric of IP settings for Wi-Fi connection as 1.
Turn on Airplane Mode.
Disable File and Print Sharing for mobile broadband connections.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/metered-internet-connections-frequently-asked-questions Metered Internet connections: FAQ
..
If you have a metered Internet connection, setting your network connection to metered in Windows can help you reduce the amount of data you send and receive.
..
Note: Ethernet network connections can't be set to metered.
..
How does setting my network connection to metered affect my PC?
Any app that relies on an Internet connection to update or display info might be limited in the amount of data it can download or display. You might notice these and
other effects:
Windows Update will only download priority updates.
Apps downloading from the Windows Store might be paused.
Start screen tiles might stop updating.
Offline files might not sync automatically.
QUESTION 144
A company has Windows 8.1 client computers.
You are designing a remote management solution. IIS is installed on some remote computers and configured to use port 80 and port 443.
You have the following requirements:
Ensure that you can perform most of the same tasks through the remote management solution that you can while working directly on the remote computer.
Ensure that the solution can operate on port 80 and on port 443.
You need to choose the remote management tool to meet the requirements.
Which remote management tool should you choose?
A. Windows Remote Shell (WinRS)
B. Remote Desktop Connection (RDC)
C. Network Shell (netsh)
D. Windows Management Instrumentation (WMI)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.technet.com/b/jonjor/archive/2009/01/09/winrm-windows-remote-management-troubleshooting.aspx WinRM (Windows Remote Management)
Troubleshooting
What is WinRM?
New in Windows Vista, Windows Server 2003 R2, Windows Server 2008 (and Server 2008 Core) are WinRM & WinRS. Windows Remote Management (known as
WinRM) is a handy new remote manage- ment service. WinRM is the "server" component of this remote management application and WinRS (Windows Remote
Shell) is the "client" for WinRM, which runs on the remote computer attempting to re- motely manage the WinRM server. However, I should note that BOTH
computers must have WinRM in- stalled and enabled on them for WinRS to work and retrieve information from the remote system. While WinRM listens on port 80
by default, it doesn't mean traffic is unencrypted. Traffic by default is only accepted by WinRM when it is encrypted using the Negotiate or Kerberos SSP. WinRM
uses HTTP (TCP
80) or HTTPS (TCP 443). WinRM also includes helper code that lets the WinRM listener to share port 80 with IIS or any other application that may need to use that
port.
What is WinRS?
Remote Shell, (WinRS) is used to execute a program on a remote host.
QUESTION 145
You add three hard drives to a Windows 8.1 computer. The computer has a RAID controller.
You plan to store data only on the three new hard drives.
You need to ensure that data loss will not occur if only one hard drive fails.
What should you do?
A.
B.
C.
D.
Create a storage pool that contains all drives and set the resiliency type to Parity.
Create a storage pool that contains one drive, and then add the other two drives drive to the pool.
Create a spanned volume.
Create a storage pool that contains all drives and set the resiliency type to Two-way mirror.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools Storage Spaces: FAQ
What is Storage Spaces?
Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to cre- ate storage spaces.
Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it's easy to work with files on them.
You can create large storage spaces and add more drives to them when you run low on pool capacity. If you have two or more drives in the storage pool, you can
create storage spaces that won't be affected by a drive failure--or even the failure of two drives, if you create a three-way mirror storage space.
http://blogs.msdn.com/b/olivnie/archive/2013/02/05/windows-8-storage.aspx Windows 8: Storage
Storage Spaces
Storage Spaces is a new feature for Windows® 8 that allows a user to combine several disks into a single pool of storage that provides for easier management of
multiple disks and resiliency against hardware fail- ure on any of those disks. The disks that you use for Storage Spaces can be a mix of different-sized disks, and
these can be connected to Microsoft® Windows using both internal and external connections, making it easy to turn the collection of drives you already have into a
safe and easy-to-manage place to store things like your home videos or photos.
...
The table below describes the different options for resiliency:
QUESTION 146
You administer a Windows 8.1 computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual
CPU and 512 MB of RAM.
You discover that the virtual machine pauses automatically and displays the state as paused- critical
You need to identify the component that is causing the error.
Which component should you identify?
A.
B.
C.
D.
Insufficient hard disk space
Insufficient number of virtual processors
No virtual switch defined
Insufficient memory
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/virtual_pc_guy/archive/2009/04/22/why-is-my-virtual-machine-paused-critical-hyper- v.aspx
Why is my virtual machine "Paused-Critical"? [Hyper-V]
Virtual machines will go into the "Paused-Critical" state under Hyper-V if we detect that we are going to run out of space for the virtual hard disks. If we were to run
out of space for expanding a dynamic or dif- ferencing virtual hard disk we would start failing disk write operations inside the virtual machine. The re- sult would
most likely be that the guest operating system would crash. To avoid this problem we periodically poll the storage that is being used for the virtual hard disks. If the
free space falls under 2 gigabyte we will start to log warning messages in the event log. If the free space falls under 200 megabyte we will pause the virtual machine
and mark it as "Paused-Critical".
Further Information:
http://www.neilbryan.ca/hyper-v-paused-critical-and-saved-critical/ Hyper-V Paused-Critical and Saved-Critical
QUESTION 147
A company has Windows 8.1 client computers.
Users frequently run a custom web application that modifies the system registry. Each time the application starts, the user is prompted for administrative approval.
You need to ensure that users can run the custom application and not be prompted for administrator approval.
What should you do?
A.
B.
C.
D.
Turn off Windows SmartScreen.
Set the Internet zone privacy level to Low.
Set the User Account Control (UAC) settings to Never notify.
Set the Internet zone security level to Medium.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html How to Change User Account Control (UAC) Settings in
Windows 8 and 8.1
Never notify me
You won't be notified before any changes are made to your PC. If you're signed in as an administrator, apps can make changes to your PC without your knowledge.
If you're signed in as a standard user, any changes that require administrator permissions will automati- cally be denied.
QUESTION 148
You are troubleshooting a computer that runs Windows 8.1.
A third-party application no longer functions correctly.
You need to repair the application. What should you do?
A.
B.
C.
D.
Run the reset /f command and specify the application's .msi file.
Run the msiexec /f command and specify the application's .msi file.
Use File History to revert the application's .msifile to a previous version.
Run the replace command, specify the application's .msi file as the source, and then specify the application's original installation directory as the destination.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference:http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx (search for `/f') Explanation:
http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx Msiexec (command-line options)
To repair a product
Syntax
msiexec /f [p][o][e][d][c][a][u][m][s][v]{Package | ProductCode}
QUESTION 149
You are a desktop administrator for your organization.
Your organization has Windows 7 computers and wants to move to a Windows 8.1 solution. The organization purchases the licenses.
You need to migrate from Windows 7 to Windows 8.1 while ensuring that programs, settings, and files migrate as well.
What should you do?
A.
B.
C.
D.
Choose the Change the product key.
Choose a clean install and use Windows Easy Transfer.
Choose an upgrade after running setup.exe from the Windows 8.1 disk.
Choose a clean install from the Media boot without formatting.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/upgrade-to-windows-8 Update to Windows 8.1: FAQ
How do I update to Windows 8.1?
Here's how to update to Windows 8.1 depending on the version of Windows you're currently running:
..
If you're running Windows 7, you can buy and download Windows 8.1 using Windows 8.1 Upgrade Assis- tant. In Upgrade Assistant, you'll have the option to install
Windows 8.1 now, later, or using media with an ISO file or a USB flash drive.
..
Will I be able to keep my files, settings, and apps?
If you start (boot) your PC from installation media that you created when you downloaded the ISO, such as a DVD or USB flash drive, you won't be able to keep
your apps, Windows settings, or personal files when you install Windows 8.1.
..
If you're running --> Windows 7
You can keep --> Personal files
..
If you're running Windows 7, Windows Vista, or Windows XP, all of your apps will need to be reinstalled using the original installation discs, or purchase
confirmation emails if you bought the apps online.
http://windows.microsoft.com/en-us/windows-8/upgrade-assistant-download-online-faq Upgrade Assistant: FAQ
Upgrade Assistant is a free download that scans your PC, desktop apps, and connected devices to see if they'll work with a later version of Windows, and then
provides a free compatibility report.
...
It provides a compatibility report. The compatibility report lists your apps and devices that will work in Windows 8 or Windows 8.1, those that might not work or won't
be available, and what you can do to get them working again. You can save or print the compatibility report to use later. If some of your apps and devices aren't
listed, it might be because we don't have compatibility info from the developer or manufac- turer for that product yet.
...
Note that after you upgrade, all of your compatible desktop apps will need to be reinstalled using the origi- nal installation discs, or purchase confirmation emails if
you bought the apps online.
QUESTION 150
You are a desktop administrator for your organization.
You have a small group of Windows 8.1 computers you want to upgrade to Windows 8.1 Pro.
You need to ensure that these computers have Windows 8.1 Pro installed on them.
You receive product keys from your contracting team. What should you do next?
A.
B.
C.
D.
Put in a Windows 8.1 DVD. Your current product key will be recognized, and then you can install Windows Pro.
Select Run >Regedit> HKLM > License. Then overwrite the dword license file.
Under Control Panel, select "Add features to Windows 8.1", and choose "Add product key".
Under settings, add roles > Windows 8.1 Pro. Then input the license file.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://www.petri.co.il/change-windows-8-1-edition-without-reinstalling.htm Easily Change Windows 8.1 Edition Without Reinstalling
..
Solution
To switch between the editions of Windows you need to use a tool called Windows Anytime Upgrade, which is installed on your computer. You will also need the
right product key.
..
..
In the Add features to Windows 8.1 window click I already have a product key (assuming, of course, you have one; if not, purchase one).
Enter your product key and wait for a second. If it's correct, you will see a message saying "Your key works. Continue when you're ready". If it's not correct, you'll
see a message saying "This key won't work.
Check it and try again, or try a different key".
..
Accept the license terms and click Add features. The progress bar should move around for a few mo- ments.
..
Check to see that you have the right edition by looking at the computer properties.
Done.
Further Information:
http://windows.microsoft.com/en-us/windows-8/feature-packs
Get more from Windows 8.1
If your PC is running Windows 8.1, you can get Windows 8.1 Pro Pack and enjoy all the features of Windows 8.1 Pro as well as Windows Media Center.
...
3. Tap or click Add features to Windows 8.1 and then do one of the following:
If you need to purchase a product key, tap or click I want to buy a product key online.
Follow the steps to purchase and enter a product key.
If you already have a product key, tap or click I already have a product key.
4. Enter your product key and click Next.
5. Read the license terms, select the check box to accept the license terms, and then click Add features.
QUESTION 151
You are a system administrator for your company.
The company has satellite offices located within different regions around the world and does not want employees to rely on carrying computers around when they
visit the satellite offices. The company is deploying Windows To Go as a solution.
You need to ensure that the company has the proper configuration for Windows To Go before deploying the solution.
Which configuration should you use?
A. a Windows To Go server that provides the use of a network boot and can provide files to run the operating system
B. at least one USB 2.0 port on the host PC
C. a second partition to run Windows To Go with a minimum of a DVD-RW to write Windows To Go data
D. a 20GB or greater SSD used as a secondary drive
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: http://technet.microsoft.com/en-us/windows/jj874386.aspx
Explanation:
http://technet.microsoft.com/en-us/windows/jj874386.aspx
Using Windows To Go
Windows To Go is not a late-night drive-through offering at the local Microsoft Store. Rather, it's a feature in the Windows 8 Enterprise operating system that allows
you to start a Windows 8 image (a Windows To Go workspace) from an external USB drive. You can start a Windows To Go workspace on most comput- ers that
meet the Windows 7 or Windows 8 certification requirements, regardless of the operating system currently running on them.
QUESTION 152
You are a domain administrator for your company.
Since the company's Windows 8.1 desktop computers are not backed up regularly, the company wants to enable folder redirection in order to move data from local
desktops to network storage.
You need to configure folder redirection on the domain so all existing desktops and any new desktops automatically apply the folder redirection settings.
What should you do?
A.
B.
C.
D.
Create a new Group Policy Object (GPO) and configure the folder redirection options to meet your company's requirements.
In computer management, create a task that is labeled Folder Redirection. Allow Folder Redirection to the specified path at named intervals.
Map a network drive from each local desktop, right-click Properties, and choose Folder Redirection with proper settings.
Sync your offline folder to the network location to ensure that backups are completed on the network.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference:http://msdn.microsoft.com/en-us/library/cc786749(v=ws.10).aspx User settings and user files are typically stored in the local user profile, under the Users
folder. The files in local user profiles can be accessed only from the current computer, which makes it difficult for users who use more than one computer to work
with their data and synchronize settings between multiple comput- ers. Two technologies exist to address this problem: Roaming Profiles and Folder Redirection.
Both tech- nologies have their advantages, and they can be used separately or together to create a seamless user experience from one computer to another. They
also provide additional options for administrators manag- ing user data.
Folder Redirection lets administrators redirect the path of a folder to a new location. The location can be a folder on the local computer or a directory on a network
file share. Users can work with documents on a server as if the documents were based on a local drive. The documents in the folder are available to the user from
any computer on the network. Folder Redirection is located under Windows Settings in the con- sole tree when you edit domain-based Group Policy by using the
Group Policy Management Console (GPMC). The path is [Group Policy Object Name]\User Configuration\Policies\Windows Settings\Folder Redirection
QUESTION 153
A company has Windows 8.1 client computers.
One computer named Computer1 will be used to centralize event logs from other client computers.
You need to configure Computer1 to collect events from other client computers,
What should you do?
A.
B.
C.
D.
Run the New-EventLogcmdlet.
Create a source-computer-initiated subscription.
Run the Get-EventLogcmdlet.
Create a collector-initiated subscription.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription
You can subscribe to receive events on a local computer (the event collector) that are forwarded from re- mote computers (the event sources) by using a collectorinitiated subscription. In a collector-initiated sub- scription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to
events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.
Further Information:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973%28v=vs.85%29.aspx Setting up a Source Initiated Subscription
Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple
remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collec- tor initiated
subscription because in the collector initiated subscription model, the event collector must de- fine all the event sources in the event subscription.
http://technet.microsoft.com/en-us/library/hh849768.aspx
New-EventLog
This cmdlet creates a new classic event log on a local or remote computer. It can also register an event source that writes to the new log or to an existing log.
The cmdlets that contain the EventLog noun (the Event log cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log
technology in Windows Vista and later versions of Windows, use Get-WinEvent.
http://technet.microsoft.com/en-us/library/hh849834.aspx
Get-EventLog
The Get-EventLog cmdlet gets events and event logs on the local and remote computers. Use the parameters of Get-EventLog to search for events by using their
property values. Get-EventLog gets only the events that match all of the specified property values. The cmdlets that contain the EventLog noun (the EventLog
cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log technology in Windows Vista and later versions of Windows, use
Get-WinEvent.
QUESTION 154
A company has Windows 8.1 client computers.
One computer named Computer1 will be used to centralize event logs from other client computers. You configure a Group Policy Object (GPO) that pushes event
logs to Computer1.
You need to configure Computer1 to receive the event logs.
What should you do?
http://www.gratisexam.com/
A.
B.
C.
D.
Create a collector-initiated subscription.
Run the New-EventLogcmdlet.
Run the Get-EventLogcmdlet.
Create a source-computer-initiated subscription.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973%28v=vs.85%29.aspx Setting up a Source Initiated Subscription
Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple
remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collec- tor initiated
subscription because in the collector initiated subscription model, the event collector must de- fine all the event sources in the event subscription.
Further Information:
http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription
You can subscribe to receive events on a local computer (the event collector) that are forwarded from re- mote computers (the event sources) by using a collectorinitiated subscription. In a collector-initiated sub- scription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to
events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.
http://technet.microsoft.com/en-us/library/hh849768.aspx
New-EventLog
This cmdlet creates a new classic event log on a local or remote computer. It can also register an event source that writes to the new log or to an existing log.
The cmdlets that contain the EventLog noun (the Event log cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log
technology in Windows Vista and later versions of Windows, use Get-WinEvent.
http://technet.microsoft.com/en-us/library/hh849834.aspx
Get-EventLog
The Get-EventLog cmdlet gets events and event logs on the local and remote computers. Use the parameters of Get-EventLog to search for events by using their
property values. Get-EventLog gets only the events that match all of the specified property values. The cmdlets that contain the EventLog noun (the EventLog
cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log technology in Windows Vista and later versions of Windows, use
Get-WinEvent.
QUESTION 155
You manage Windows 7 and Windows 8.1 client computers that run.
You are configuring Windows updates for all client computers.
You have the following requirements:
Ensure that all client computers check for updates twice a day, Install all critical and available updates, including updates that require a restart, each day.
If critical updates are installed, restart client computers at 11:00 P.M. You need to configure local Group Policy settings to meet the requirements.
Which three actions should you perform? (Each answer presents part of the solution. Choose three.)
A.
B.
C.
D.
E.
Enable the Reschedule Automatic Updates scheduled installations policy setting.
Configure the Automatic Maintenance Activation Boundary policy setting.
Enable the Specify intranet Microsoft update service location policy setting.
Configure the Automatic Updates detection frequency policy setting.
Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
Specifies the hours that Windows will use to determine how long to wait before checking for available updates. The exact wait time is determined by using the hours
specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20 hour detection frequency, all clients to which
this policy is applied will check for updates any- where between 16 and 20 hours
Reference: Configure Group Policy Settings for Automatic Updates
QUESTION 156
You are the desktop administrator for a medium-sized company.
You are rolling out new Windows 8.1 computers to your employees. You configure one of the computers so that it has the devices and settings the employees need
for testing purposes.
You need to ensure that the hardware devices are operating properly.
Which tool should you use?
A.
B.
C.
D.
eventvwr.exe
Mmcdevmgmt.msc
sigverif.exe
Driverquery /si
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc754081.aspx
Open Device Manager
..
mmc devmgmt.msc
http://windows.microsoft.com/en-us/windows-vista/get-help-with-device-manager-errors Get help with Device Manager errors
Device Manager helps you determine which hardware devices are installed on your computer, and whether or not they are working properly. If one of your devices
is not working properly, an error icon will appear next to the name of the device. If Device Manager cannot identify the device, it will label it an un- known device.
An error icon appears next to any device that is not working properly. In this example, a biometric co- processor (fingerprint reader) is not functioning.
When a device is not working properly, Device Manager will also usually display an error message with an accompanying error code. There are many different
Device Manager error codes.
Further Information:
http://technet.microsoft.com/en-us/library/cc785425%28v=ws.10%29.aspx Event Viewer
With Event Viewer, you can monitor events recorded in event logs. Typically a computer stores the Appli- cation, Security, and System logs. It could also contain
other logs, depending on the computer's role and the applications installed.
http://support.microsoft.com/kb/308514
How To Verify Unsigned Device Drivers in Windows XP
This step-by-step article describes how you can use the Windows XP Signature Verification tool (Sigverif.exe) to find unsigned drivers and verify device drivers in
Windows XP. This information can be helpful for troubleshooting system instability, error messages, boot problems, and so on.
http://technet.microsoft.com/en-us/library/bb490896.aspx
Driverquery
Displays a list of all installed device drivers and their properties.
QUESTION 157
You administer Windows 8.1 computers in your company network, including a computer named Client.
You need to prevent users of Client1 from running applications that are stored on removable storage devices.
What should you do?
A.
B.
C.
D.
Set Local Computer Policy: Removable Disks to Deny write access to Enabled.
Set Local User Policy: Removable Storage Access to Removable Disks: Deny read access to Enabled.
Set Local User Policy: Removable Storage Access to Removable Disks: Deny write access to Enabled.
Set Local Computer Policy: Removable Storage Access to Removable Disks: Deny execute access to Enabled.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Further Information:
http://www.grouppolicy.biz/2012/01/how-to-use-group-policy-to-deny-executing-writing-andor-reading-on- removable-disks/
How to use Group Policy to deny executing, writing and/or reading on removable disks
QUESTION 158
A company has Windows 8.1 client computers. The company develops a Windows Store app but does not publish it to the Windows Store.
You need to side load the Windows Store app on all client computers.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Run the get-appxpackage Windows PowerShell cmdlet.
Run the add-appxpackage Windows PowerShell cmdlet.
Enable the Allow all trusted applications to install Group Policy setting.
Enable the Allow installation of desktop items Group Policy setting.
Run the msiexec command.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh856048.aspx
Add-AppxPackage
The Add-AppxPackage cmdlet adds a signed app package (.appx) to a user account. Use the Dependen- cyPath parameter to add all other packages that are
required for the installation of the app package. You can use the Register parameter to install from a folder of unpackaged files during development of Windows®
Store apps.
To update an already installed package, the new package must have the same package family name.
http://technet.microsoft.com/en-US/windows/jj874388.aspx
Try It Out: Sideload Windows Store Apps
By now, you are familiar with Windows Store apps. There are some pretty cool ones available in the store, and publishers are adding more every week. A great
thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish
them through the Windows Store since that would make them publically available. Instead, you can sideload LOB apps. Sideloading simply means installing a
Windows Store app without publishing it in and downloading it from the store. You install it directly.
..
Verify the Requirements
There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8
Enterprise:
The computer running Windows 8 Enterprise must be joined to the domain. You must enable the "Allow all trusted apps to install" Group Policy setting. The app
must be signed by a \ certificate that is chained to a trusted root certificate.
...
Further Information:
http://technet.microsoft.com/en-us/library/hh856044.aspx
Get-AppxPackage
The Get-AppxPackage cmdlet gets a list of the app packages (.appx) that are installed in a user profile. To get the list of packages for a user profile other than the
profile for the current user, you must run this command by using administrator permissions.
http://www.advancedinstaller.com/user-guide/msiexec.html
Msiexec.exe Command Line
The Windows Installer technology uses Msiexec.exe for installing MSI and MSP packages.
QUESTION 159
You are a system administrator for a local accounting firm. Your company uses Windows 8.1 Pro desktop computers. All computers have a secondary D: drive.
You want to enable File History for all your users. You create the folder structure
D:\Backup\File History on all user computers. You launch the File History application and verify that it is turned on, Next, you click Select drive in Configure File
History Settings. However, under Copy Files to: you get the message, "No usable drives were found."
You need to successfully configure file history.
What should you do?
A.
B.
C.
D.
Verify that your local drive has enough free space.
Share the File History folder.
Grant NTFS rights to the File History folder.
Use a network drive for file history.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/set-drive-file-history Set up a drive for File History
Before you start using File History to back up your files, you need to first select where your backups are saved. You can select an externally connected drive, such
as a USB drive, or you can save to a drive on a network. There are other choices, but these two provide the best options to help protect your files against a crash or
other PC problems.
QUESTION 160
You use a Windows 8.1 Pro computer. You turn on File History and install several applications.
The computer becomes slow and unresponsive.
You need to restore the computer to its default settings, You also need to keep your personal files stored on the computer.
What should you do?
A.
B.
C.
D.
Run Refresh your PC.
Run the Clear-Content PowerShell crndlet.
Restore files from File History.
Run Reset your PC.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Refreshing your PC reinstalls Windows and keeps your personal files and settings. It also keeps the apps that came with your PC and the apps you installed from
the Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps--except for the apps that came with your PC. Restor- ing your
PC is a way to undo recent system changes you've made.
QUESTION 161
A company has an Active Directory Domain Services domain named contoso.com. The domain contains two sites that are named SiteA and SiteB. The company
uses Windows 8.1 Pro laptop computers. The computer account objects are located in an Organizational Unit (OU) named Laptops.
The company plans to deploy a wireless network infrastructure. You need to preconfigure all laptop computers with the wireless network access information by
using a Group Policy Object (GPO).
What should you do?
A.
B.
C.
D.
Create and link a GPO to a group containing all laptop computers. Edit the GPO and configure a Wireless Network Policy.
Create and link a GPO to the Laptops OU. Edit the GPO and configure a Wireless Network Policy.
Create and link a GPO to a SiteA. Edit the GPO and configure a Wireless Network Policy.
Create and link a GPO to a SiteB. Edit the GPO and configure a Wireless Network Policy,
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/magazine/gg266419.aspx
Using Group Policy to Configure Wireless Network Settings
In an Active Directory Domain Services (AD DS) environment, you can use Group Policy settings to con- figure wireless network policies. (Note that you should
have Windows Server 2003 SP1 or later installed on your domain controllers.)
http://technet.microsoft.com/en-us/library/cc738954%28v=ws.10%29.aspx Link a Group Policy object to a site, domain, or organizational unit
Do one of the following:
1.
* To link to a domain or an organizational unit, open Active Directory Users and Computers.
* To link to a site, open Active Directory Sites and Services. In the console tree, right-click the site, domain, or organizational unit to which you want the Group Pol2.
icy object to be linked.
Click Properties, and then click the Group Policy tab.
3.
To add the Group Policy object to the Group Policy Object Links list, click Add. This opens the Add a 4.
Group Policy Object Link dialog box.
Click the All tab, click the Group Policy object that you want, and then click OK.
5.
In the properties dialog box for the site, domain, or organizational unit, click OK.
6.
QUESTION 162
You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT department configures all of them to use BitLocker on all
fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?
A. A password
B. A startup key
C. A.tpm file
D. TPM
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/magazine/ff404223.aspx
Enable BitLocker on USB Flash Drives to Protect Data
Encrypting USB flash drives protects the data stored on the volume. Any USB flash drive formatted with FAT, FAT32, or NTFS can be encrypted with BitLocker.
..
To enable BitLocker encryption on a USB flash drive, do the following:
..
3. On the Choose How You Want To Unlock This Drive page, choose one or more for the following op- tions, and then click Next:
Use A Password To Unlock This Drive Select this option if you want the user to be prompted for a pass- word to unlock the drive. Passwords allow a drive to be
unlocked in any location and to be shared with other people.
Use My Smart Card To Unlock The Drive Select this option if you want the user to use a smart card and enter the smart card PIN to unlock the drive. Because this
feature requires a smart card reader, it is normally used to unlock a drive in the workplace and not for drives that might be used outside the workplace.
4. On the How Do You Want To Store Your Recovery Key page, click Save The Recovery Key To A File.
...
QUESTION 163
You are the desktop administrator for your company, which uses Windows 8.1 computers.
The company decides to use virtual disks at your location so the programmers can build and test applications in a closed network.
You need to use the file given as a virtual hard disk and be able to boot to the vhd.
What should you do?
A.
B.
C.
D.
Copy the vhd file to the root of C;\ run bcdedit and add an entry to the boot options that includes the path to the vhd.
Attach the vhd in computer management and add it to the Boot Menu.
Copy the vhdfile to the root of C:\, open msconfig, and choose Safe Boot and Alternate Shell.
Move the vhd file to a network share, map the network share, and allow a network boot.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Ref: http://technet.microsoft.com/en-us/library/hh825709.aspx http://technet.microsoft.com/en-us/library/hh825709.aspx
QUESTION 164
A company has an Active Directory Domain Services (AD DS) domain with Windows 8.1 client computers.
Internet Explorer does not display warning messages to some users when public websites install software or run other installed applications on the client computers.
You need to configure Internet Explorer to always display warning messages about websites that attempt to install software or run applications.
What should you do?
A.
B.
C.
D.
Enable the Turn on Protected Mode Group Policy setting.
Enable the Automatic prompting for file downloads Group Policy setting.
Disable the Allow software to run or install even if the signature is invalid Group Policy setting.
Disable the Launching applications and files in an IFRAME Group Policy setting,
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-vista/what-does-internet-explorer-protected-mode-do What does Internet Explorer protected mode do?
Internet Explorer's protected mode is a feature that makes it more difficult for malicious software to be in- stalled on your computer.
In addition to helping protect your computer from malicious software, protected mode allows you to install wanted ActiveX controls or add-ons when you are logged
in as an administrator.
..
In addition to warning you when webpages try to install software, Internet Explorer will warn you when webpages try to run certain software programs. You are
warned when a software program would run out- side of Internet Explorer and outside of protected mode, because that program might have more access to your
computer than you prefer. This usually happens when a website is using an add-on to run a soft- ware program on your computer.
http://technet.microsoft.com/en-us/library/cc985351.aspx
Group Policy and Internet Explorer 8
Policy name:
Turn on Protected Mode
Policy path
Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone
Further Information:
http://www.sevenforums.com/tutorials/63141-internet-explorer-protected-mode-turn-off.html Internet Explorer Protected Mode - Turn On or Off
Protected mode in IE7, IE8, IE9, IE10, and IE11 is a feature that makes it more difficult for malicious soft- ware to be installed on your computer.
In addition to helping protect your computer from malicious software, protected mode allows you to install wanted ActiveX controls or add-ons when you are logged
in as an administrator.
QUESTION 165
You are the network administrator for Contoso.com and are creating an image for a Windows 8.1 implementation for all of your users.
You find out that an application your company has used for many years is not compatible with Windows 8.1. It has always worked on your Vista computers with
SP2. The application requires administrator privileges.
You need to configure the correct settings so that the application can run on Windows 8.1.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Using the Application Compatibility toolkit run the Windows Vista Compatibility Evaluator for Windows 8.1, and select the Service Pack 2 option.
Modify the User Account Control Settings by adjusting the slider to Never Notify.
Assign the application to Run as administrator on the Security tab of the application executable file properties.
Using the Compatibility Troubleshooter, check Run this application in compatibility mode for and select Vista (Service Pack 2).
Select Run this program as an administrator in the Compatibility Troubleshooter.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/older-programs-compatible-version-windows Make older programs compatible with this version of Windows
Most programs created for earlier versions of Windows will work in this version of Windows, but some older programs might run poorly or not at all. You can run the
Program Compatibility Troubleshooter on most programs to detect and fix common compatibility problems.
..
Change compatibility settings manually
..
Compatibility mode
Runs the program using settings from a previous version of Windows. Try this setting if you know the program is designed for (or worked in) a specific version of
Windows.
..
Run this program as an administrator.
Some programs require administrator privileges to run properly. If you aren't signed in to your PC as an administrator, this option is unavailable.
...
Further Information:
http://technet.microsoft.com/en-us/library/hh825181.aspx
Application Compatibility Toolkit (ACT) Technical Reference
The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, de- vices, and computers in your organization are compatible
with versions of the Windows® operating sys- tem. By using ACT, you can obtain compatibility information from Microsoft and software vendors, identify
compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility
issues before you deploy a version of Windows to your organization.
QUESTION 166
You provide IT support for a small business.
A member of the team needs the ability to use Remote Desktop and VPN to access a desktop computer from a laptop when traveling. This desktop computer is
running Windows 8.1 Pro, while the laptop is running Windows 7 Professional.
You need to set up a secure Remote Desktop connection on the desktop computer.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Require Network Level Authentication.
Allow remote connections.
Disable Remote Assistance connections.
Make the user account a standard user.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows/remote-desktop-connection-faq#1TC=windows-8 Remote Desktop Connection: frequently asked questions
...
There are two remote settings options:
Don't allow remote connections to this computer. This will prevent anyone from connecting to your PC re- motely.
Allow remote connections to this computer. This will allow remote connections on your PC.
If you know that the people who will connect to your PC are running Windows 7, Windows 8, or Windows 8.1 on their PCs, check the Allow connections only from
computers running Remote Desk- top with Network Level Authentication (recommended) box. These versions of Windows use Network Level Authentication, which
is an authentication method that completes before you establish a full connection and the sign-in screen appears. This can help protect the remote PC from hackers
and malware.
http://technet.microsoft.com/en-us/library/cc732713.aspx
Configure Network Level Authentication for Remote Desktop Services Connections
Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated
to the RD Session Host server before a ses- sion is created.
Network Level Authentication completes user authentication before you establish a remote desktop con- nection and the logon screen appears. This is a more
secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
It requires fewer remote computer resources initially. The remote computer uses a limited number of re- sources before authenticating the user, rather than starting
a full remote desktop connection as in pre- vious versions.
It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
The client computer must be using at least Remote Desktop Connection 6.0. The client computer must be using an operating system, such as Windows 7,
Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol. The RD Session Host server must
be running Windows Server 2008 R2 or Windows Server 2008.
QUESTION 167
You provide tech support for a small home business. One of its Windows 8.1 computers is having occasional problems opening and saving files. You suspect that
there is a problem with the hard drive but need to verify that it is not just a problem with one of the three volumes on the disk.
You start diskpart and set the focus to disk 0,
You need to obtain the properties of the hard disk as well as the health status of the volumes that reside on it.
Which command should you run next?
A. List partition
B. Detail volume
C. Detail disk
D. Attributes volume
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference:http://msdn.microsoft.com/en-us/library/ff794606(v=winembedded.60).aspx
Explanation:
http://technet.microsoft.com/en-us/library/bb490893.aspx
DiskPart
DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using scripts or direct input from a
command prompt. Before you can use DiskPart.exe com- mands on a disk, partition, or volume, you must first list and then select the object to give it focus. When
an object has focus, any DiskPart.exe commands that you type act on that object.
You can list the available objects and determine an object's number or drive letter by using the list disk, list volume, and list partition commands. The list disk and
list volume commands display all disks and vol- umes on the computer. However, the list partition command only displays partitions on the disk that has focus.
When you use the list commands, an asterisk (*) appears next to the object with focus. You select an object by its number or drive letter, such as disk 0, partition 1,
volume 3, or volume C.
When you select an object, the focus remains on that object until you select a different object. For exam- ple, if the focus is set on disk 0, and you select volume 8
on disk 2, the focus shifts from disk 0 to disk 2, volume 8. Some commands automatically change the focus. For example, when you create a new parti- tion, the
focus automatically switches to the new partition.
You can only give focus to a partition on the selected disk. When a partition has focus, the related volume (if any) also has focus. When a volume has focus, the
related disk and partition also have focus if the vol- ume maps to a single specific partition. If this is not the case, then focus on the disk and partition is lost.
DiskPart commands
...
list partition
Displays the partitions listed in the partition table of the current disk. On dynamic disks, these partitions may not correspond to the dynamic volumes on the disk.
This discrepancy occurs because dynamic disks contain entries in the partition table for the system volume or boot volume (if present on the disk) and a partition
that occupies the remainder of the disk in order to reserve the space for use by dynamic volumes.
..
detail volume
Displays the disks on which the current volume resides.
..
detail disk
Displays the properties of the selected disk and the volumes on that disk.
..
QUESTION 168
You are the system administrator for Contoso, Ltd.
The human resource director's Windows 8.1 computer crashes at login this morning. After powering off and restarting the computer, you successfully boot it, and
the human resource director is able to log in. Later in the day, the director reports that the computer is still not functioning properly. Apps are opening extremely
slowly, and the computer locks up for minutes at a time. You have not taken any disaster recovery steps prior to this problem. You decide to recover the computer's
operating system.
You need to ensure that the recovery does not affect the human resource director's current data, personalization settings, and windows store apps.
Which utility should you use?
A.
B.
C.
D.
Refresh PC
Folder Recovery
File Recovery
Recovery Drive
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
QUESTION 169
You are a desktop administrator for your company and are assigned to work with the engineering team.
The hard drive on your top engineer's laptop has failed. You replace it and install Windows 8.1 Enterprise. You learn that the laptop was upgraded from Windows 7
Professional to Windows 8.1 Enterprise a month ago. When the computer was using Windows 7, it had scheduled backups running several times a week using
Backup and Restore, These backups were set to be stored on a network drive, Additionally, two weeks ago, this engineer made a full backup of the data files and
manually copied them to an external hard drive. No defaults in Windows 8.1 were changed.
You need to restore the most recent data.
What should you do?
A. Use Windows 8.1 File History to restore the latest copy of the data.
B. Use Windows File Recovery from the data stored on the network.
C. Restore Windows 7 and reinstall Windows 8.1.
D. Restore the data files form the external hard drive to the hard drive.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
You need the latest backup data files. The data stored on the network location might appear as the most recent but the scheduled backup is not continued when n
upgrading to Windows 8.1. After you upgrade Windows, you will need to set up Windows Backup, even if you had a scheduled backup in the previous version of
Windows. This is because there are several changes to the backup program.
Therefore the most recent files is from the full backup copied to an external hard drive two weeks ago.
Ref: http://windows.microsoft.com/en-ca/windows/back-up-files#1TC=windows-7
QUESTION 170
You administer Windows 8.1 Enterprise computers in your company network. You provide remote employees with a Windows to go workspace.
A remote employee informs you that his workspace requires activation.
You need to activate the workspace.
What should you do?
A.
B.
C.
D.
Instruct the employee to run the slmgr /upk command from the workspace.
Instruct the employee to connect to the company network from the workspace by using VPN.
Give the employee a Multiple Activation Key (MAK).
Instruct the employee to run Windows Update from the workspace.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj592680.aspx#wtg_faq_roamact Windows To Go: Frequently Asked Questions
..
Do I need to activate Windows To Go every time I roam?
No, Windows To Go requires volume activation; either using the Key Management Service (KMS) server in your organization or using Active Directory based
volume activation. The Windows To Go workspace will not need to be reactivated every time you roam. KMS activates Windows on a local network, eliminat- ing
the need for individual computers to connect to Microsoft. To remain activated, KMS client computers must renew their activation by connecting to the KMS host on
periodic basis. This typically occurs as soon as the user has access to the corporate network (either through a direct connection on-premises or a through remote
connection using DirectAccess or a virtual private network connection), once activated the machine will not need to be activated again until the activation validity
interval has passed. In a KMS con- figuration the activation validity interval is 180 days.
Further Information:
http://technet.microsoft.com/en-us/library/dn502540.aspx
Slmgr.vbs Options for Volume Activation
..
Table 2. Slmgr.vbs command-line options
..
/upk [ActivationID]
This option uninstalls the product key of the current Windows edition. After a restart, the system will be in an Unlicensed state unless a new product key is installed.
Optionally, you can use the [Activation ID] parameter to specify a different installed product. This operation must be run from an elevated command prompt.
QUESTION 171
You are a desktop administrator responsible for migrating Windows Vista computers to Windows 8.164-bit.
Each computer has a 20GB hard drive, 800MHz (x54) processor, and 512 MB of system memory.
You need to upgrade the computers so they can run Windows 8.1, 64-bit,
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Upgrade system memory to 2 GB.
Upgrade system memory to 1 GB.
Add a processor that is 1 Ghz or faster.
Increase the hard drive size to 50 GB.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/system-requirements System requirements
Windows 8.1
If you want to run Windows 8.1 on your PC, here's what it takes:
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more info) RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
Personal comment:
At first I thought this question was wrong, because I had no knowledge of any x64 bit processor at 800MHz. But here it is:
http://en.wikipedia.org/wiki/List_of_Intel_microprocessors#64-bit_processors:_IA-64 Itanium
Code name Mercer
Family 7
Released May 29, 2001
733 MHz and 800 MHz
2MB cache
All recalled and replaced by Itanium 2
QUESTION 172
A company has Windows 8.1 client computers.
The performance of a client computer decreases. You establish that the computer has been infected by malware.
You need to restore the client computer to full functionality without losing the user's data,
What should you do?
A.
B.
C.
D.
Use the Refresh your PC without affecting your files function.
Start the computer in Safe Mode.
Install the corporate printer and set it as the default printer. Then add the home printer to the homegroup settings.
Use the Remove everything and install Windows function.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
QUESTION 173
You are the PC Support Specialist for Contoso, Ltd. You are configuring Windows 8.1 so that you can create an image. An additional web browser is installed on the
image.
You need to ensure that Internet Explorer 10 for the Desktop is the default web browser.
Which two actions should you perform? (Each correct answer presents a complete solution.
Choose two.)
A.
B.
C.
D.
E.
Tap the tile of another web browser on the Start Menu and tap the Unpin from start option.
On the Security tab of Internet options, click Reset all zones to default level.
Under Set program access and computer defaults, select Default Programs, then choose Microsoft Windows.
In Default Programs, associate the .htm and .html files with Internet Explorer.
Go to Programs and Features in Control Panel and set Internet Explorer as the default application.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 174
You are a desktop administrator for a small company.
You are building a Windows 8.1 image to rollout to all new computers. Your company plans to administer all client computers from a single location.
You need to ensure that you can manage all client computers remotely once they are deployed.
Which action should you perform from the computer you are building the image from?
A.
B.
C.
D.
Run the winrmenumerate command.
Run the Enable-PSRemotingcmdlet.
Run the Set-PSStrictModecmdlet.
Run the New-PSSessionConfigurationFilecmdlet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh849694.aspx
Enable-PSRemoting
Configures the computer to receive remote commands.
..
You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands.
Because the configuration activates listeners, it is pru- dent to run it only where it is needed.
...
The Enable-PSRemoting cmdlet performs the following operations:
-- Runs the Set-WSManQuickConfig cmdlet, which performs the following tasks:
----- Starts the WinRM service.
----- Sets the startup type on the WinRM service to Automatic. ----- Creates a listener to accept requests on any IP address. ----- Enables a firewall exception for
WS-Management communications. ----- Registers the Microsoft.PowerShell and Microsoft.PowerShell.Workflow session configurations, if it they are not already
registered.
----- Registers the Microsoft.PowerShell32 session configuration on 64-bit computers, if it is not already registered.
----- Enables all session configurations.
----- Changes the security descriptor of all session configurations to allow remote access. ----- Restarts the WinRM service to make the preceding changes
effective.
...
Further Information:
http://technet.microsoft.com/en-us/library/cc781778%28v=ws.10%29.aspx Windows Remote Management Command-Line Tool (Winrm.cmd)
Windows Remote Management (WinRM) uses a new command-line tool, Winrm.cmd, to perform its oper- ations. These operations include Get, Put, Invoke, and
Enumerate.
..
Performing an Enumerate Operation
The WS-Management Enumerate operation returns a collection of objects.
..
http://technet.microsoft.com/en-us/library/hh849712.aspx
New-PSSessionConfigurationFile
Creates a file that defines a session configuration.
QUESTION 175
You are a PC Support Specialist for Fabrikam, Inc.
A user has a Windows 8.1 computer that is reporting corruption errors on the C: drive.
You need to resolve this issue in the least amount of time,
What should you do?
A.
B.
C.
D.
At an elevated command prompt, run fsutil.exe repair enumerate C: Sverify.
At an elevated command prompt, run CHKDSK/SPOTFIX.
At an elevated command prompt, run CHKDSK/I.
At an elevated PowerShell prompt, run Repair-Volume -scan.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference:http://www.tekrevue.com/tip/how-to-scan-fix-hard-drives-with-chkdsk-in-windows-8/ Explanation:
http://blogs.msdn.com/b/b8/archive/2012/05/09/redesigning-chkdsk-and-the-new-ntfs-health-model.aspx Redesigning chkdsk and the new NTFS health model
Key design changes to help improve availability:
..
d. Precise and rapid correction At the user or administrator's convenience, the volume can be taken off- line, and the corruptions logged in the previous step can be
fixed. The downtime from this operation, called "Spotfix," takes only seconds, and on Windows Server 8 systems with cluster shared volumes, we've eliminated this
downtime completely.
...
Q) Is a reboot absolutely required to fix non-system volumes? No, but the Action Center generally provides the simplest experience. If you're an advanced user, you
can fix non-system volumes by opening the properties of the drive, or by running chkdsk \scan <volume>: and chkdsk \spotfix <volume>: from the command line.
..
Further Information:
http://technet.microsoft.com/en-us/library/hh848662.aspx
Repair-Volume
Performs repairs on a volume.
Parameters
..
-Scan
Scans the volume.
QUESTION 176
A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run
an edition of Windows 8.1.
The company plans to use the following programs and features on the Windows 8.1 computers:
32-bit and 64-bit software
Desktop apps
Windows Media Player
Storage Spaces
You need to identify the installation or upgrade paths that support the programs and features.
Which three paths meet the requirements? (Each correct answer presents a complete solution.
Choose three.)
A. Purchase hardware with Windows RT pre-installed.
B. Perform a clean installation of Windows RT.
C. Perform a clean installation of Windows 8.1 Pro.
D. Perform a clean installation of Windows 8.1.
E. Upgrade from Windows 7 Enterprise to Windows 8.1 Enterprise.
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8-1/compare/default.aspx Compare Windows 8.1 Editions
QUESTION 177
You are a desktop engineer for a small company. Your sales associates currently use Windows 7 computers that run Windows XP Mode for a legacy business
application. You are deploying new computers for your sales associates due to life cycle management.
You have the following requirements:
The new computers must run Windows 8.1 and have Hyper-V installed.
The Windows XP Virtual Machines (VM) should be isolated from the host machine on your network and from other VMs.
You need to create a virtual switch to meet these requirements. Which type of switch should you use?
A.
B.
C.
D.
Private switch
External switch
Distributed switch
Internal switch
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows7/install-and-use-windows-xp-mode-in-windows-7 Install and use Windows XP Mode in Windows 7
Using Windows XP Mode, you can run programs that were designed for Windows XP on computers run- ning Windows 7 Professional, Enterprise, or Ultimate
editions. Windows XP Mode isn't supported on Windows 8.
..
How does Windows XP Mode work?
Windows XP Mode works in two ways -- both as a virtual operating system and as a way to open pro- grams within Windows 7. It runs in a separate window on the
Windows 7 desktop, much like a program, except it's a fully-functional, fully-licensed version of Windows XP. In Windows XP Mode, you can access your physical
computer's CD/DVD drive, install programs, save files, and perform other tasks as if you were using a computer running Windows XP.
When you install a program in Windows XP Mode, the program appears in both the Windows XP Mode list of programs and in the Windows 7 list of programs, so
you can open the program directly from Windows 7.
Programs installed in Windows XP Mode in the Windows 7 Start menu
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-2-configure-hardware-and- applications-16/
Virtual switches/ Hyper-V VLAN you can create 3 different types of virtual switches depending the needs of your virtual machines and one single machine can use
multiple virtual NICs that is member of different Virtual Switches.
External This virtual switch binds to the physical network adapter and create a new adapter you can 1.
see in Control Panel\Network and Internet\Network Connections so if a virtual machine needs contact outside the host machine this one is a must.
Internal This virtual switch can be used to connect all virtual machines and the host machine but can- 2.
not go outside that.
Private This virtual switch can only be used by the virtual host 3.
http://technet.microsoft.com/en-us/library/cc816585%28v=ws.10%29.aspx
QUESTION 178
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and
COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
Ensure that COMPUTER2 can run remote commands on COMPUTER1.
Test the solution by successfully running a command from COMPUTER2 that executes on COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.
Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands
may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://msdn.microsoft.com/en-us/library/aa384372%28v=vs.85%29.aspx
Installation and Configuration for Windows Remote Management
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start.
Configures a listener for the ports that send and receive WS-Management protocol messages using either
HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
http://technet.microsoft.com/en-us/library/hh875630.aspx
Winrs
Windows Remote Management allows you to manage and execute programs remotely.
Syntax
winrs [/<parameter>[:<value>]] <command>
Parameters
/r[emote]:<endpoint>
Specifies the target endpoint using a NetBIOS name or the standard connection:
<url>: [<transport>://]<target>[:<port>]
If not specified, /r:localhost is used.
QUESTION 179
A company has a branch office with client computers that run Windows 8.1. Files are saved locally on the client computers and are not backed up regularly.
You need to ensure that you can retrieve previous versions of locally saved files from each client computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx
What is File History?
File History is a backup application that continuously protects your personal files stored in Libraries, Desktop,
Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for
changes and copies changed files to another location. Every time any of your personal files has changed,
its copy will be stored on a dedicated, external storage device selected by you. Over time, File History
builds a complete history of changes made to any personal file.
...
Requirements
File History requires:
Windows 8 Client operating system
An external storage device with enough storage capacity to store a copy of all user libraries, such as a
USB drive, Network Attached Storage device, or share on another PC in the home network.
QUESTION 180
A computer currently runs a 32-bit version of Windows 7 Ultimate.
You need to deploy a 64-bit version of Windows 8.1 to the computer. The new deployment must
be the only version of Windows on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://pcsupport.about.com/od/windows-8/ss/windows-8-clean-install-part-1_9.htm
How To Clean Install Windows 8 or 8.1 (Part 1 of 2)
QUESTION 181
Ten client computers run Windows Vista and a custom application. The custom application is
compatible with Windows 8.1.
You purchase 10 new computers that have Windows 8.1 pre-installed. You plan to migrate user
settings and data from the Windows Vista computers to the Windows 8.1 computers. You install
the User State Migration Toolkit (USMT) on a USB flash drive.
You need to ensure that the custom application settings are applied to the Windows 8.1
computers after the migration is complete.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc721992%28v=ws.10%29.aspx
USMT Components
You use ScanState to collect the files and settings from the source computer. You use LoadState to restore
the user state onto the destination computer.
.. USMT Components
ScanState.exe
ScanState scans the source computer, collects the files and settings and creates a store. ScanState
does not modify the source computer. By default, ScanState compresses the files and stores them as
an image file (USMT3.MIG).
LoadState.exe
LoadState migrates the files and settings from the store to the destination computer. LoadState migrates
each file (one by one) from the store to a temporary location on the destination computer — the
files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the
file to the correct location, deletes the temporary copy, and begins migrating the next file.
Compression improves performance by reducing network bandwidth usage as well as the required
space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.
QUESTION 182
You have a computer that runs Windows 8.1, and three unused external disk drives.
You are creating a volume to store picture files.
You have the following requirements:
Use all three external disk drives.
Ensure that the volume is accessible from a single drive
letter.
Ensure data redundancy between the disk drives in the
event of a hardware failure.
You need to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://www.eightforums.com/tutorials/4203-storage-spaces-create-new-pool-storage-spacewindows8-a.html
Explanation:
http://www.eightforums.com/tutorials/4203-storage-spaces-create-new-pool-storage-spacewindows-8-a.html
How Create a New Pool and Storage Space in Windows 8
..To Create a New Pool and Storage Space
http://blogs.msdn.com/b/olivnie/archive/2013/02/05/windows-8-storage.aspx
Windows 8: Storage
Storage Spaces
Storage Spaces is a new feature for WindowsR 8 that allows a user to combine several disks into a single
pool of storage that provides for easier management of multiple disks and resiliency against hardware failure
on any of those disks. The disks that you use for Storage Spaces can be a mix of different-sized
disks, and these can be connected to MicrosoftR Windows using both internal and external connections,
making it easy to turn the collection of drives you already have into a safe and easy-to-manage place to
store things like your home videos or photos.
...
The table below describes the different options for resiliency:
QUESTION 183
A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that
run a 32-bit version of Windows 8.1. A workgroup contains client computers that run a 64-bit
version of Windows 8.1.
Computers in the workgroup can't currently print to PRINTER1.
You need to ensure that the workgroup computers can print to PRINTER1.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/library/cc732946.aspx
Update and Manage Printer Drivers
Add drivers for client computers running 32-bit or 64-bit versions of Windows
To support client computers that use different processor architectures than the print server, you must install
additional drivers. For example, if your print server is running a 64-bit version of Windows and you
want to support client computers running 32-bit versions of Windows, you must add x86-based drivers for
each printer.
Further information:
http://www.printmanager.com/cms.php?aid=54&fullpage=1&support=8
Mixing 32 bit and 64 bit Print Server Architectures
..32 bit Print Server with 64 bit Clients:
In the following scenario, we will be covering how to easily allow 64 bit Windows Client to print through
shared print queues on a 32 bit Server.
..1. Download 64 bit Driver:
..2. Open Sharing Properties:
..3. Specify Additional Drivers:
4. Select your 64 Bit Driver:
..5. Test and Print:
...
Personal comment:
Sometimes you may encounter problems when adding 64-bit drivers to 32-bit operating systems. In these
cases, you will need to do this workaround:
1. Obtain the 64-bit driver for PRINTER1.
2. Install the driver on one computer in the workgroup.
3. Add the driver on COMPUTER1.
http://www.pcounter-europe.com/support/kb/844512/
Windows printer configuration in mixed x86 and x64 environments
Problem:
You have an x86 or x64 server and clients of both types who need to print to queues on the server. However,
the server OS will not allow you to install a driver using a different architecture than the server OS
uses - ie. x64 print drivers on an x86 server.
Solution:
You must install the driver, that is using the differing architecture from the server, from a workstation to
the server.
To do this, login to a workstation that uses the differing architecture, download the printer driver you wish
to use on the server. Browse to the printers area on the server from a run dialog box - ie. Start -> Run
-> \\servername\printers.
Once the window is showing the printers on the server, go to File ->Server Properties -> Drivers -> Add.
A window should open up with check boxes for each architecture type supported by the server. Simply
check the appropriate architecture type and click next.
Now you will be looking at the standard driver selection window. Browse to the driver you downloaded
and select the appropriate .INF file.
Notes:
Please note that both x86 and x64 drivers must have the exact same name. "HP LaserJet 2200 PCL 6"
and "HP LaserJet 2200 PCL6" would be regarded as separate printers and the driver would not be correctly
distributed. If they have the same name, they will appear automatically in additional drivers for both
architectures in your printer's sharing properties, and will be distributed accordingly.
QUESTION 184
A desktop computer runs Windows 8.1. The computer is joined to an Active Directory Domain
Services (AD DS) domain named contoso.com.
You have two domain user accounts:
A primary account named User1 that does not have domain administrative
privileges.
An account named Admin1 that has administrative privileges in the
domain.
You are currently logged in as User1. You need to run an application named appl.exe.
You have the following requirements:
Start the application by using your administrative credentials.
Minimize the application load time.
You need to complete the command to meet the requirements.
Which command segments should you use to complete the command? (To answer, drag the
appropriate command segments to the correct locations in the answer area. Command segments
may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc771525.aspx
Runas
Allows a user to run specific tools and programs with different permissions than the user's current logon
provides.
Syntax
runas [{/profile | /noprofile}] [/env] [{/netonly | /savecred}] [/smartcard] [/showtrustlevels] [/trustlevel]
/user:<UserAccountName> "<ProgramName> <PathToProgramFile>"
Parameters
/profile
Loads the user's profile. This is the default. This parameter cannot be used with the /netonly parameter.
/no profile
Specifies that the user's profile is not to be loaded. This allows the application to load more quickly, but
it can also cause a malfunction in some applications.
..
/user:<UserAccountName> "<ProgramName> <PathToProgramFile>"
Specifies the name of the user account under which to run the program, the program name, and the
path to the program file. The user account name format should be <User>@<Domain> or
<Domain>\<UserAccountName>.
QUESTION 185
A company has 50 client computers that run Windows 8.1. Forty client computers are connected
to a secure internal network, and 10 client computers are located in public kiosks.
A new company security policy includes the following requirements:
Visitors can access only kiosk computers.
Employees can access and shut down only internal
computers.
Only administrators can access all computers
remotely.
Only administrators can shut down kiosk
computers.
You need to assign security groups to local security policies to meet the requirements.
What should you do? (To answer, drag the appropriate security group or groups to the correct
location or locations in the answer area. Security groups may be used once, more than once, or
not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.softheap.com/internet/the-guest-account-and-everyone-group.html
The Guest Account and Everyone Group
Evaluate the need for the Guest account. Most administrators agree that it should be disabled, although
removing it remove the ability of anonymous users to access a system. In some organizations, the Guest
account is very useful. For example, people who don't normally work with computers might need to occasionally
access a system to obtain some information. Factory floor workers might want to look up pension
plan information on a kiosk system in the break room. This is a good use for the Guest account. However,
consider creating a separate domain for these public services where the Guest account is enabled. Alternatively,
use a Web server for this type of system. Note the following: Users who log on as guests can access
any shared folder that the Everyone group has access to (i.e., if the Everyone group has Read permissions
to the Private folder, guests can access it with Read permissions). You don't know who Guest
users are and there is no accountability because all guests log in to the same account. Always disable the
Guest account on networks that are connected to untrusted networks such as the Internet. It provides too
many opportunities for break-ins.
QUESTION 186
A computer currently runs a 64-bit version of Windows 7 Enterprise.
You need to deploy a 64-bit version of Windows 8.1 Pro to the computer. The new deployment
must not affect the Windows 7 installation on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://lifehacker.com/5840387/how-to-dual+boot-windows-7-and-windows-8-side-by-side
Explanation:
http://winsupersite.com/article/windows8/windows-8-tip-dualboot-windows-7-144111
Windows 8 Tip: Dual-Boot with Windows 7
When it comes to dual-booting between Windows 8 and Windows 7, the advice is the same as always: Install
the older OS first, make room for the second OS, and then install the newer OS.
..Once Windows 7 is installed on the PC, there are two steps to follow to install Windows 8 in a dual-boot
configuration:
1. Partition the disk.
..2. Install Windows 8 using the Custom install type. Now, you can run Windows 8 Setup. You can use optical
disc- or USB-based Setup media, but you must do so by booting the PC from the media. (That is, do
not run Setup from within Windows 7.)
Step through the Windows 8 Setup wizard normally. When you reach the screen that asks, “Which type of
installation do you want?”, Choose “Custom: Install Windows only (advanced).”
QUESTION 187
A client laptop runs Windows 7 Professional and a custom application. The custom application is
compatible with Windows 8.1.
You plan to migrate user settings and data from the client laptop to a new tablet PC that runs
Windows 8.1 Pro. You install the User State Migration Toolkit (USMT) on a USB flash drive.
You need to ensure that the custom application settings are applied to the tablet PC after the
migration is complete.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://www.utilizewindows.com/7/basics/170-migrate-to-windows-7-using-usmt
Explanation:
http://technet.microsoft.com/en-us/library/cc721992%28v=ws.10%29.aspx
USMT Components
You use ScanState to collect the files and settings from the source computer. You use LoadState to restore
the user state onto the destination computer.
..
USMT Components
ScanState.exe
ScanState scans the source computer, collects the files and settings and creates a store. ScanState
does not modify the source computer. By default, ScanState compresses the files and stores them as
an image file (USMT3.MIG).
LoadState.exe
LoadState migrates the files and settings from the store to the destination computer. LoadState migrates
each file (one by one) from the store to a temporary location on the destination computer — the
files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the
file to the correct location, deletes the temporary copy, and begins migrating the next file.
Compression improves performance by reducing network bandwidth usage as well as the required
space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.
QUESTION 188
A desktop computer runs Windows 8.1. The computer is joined to an Active Directory Domain
Services (AD DS) domain named contoso.com.
You have two domain user accounts:
A primary account named User1 that does not have
domain administrative privileges.
An account named Admin1 that has administrative
privileges in the domain.
You are currently logged in as User1. You need to run an application named appl.exe.
You have the following requirements:
Start the application by using your administrative
credentials.
Ensure that the user environment is fully available
to the application.
You need to complete the command to meet the requirements.
Which command segments should you use to complete the command? (To answer, drag the
appropriate command segments to the correct locations in the answer area. Command segments
may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc771525.aspx
Runas
Allows a user to run specific tools and programs with different permissions than the user's current logon
provides.
Syntax
runas [{/profile | /noprofile}] [/env] [{/netonly | /savecred}] [/smartcard] [/showtrustlevels] [/trustlevel]
/user:<UserAccountName> "<ProgramName> <PathToProgramFile>"
Parameters
/profile
Loads the user's profile. This is the default. This parameter cannot be used with the /netonly parameter.
/no profile
Specifies that the user's profile is not to be loaded. This allows the application to load more quickly, but
it can also cause a malfunction in some applications.
..
/user:<UserAccountName> "<ProgramName> <PathToProgramFile>"
Specifies the name of the user account under which to run the program, the program name, and the
path to the program file. The user account name format should be <User>@<Domain> or
<Domain>\<UserAccountName>.
QUESTION 189
You have a computer that runs Windows 8.1, and three unused external disk drives.
You are creating a volume to store picture files. You have the following requirements:
Use all three external disk drives.
Ensure that the volume is accessible from a single
drive letter.
Maximize the available space.
You need to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Disk Management tool does not have a setting for disk resiliency.
In Storage Pool select "Simple" (no resiliency): A simple storage space writes one copy of your
data, and doesn’t protect you from drive failures. A simple storage space requires at least one
drive.
Explanation:
http://www.eightforums.com/tutorials/4203-storage-spaces-create-new-pool-storage-spacewindows-8-a.html
How Create a New Pool and Storage Space in Windows 8
..To Create a New Pool and Storage Space
..
http://blogs.msdn.com/b/olivnie/archive/2013/02/05/windows-8-storage.aspx
Windows 8: Storage
Storage Spaces
Storage Spaces is a new feature for WindowsR 8 that allows a user to combine several disks into a single
pool of storage that provides for easier management of multiple disks and resiliency against hardware failure
on any of those disks. The disks that you use for Storage Spaces can be a mix of different-sized
disks, and these can be connected to MicrosoftR Windows using both internal and external connections,
making it easy to turn the collection of drives you already have into a safe and easy-to-manage place to
store things like your home videos or photos.
...
The table below describes the different options for resiliency:
QUESTION 190
A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that
run a 64-bit version of Windows 8.1.
The workgroup contains client computers that run a 32-bit version of Windows 8.1. Computers
in the workgroup can't currently print to PRINTER1.
You need to ensure that the workgroup computers can print to PRINTER1.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
to the answer area and arrange the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://technet.microsoft.com/library/cc732946.aspx
Explanation:
http://technet.microsoft.com/library/cc732946.aspx
Update and Manage Printer Drivers
Add drivers for client computers running 32-bit or 64-bit versions of Windows
To support client computers that use different processor architectures than the print server, you must install
additional drivers. For example, if your print server is running a 64-bit version of Windows and you
want to support client computers running 32-bit versions of Windows, you must add x86-based drivers for
each printer.
Further information:
http://www.printmanager.com/cms.php?aid=54&fullpage=1&support=8
Mixing 32 bit and 64 bit Print Server Architectures
..64 bit Print Server with 32 bit Clients:
In the following scenario, we will be covering how to easily allow 32 bit Windows Clients to print through
shared print queues on a 64 Bit Server.
..1. Download 32 bit Driver:
..2. Open Sharing Properties:
..3. Specify Additional Drivers:
..
4. Select your 32 Bit Driver:
..5. Test and Print:
QUESTION 191
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one
network switch and joined to the domain. Windows Firewall is turned off on both computers.
You are planning a remote management solution. You have the following requirements:
Ensure that COMPUTER1 can run remote commands on
COMPUTER2.
Test the solution by successfully running a command from
COMPUTER1 that executes on COMPUTER2.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the
remote management requirements.
Which commands should you run? (To answer, drag the appropriate command or commands to
the correct location or locations in the answer area. Commands may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://technet.microsoft.com/en-us/library/dd163506.aspx
Explanation:
http://msdn.microsoft.com/en-us/library/aa384372%28v=vs.85%29.aspx
Installation and Configuration for Windows Remote Management
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start.
Configures a listener for the ports that send and receive WS-Management protocol messages using either
HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
http://technet.microsoft.com/en-us/library/hh875630.aspx
Winrs
Windows Remote Management allows you to manage and execute programs remotely.
Syntax
winrs [/<parameter>[:<value>]] <command>
Parameters
/r[emote]:<endpoint>
Specifies the target endpoint using a NetBIOS name or the standard connection:
<url>: [<transport>://]<target>[:<port>]
If not specified, /r:localhost is used.
QUESTION 192
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8.1. Some computers have a Trusted Platform Module (TPM) chip. Members of the
ITStaff security group are part of the local Power Users group on each client computer.
You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker
Drive Encryption on all client computers by using the least amount of privilege necessary.
Which commands should you run? (To answer, drag the appropriate command or commands to
the correct location or locations in the answer area. Commands may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://technet.microsoft.com/en-us/library/ee706521(v=ws.10).aspx
Explanation:
http://technet.microsoft.com/en-US/library/cc754948.aspx
Group Policy Planning and Deployment Guide
..Administrative requirements for Group Policy
To use Group Policy, your organization must be using Active Directory, and the destination desktop and
server computers must be running Windows Server 2008, Windows Vista, Windows Server 2003, or
Windows XP.
By default, only members of the Domain Admins or the Enterprise Admins groups can create and link
GPOs, but you can delegate this task to other users.
..
http://technet.microsoft.com/en-us/library/jj679890.aspx
BitLocker Group Policy Settings
.. Require additional authentication at startup
This policy setting is used to control which unlock options are available for operating system drives.
..With this policy setting, you can configure whether BitLocker requires additional authentication each time
the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This policy
setting is applied when you turn on BitLocker.
.. Reference
If you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible
TPM check box. In this mode, a USB drive is required for startup. Key information that is used to encrypt
the drive is stored on the USB drive, which creates a USB key. When the USB key is inserted, access
to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable, you
need to use one of the BitLocker recovery options to access the drive.
...
Further information:
..Enforce drive encryption type on fixed data drives
This policy controls whether fixed data drives utilize Used Space Only encryption or Full encryption. Setting
this policy also causes the BitLocker Setup Wizard to skip the encryption options page so no encryption
selection displays to the user.
QUESTION 193
A company has client computers that run Windows 8.1. All client computers allow incoming
Remote Desktop connections.
You attempt to connect from COMPUTER1 to COMPUTER2 by using Remote Desktop.
Remote Desktop cannot connect to the remote computer. You establish that the firewall settings
on COMPUTER2 have not been set to allow incoming connections.
From COMPUTER1, you need to enable Remote Desktop traffic through Windows Firewall on
COMPUTER2.
Which commands should you run? (To answer, drag the appropriate command or commands to
the correct location or locations in the answer area. Commands may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Ref: http://docs.oseems.com/operatingsystem/windows/firewall-command
Explanation:
http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx
PsExec
PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete
with full interactivity for console applications, without having to manually install client software. PsExec's
most powerful uses include launching interactive command-prompts on remote systems and remote-enabling
tools like IpConfig that otherwise do not have the ability to show information about remote systems.
http://ss64.com/nt/psexec.html
PsExec
Syntax
psexec \\computer[,computer[,..] [options] command [arguments]
http://technet.microsoft.com/en-us/library/cc771046%28v=ws.10%29.aspx
Netsh Commands for Windows Firewall
The Netsh commands for Windows Firewall provide a command-line alternative to the capabilities of the
Windows Firewall Control Panel utility. By using the Netsh firewall commands, you can configure and
view Windows Firewall exceptions and configuration settings.
.. Netsh firewall
The following sections describe each command and its syntax.
..
set service
Enables or disables the pre-defined file and printer sharing, remote administration, remote desktop,
and UPnP exceptions.
Syntax
set service [ type = ] { fileandprint | remoteadmin | remotedesktop | upnp | all } [ [ mode = ] { enable |
disable } ] [ [ scope = ] { all | subnet | custom } ] [ [ addresses = ] { IPAddress | IPRange | Subnet | localsubnet
}[,…] ] [ [ profile = ] { current | domain | standard | all } ]
Parameters
[ type = ] { fileandprint | remoteadmin | remotedesktop | upnp | all }
Required. Specifies the service whose pre-defined rules are enabled or disabled. The value must be one
of the following:
fileandprint. The file and printer sharing service.
remoteadmin. The ability to remotely administer a computer running Windows.
remotedesktop. The ability to use a Terminal Services client such as Remote Desktop.
upnp. Universal Plug-and-Play protocol for networked devices.
all. All of the above services.
[ [ mode = ] { enable | disable } ]
Specifies whether this exception is currently applied and active on the local computer. The default
value is enable.
[ [ scope = ] { all | subnet | custom } ]
..
[ [ addresses = ] { IPAddress | IPRange | Subnet | localsubnet }[,…] ]
..
[ [ profile = ] { current | domain | standard | all } ]
QUESTION 194
You administer Windows 8.1 Pro computers in your company network.
A user informs you that he wants to use a picture password on his computer.
You need to configure a picture password with a custom picture for the user.
Which prerequisites should you comply with for each element in order to configure the required
picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct
element or elements in the answer area. Each prerequisite may be used once, more than once, or
not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 195
You administer Windows 8.1 Enterprise (64-bit) computers in your company network. For some
applications, some computers run a 32-bit version of the application, and other computers run a
64-bit version of the application.
You want to distribute a package that contains updates for the 32-bit applications only.
You need to determine if a particular computer is running 32-bit or 64-bit versions of the
applications.
From the Select columns window, which column should you add to Task Manager? (To answer,
select the appropriate column name in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 196
You install Windows 8.1 Enterprise on new laptops that will be shipped to remote users in the
sales department of your company. You create new VPN connections on the laptops.
Your company security policy requires that the maximum allowed network outage time for the
VPN connection should be less than 10 minutes.
You need to configure the required timeout.
Which protocol should you use? (To answer, configure the appropriate option or options in the
answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/dd469724%28v=ws.10%29.aspx
RRAS Server Properties Page - IKEv2 Tab
.. Network outage time (minutes)
Specifies the maximum amount of time, in minutes, that IKEv2 packets are retransmitted without a response
before the connection is considered lost. Higher values support connection persistence through
network outages. The default value is 30 minutes.
..
http://blogs.technet.com/b/sbs/archive/2014/05/19/configuring-vpn-on-windows-server-2012-r2-essentials.aspx
Understanding VPN configuration in Windows Server 2012 R2 Essentials
.. Default Settings of VPN on Windows Server 2012 R2 Essentials
To check the default settings for the VPN, open Routing and Remote Access Manager. Right click server
name, and select Properties.
..The IKEv2 tab consists of the default options to control the IKEv2 client connections and Security Association
expiration.
QUESTION 197
A company has a main office located in Miami, and branch offices in Boston, Los Angeles, and
Portland. The office networks are configured as described in the following table.
A management computer in the main office, named COMPUTER1, runs Windows 8.1 and
several third-party management applications.
You are configuring access to COMPUTER1. You have the following requirements:
Ensure that only users in the Boston office can connect to COMPUTER1
by using HTTP.
Ensure that only users in the Los Angeles office can connect to
COMPUTER1 by using HTTPS.
Ensure that only users in the Portland office can connect to COMPUTER1
by using FTP.
You need to configure access to COMPUTER1.
How should you configure Windows Firewall? (To answer, drag the appropriate elements to the
correct location or locations in the answer area. Elements may be used once, more than once, or
not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation/Reference:
Seems to be TCP on every answer
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
Explanation:
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
List of TCP and UDP port numbers
20 TCP UDP FTP data transfer
21 TCP FTP control (command)
80 TCP Hypertext Transfer Protocol (HTTP)
443 TCP Hypertext Transfer Protocol over TLS/SSL (HTTPS)
443 UDP QUIC (from Chromium) for HTTPS
Further Information:
22 TCP UDP Secure Shell (SSH)—used for secure logins, file transfers (scp, sftp) and port forwarding
QUESTION 198
A company plans to upgrade its client computer operating systems from Windows 7 to Windows
8.1.
You need to use the User State Migration Tool (USMT) to configure the migration profile to
exclude all files in the users' Documents folders.
Which command should you run on the client computers before the upgrade? (To answer, drag
the appropriate command elements to the correct location or locations in the answer area. Each
command may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 199
You administer Windows 8.1 computers in your company network. All computers include
Windows 8.1 compatible Trusted Platform Module (TPM).
You configure a computer that will run a credit card processing application.
You need to ensure that the computer requires a user to enter a PIN code when starting the
computer.
Which policy should you configure? (To answer, select the appropriate policy in the answer
area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj679890.aspx
BitLocker Group Policy Settings
Require additional authentication at startup
This policy setting is used to control which unlock options are available for operating system drives.
With this policy setting, you can configure whether BitLocker requires additional authentication each time
the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This policy
setting is applied when you turn on BitLocker.
..On a computer with a compatible TPM, four types of authentication methods can be used at startup to
provide added protection for encrypted data. When the computer starts, it can use:
only the TPM for authentication
insertion of a USB flash drive containing the startup key
the entry of a 4-digit to 20-digit personal identification number (PIN)
a combination of the PIN and the USB flash drive
There are four options for TPM-enabled computers or devices:
* Configure TPM startup
Allow TPM
Require TPM
Do not allow TPM
* Configure TPM startup PIN
Allow startup PIN with TPM
Require startup PIN with TPM
Do not allow startup PIN with TPM
* Configure TPM startup key
Allow startup key with TPM
Require startup key with TPM
Do not allow startup key with TPM
* Configure TPM startup key and PIN
Allow TPM startup key with PIN
Require startup key and PIN with TPM
Do not allow TPM startup key with PIN
Further information:
http://4sysops.com/archives/active-directory-and-bitlocker-part-3-group-policy-settings/
Active Directory and BitLocker – Part 3: Group Policy settings
...
There are a few things you’ll need to note when configuring these settings in Group Policy for your Active
Directory.
..Second, make sure you get the “Require additional authentication at startup” setting correct under “Operating
system drives.” Make sure that “Allow BitLocker without a compatible TPM” is unchecked and that
you’re not requiring more than one startup option. This is how it should look:
http://4sysops.com/archives/bitlocker-group-policy-changes-in-windows-8/
BitLocker Group Policy changes in Windows 8
“Allow Secure Boot for integrity validation” allows you to configure the use of Secure Boot on computers
that have UEFI firmware. More specifically, it lets you disable it since the default is to use Secure Boot
when it is available on a computer. In the event you do disable it, you can configure the “use enhanced
Boot Configuration Data validation profile” to choose specific BCD settings to verify.
Allow Secure Boot for integrity validation
QUESTION 200
A Company has 10 computers that run windows vista. The computers are members of a
workgroup.
The company plans to upgrade the computers to Windows 8.1. You are planning a deployment
strategy.
You need to ensure that users can log on to their existing accounts and access their existing data
after the upgrade.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://winsupersite.com/article/windows8/windows-8-tip-upgrade-windows-vista-144320
Windows 8 Tip: Upgrade from Windows Vista
Continuing a series of tips that examines upgrading from previous versions of Windows to Windows 8, I
take a look at Windows Vista: Which upgrade types are supported, and what can you bring forward from
this version of Windows to Windows 8?
You may recall from previous articles, or from Windows 8 Secrets, that Microsoft has changed the way
they describe the processes by which we move from the one version of Windows to the next. In the past,
we used the following terms to describe the different ways in which you could install Windows:
Clean install, where you install—or reinstall—Windows from scratch.
In-place upgrade, where you upgrade to a newer version of Windows from within the older version, retaining
most of your settings and applications, and all of your documents and other data files.
Migration, by which Setup backs up your settings and/or data first, then clean installs Windows, and then
reapplies your settings and/or data to the new OS.
QUESTION 201
A company has client computers that run Windows XP or Windows Vista.
The company plans to upgrade all client computers to Windows 8.1. You are planning a
deployment strategy.
You need to identify the elements that will be retained after the upgrades.
Which elements will be retained? (To answer, drag the appropriate element or elements to the
correct location or locations in the answer area. Elements may be used once, more than once, or
not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj203353.aspx
Windows 8 and Windows 8.1 Upgrade Paths
QUESTION 202
A company has an Active Directory Domain Services (AD DS) domain. All client computers run
Windows 8.1. The company has three departments named Accounting, Human Resources (HR),
and Marketing. User account objects are stored in their respective departmental AD security
groups and have full access to shared folders for each department.
A new company policy requires that the following access rules are in place:
Users must have complete access only to their department’s shared
folder.
Accounting department users must be able to change files in the
HR folder.
HR department users must be able to change files in the Marketing
folder.
Marketing department users must be able to change files in the
Accounting folder.
You need to comply with the company policy.
Which permissions should you assign? (To answer, drag the appropriate security group or groups
to the correct location or locations in the answer area. Security groups may be used once, more
than once, or not at all. You may need to drag the split bar between panes or scroll to view
content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/bb727008.aspx
File and Folder Permissions
On NTFS volumes, you can set security permissions on files and folders. These permissions grant or
deny access to the files and folders.
..
File and Folder Permissions:
QUESTION 203
You are troubleshooting communication issues on a computer that has Windows 8.1 Enterprise
installed.
The relevant portion of the computer configuration is displayed in the exhibit. (Click the Exhibit
button.)
You need to find the Windows Firewall service startup and shutdown events.
In the Event Viewer, which event log should you select? (To answer, select the appropriate log in
the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Further Information:
QUESTION 204
You are preparing to deploy a new computer that runs Windows 8.1. You plan to copy the user's
data from his current computer to the new computer.
You need to generate a list of data that will be copied from his existing computer to the new
computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Note:
To use the Windows Easy Transfer feature, you must be an Administrator on both Windows 8.1-based
computers.
(box 1)
To transfer files and settings from your local computer to the domain-joined computer, follow these
steps:
1. Save files and settings on the local computer. To do this, follow these steps:
1. On the Start screen, type Windows Easy Transfer, and then click Windows Easy Transfer from the
results.
2. On the Welcome to Windows Easy Transfer page, click Next.
3. Select An external hard disk or USB flash Drive, and then plug in the external storage drive.
4. Select This is my old PC. Windows Easy Transfer will scan all user profiles and data on the computer.
5. To select what to transfer, click Customize, and then click Advanced to change your selections. After
you make your selections, click Save.
6. Click Next.
7. Enter the password, and then click Save to save the Easy Transfer file to the external storage drive.
8. Click Next two times, and then click Close to close the Windows Easy Transfer wizard.
(box 2, Box 3)
2. Import files and settings on the domain-joined computer. To do this, follow these steps:
1. On the Start screen, type Windows Easy Transfer, and then click Windows Easy Transfer from the
results.
2. On the Welcome to Windows Easy Transfer page, click Next.
3. Select An external hard disk or USB flash Drive.
4. Select This is my new PC.
5. Plug in the external storage drive, and then select Yes.
6. Locate where you saved the Easy Transfer file, and then click Open.
7. Enter the password that you specified in Step 1G, and then click Next.
8. To select what to transfer, click Customize, and then click Advanced to change your selections. After
you make selections, click Save.
Note To map user accounts or to map drives, click Advanced Options.
9. Click Transfer.
10. (box 3) After the transfer finishes, click See what was transferred to view the Windows Easy Transfer
reports. Click See a list of apps you might want to install on your new PC to see the programs that are
installed on your old computer.
11. Click Close to close the Windows Easy Transfer wizard.
12. Restart the computer.
To install Windows 8.1 apps on the domain-joined computer, follow these steps:
1. On the Start screen, click Store.
2. Click the apps that you want to install, and then click Install.
Reference: How to use Windows Easy Transfer to transfer files and settings in Windows 8.1
QUESTION 205
A company has Windows 8.1 client computers. All computers have the same hardware and
software installed.
The Development and Sales departments have different backup requirements. The requirements
are described in the following table.
You need to select a backup location for each department.
What should you do? (To answer, drag the appropriate resource to the correct location or
locations in the answer area. Resources may be used once, more than once, or not at all. You
may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://winsupersite.com/windows-8/windows-81-tip-use-system-image-backup
Windows 8.1 Tip: Use System Image Backup
..
In the File History control panel that appears, look in the lower left corner. The option you're looking for is
System Image Backup. Click that, and the familiar Create a System Image wizard appears and you're
good to go.
http://windows.microsoft.com/en-us/windows-8/set-drive-file-history
Set up a drive for File History
Before you start using File History to back up your files, you need to first select where your backups are
saved. You can select an externally connected drive, such as a USB drive, or you can save to a drive on
a network.
QUESTION 206
You administer Windows 8.1 Enterprise computers in your company network.
One of the computers indicates high memory utilization. You open Task Manager on the
computer and discover that a process named Antimalware Service Executable consumes 30% of
available memory.
You need to identify the account that is used to run the process.
In Task Manager, which tab should you select to identify the account? (To answer, select the
appropriate tab in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 207
You administer Windows XP and Windows 7 client computers in your company network. You
add 100 new client computers that have Windows 8.1 Enterprise installed.
You need to migrate user profiles, local groups membership, and network mapped drives to the
new client computers. You download and copy User State Migration Tool (USMT) files to a
network share.
Which three actions should you perform next, in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Note:
* / Step One: Plan Your Migration
Modify copies of the Migration.xml and MigDocs.xml files and create custom .xml files, if it is required.
/ Step Two: Collect Files and Settings from the Source Computer
Run scanstate on source computers
/ Step Three: Prepare the Destination Computer and Restore Files and Settings
Run loadstate on the destination computers.
* USMT 5.0 includes three command-line tools:
ScanState.exe version 6.2
LoadState.exe version 6.2
UsmtUtils.exe version 6.2* USMT 5.0 also includes a set of three modifiable .xml files:
MigApp.xml
MigDocs.xml
MigUser.xml
http://technet.microsoft.com/en-us/library/cc766203%28v=ws.10%29.aspx
USMT .xml Files
.. Config.xml
This is an optional file that you can create using the /genconfig option on the ScanState command line.
You should create and modify this file if you want to exclude certain components from the migration. In
addition, you must create and modify this file if you want to exclude any of the operating system settings
that are migrated to computers running Windows Vista (because MigSys.xml is not applicable in that scenario).
This file has a different format than the migration .xml files because it does not contain any migration
rules — it only contains a list of the operating system components, applications, and the user documents
that can be migrated. For an example, see the Sample Config.xml file. For this reason, excluding
components using this file is easier than modifying the migration .xml files because you do not need to be
familiar with the migration rules and syntax. You cannot use wildcard characters in this file.
http://technet.microsoft.com/en-us/library/cc721992%28v=ws.10%29.aspx
USMT Components
You use ScanState to collect the files and settings from the source computer. You use LoadState to restore
the user state onto the destination computer.
.. USMT Components
ScanState.exe
ScanState scans the source computer, collects the files and settings and creates a store. ScanState
does not modify the source computer. By default, ScanState compresses the files and stores them as
an image file (USMT3.MIG).
LoadState.exe
LoadState migrates the files and settings from the store to the destination computer. LoadState migrates
each file (one by one) from the store to a temporary location on the destination computer — the
files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the
file to the correct location, deletes the temporary copy, and begins migrating the next file.
Compression improves performance by reducing network bandwidth usage as well as the required
space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.
QUESTION 208
A company has client computers that run Windows 7. Each employee has two client computers:
one at work and one at home.
The company plans to deploy Windows 8.1 to all client computers. You are planning a
deployment strategy.
You have the following requirements:
Minimize deployment time.
Ensure that the PC Reset and PC Refresh features can be utilized on all
work computers.
You need to plan a deployment strategy that meets the requirements.
What should you do? (To answer, drag the appropriate installation method or methods to the
correct location or locations in the answer area. Methods may be used once, more than once, or
not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc
How to refresh, reset, or restore your PC
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC reinstalls
Windows and keeps your personal files and settings. It also keeps the apps that came with your
PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes
your files, settings, and apps — except for the apps that came with your PC. Restoring your PC is a way
to undo recent system changes you've made.
http://technet.microsoft.com/en-us/windows/jj874386.aspx
Using Windows To Go
Windows To Go is not a late-night drive-through offering at the local Microsoft Store. Rather, it’s a feature
in the Windows 8 Enterprise operating system that allows you to start a Windows 8 image (a Windows To
Go workspace) from an external USB drive. You can start a Windows To Go workspace on most computers
that meet the Windows 7 or Windows 8 certification requirements, regardless of the operating system
currently running on them.
Further Information:
http://technet.microsoft.com/en-us/library/jj592685.aspx
Deployment Considerations for Windows To Go
QUESTION 209
You administer Windows 8.1 computers in your company network. The security policies of the
company require that USB storage devices are allowed only if they are protected with
BitlockerTo Go.
You need to prevent users from removing Bitlocker encryption from the USB storage devices.
Which configuration setting should you modify? (To answer, select the appropriate setting in the
answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/jj679890.aspx
BitLocker Group Policy Settings
.. Control use of BitLocker on removable drives
This policy setting is used to prevent users from turning BitLocker on or off on removable data drives.
.. Configure use of smart cards on fixed data drives
This policy setting is used to require, allow, or deny the use of smart cards with fixed data drives.
.. Deny write access to removable drives not protected by BitLocker
This policy setting is used to require that removable drives are encrypted prior to granting Write access,
and to control whether BitLocker-protected removable drives that were configured in another organization
can be opened with Write access.
.. Configure use of hardware-based encryption for removable data drives
This policy controls how BitLocker reacts to encrypted drives when they are used as removable data
drives. Using hardware-based encryption can improve the performance of drive operations that involve
frequent reading or writing of data to the drive.
..Enforce drive encryption type on removable data drives
This policy controls whether fixed data drives utilize Full encryption or Used Space Only encryption. Setting
this policy also causes the BitLocker Setup Wizard to skip the encryption options page, so no encryption
selection displays to the user.
..Allow access to BitLocker-protected removable data drives from earlier versions of Windows
This policy setting controls access to removable data drives that are using the BitLocker To Go Reader
and whether the BitLocker To Go Reader can be installed on the drive.
.. Configure use of passwords on removable data drives
This policy setting is used to require, allow, or deny the use of passwords with removable data drives.
.. Choose how BitLocker-protected removable drives can be recovered
This policy setting is used to configure recovery methods for removable data drives.
..
Further Information:
QUESTION 210
You administer 100 Windows 8.1 Pro laptops in your company network.
You have a wireless access point that requires 802.1x authentication. Authentication requests are
forwarded to a RADIUS server.
You need to configure the laptops to connect to the wireless access point. Your solution must
ensure that laptops authenticate to the RADIUS server by using stored credentials.
Which three actions should you perform in sequence? (To answer, move the appropriate three
actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 211
You are a system administrator for a local construction company. The company uses Windows
8.1 Pro desktop and laptop computers. All desktop computers have a 160 GB disk drive.
You receive a call from a user who needs to a recover an .avi file from file history but discovers
that the file no longer exists. The user reports recently deleting a large PowerPoint presentation
from the hard drive.
The user's File History configuration is displayed in the graphic below:
Use the drop-down menus to select the answer choice that completes each statement Each correct
selection is worth one point.
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/what-something-goes-wrong-file-history
What if something goes wrong in File History?
.. Note
File History doesn't automatically delete versions of files older than the time interval you choose unless
your drive is getting full and space is needed to back up more recent versions.
..
http://windowssecrets.com/top-story/understanding-windows-8s-file-history/
Understanding Windows 8′s File History
..As noted, File History typically requires a second drive or networked drive to store backup files. If that
drive isn’t available — say, you’re on the go and you’ve disconnected your USB drive — File History will
use a temporary offline cache located on your C: drive.
The Size of offline cache setting controls how much of your C: drive will be used to store temporary backups
if the normal backup drive isn’t available. The cache is normally set to 5 percent of the C: drive’s
space. But you can increase the cache size to as much as 20 percent (see Figure 6).
Figure 6. File History's offline cache size can be set as low as 2 percent and as high as 20 percent of
the C: drive's space.
With the Keep saved versions setting (see Figure 7), you can control how long Windows retains your
backups — from one month to an optimistic “Forever.”
Figure 7. File History's Keep saved versions setting
...
QUESTION 212
You are a system administrator for Contoso, Ltd. You manage a remote site that consists of 50
users. Each user has a Windows 8.1 desktop computer. You grant local admin rights to a small
group of power users that have proven a level of proficiency with Windows 8.1. This group helps
with minor problems as needed.
One of the power users makes configuration changes on a desktop computer. Now the computer
freezes for two minutes during the boot process.
You need to use msconfig to change the boot options to meet the following requirements:
Boot in safe mode
Boot the computer with a minimal set of drivers
Networking enabled
See the splash startup screen
Read drivers as they are loaded
Which three options should you select? (To answer, select the appropriate three options from the
System Configuration Boot tab in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://windows.microsoft.com/en-us/windows/using-system-configuration#1TC=windows-8
Using System Configuration (msconfig)
System Configuration (msconfig) is a tool that can help identify problems that might prevent Windows
from starting correctly. Using System Configuration, you can start Windows with common services and
startup apps turned off and then turn them back on, one at a time. If a problem doesn't occur when an
app or service is turned off, but does occur when the service is turned on, then that service could be the
cause of the problem.
..Boot
Shows configuration options for the operating system and advanced debugging settings, including:
Safe boot: Minimal. On startup, opens the Windows graphical user interface (File Explorer) in safe mode
running only critical system services. Networking is disabled.
Safe boot: Alternate shell. On startup, opens the Windows command prompt in safe mode running only
critical system services. Networking and File Explorer are disabled.
Safe boot: Active Directory repair. On startup, opens File Explorer in safe mode running critical system
services and Active Directory.
Safe boot: Network. On startup, opens File Explorer in safe mode running only critical system services.
Networking is enabled.
No GUI boot. Doesn't display the Windows Welcome screen when starting.
Boot log. Stores all information from the startup process in the file %SystemRoot%Ntbtlog.txt.
Base video. On startup, opens File Explorer in minimal VGA mode. This loads standard VGA drivers instead
of video drivers specific to the video hardware on the PC.
OS boot information. Shows driver names as drivers are being loaded during the startup process.
.
QUESTION 213
You are the PC support specialist for Contoso, Ltd.
Your department upgrades your company's laptops to Windows 8.1.
You need to use BitLocker to encrypt the system drives on these laptops. You attempt to encrypt
several laptops but receive an error message shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.howtogeek.com/howto/6229/how-to-use-bitlocker-on-drives-without-tpm/
How To Use BitLocker on Drives without TPM
BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista,
but requires a Trusted Platform Module (TPM) on the system. Not all systems include TPM and today we
take a look at how to bypass it so you can use BitLocker.
..What happens if you get this goofy error…and what is a TPM anyway? TPM stands for Trusted Platform
Module which is a microchip in a computer that supports advanced security features. It’s where BitLocker
stores the encryption key. If you have a drive that doesn’t have a compatible TMP then you’ll need to use
the following steps and have a flash drive.
..After the restart you’re prompted to use the startup key on the flash drive every time you start the computer.
Further information:
http://technet.microsoft.com/en-us/library/jj679890.aspx
BitLocker Group Policy Settings
.. Require additional authentication at startup
This policy setting is used to control which unlock options are available for operating system drives.
..With this policy setting, you can configure whether BitLocker requires additional authentication each time
the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This policy
setting is applied when you turn on BitLocker.
QUESTION 214
You have a Windows 8.1 Pro laptop. You set the Power Options so the laptop does not sleep
when plugged in.
When the laptop is not plugged in, it will go to sleep but not always after the same amount of
time. It also wakes itself up seemingly randomly without user intervention.
You need to confirm that the sleep settings are configured when the laptop is functioning on
battery power, and you need to identify what may be causing the machine to wake up or is
preventing it from sleeping.
You run the command Powercfg /devicequery. The configuration is shown in the following
exhibit (Click the Exhibit button.)
You open the Power Options, which are shown in the following exhibit. (Click the Exhibit
button.)
Finally, you run powercfg /request from the command line. The configuration is shown in the
following exhibit. (Click the Exhibit button.)
Consider each of the following statements. Does the information in the three screenshots support
the inference as stated? (Each correct selection is worth one point.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Further Information:
http://technet.microsoft.com/en-us/library/cc748940%28v=ws.10%29.aspx
Powercfg Command-Line Options
You can use the Powercfg.exe tool to control power settings and configure computers to default to Hibernate
or Standby modes.
Powercfg Command-Line Options
powercfg [-l] [-q ] [-x] [-changename] [-duplicatescheme] [-d] [-deletesetting] [-setactive] [-getactivescheme]
[-setacvalueindex] [-setdcvalueindex] [-h] [-a] [-devicequery] [-deviceenablewake] [-devicedisablewake]
[-import] [-export] [-lastwake] [-?] [-aliases] [-setsecuritydescriptor] [-getsecuritydescriptor]
...
-devicequery wake_armed – Lists devices that are currently configured to wake the computer from any
sleep state.
QUESTION 215
A company has Windows 8.1 client computers.
A Windows Server Update Services (WSUS) server has been configured to manage the client computer updates.
You need to configure the client computers to join a WSUS group named Computers and to automatically receive updates from the WSUS server.
Which two Group Policy Object (GPO) settings should you configure? (To answer, select the appropriate two settings from the GPO Editor in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc720539%28v=ws.10%29.aspx
Configure Automatic Updates by Using Group Policy
..Specify Intranet Microsoft Update Service Location
The settings for this policy enable you to configure a WSUS server that Automatic Updates will contact for
updates. You must enable this policy in order for Automatic Updates to download updates from the
WSUS server.
..Enable Client-side Targeting
This policy enables client computers to self-populate computer groups that exist on the WSUS server.
If the status is set to Enabled, the specified computer group information is sent to WSUS, which uses it to
determine which updates should be deployed to this computer. This setting is only capable of indicating to
the WSUS server which group the client computer should use. You must actually create the group on the
WSUS server.
QUESTION 216
Your company is deploying new Windows 8.1 computers.
The company has several departments. Each department requires different hardware
configurations. You need to implement the appropriate hardware.
You have the following requirements:
Finance must have BitLocker To Go.
Operations must have the ability to use tablets and access the Windows Store to
download and run apps.
IT must have the ability to use Hyper-V with Windows 8.1.
Marketing must have the ability to use tablets as well as the snap app
functionality.
What are the minimum hardware requirements to meet each department's needs? (To answer,
drag the appropriate hardware to the correct location or locations in the answer area. Each
answer may be used more than once.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/bitlocker-drive-encryption
BitLocker Drive Encryption
BitLocker can encrypt the drive Windows is installed on (the operating system drive) as well as fixed data
drives (such as internal hard drives). You can also use BitLocker To Go to help protect all files stored on a
removable data drive (such as an external hard drive or USB flash drive).
http://windows.microsoft.com/en-us/windows-8/system-requirements
System requirements
Windows 8.1
..
To use touch, you need a tablet or a monitor that supports multitouch (more info)
To access the Windows Store and to download, run, and snap apps, you need an active Internet connection
and a screen resolution of at least 1024 x 768
...
http://blogs.msdn.com/b/b8/archive/2011/09/07/bringing-hyper-v-to-windows-8.aspx
Bringing Hyper-V to “Windows 8”
.. Hyper-V requires a 64-bit system that has Second Level Address Translation (SLAT). SLAT is a feature
present in the current generation of 64-bit processors by Intel & AMD. You’ll also need a 64-bit version of
Windows 8, and at least 4GB of RAM. Hyper-V does support creation of both 32-bit and 64-bit operating
systems in the VMs.
http://windowsitpro.com/windows-8/q-what-resolution-do-windows-8-metro-ui-and-snap-feature-require
Q: What resolution do the Windows 8 Metro UI and Snap feature require?
..To use the Snap application capability, which allows two Metro applications to appear on the screen at
the same time with one application using up most of the screen and the other giving a summary view, you
need a resolution of 1366x768.
...
QUESTION 217
You are the network administrator for Contoso, Ltd. You want to do a non-interactive
installation of a desktop app named PDFApp on all of your Windows 8.1 computers by using the
Windows Installer.
You create an MSI package named pdfapp.msi and copy it to the E drive of your Windows 8.1
computers by using Group Policy. You plan to use this file to install the desktop app.
You need to write a Windows Installer command line that ensures the users do not see an
interface during the installation. A reboot is not required.
What should you do? (To answer, drag the appropriate command to the correct location in the
command line. Each command may be used only once, more than once, or not at all. You may
need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx
Msiexec (command-line options)
..
To install or configure a product
Syntax
msiexec /i {Package | ProductCode}
Parameters
/i
Installs or configures a product.
Package
Specifies the name of the Windows Installer package file.
ProductCode
Specifies the globally unique identifier (GUID) of the Windows Installer package.
...
To set the user interface level
Syntax
msiexec /q{n | b | r | f | n+ | b+ | b-}
Parameters
/qn
Displays no user interface.
...
http://www.gratisexam.com/
QUESTION 218
You are on a company's desktop support team.
You receive a call from an employee. The employee is having problems installing an old printer
on a Windows 8.1 Pro computer. The employee asks you to look at the driver that is installed and
assess if it is the correct one.
You need to open the device manager remotely.
Which four actions should you perform in sequence? (To answer, move the appropriate four
actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc754081.aspx
Open Device Manager
...
To open Computer Management by using the command line
At a command prompt, in the Start Search box, or the Run box, type the command:
mmc compmgmt.msc
..To open Device Manager on a remote computer
1. Open Computer Management using either of the procedures in the previous section.
2. On the Action menu, click Connect to another computer.
3. In the Select Computer dialog box, do one of the following:
* In the Another computer text box, type the name of the computer to access, and then click OK.
* Click Browse, and then click Advanced to find the computer you want. Click OK when you have selected
the correct computer.
If the connection is successful, the name of the computer appears in parentheses next to the Computer
Management label in the upper left.
Note: Access to Device Manager on a remote computer in this manner is "read-only." You cannot make
any changes to devices or their settings.
Further Information:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3-configure-networkconnectivity15/
...
Modify settings using MMC you can start Computer Management and then go Actions -> Connect to a another
computer …
For some of these settings remote registry service must be enabled and of course permission on the remote
client.
QUESTION 219
You are a consultant traveling out of town. You are carrying a Windows 8.1 Pro laptop that you
use for giving presentations while connected to a projector.
You are concerned about battery life while presenting and need to modify your power settings to
maximize battery life without risking interrupting your presentation.
Which two settings do you need to configure to increase battery life without risking interruption
to your presentation? (To answer, select the appropriate two settings from the Power Options
window in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 220
A company has 10 Windows 8.1 client computers. You purchase a Windows Store app and
install theapp on several computers.
The hard drive of a computer on which the application is installed fails. You reinstall Windows
8.1.
You need to reinstall the Windows Store app on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/windows-store-install-apps-multiple-pcs
Use your Microsoft account to install apps on multiple PCs
You can use your Microsoft account to sign in to the Windows Store and install your apps on different
PCs.
To install your apps on another PC
1. Sign in to the PC you want to install your apps on using your Microsoft account.
2. On the Start screen, tap or click Store to open the Windows Store.
3. Tap or click Account, and then tap or click My apps.
4. Swipe down on or right-click the apps you want to install, and then tap or click Install.
QUESTION 221
You are planning to upgrade Internet Explorer.
You have the following requirements:
Create a report that identifies which computers are successfully upgraded.
Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements.
What should you do?
A.
B.
C.
D.
Use Windows Server Update Services (WSUS).
Use Internet Explorer Administration Kit (IEAK) and Group Policy.
Use Microsoft System Center Configuration Manager.
Use Microsoft System Center Essentials.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows Server Update Services 2.0 and above comprise a repository of update packages from Microsoft. It allows administrators to approve or decline updates
before release, to force updates to install by a given date, and to obtain extensive reports on what updates each machine requires. System administrators can also
configure WSUS to approve certain classes of updates automatically (critical updates, security updates, service packs, drivers, etc.). One can also approve updates
for "detection" only, allowing an administrator to see what machines will require a given update without also installing that update. http://en.wikipedia.org/wiki/
Windows_Server_Update_Services
QUESTION 222
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client
computers. You are designing the deployment of a custom application.
You have the following requirements:
The application must be available to only users who need it.
Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements.
Which deployment method should you use?
A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/rds/archive/2009/06/08/introducing-remoteapp-and-desktop- connections.aspx
The RemoteApp and Desktop Connections feature offers several benefits:
RemoteApp programs launch from the Start menu just like any other application. Published Remote Desktop connections are included alongside RemoteApp
programs on the Start menu.
Changes to the published connection (such as newly published RemoteApp programs) are automatically reflected on the user's Start menu, without any effort on
the user's part. RemoteApp programs can be easily launched with Windows Search. Users only have to log on once, to create the connection. From that point on,
updates happen with no prompt for user credentials.
RemoteApp and Desktop Connections does not require domain membership for client computers.
RemoteApp and Desktop Connections benefits from new features in Windows Server 2008 R2, such as Personal Desktop assignment or per-user application
filtering. RemoteApp and Desktop Connections is built on standard technologies such as XML and HTTPS, making it possible for developers to build solutions
around it. It also offers APIs that allow the client software to support other types of resources, in addition to RemoteApp programs and Remote Desktop
connections.
QUESTION 223
Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client computers that run Windows XP. Nine hundred of the computers are
on the local area network. One hundred computers are portable computers that connect to the main office only once every few months.
You are planning to deploy Windows 7.
You need to generate a report of the software that is installed on all client computers. You need this information as soon as possible.
What should you use?
A.
B.
C.
D.
Microsoft System Center Data Protection Manager
Microsoft Desktop Optimization Pack
Microsoft System Center Essentials
Microsoft System Center Operations Manager
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 224
Your network has client computers that run Windows Vista.
You are planning to deploy Windows 7.
You need to detect and analyze the compatibility of an application that requires elevated privileges.
What should you do?
A.
B.
C.
D.
Use the Standard User Analyzer (SUA) Wizard.
Run a virtual version of the Setup Analysis Tool (SAT).
Use the Standard User Analyzer (SUA) tool.
Run a stand-alone version of the Setup Analysis Tool (SAT).
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The Standard User Analyzer (SUA) tool enables you to test your applications to detect potential compatibility issues due to the User Account Control (UAC) feature.
http://technet.microsoft.com/en-us/library/cc765948(v=ws.10).aspx
QUESTION 225
Your company's network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the
Shipping Computers organizational unit (OU).
The company wants to deploy a new application. The application is not packaged.
You have the following requirements:
Deploy the application to all computers in the shipping department.
Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements. Which two actions should you include in the process? (Each correct answer presents
part of the solution. Choose two.)
A. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department computers, and assign the package to the
collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the shipping department users, and assign the package to the
collection.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hints:
GPO only support MSI & ZAP file type this application is not packaged = non MSI or ZaP file type
QUESTION 226
Your network has client computers that run Windows XP. All users access a custom line-of- business application. The line-of-business application is not compatible
with Windows 7.
You are planning to deploy Windows 7.
You have the following requirements:
The application must run on all client computers.
The application executable must reside on each client computer.
You need to manage application compatibility to meet the requirements.
What should you do?
A.
B.
C.
D.
Install the application on a Remote Desktop Services server.
Install a shim for the application on each client computer.
Virtualize the application by using Microsoft Application Virtualization (App-V).
Install the Windows Compatibility Evaluator on each client computer.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 227
Your company has 1,000 client computers that run Windows XP Professional x64. You are planning to deploy Windows 7 Enterprise x64. The company uses an
application that is incompatible with Windows 7 Enterprise x64.
You have the following requirements:
Provide all users with access to the application.
Deploy and manage the application by using a centralized solution.
You need to design a solution that meets the requirements.
What should you do?
A.
B.
C.
D.
Install the application on all client computers by using Group Policy, and then use the Compatibility tab.
Install the Microsoft Application Virtualization (App-V) client on each client computer, and run the application in offline mode.
Install the Microsoft Enterprise Desktop Virtualization (MED-V) package on each client computer.
Install the Microsoft Application Virtualization (App-V) client on each client computer, and stream the application by using App-V.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 228
Your company has 1,000 Windows XP computers. You plan to migrate these computers to Windows 7.
You need to detect compatibility issues that can occur during the installation and configuration process for a specific application.
Which tool should you use?
A. Windows Compatibility Evaluator
B. Setup Analysis Tool
C. Inventory Collector
D. Update Compatibility Evaluator
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/pt-pt/library/cc766109(v=ws.10).aspx The Setup Analysis Tool (SAT) automates the running of application installations while monitoring
the actions taken by each application's installer. The standalone version of SAT can monitor any MSI-based installers and third-party installers. However, the Virtual
SAT tool can only monitor MSI-based installers and third-party installers that run unattended.
hints:
You need to detect compatibility issues that can occur during the installation and configuration process for a specific application.
QUESTION 229
Your companys network has client computers that run Windows 7. Multiple users share the computers in the shipping department. These computers reside in the
Shipping Computers organizational unit (OU).
The network design is shown in the following diagram.
You are planning to deploy an application. The application is packaged as a Microsoft Windows Installer package (MSI).
You need to deploy the application only to computers in the shipping department.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Link the software installation policy to the Workstations OU.
Link the software installation policy to the Shipping Computers OU.
Create a new Group Policy object (GPO) and add a software installation policy under the User Configuration container.
Create a new Group Policy object (GPO) and add a software installation policy under the Computer Configuration container.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To specify how and when computers are updated through Group Policy In Group Policy Object Editor, expand Computer Configuration, expand Administrative
Templates, expand Windows Components, and then click Windows Update. In the details pane of Group Policy Object Editor, configure the appropriate policies.
See the following table for examples of the policies you might want to set.. refer to http://technet.microsoft.com/en-us/library/cc708536(v=WS.10).aspx Hints:
Workstations OU = engineering computer OU + finance computer OU + shipphing computer OU
QUESTION 230
Your companys network has client computers that run Windows 7. When a user attempts to log on to the domain from a computer named Client1, she receives the
following message: The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that
account is incorrect. You need to ensure that the user can log on to the domain from Client1.
What should you do?
A.
B.
C.
D.
Disjoin and rejoin Client1 to the domain.
Reset the account password for Client1 through Active Directory Users and Computers.
Add the computer account for Client1 to the Domain Computers Active Directory group.
Reset the account password for the user through Active Directory Users and Computers.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Re-create the computer account, join a workgroup, and then rejoin the domain.
refer to http://support.microsoft.com/kb/810497
QUESTION 231
Your company has two Active Directory Domain Services (AD DS) domains, Domain1 and Domain2. A two-way trust relationship exists between the domains.
Users in both domains can log on to client computers in only their own domains. System logs on the domain controllers display the error message Clock skew too
great when users in Domain1 attempt to log on to client computers in Domain2.
You need to ensure that users can log on to client computers in both domains.
What should you do?
A.
B.
C.
D.
Decrease the Maximum tolerance for computer clock synchronization setting in the default Domain Group Policy object ( GPO ).
Configure the primary domain controller (PDC) emulatorin each domain to synchronize its clock with the same external time source.
Run a startup script that includes Net Time /setsntp on all client computers.
Run a startup script that includes Net Time /querysntp on all client computers.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 232
Your company has an Active Directory Domain Services (AD DS) forest with a single domain named contoso.com. The design of the organizational units (OUs) and
Group Policy objects (GPOs) is shown in the following diagram.
Multiple computer configuration settings and user configuration settings are defined in the Kiosk Computers GPO.
A security audit indicates that user configuration settings that are defined in the Kiosk Computers GPO are not applied when users log on to client computers that
are in the Kiosk Computers OU.
You need to ensure that the user configuration settings are correctly applied.
What should you do?
A.
B.
C.
D.
Enable loopback processing in Merge mode on the Default Domain Policy GPO.
Disable the user configuration settings on the Default Domain Policy GPO.
Enable loopback processing in Replace mode on the Kiosk Computers GPO.
Disable the user configuration settings on the New York Users GPO.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Refer to Planning and managing windows 7 desktop deployments and environment Pg 10-92
QUESTION 233
You have a single Active Directory Domain Services (AD DS) site. All client computers run Windows 7. Users in the marketing department use a custom
application. You create a new Group Policy object (GPO) and link it to the site. Users in the marketing department then report that they are unable to use the
custom application.
You need to ensure that all users in the marketing department are able to use the custom application. You need to ensure that all other users continue to receive
the new GPO.
What should you do?
A. Add marketing users to a domain group. Use security filtering to grant the group the Allow- Read permission and the Allow-Apply Group Policy permission for
the GPO.
B. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the OU.
C. Add marketing users to a domain group. Use security filtering to grant the group the Allow- Read permission and the Deny-Apply Group Policy permission for the
GPO.
D. Move marketing users to a dedicated organizational unit (OU). Apply the Block Inheritance setting to the domain.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 234
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers. Users occasionally change the Internet Explorer settings on
individual client computers.
The company wants to maintain a standard Internet Explorer configuration on all client computers.
You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.
What should you do?
A.
B.
C.
D.
Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.
Use the Group Policy Update utility to refresh Group Policy.
Enable Internet Explorer Maintenance Policy Processing in Group Policy.
Enable User Group Policy loopback processing mode.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
nternet Explorer Maintenance policy processing
This policy affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer
Maintenance. It overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed.
If you enable this policy, you can use the check boxes provided to change the options. Allow processing across a slow network connection updates the policies
even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant
delays.
Do not apply during periodic background processing prevents the system from updating affected policies in the background while the computer is in use.
Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data. Process even if the Group Policy
objects have not changed updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only
when changed.
However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it.
http://technet.microsoft.com/en-us/library/cc978526.aspx
QUESTION 235
Your companys network includes client computers that run Windows 7.
You design a wireless network to use Extensible Authentication ProtocolCTransport Level Security (EAP-TLS). The Network Policy Server has a certificate installed.
Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network.
What should you do?
A. Install a certificate in the Trusted Root Certification Authorities certificate store.
B. Configure client computers to use Protected Extensible Authentication ProtocolCTransport Layer Security (PEAP-TLS).
C. Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MSCHAP v2).
D. Install a certificate in the Third-Party Root Certification Authorities certificate store.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 236
Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.
The company wants to require a secure connection between client computers and the file server.
You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.
What should you do?
A.
B.
C.
D.
Create an Isolation rule and specify Request authentication for inbound and outbound connections.
Create a Tunnel rule and specify Gateway-to-client as the tunnel type.
Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.
Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The PDC emulator master also serves as the machine to which all domain controllers in the domain will synchronise their clocks. It, in turn, should be configured to
synchronise to an external NTP time source
http://en.wikipedia.org/wiki/Primary_Domain_Controller
QUESTION 237
You deploy Windows 7 to the computers that are used by your companys Web developers. All Web developer user accounts are in a single organizational unit
(OU).
Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers.
You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications.
What should you do?
A.
B.
C.
D.
Enable Compatibility View in Internet Explorer.
Add each server to the Intranet zone.
Add each server to the Trusted Sites zone.
Set the default security setting in Internet Explorer to Medium.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Pop-up Blocker features
Pop-up Blocker is turned on by default. There are restrictions on the size and position of pop-up windows, regardless of the Pop-up Blocker setting. Pop-up
windows cannot be opened larger than or outside the viewable desktop area. For more information, see "Windows Restrictions" in this document.
When this functionality is enabled, automatic and background pop-up windows are blocked, but windows that are opened by a user click will still open in the usual
manner. Note that sites in the
Trusted Sites and Local
Intranet zones do not have their pop-up windows blocked by default, as they are considered safe. This setting can be configured in the Security tab in Internet
Options. http://technet.microsoft.com/en-us/library/cc784600(v=ws.10).aspx hints: internal web , so i choose intranet zones.
Local Intranet Zone
By default, the Local Intranet zone contains all network connections that were established by using a Universal
Naming Convention (UNC) path, and Web sites that bypass the proxy server or have names that do not include periods (for example, http://local), as long as they
are not assigned to either the Restricted Sites or Trusted Sites zone. The default security level for the Local Intranet zone is set to Medium (Internet Explorer 4) or
Medium-low (Internet Explorer 5 and 6). Be aware that when you access a local area network (LAN) or an intranet share, or an intranet Web site by using an
Internet Protocol (IP) address or by using a fully qualified domain name (FQDN), the share or Web site is identified as being in the Internet zone instead of in the
Local intranet zone.
Trusted Sites Zone
This zone contains Web sites that you trust as safe (such as Web sites that are on your organization's intranet or that come from established companies in whom
you have confidence). When you add a Web site to the Trusted Sites zone, you believe that files you download or that you run from the Web site will not damage
your computer or data. By default, there are no Web sites that are assigned to the Trusted Sites zone, and the security level is set to Low.
http://support.microsoft.com/kb/174360
QUESTION 238
Your network has client computers that run Windows 7 Enterprise. You plan to deploy new administrative template policy settings by using custom ADMX files. You
create the custom ADMX files, and you save them on a network share. You start Group Policy Object Editor (GPO Editor). The custom ADMX files are not available
in the Group Policy editing session. You need to ensure that the ADMX files are available to the GPO Editor. What should you do?
A.
B.
C.
D.
Copy the ADMX files to the % systemroot% \ inf folder on each Windows 7 computer, and then restart the GPO Editor.
Set the network share permissions to grant all Windows 7 users Read access for the share.
Copy the ADMX files to the %systemroot% \ system32 folder on each Windows 7 computer, and then restart the GPO Editor.
Copy the ADMX files to the central store, and then restart the GPO Editor.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://support.microsoft.com/kb/929841
To take advantage of the benefits of .admx files, you must create a Central Store in the SYSVOL folder on a domain controller. The Central Store is a file location
that is checked by the Group Policy tools. The Group Policy tools use any .admx files that are in the Central Store. The files that are in the Central Store are later
replicated to all domain controllers in the domain.
QUESTION 239
When a user attempts to connect to a server named Server1 by using Remote Desktop Connection (RDC), he receives the following error message.
You need to assign the least amount of privilege to the user to ensure that he can connect to Server1 by using RDC.
To which group should you add the user?
A.
B.
C.
D.
Add the user to the Power Users group on Server1.
Add the user to the Remote Desktop Users group on Server1.
Add the user to the domain Windows Authorization Access group.
Add the user to the domain Remote Desktop Users group
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 240
A company has an Active Directory Domain Services (AD DS) forest with a single domain.
Domain controllers are located in the companys offices in New York and Boston. You deploy a group policy at the domain level that includes security filtering. You
discover that Group Policy object (GPO) settings are being applied to computers in the New York office, but not to computers in the Boston office.
You suspect there might be replication problems with the policies. What should you do?
A.
B.
C.
D.
Run a Group Policy Results report against computers in the Boston office.
Run a Group Policy Modeling report against computers in the Boston office.
Use the GpoTool.exe command-line tool.
Use the RepAdmin.exe command-line tool.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 241
Your companys network has client computers that run Windows 7.
A software vendor releases version 2 of an application that your company uses. Your company currently uses version 1. Version 1 and version 2 are not compatible.
You plan to deploy version 2 of the application.
You have the following requirements:
Users must be able to run both versions of the application on their computers.
Version 2 must be available when a client computer is not connected to the network.
You need to plan a software deployment process that meets the requirements. What should you do? (Choose all that apply.)
A.
B.
C.
D.
Deploy version 2 of the application by using Microsoft Application Virtualization (App-V).
Deploy version 2 of the application by using Microsoft Enterprise Desktop (MED-V).
Deploy version 2 of the application as a Remote Desktop Services RemoteApp.
Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed in real-time to any client from a virtual application server. It removes the
need for local installation of the applications. Instead, only the App-v client needs to be installed on the client machines. All application data is permanently stored on
the virtual application server. Whichever software is needed is either streamed or locally cached from the application server on demand and run locally. The App-V
stack sandboxes the execution environment so that the application does not make changes to the client itself (OS File System and/or Registry). App-V applications
are also sandboxed from each other, so that different versions of the same application can be run under App-V concurrently.
http://en.wikipedia.org/wiki/Microsoft_App-V
QUESTION 242
A company uses Microsoft Deployment Toolkit (MDT) 2010 to deploy Windows 7 Enterprise and Microsoft Office 2010. The company is replacing existing
computers with new 64-bit computers.
You have the following requirements:
You need to include Office 2010 with the deployment.
You need to automate the deployment where possible.
Some employees have accessibility requirements that require specialized hardware.
The hardware must continue to be used after the deployment.
The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from the manufacturer.
You need to create an image that meets these requirements.
What should you do? (Choose all that apply.)
A.
B.
C.
D.
E.
F.
G.
H.
Import the Windows 7 Enterprise x86 source files.
From the MDT deployment workbench, select the Custom Task Sequence template.
Use a reference computer and capture a WIM image.
From the MDT deployment workbench, select the Sysprep and Capture template.
Import the necessary OEM drivers.
Import the 32-bit version of Office 2010.
Import the 64-bit version of Office 2010.
Import the Windows 7 Enterprise x64 source files.
Correct Answer: ABEF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints:
The specialized hardware is compatible with Windows 7 but only 32-bit drivers are available from the manufacturer.
QUESTION 243
Your company's network includes a main office and several branch offices. The branch offices are connected to the main office by high-latency links. All client
computers run Windows 7 Enterprise, and all servers run Windows Server 2008 R2. Servers are located in each of the branch offices.
Client computers in the branch offices frequently access a specific group of files on a file server named Server1. These access requests consume significant
amounts of bandwidth and reduce the speed of higher-priority traffic.
You need to reduce the bandwidth that is consumed by requests for frequently accessed files.
What should you do?
A. Configure BranchCache in Hosted Cache mode on client computers in the main office and the branch offices.
B. Configure BranchCache in Distributed Cache mode on client computers in the main office and the branch offices.
C. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Distributed Cache mode on a server computer in only the
branch offices.
D. Enable the BranchCache For Network Files role service on Server1. Configure BranchCache in Hosted Cache mode on a server computer in only the branch
offices.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
BranchCacheTM is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in
remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across
client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode).
Distributed Cache mode
If client computers are configured to use Distributed Cache mode, the cached content is distributed among client computers on the branch office network. No
infrastructure or services are required in the branch office beyond client computers running Windows 7.
Hosted Cache mode
In hosted cache mode, cached content is maintained on a computer running Windows Server 2008 R2 on the branch office network.
hints: no server are located in the branch office.
http://technet.microsoft.com/en-us/library/dd637832(v=ws.10).aspx
QUESTION 244
A Windows Server 2008 R2 server named SERVER01 has the Windows Deployment Services (WDS) role installed. SERVER02 is running DHCP services. You
prestage computer objects in Active Directory. You plan to use WDS to deploy Windows 7 to the prestaged computers. When you try to deploy an image by using
PXE, the process fails. You need to ensure that SERVER01 responds to prestaged client computers only. From WDS, what should you do? (Choose all that apply.)
A.
B.
C.
D.
E.
F.
On the DHCP tab, select Configure DHCP option 60 to indicate that this server is also a PXE server.
On the Advanced tab, select Authorize this Windows Deployment Services server in DHCP.
On the PXE Response tab, select Respond to all client computers (known and unknown).
On the DHCP tab, select Do not listen on Port 67.
On the PXE Response tab, select Respond only to known client computers.
On the Advanced tab, select Do not authorize this Windows Deployment Services server in DHCP.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints: prestaged computers = known client computers
QUESTION 245
Your company has a custom Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) and uses
autoenrollment. When external users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page
rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?
A.
B.
C.
D.
Install the current certificate into the personal store on each client computer. Add the applications URL to the Trusted Sites zone in Internet Explorer.
Install the current certificate into the computer store on each client computer.
Purchase and install a commercial certificate on the CA server. Ensure that users trust the issuing CA.
Issue a root certificate from the internal CA on the external users computers.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 246
Your companys network is shown in the following diagram.
There is a VPN between Branch Officebranch office B and the Core Networkcore network.
The company plans to deploy Windows 7 to all client computers. You need to manage the deployment to ensure that client computers in branch office A and in
branch office B can activate Windows.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)
A.
B.
C.
D.
Configure DNS so that client computers in branch office A use the Key Management Service (KMS) in the core network.
Deploy the Key Management Service (KMS) in branch office B.
Deploy the Key Management Service (KMS) in branch office A.
Configure DNS so that client computers in branch office B use the Key Management Service (KMS) in the core network.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 247
You are deploying an App-V client application to the New York office. You need to ensure that the application will be installed at a specific time.
What should you use to deploy the application?
A.
B.
C.
D.
ConfigMgr
a Group Policy object (GPO) with a software installation policy.
MED-V
Microsoft Deployment Toolkit
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 248
Your company has client computers that run Windows 7 Enterprise.
Each computer in the company is required to boot into a different Windows 7 application environment without compromising the main Windows 7 Enterprise
installation. You need to create a new Native Boot VHD that will host the alternate Windows 7 environments.
Which command should you use?
A.
B.
C.
D.
BCDEdit.exe
Bootcfg.exe
DiskPart.exe
BCDboot.exe
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.techexams.net/forums/windows-7-exams/66547-bcdedit-bcdboot-difference.html BCDboot is a tool used to quickly set up a system partition, or to repair
the boot environment located on the system partition. The system partition is set up by copying a small set of boot environment files from an installed Windows®
image. BCDboot also creates a Boot Configuration Data (BCD) store on the system partition with a new boot entry that enables you to boot to the installed Windows
image.
BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding
boot menu parameters, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements
QUESTION 249
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows 7 computers. You are planning to deploy a custom application.
You need to schedule the deployment to occur outside of business hours and without user interaction. What should you do? (Choose all that apply.)
A.
B.
C.
D.
E.
F.
Create a collection with the required computers and assign the software to the collection.
Create a software installation Group Policy object (GPO).
Assign the policy to the root of the Active Directory Domain Services (AD DS) domain.
Create a software deployment package by using System Center Configuration Manager 2007.
Create an unattend.xml file.
Create a silent install MSI file.
Correct Answer: ADF
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints: without user interaction = silent install MSI file
QUESTION 250
A network consists of 1,000 laptop computers that run Windows XP. The computers do not have access to the corporate network.
You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.
You need to plan the most efficient method for activating all of the computers.
What should you do?
A. Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key (MAK) Proxy for the remaining computers.
B. Use the Key Management Service (KMS) for all the computers.
C. Use Multiple Activation Key (MAK) Independent for all the computers.
D. Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service (KMS) for the remaining computers.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx MAK:
If users install a MAK using the user interface (UI), the MAK client attempts to activate itself over the Internet one time. If the users install a MAK using the
Slmgr.vbs script, the MAK client does not try to activate itself automatically.
refer to http://technet.microsoft.com/en-us/library/ff793438.aspx Hints:
The computers do not have access to the internet
QUESTION 251
Your company's network is shown in the following diagram.
Each office is connected to the Internet through a high-bandwidth connection. The branch offices are connected to the core network through low-bandwidth
connections.
Microsoft Windows Server Update Services (WSUS) must provide software updates for all offices.
You need to design the WSUS infrastructure to minimize traffic over the low-bandwidth connections.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Deploy BranchCache on the WSUS server and client computers
Configure WSUS to use updates that are stored locally
Configure WSUS to use updates that are stored on Microsoft Update
Deploy Quality of Service (QoS) on the WSUS server and client computers
Deploy WSUS servers in the branch offices
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
WSUS update from Microsoft update is faster then core network Deploy WSUS servers in each branch office in order to provide WSUS server for branch client.
hints:
1. Each office is connected to the Internet through a high-bandwidth connection.
2. The branch offices are connected to the core network through low-bandwidth connections.
QUESTION 252
Your network is configured as shown in the following diagram.
You are planning to deploy Windows 7.
You have the following requirements:
Use BitLocker on all computers in the isolated network.
Provide DirectAccess on all portable computers.
Use the Key Management Service (KMS) to activate all client computers.
You need to plan a client computer licensing strategy that meets the requirements.
What should you do?
A. License 500 copies of Windows 7 Ultimate.
B. License 500 copies of Windows 7 Enterprise.
C. License 350 copies of Windows 7 Professional, license 150 copies of Windows 7 Ultimate, and purchase Software Assurance for the Windows 7 Professional
licenses.
D. License 350 copies of Windows 7 Enterprise, and license 150 copies of Windows 7 Ultimate.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints:
Direct Access only available for Ultimate and Enterprise only.
Company should use Enterprise version
QUESTION 253
Your company has 1,000 client computers that run Windows 7. The company uses several custom line-of-business applications that are not compatible with
Windows 7. You need to distribute a Microsoft Enterprise Desktop Virtualization (MED-V) virtual machine (VM) image that includes the custom applications to all
Windows 7 client computers.
What should you do?
A.
B.
C.
D.
Mount the VM image from the MED-V workspace.
Deploy the VM image from the MED-V server.
Deploy the VM image by using Windows Deployment Services (WDS).
Deploy the VM image by using Windows Server Update Services (WSUS).
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 254
Your company plans to upgrade all client computers to Windows 7.
The company uses a custom line-of-business application. The application contains sensitive data.
The application will not run on Windows 7
You establish that Microsoft Enterprise Desktop Virtualization (MED-V) is the appropriate technology to allow your organization to continue to use the application.
You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.
What should you do?
A.
B.
C.
D.
Using MED-V TrimTransfer technology, deploy the VM image over the network
In the MED-V console, configure the MED-V workspace to prevent offline operation
Use BitLocker Drive Encryption to encrypt the drive on which the VM image is stored
Using Microsoft System Center Configuration Manager, deploy the VM image to an image store directory
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 255
The client computers in your network run either Windows XP or Windows 7. All client computers are in a single Active Directory Domain Services (AD DS)
organizational unit (OU) named MyClients.
You install Windows Software Update Services (WSUS). You create a Group Policy object (GPO) that enables automatic updates from the WSUS server, and you
link the GPO to the MyClients OU. You place all client computers in a targeting group named MyClients.
Testing reveals that a security update that is applicable to both Windows XP and Windows 7 causes a line-of-business application to fail on the Windows XP client
computers.
You need to ensure that the application runs on the Windows XP client computers and that the Windows 7 client computers receive the security update.
What should you do?
A. Remove the Windows XP client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
B. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the All Computers targeting group.
C. Create a targeting group named MyXPClients beneath the MyClients targeting group. Move the Windows XP client computers to the MyXpClients targeting
group. Approve the update for installation to the MyClients targeting group.
D. Remove the Windows 7 client computers from the MyClients targeting group. Approve the update for installation to the Unassigned Computers targeting group.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
All computers targeting group = assigned group and unassigned group. Unassigned computer targeting group = all computer which is not assign to any group.
hints:
Windows 7 remove from MyClients = unassigned computer targeting group Windows XP = MyClients targeting group
update will only done for unassigned computer targeting group
QUESTION 256
Your company uses Microsoft Windows Server Update Services (WSUS) to deploy software updates and service packs. Microsoft releases a security update for
Windows 7. You have the following requirements: The security update must be deployed by 5:00 P.M. on Friday. Computers that are off when the security update is
deployed must install the security update as soon as they are turned on. You need to manage the software update process to meet the requirements. What should
you do?
A.
B.
C.
D.
Approve the security update for installation through the WSUS console with no deadline.
Approve the security update for download through the WSUS console with a deadline of Friday at 5:00 P.M.
Approve the security update for installation through the WSUS console with a deadline of Friday at 5:00 P.M.
Approve the security update for download through the WSUS console with no deadline.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hints:
1. question mention at friday 5pm
2. question request install update in stead of download update
QUESTION 257
Your company has a single Active Directory Domain Services (AD DS) domain named contoso.com that uses Active DirectoryCintegrated DNS.
You deploy the Key Management Service (KMS) on a Windows 7 computer. You need to ensure that Windows 7 client computers can locate the KMS host and
perform activation.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
Create and deploy a GPO firewall rule to allow RPC traffic through TCP port 1688 on the client computers.
Deploy a Windows Server 2008 KMS host.
Grant the KMS server the Full Control permission on the _vlmcs._tcp.contoso.com DNS record.
Grant the KMS server the Full Control permission on the _msdcs._tcp.contoso.com DNS zone.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/ee939272.aspx
The KMS clients find the KMS host via a DNS SRV record (_vlmcs._tcp) and then automatically attempt to discover and use this service to activate themselves.
When in the 30 day Out of Box grace period, they will try to activate every 2 hours. Once activated, the KMS clients will attempt a renewal every 7days.
Listening on Port:
Communication with KMS is via anonymous RPC. 1688 is the default TCP port used by the clients to connect to the KMS host. Make sure this port is open between
your KMS clients and the KMS host.
QUESTION 258
Your network contains 5 servers that have the Remote Desktop Session Host role service installed. The servers host a Remote Desktop RemoteApp named App1.
You need to recommend a solution for App1 that meets the following requirements:
Must ensure that users can connect to any Remote Desktop Session Host server
Must ensure that users are automatically reconnected to disconnected sessions
What should you include in the recommendations?
A.
B.
C.
D.
E.
Windows Virtual PC and Windows XP Mode
Remote Desktop Web Access
Remote Desktop Gateway
Windows Deployment Services
Remote Desktop Connection Broker
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access
to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp
programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual
desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates
RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs.
http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx
QUESTION 259
Your company has two network segments. The core network segment is where centralized management is performed. The high-security network segment is an
isolated network. A firewall between the core network segment and the high-security network segment limits network communication between the segments.
These network segments are shown in the following diagram.
Your company plans to deploy Windows 7 to all client computers. You need to manage activation for client computers that are located in the high-security network
segment.
What should you do?
A.
B.
C.
D.
Deploy the Key Management Service (KMS) in the core network segment.
Deploy the Key Management Service (KMS) in the high-security network segment.
Install the Volume Activation Management Tool (VAMT) in the core network segment.
Install the Volume Activation Management Tool (VAMT) in the high-security network segment.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx There is a firewall blocking, (VAMT) should setup at high-security network.
QUESTION 260
Your company has client computers that run Windows XP Professional.
You are planning to install Windows 7 Enterprise on the existing client computers. You need to ensure that the user state can be viewed after it has been collected
and saved. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Perform an offline migration by using Windows PE.
B. Use an uncompressed migration store.
C. Perform an offline migration by using Windows.old.
D. Use a hard-link migration store.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 261
You plan to deploy Windows 7 to client computers.
You have the following requirements:
Deploy Windows 7 over the network.
Do not affect the performance of existing network applications.
You need to design a zero-touch deployment strategy that supports the requirements.
What should you do?
http://www.gratisexam.com/
A.
B.
C.
D.
Deploy images from a Microsoft System Center Configuration Manager server that runs Windows Server 2008.
Deploy images from a dedicated share on a Windows Server 2008 server.
Ensure that all computers have the Internet Protocol version 6 (IPv6) protocol disabled prior to deployment.
Ensure that all computers have the Internet Protocol version 4 (IPv4) protocol disabled prior to deployment.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 262
Your company has an Active Directory Domain Services (AD DS) forest with a single domain. A server has the Windows Deployment Services (WDS) role installed.
You create a Windows 7 image.
You plan to use the Lite Touch Installation deployment method to deploy the Windows 7 image. You need to design a deployment strategy that will install an image
on unknown client computers only if administrative approval is granted.
What should you do?
A.
B.
C.
D.
Create a multicast transmission for the Windows 7 image.
Use an Auto-Add policy on the WDS server.
Create a unicast transmission for the Windows 7 image.
Use DHCP rogue detection on the WDS server.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc731409(v=ws.10).aspx#BKMK_2
QUESTION 263
Your network has 1,000 client computers that run Windows XP. You are planning to deploy Windows 7.
You plan to use the Microsoft Deployment Toolkit Lite Touch Installation deployment method to deploy the Windows 7 image.
You have the following requirements:
Migrate 20 computers at a time.
Ensure that you conserve network bandwidth.
You need to design a deployment strategy that meets the requirements.
What should you do?
A.
B.
C.
D.
Configure multicast transmission on the deployment point.
Configure unicast transmission on the deployment point.
Distribute the image by using Background Intelligent Transfer Service (BITS).
Compress the contents of the distribution folder.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Performing Multicast Deployments
In order to deploy an image using multicasting instead of unicasting, you must first create a multicast transmission. Multicast transmissions make the image
available for multicasting, which enables you to deploy an image to a large number of client computers without overburdening the network. When you deploy an
image using multicasting, the image is sent over the network only once, which can drastically reduce the amount of network bandwidth that is used. http://
technet.microsoft.com/en-us/library/dd637994(v=ws.10).aspx
QUESTION 264
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.
You are planning to deploy Windows 7 by using a zero-touch installation process.
You need to test the deployment methodology.
What should you do first?
A. Create a computer collection with test computers as members.
B. Create a security group with test computers as members.
C. Create an organizational unit and move test computer accounts into it.
D. Create a distribution group with test computers as members.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 265
You are planning a Windows 7 deployment infrastructure.
You have the following requirements:
Enable network deployments of WIM images or VHDs
Support multicast with the use of multiple stream transfer functionality.
Allow drivers to be stored centrally, and use dynamic driver provisioning.
You need to design an infrastructure that meets the requirements.
Which deployment method should you recommend?
A.
B.
C.
D.
Microsoft Deployment Toolkit (MDT) 2010
Microsoft Deployment Toolkit (MDT) 2008
Windows Deployment Services in Windows Server 2008 R2
Deployment Image Servicing and Management (DISM)
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 266
Your network has a single domain with 1,000 client computers that run Windows Vista.
You are planning a deployment of Windows 7.
Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7.
You have the following requirements:
Migrate the user state for each user.
Preserve the file system and existing applications for only the sales department computers.
You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?
A. Use the Upgrade Computer method for the sales department computers.
Use the Replace Computer method for all other computers.
B. Use the Upgrade Computer method for the sales department computers.
Use the Refresh Computer method for all other computers.
C. Use the Refresh Computer method for the sales department computers.
Use the New Computer method for all other computers.
D. Use the Refresh Computer method for the sales department computers.
Use the Replace Computer method for all other computers.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hints: only upgrade can preserve existing application Replace method - change new computer and migrate user state for each user.
QUESTION 267
You are planning a zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network.
Each client computer has three available boot methods:
boot from the network by using PXE
boot from USB media
boot from the local hard disk
You have the following requirements:
Set the boot method for a zero-touch deployment.
Ensure that client computers that fail on deployment can be manually configured.
You need to design a zero-touch deployment strategy that supports the requirements.
What should you do?
A.
B.
C.
D.
Remove USB media and local hard disk from the available boot methods
Remove USB media and network from the available boot methods
Set network as the first boot method, USB media as the second boot method, and local hard disk as the third boot method
Set USB media as the first boot method and local hard disk as the second boot method.
Remove network from the available boot methods
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints: zero-touch deployment of Windows 7 Enterprise to client computers on your corporate network so, set network as 1st boot.
QUESTION 268
Your company has client computers that run Windows XP Professional. You are planning to install Windows 7 Enterprise on the existing client computers. You
need to design a user state migration strategy that minimizes network bandwidth and server use when user data is being migrated.
What should you do?
A.
B.
C.
D.
Use the Refresh Computer method and a hard-link migration store.
Use the Refresh Computer method and a compressed migration store.
Use the Replace Computer method and a hard-link migration store.
Use the Replace Computer method and a compressed migration store.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A hard-link migration store enables you to perform an in-place migration where all user state is maintained on the computer while the old operating system is
removed and the new operating system is installed; this is why it is best suited for the computer-refresh scenario. http://technet.microsoft.com/en-us/library/
dd560753(v=ws.10).aspx
Refresh Scenario
Similar to a new installation, the refresh scenario performs a clean setup. The difference is that the target computer already contains Windows, for which files and
settings will be preserved (installed applications are not taken into consideration). This scenario is especially useful in the event that preserving the user state is a
priority. It still leverages the consistency benefits that come through a new installation. You can automate this scenario with the latest version of the User State
Migration Tool (USMT 4.0), which will collect pertinent data for each user state found in the system, and restore it after the clean installation is performed.
Replace Scenario
This is similar to the refresh scenario, except the target system is a new computer that does not yet contain any files or settings. The scenario consists of
conducting a new installation on the target computer, and then using the USMT 4.0 to transfer files and settings from the old computer. You can run this scenario
side-by-side with an older system running Windows XP or
Windows Vista.
http://technet.microsoft.com/en-us/magazine/hh124549.aspx Hints:
Install on existing client computer = refresh
Replace a new client computer = Replace
QUESTION 269
Your company has 1,000 client computers that run Windows 7 Enterprise. You need to ensure that users cannot bypass or disable Internet Explorer logging.
What should you do?
A.
B.
C.
D.
Set the Disable the Advanced Page state to Enabled, and set the Turn off InPrivate Browsing state to Enabled.
Set the Turn off InPrivate Filtering state to Enabled, and set the Disable the General Page state to Enabled.
Set the Turn off InPrivate Browsing state to Enabled, and set the Disable the General Page state to Enabled.
Set the Disable the General Page state to Enabled, and set the Disable the Advanced Page state to Enabled.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
InPrivate Browsing in Internet Explorer 8 helps prevent one's browsing history, temporary Internet files, form data, cookies, and usernames and passwords from
being retained by the browser, leaving no easily accessible evidence of browsing or search history.
http://en.wikipedia.org/wiki/Internet_Explorer_8
hints:
run IE InPrivate Browsing will not keep any history or logging.
General Page able to clear IE history
QUESTION 270
All client computers in your network run Windows 7 with default firewall settings.
You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate
installation of the agent on all client computers.
What should you do?
A.
B.
C.
D.
Create inbound program rules.
Create inbound port rules.
Create Windows service hardening rules.
Create connection security rules.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints:
software havent install, so unable to block program
QUESTION 271
All client computers in your network run Windows 7 Enterprise. You need to prevent all standard user accounts from running programs that are signed by a specific
publisher.
What should you do?
A.
B.
C.
D.
Use AppLocker application control policies. Create an Executable rule.
Use software restriction policies. Create a hash rule.
Use AppLocker application control policies. Create a Windows Installer rule.
Use software restriction policies. Create a path rule.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/dd759068.aspx The AppLocker Microsoft Management Console (MMC) snap-in is organized into four areas called rule
collections. The four rule collections are executable files, scripts, Windows Installer files, and DLL files. These collections give the administrator an easy way to
differentiate the rules for different types of applications.
Rule conditions are criteria that the AppLocker rule is based on. Primary conditions are required to create an AppLocker rule. The three primary rule conditions are
publisher, path, and file hash. Publisher - This condition identifies an application based on its digital signature and extended attributes. The digital signature contains
information about the company that created the application (the publisher). The extended attributes, which are obtained from the binary resource, contain the name
of the product that the application is part of and the version number of the application. The publisher may be a software development company, such as Microsoft,
or the information technology department of your organization. Path - This condition identifies an application by its location in the file system of the computer or on
the network. AppLocker uses path variables for directories in Windows. File hash - When the file hash condition is chosen, the system computes a cryptographic
hash of the identified file.
QUESTION 272
Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and
install software applications. All users have standard user accounts.
You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy.
What should you do?
A.
B.
C.
D.
Configure the User Account Control: Behavior of the elevation prompt for standard users setting to be Prompt for credentials.
Configure the User Account Control: Only elevate executables that are signed and validated setting to be Enabled.
Configure the User Account Control: Detect application installations and prompt for elevation setting to be Disabled.
Configure the User Account Control: Detect application installations and prompt for elevation setting to be Enabled.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
User Account Control: Detect application installations and prompt for elevation The User Account Control: Detect application installations and prompt for elevation
policy setting controls the behavior of application installation detection for the computer.
The options are:
Enabled. (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative
user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. Disabled. (Default for enterprise) Application
installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies
such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary.
http://technet.microsoft.com/en-us/library/dd851376.aspx
QUESTION 273
Your network has 1,000 client computers that run Windows 7. You need to install an application, in the Local System account context, on the client computers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Configure a logon script.
B. Configure a startup script.
C. Configure a shutdown script.
D. Configure a logoff script.
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 274
You are planning to deploy Windows 7 to all client computers in your network. You need to ensure that domain administrators can manage domain Group Policy
objects (GPOs) from their Windows 7 computers. What should you provide to the domain administrators?
A.
B.
C.
D.
Local Group Policy Editor
GPOAccelerator Tool
Remote Server Administration Tools
Administration Tools Pack
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Group Polices were modified using the Group Policy Edit tool that was integrated with Active Directory Users and Computers Microsoft Management Console
(MMC) snap-in, but it was later split into a separate MMC snap-in called the Group Policy Management Console (GPMC). The GPMC is now a user component in
Windows Server 2008 and Windows Server 2008 R2 and is provided as a download as part of the Remote
Server Administration Tools for Windows Vista and Windows 7.
http://en.wikipedia.org/wiki/Group_Policy
QUESTION 275
Your network has a single domain with 1,000 client computers that run Windows 7. Users frequently copy data from their computers to removable drives. You need
to ensure that data that is copied to removable drives is protected. What should you do?
A.
B.
C.
D.
Use Encrypting File System (EFS)
Enable Trusted Platform Module (TPM) hardware on all client computers
Use Active Directory Rights Management Services
Configure a Group Policy to enforce the use of BitLocker To Go
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
BitLocker to Go extends BitLocker data protection to USB storage devices, enabling them to be restricted with a passphrase. In addition to having control over
passphrase length and complexity, IT administrators can set a policy that requires users to apply BitLocker protection to removable drives before being able to write
to them. http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows- 7/features.aspx#bitlocker
QUESTION 276
Your network has a single domain with 1,000 client computers that run Windows 7.
A large number of software installation scripts are configured to run on the client computers. You need to recommend a Group Policy setting to allow users to log on
to their computers as soon as possible at first boot.
What should you recommend?
A.
B.
C.
D.
Configure the Run logon scripts synchronously setting to be Enabled.
Configure the Run logon scripts synchronously setting to be Disabled.
Configure the Run startup scripts asynchronously setting to be Enabled.
Configure the Run startup scripts asynchronously setting to be Disabled.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Run logon scripts synchronously
Description
Directs the system to wait for logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop. If you enable this
policy, Windows Explorer does not start until the logon scripts have finished running. This setting assures that logon script processing is complete before the user
starts working, but it can delay the appearance of the desktop. If you disable this policy or do not configure it, the logon scripts and Windows Explorer are not
synchronized and can run simultaneously.
Run startup scripts asynchronously
Description
Lets the system run startup scripts simultaneously. Startup scripts are batch files that run before the user is invited to log on. By default, the system waits for each
startup script to complete before it runs the next startup script. If you enable this policy, the system does not coordinate the running of startup scripts. As a result,
startup scripts can run simultaneously.
If you disable this policy or do not configure it, a startup script cannot run until the previous script is complete.
http://msdn.microsoft.com/en-us/library/ms811602.aspx
QUESTION 277
Your company has 1,000 computers in the main office and 20 computers in store kiosks. All the computers run Windows 7 Enterprise. The kiosk computers do not
have network connections. The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title
bar. The company changes its logo.
You have the following requirements:
Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers.
Modify the search providers that are available to main office computers.
You need to define Internet Explorer settings to support the requirements.
What should you do?
A. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a
deployment CD for the kiosk computers.
B. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic
version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers.
C. Save the logo as Logo.png and copy the file to the C:\Windows\Branding\ directory on each kiosk computer. Create and distribute a new OpenSearch
description file for the main office computers.
D. Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive, and distribute
the file to all computers.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hints:
Kiosk computer do not have network connections, deployment CD is needed.
QUESTION 278
You are planning to test a custom image of Windows 7 Enterprise. You deploy the image on test computers in Toronto by using ConfigMgr.
The deployed image fails to activate.
You need to ensure that the image meets company activation requirements.
What should you do?
A.
B.
C.
D.
Run the Sysprep /generalize command.
Run the Sysprep /oobe command.
Modify the unattend.xml file and enter a MAK key.
Modify the unattend.xml file and enter a KMS key.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 279
Your company has an Active Directory domain.
You are planning the deployment of Windows 7 to client computers that are located in a main office and in satellite offices. All client computers use the same
hardware. Your company's security policy has the following requirements:
All client computers in the main office must run Windows 7 Enterprise.
All client computers in the satellite offices must use BitLocker.
All client computers in the main office must apply a custom security template.
The template must not apply to client computers in the satellite offices. You need to recommend an image-creation strategy that meets the requirements of the
security policy. The solution must minimize administrative effort.
What should you include in your recommendations?
A. One image for all client computers
A Group Policy object
B. One image for the main office computers
One image for the satellite office computers
A Data Recovery Agent
A Security database (secedit.sdb)
C. One image for the main office computers
One image for the satellite office computers
A Group Policy object
D. One image for all client computers
A Data Recovery Agent
A Security database (secedit.sdb)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 280
You have an image that is used to deploy Windows 7 on client computers.
You need to add drivers to the Windows 7 image.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Use the Deployment Image Servicing and Management (DISM) tool offline.
Use INF files for driver packages.
Use executable files for driver packages.
Use Windows Installer files for driver packages.
Use the Deployment Image Servicing and Management (DISM) tool online.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Deployment Image Servicing and Management able to attach INF driver file to image at offline mode
QUESTION 281
Your company is planning to deploy Windows 7.
You have an image that is used to deploy Windows 7 on client computers. You need to add a volume image to the existing Windows image.
What should you do?
A. Service the image online.
B. Use ImageX to append the volume image.
C. Use the Deployment Image Servicing and Management (DISM) tool to mount the image.
D. Use DiskPart to attach a new volume.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ImageX is a command-line tool that enables the creation of Windows image (.wim) files for deployment in a manufacturing or corporate IT environment. The /
append option appends a volume image to an existing .wim file. It creates a single instance of the file, comparing it against the resources that already exist in the
.wim file, so you do not capture the same file twice http://technet.microsoft.com/en-us/library/cc749603(v=ws.10).aspx
QUESTION 282
Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.
You have the following requirements:
Provide access to all applications when mobile computer users first start their computers.
Minimize network and local storage requirements.
Provide language-pack support based on the geographic location of the user.
You need to ensure that your image-creation strategy meets the requirements.
What should you do?
A.
B.
C.
D.
Create a single thin image for all computers.
Create one thin image for the mobile computers. Create one thick image for all other computers.
Create one thick image for the mobile computers. Create one thin image for all other computers.
Create a single hybrid image for all computers.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows® 7 By Ian McLean, Orin Thomas
http://books.google.com.my/books?id=lpNuBdGgFncC&pg=PT310&lpg=PT310&dq=thin+ima ge+thick+image
+languagepack&source=bl&ots=mU6XADkqKY&sig=C_BBoYQjkIHwwo7B9 P2MlXM4TOU&hl=en&sa=X&ei=QEKTDvC4fJrAfs7JGyCw&ved=0CB8Q6AEwAA#v=onepage&q=thin%20image%20thick%20im age%20languagepack&f=false
QUESTION 283
Your network includes the client computer hardware configurations shown in the following table.
You need to deploy Windows 7 by using the fewest images.
How many images are needed?
A.
B.
C.
D.
2
3
4
8
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
One for 32bit image and one for 64bit image
QUESTION 284
Your company has 1,000 client computers.
You are planning to deploy Windows 7 and a new line-of-business application.
You have the following requirements:
Install the application as part of the standard Windows 7 deployment.
Use a single Windows 7 image for the deployment.
The application must be available for use on client computers that are not connected to the network.
You need to ensure that the application is installed on all new client computers.
What should you do?
A.
B.
C.
D.
Deploy the application by using Windows Server Update Services (WSUS).
Publish the application by using Group Policy Software Installation.
Service an offline image of Windows 7 to add the new application.
Service an online image of Windows 7 to add the new application.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Hints:
Client computer that are not connected to the network = A & B is wrong the question refer to application installation. You can not do it offline servicing. Only online
will be able to achieve it.
QUESTION 285
You deploy Windows 7 Enterprise to 1,000 client computers by using an image file. You need to define an image update strategy to incorporate software updates.
What should you do?
A.
B.
C.
D.
Install the deployment image on a client computer. Run the update package on the client computer, run Sysprep, and then recapture the image.
Append a disk volume that contains the update to the deployment image.
Mount the deployment image on a client computer that runs Windows 7. Run the update package on the client computer.
Install the deployment image on a client computer. Run the update package on the client computer, run BCDedit, and then recapture the image.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints: incorporate software updates = update image online Sysprep is needed before capture image.
QUESTION 286
You are designing a Windows 7 deployment image.
You plan to partition the hard disk of each client computer during deployment.
You need to modify the unattended answer file by using a text editor.
Where should you add the disk information?
A.
B.
C.
D.
to the Generalize configuration pass
to the AuditSystem configuration pass
to the WindowsPE configuration pass
to the Specialize configuration pass
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/dd744551(v=ws.10).aspx The windowsPE configuration pass also enables you to specify Windows Setup-related settings,
including:
- Partition and format a hard disk.
- Select a specific Windows image to install, the path of that image, and any credentials required to access that image.
- Select a partition on the destination computer where you install Windows.
- Apply a product key and administrator password.
- Run specific commands during Windows Setup.
QUESTION 287
You are planning to deploy Windows 7 Enterprise and several custom applications. You create a custom Windows 7 Enterprise image. You need to validate that the
custom applications will run after the deployment. What should you do?
A.
B.
C.
D.
Use ImageX with the check option to mount the image.
Mount the custom image by using the Deployment Image Servicing and Management (DISM) tool.
Deploy the custom image, and then run the sigverif.exe command.
Deploy the custom image to a Virtual Hard Disk (VHD), and then boot from the VHD.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The only way to check custom application is C in question, as need to load image to VHD or real PC, then boot from VHD or PC to windows, then run the customer
application in windows.
QUESTION 288
Your company has a main office and 5 branch offices. Each office contains 200 client computer.
Each office has a direct connection to the Internet. The branch offices are connected to the main office through dedicated connections.
You plan to deploy an update solution for all client computers by using Windows Server Update Services (WSUS).
You need to recommend a WSUS deployment solution. The solution must minimize traffic over the dedicated connections.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Configure WSUS to download updates from an upstream server.
B.
C.
D.
E.
Deploy BranchCache in distributed cache mode in each office.
Deploy a WSUS server in each office.
Configure WSUS to download updates from Microsoft Update.
Deploy a WSUS server in the main office only.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
hints:
Each office has a direct connection to the Internet. The branch offices are connected to the main office through dedicated connections.
QUESTION 289
Your company has an Active Directory Domain Services (AD DS) forest with a single domain. The domain, organizational unit (OU), and Group Policy object (GPO)
design is shown in the following diagram.
You deploy a Microsoft Windows Server Update Services (WSUS) server. You need to ensure that only client computers that are members of the NY Computers
OU use the WSUS server for updates.
Where should you define Windows Update settings?
A. in the User Configuration settings of the New York Computers GPO
B. in the Computer Configuration settings of the New York Baseline GPO
C. in the User Configuration settings of the New York Baseline GPO
D. in the Computer Configuration settings of the New York Computers GPO
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To specify how and when computers are updated through Group Policy In Group Policy Object Editor, expand Computer Configuration, expand Administrative
Templates, expand Windows Components, and then click Windows Update. In the details pane of Group Policy Object Editor, configure the appropriate policies.
See the following table for examples of the policies you might want to set.. refer to http://technet.microsoft.com/en-us/library/cc708536(v=WS.10).aspx
QUESTION 290
Your company's network is shown in the following diagram.
All client computers are members of the contoso.com Active Directory Domain Services (AD DS) domain. Each network segment is represented by an AD DS site
object that is named to match the network segment.
Your company plans to deploy Windows 7 to all client computers. You need to manage the deployment to ensure that client computers in branch office C can
activate Windows. What should you do?
A. Create a DNS service (SRV) resource record named
_vlmcs._udp.BranchOfficeC._sites.contoso.com.
B. Deploy the Multiple Activation Key (MAK) in branch office C.
C. Deploy the Key Management Service (KMS) in branch office C.
D. Create a DNS service (SRV) resource record named
_vlmcs._tcp.BranchOfficeC._sites.contoso.com.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Key Management Service (KMS) requires a count of 25 or higher from the KMS host to activate itself.
refer to http://technet.microsoft.com/en-us/library/ee939272.aspx
QUESTION 291
Your company has client computers that run Windows Vista and client computers that run Windows 7. The client computers connect directly to the Microsoft
Update Web site once per week and automatically install all available security updates.
Microsoft releases a security update for Windows 7.
You have the following requirements:
Create a report of all Windows 7 computers that are currently connected to the network and that do not have the security update installed.
Use the least amount of administrative effort.
You need to manage the software update process to meet the requirements.
What should you do?
A. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for installation, and force a detection cycle on the client computers.
B. Deploy Microsoft Windows Server Update Services (WSUS). Approve the security update for detection, and force a detection cycle on the client computers.
C. Use the Microsoft Baseline Configuration Analyzer (MBCA) to scan the client computers.
D. Use the Microsoft Baseline Security Analyzer (MBSA) to scan the client computers.
Configure MBSA to use the Microsoft Update site catalog.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their
security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by
using MBSA to detect common security misconfigurations and missing security updates on your computer systems. http://technet.microsoft.com/en-us/security/
cc184924
QUESTION 292
Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you
do?
A.
B.
C.
D.
Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD).
Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu.
Use Bootcfg to modify the boot parameters.
Use BCDboot to modify the system partition.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in
the %WINDIR%\System32 folder.
http://technet.microsoft.com/library/cc731662.aspx
QUESTION 293
Your network has a single domain with 1,000 client computers that run Windows Vista. All client computers are members of the domain.
You are planning to deploy Windows 7.
You need to create a report that shows hardware and device compatibility on all client computers.
You need to perform this action without installing any additional software on the client computers.
Which tool should you use?
A.
B.
C.
D.
System Center Configuration Manager
System Center Capacity Planner
Windows Performance Monitor Data Collector Sets
Microsoft Assessment and Planning Toolkit
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Microsoft Assessment and Planning Toolkit performs a detailed analysis of hardware and device compatibility for migration to Windows 7, Windows Server 2008
R2, SQL Server 2008 R2, Microsoft Office 2010, and Office 365. The hardware assessment looks at the installed hardware and determines if migration is
recommended. If it is not recommended, then reports provide information about why it is not.
http://technet.microsoft.com/en-us/library/bb977556.aspx
QUESTION 294
You are designing a Windows 7 virtual desktop infrastructure.
You have the following requirements:
Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.
Support network load balancing. Support reconnection to existing sessions on virtual desktops.
You need to specify a design that meets the requirements.
What should you include in your design?
A.
B.
C.
D.
Remote Desktop Gateway
Windows Deployment Services
Remote Desktop Connection Broker
Windows Virtual PC and Windows XP Mode
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Remote Desktop Connection Broker (RD Connection Broker), formerly Terminal Services Session Broker (TS Session Broker), is used to provide users with access
to RemoteApp and Desktop Connection. RemoteApp and Desktop Connection provides users a single, personalized, and aggregated view of RemoteApp
programs, session-based desktops, and virtual desktops to users. RD Connection Broker supports load balancing and reconnection to existing sessions on virtual
desktops, Remote Desktop sessions, and RemoteApp programs accessed by using RemoteApp and Desktop Connection. RD Connection Broker also aggregates
RemoteApp sources from multiple Remote Desktop Session Host (RD Session Host) servers that may host different RemoteApp programs.
http://technet.microsoft.com/en-us/library/dd560675(v=WS.10).aspx
QUESTION 295
Your company plans to deploy Windows 7 Enterprise.
The current client computers run either Windows XP Professional or Windows Vista Enterprise. The company uses 20 custom applications that were written for
Windows XP. You need to create a log of compatibility issues for the custom applications.
What should you do?
A.
B.
C.
D.
Install each application on a Windows XP client computer, and then run the Application Compatibility Toolkit (ACT).
Install each application on a Windows 7 client computer, and then run the Application Compatibility Toolkit (ACT).
Install each application on a Windows XP client computer. Sequence each application by using Microsoft Application Virtualization (App-V).
Install each application on a Windows Vista client computer. Sequence each application by using Microsoft Application Virtualization (App-V).
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 296
A company has 100 client computers that run Windows 8.1.
You need to assign static IPv6 addresses to the client computers.
Which Windows Powershellcmdlet should you run?
A.
B.
C.
D.
Set-NetTCPSetting
Set-NetIPInterface
Set-NetlPv6Protocol
set-NetIPAddress
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/hh826151.aspx
Set-NetIPAddress
The Set-NetIPAddress cmdlet modifies IP address configuration properties of an existing IP address.
To create an IPv4 address or IPv6 address, use the New-NetIPAddress cmdlet.
QUESTION 297
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
Portable client computers no longer connect to the corporate wireless network. You need to ensure that when the corporate wireless network is available, the
computers always connect to it automatically.
Which two actions would achieve the goal? (Each correct answer presents a complete solution.
Choose two.)
A.
B.
C.
D.
Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the organizational unit that contains the computers.
Configure the corporate wireless network as an unmetered network.
Configure the corporate wireless network as a preferred network.
Manually connect to the corporate wireless network and select the option to connect automatically to that network.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Answer:
Configure the corporate wireless network as a preferred network. Manually connect to the corporate wireless network and select the option to connect automatically
to that network.
Explanation:
http://blogs.technet.com/b/canitpro/archive/2014/03/05/windows-8-1-tips-manage-wireless-network-profiles.aspx Windows 8.1 tips: Managing Wireless Network
Profiles
..
And finally, if you wanted to change the preferred order for your machine to connect to specific wireless network, you could move a network up in the priority list by
using the command: set profileorder name=goose interface="Wi-Fi" priority=1
..
http://www.eightforums.com/tutorials/20152-wireless-networks-priority-change-windows-8-a.html How to Change Connection Priority of Wireless Networks in
Windows 8 and 8.1 ..
Windows usually connects to networks in this priority order:
Ethernet
1.
Wi-Fi (wireless)
2.
Mobile broadband
3.
When you connect to a new Wi-Fi network, it's added to the list, and Windows will connect to that network while it's in range. If you connect to another Wi-Fi
network while in range of the first network, Windows will prefer the second network over the first one.
Mobile broadband networks are treated differently. If you manually connect to a mobile broadband net- work when there is a Wi-Fi network in range, the mobile
broadband network is preferred just for that ses- sion. The next time you're in range of both networks, the Wi-Fi network is preferred. This is because mo- bile
broadband networks typically are metered.
If you want to force your PC to prefer a mobile broadband network over Wi-Fi, tap or click the Wi-Fi net- work in the list of networks, and then click Disconnect.
Windows won't automatically connect to that Wi-Fi network.
QUESTION 298
A company has client computers that run Windows 8.1. The corporate network is configured for IPv4 and IPv6.
You need to disable Media Sensing for IPv6 on the client computers without affecting IPv4 communications.
What should you do on each client computer?
A.
B.
C.
D.
Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
Run the Disable-NetAdapter Windows PowerShell cmdlet.
Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh826144.aspx
Set-NetIPv6Protocol
Set-NetIPv6Protocol -DhcpMediaSense<DhcpMediaSense>
Specifies a value for Media Sense. The cmdlet modifies the value for this setting.
Media Sense provides a mechanism for the network adapter to notify the protocol stack of media connect and disconnect events. These events trigger the DHCP
client to take an action, such as attempting to re- new a DHCP lease or removing routes that are related to a disconnected network. When Media Sense is enabled,
the network parameters on the laptop of a roaming user are automatically and transparently up- dated without requiring a restart when the user moves from one
location to another. The acceptable val- ues for this parameter are:
-- Enabled
-- Disabled
The default value is Enabled.
Further information:
Disable-NetAdapterBinding
The Disable-NetAdapterBinding cmdlet disables a binding to a network adapter. Running this cmdlet causes loss of network connectivity depending on the binding
that is disabled. Note: Disabling some adapter bindings can automatically enable other network adapter bindings.
Disable-NetAdapter
The Disable-NetAdapter cmdlet disables a network adapter. A network adapter must be enabled to con- nect to a network. This cmdlet causes loss of network
connectivity of the specified network adapter. Note:
Do not disable the network adapter being used to manage a remote computer. By default the user will be prompted to confirm the network adapter should be
disabled
Set-NetlPv4Protocol
Is not a valid cmdlet.
QUESTION 299
A company has 100 client computers that run Windows 8.1. The client computers are members of a workgroup.
A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall settings.
Which Windows PowerShell cmdlet should you run on each client computer?
A.
B.
C.
D.
E.
New-NetFirewallRule
Set-NetFirewallSetting
Set-NetFirewallRule
Set-NetFirewallProfile
New-NetIPSecMainModeRule
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj554908.aspx
New-NetFirewallRule
The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.
Further information:
Set-NetFirewallSetting
The Set-NetFirewallSetting cmdlet configures properties that apply to the firewall and IPsec settings, re- gardless of which network profile is currently in use. This
cmdlet allows the administrator to specify global firewall behavior.
Set-NetFirewallRule
The Set-NetFirewallRule cmdlet modifies existing firewall rule properties.
Set-NetFirewallProfile
The Set-NetFirewallProfile cmdlet configures options for the profiles, including domain, public, and pri- vate, that are global, or associated with the input rules.
New-NetIPSecMainModeRule
The New-NetIPsecMainModeRule cmdlet creates an IPsec main mode rule. A main mode rule contains a set of local and remote end points to determine the peers
to which it applies. When an application on the local computer attempts to communicate with one of these specified remote hosts, the computer attempts to
establish a security association (SA) with the remote server.
QUESTION 300
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Portable client computers connect to the corporate
wireless network.
You have the following requirements:
Prevent users from configuring a wireless network by using
settings from a USB flash drive.
Do not affect the use of other USB devices.
You need to create a Group Policy object (GPO) to meet the requirements.
Which GPO should you create?
A.
B.
C.
D.
A GPO that disables the Allow only USB root hub connected Enhanced Storage Features policy setting.
A GPO that enables wireless policy processing.
A GPO that prohibits connections to mobile broadband networks when roaming.
A GPO that configures Windows Connect Now settings.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-US/windows-vista/What-is-Windows-Connect-Now Computer Configuration\Policies\Administrative Templates\Network\Windows
Connect Now Turn Off Ability To Configure Using A USB Flash Drive setting:
Prevents Windows from being able to store a Windows Connect Now configuration to a UFD. Because the Windows Connect Now information stored on a UFD
contains information that can allow computers to access your protected wireless network, you might choose to disable this setting to improve the security of your
wireless networks.
http://sourcedaddy.com/windows-7/windows-connect-now-in-windows-7.html Explanation:
http://windows.microsoft.com/en-US/windows-vista/What-is-Windows-Connect-Now What is Windows Connect Now?
Microsoft Windows Connect Now (WCN) is a technology designed to address the need for a simple and more secure way to configure network devices and
computers. In addition to easier device configuration, you can use WCN to save wireless network settings to a USB flash drive and then plug that drive into devices (such as routers) and computers so you can quickly and easily add them to a network.
http://support.epson.ru/products/manuals/101846/html_z/setpn_4.htm Using WCN (Windows Connect Now)
..
QUESTION 301
A company has client computers that run Windows 8.1.
The client computers are connected to a corporate private network.
Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate
network resource from their home computers.
Which setting should you configure on the home computers?
A.
B.
C.
D.
Virtual Private Network connection
Remote Desktop local resources
DirectAccess connection
Remote Desktop Gateway IP address
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 302
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Client computers use Window BitLocker Drive
Encryption with a Trusted Platform Module (TPM) chip.
You need to create a Group Policy object (GPO) that will secure the TPM owner information.
Which policy setting should you configure?
A.
B.
C.
D.
Enable the Turn on TPM backup to Active Directory Domain Services policy setting.
Enable the Configure the level of TPM usage authorization information available to the registry policy setting.
Set the Configure the level of TPM owner authorization information available to operating system policy setting to Full.
Enable the Configure TPM platform validation profile policy setting.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj679889.aspx
Trusted Platform Module Services Group Policy Settings
..
If you enable this policy setting, TPM owner information will be automatically and silently backed up to AD DS when you use Windows to set or change a TPM
owner password.
QUESTION 303
A company has client computers that run Windows 8.1. The company uses Windows BitLocker Drive Encryption with the data-only option o all client computers.
You delete a file containing highly confidential information from your computer.
You need to clear the free space on the hard drive to minimize the chance of the confidential information being recovered.
Which command should you run on the client computer?
A. manage-bde w
B. chkdsk/spotfix
C. diskpart clean
D. BdeHdCfg -target c: shrink
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj647761.aspx
Manage-bde: WipeFreeSpace
Syntax:
manage-bde WipeFreeSpace|-w [<Drive>] [-Cancel] [-computername <Name>] [{-?|/?}] [{-help|-h}]
Wipes the free space on the volume removing any data fragments that may have existed in the space. Running this command on a volume that was encrypted
using the "Used Space Only" encryption method provides the same level of protection as the "Full Volume Encryption" encryption method.
Example:
The following example illustrates using the -w command to create wipe the free space on drive C.
manage-bde -w C:
Further information:
http://technet.microsoft.com/en-us/library/cc730714.aspx
Chkdsk
chkdsk [<Volume>[[<Path>]<FileName>]] [/f] [/v] [/r] [/x] [/i] [/c] [/l[:<Size>]] [/b]
http://technet.microsoft.com/en-us/library/cc731145.aspx
Clean
The Diskpart Clean command removes any and all partition or volume formatting from the disk with focus.
http://technet.microsoft.com/en-us/library/ff829850.aspx
Bdehdcfg
Prepares a hard drive with the partitions necessary for BitLocker Drive Encryption.
QUESTION 304
You deploy several tablet PCs that run Windows 8.1.
You need to minimize power usage when the user presses the sleep button.
What should you do?
A.
B.
C.
D.
Configure the active power plan to disable Wake Timers.
Configure the active power plan to use Fast Startup.
In Power Options, configure the sleep button setting to Hibernate.
In Power Options, configure the sleep button setting to Sleep.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows7/sleep-and-hibernation-frequently-asked-questions Sleep and hibernation: frequently asked questions
What's the difference between sleep, hibernate, and hybrid sleep?
Sleep is a power-saving state that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again.
Putting your computer into the sleep state is like pausing a DVD player--the computer immediately stops what it's doing and is ready to start again when you want to
resume working.
Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and set- tings in memory and draws a small amount of power,
hibernation puts your open documents and pro- grams on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hi- bernation
uses the least amount of power. On a laptop, use hibernation when you know that you won't use your laptop for an extended period and won't have an opportunity to
charge the battery during that time.
Hybrid sleep is designed primarily for desktop computers. Hybrid sleep is a combination of sleep and hi- bernate--it puts any open documents and programs in
memory and on your hard disk, and then puts your computer into a low-power state so that you can quickly resume your work. That way, if a power failure occurs,
Windows can restore your work from your hard disk. When hybrid sleep is turned on, putting your computer into sleep automatically puts your computer into hybrid
sleep. Hybrid sleep is typically turned on by default on desktop computers.
Further information:
http://www.howtogeek.com/122954/how-to-prevent-your-computer-from-waking-up-accidentally/ How To Prevent Your Computer From Waking Up Accidentally
..
Disable Wake Timers
If you find your Windows computer waking from sleep for no apparent reason, your computer is either be- ing woken up by a hardware device such as your mouse
-- or scheduled task set to wake your com- puter.
http://msdn.microsoft.com/en-us/library/windows/hardware/jj835779%28v=vs.85%29.aspx Distinguishing Fast Startup from Wake-from-Hibernation
Starting with Windows 8, a fast startup mode is available to start a computer in less time than is typically required for a traditional, cold startup. A fast startup is a
hybrid combination of a cold startup and a wake- from-hibernation startup.
http://www.redmondpie.com/enable-windows-8-hibernate-mode-option-how-to-tutorial/ Enable Windows 8 / 8.1 Hibernate Mode Option [How-To Tutorial] ..
Another similarly missing power option (apparently) is Hibernate, which, although not readily visible, is still a part of the operating system, and you just have to
enable it.
QUESTION 305
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain.
You have the following requirements:
Ensure that files in shared network folders are available offline.
Maximize efficiency for users who connect to shared network folders from a mobile device.
You need to configure Group Policy settings to meet the requirements.
What should you do first?
A.
B.
C.
D.
Enable and configure the Configure slow-link mode policy setting.
Enable the Enable file synchronization on costed networks policy setting.
Enable the Synchronize all offline files when logging on policy setting.
Enable and configure the Specify administratively assigned Offline Files policy setting.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj127408.aspx
Enable Background File Synchronization on Metered Networks
This document describes how to enable background file synchronization of Offline Files while using me- tered connections that have usage limits, and while
roaming on another provider's network.
Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012 support cost-aware syn- chronization by automatically tracking roaming and
bandwidth usage limits while on metered connections. By default, when the user is using a metered connection (such as a 4G mobile network) and is near or over
their bandwidth limit or roaming on another provider's network, Windows switches to Offline mode and disables background synchronization. Users can still
manually initiate synchronization, and adminis- trators can override cost-aware synchronization for specific users, such as executives.
QUESTION 306
You install Windows 8.1 on a desktop computer. You create a system image and then install third-party desktop apps and create personal data. You disable the
creation of restore points.
The computer is not running optimally.
You need to remove the third-party applications and preserve files that are stored in your Documents folder.
You start the computer from a system repair disk.
Which troubleshooting option should you use?
A.
B.
C.
D.
Refresh your PC without affecting your files
System Restore
Remove everything and install Windows
System Image Recovery
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Basically the Refresh feature allows you to refresh your Windows 8.1 installation back to a vanilla, brand new install while preserving all your personal files.
Windows 8.1 also includes a Reset feature which is similar however resetting your install deletes all personal files so don't select this unless you want a full system
wipe.
This is what happens:
Your files and personalization settings won't change.
Your PC settings will be changed back to their defaults.
Metro-style apps from the Windows store will be retained.
Explanation:
http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
Applies to Windows 8.1, Windows RT 8.1
If you're having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC re- installs Windows and keeps your personal files and
settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your
files, settings, and apps -- except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you've made.
If you want to back up and restore your personal files using File History, see Set up a drive for File History If you want to restart your PC, see Shut down (turn off),
sleep, or hibernate your PC.
Refresh your PC without affecting your files
If your PC isn't performing as well as it once did, and you don't know why, you can refresh your PC with- out deleting any of your personal files or changing your
settings.
Further information:
http://windows.microsoft.com/en-us/windows/restore-computer-from-system-image-backup#1TC=windows-7 Restore your computer from a system image backup
When you restore your computer from a system image, it's a complete restoration. You can't choose indi- vidual items to restore, and all of your programs, system
settings, and files are replaced with those on the system image.
QUESTION 307
A company has client computers that run Windows 8.1. File History is on.
An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History.
What should you do?
http://www.gratisexam.com/
A. Configure the File History advanced settings to include the Archives folder.
B. From the File History configuration options, change the drive and select the Archives folder.
C. Create a library named History and add the Archives folder to the library.
D. Move the Archives folder into the Windows system folder.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx What is File History?
File History is a backup application that continuously protects your personal files stored in Libraries, Desk- top, Favorites, and Contacts folders. It periodically (by
default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will
be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to-backup-file-history-in- windows-8.aspx
A New Way to Backup: File History in Windows 8
File History is a new feature in Windows 8 that helps to ensure that your personal files are safe. In addi- tion to being a backup solution, File History also provides
the capability to restore multiple backup copies (versions) of your files. File history in Windows 8 is easy to setup, powerful, and reliable. This means you can have
more confidence when working with files, and also keep less redundant copies around for your own personal "data history". You can easily configure File History to
protect some or all of the files that are in your libraries on Windows 8. You can add folders to your libraries easily in Windows 8, giving you the ability to use File
History with any group of folders and files that you choose.
QUESTION 308
A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all
computers.
You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
A.
B.
C.
D.
E.
F.
G.
Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.
Create and configure a collector-initiated subscription.
Start the Windows Event Collector service on all computers other than COMPUTER1.
Start the Windows Event Collector service on COMPUTER1.
Create and configure a source computer¡ªinitiated subscription.
Start the Windows Event Log service on all computers other than COMPUTER1.
Add COMPUTER1 machine account to the Event Log Readers local group on all other computers.
Correct Answer: BDG
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For best management we want a collector-initiated subscription--meaning we'll be setting up the subscription at the collecting computer instead of at each individual
computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.
The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.
http://blog.oneboredadmin.com/2012/06/windows-event-collection.html Windows Event Collection
The only basic rules are that the source machine should have Winrm2 installed and running on it, and the Event Collector Service should be running on the collector
machine. There are two methods available to complete this challenge - collector initiated and source initiated.
Collector Initiated
When defining such a subscription, you instruct the collector to open a WinRM session to the source ma- chine(s) using a specified set of credentials (or the
computer account) and ask for a subscription.
Further Information:
For best management we want a collector-initiated subscription--meaning we'll be setting up the subscrip- tion at the collecting computer instead of at each
individual computer. The Windows Event Collector ser- vice is requested for subscriptions to work on the computer doing the collecting. The collecting computer
must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.
http://msdn.microsoft.com/en-us/library/windows/desktop/bb427443%28v=vs.85%29.aspx Windows Event Collector
You can subscribe to receive and store events on a local computer (event collector) that are forwarded from a remote computer (event source).
The following list describes the types of event subscriptions:
Source-initiated subscriptions: allows you to define an event subscription on an event collector computer without defining the event source computers. Multiple
remote event source computers can then be set up (using a group policy setting) to forward events to the event collector computer. This subscription type is useful
when you do not know or you do not want to specify all the event sources computers that will forward events.
Collector-initiated subscriptions: allows you to create an event subscription if you know all the event source computers that will forward events. You specify all the
event sources at the time the subscrip- tion is created.
http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription
You can subscribe to receive events on a local computer (the event collector) that are forwarded from re- mote computers (the event sources) by using a collectorinitiated subscription. In a collector-initiated sub- scription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to
events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.
http://technet.microsoft.com/en-us/library/cc748890.aspx
Configure Computers to Forward and Collect Events
Before you can create a subscription to collect events on a computer, you must configure both the collect- ing computer (collector) and each computer from which
events will be collected (source).
In a workgroup environment, you can follow the same basic procedure described above to configure com- puters to forward and collect events. However, there are
some additional steps and considerations for workgroups:
You can only use Normal mode (Pull) subscriptions.
You must add a Windows Firewall exception for Remote Event Log Management on each source com- puter.
You must add an account with administrator privileges to the Event Log Readers group on each source computer. You must specify this account in the Configure
Advanced Subscription Settings dialog when creating a subscription on the collector computer.
Type winrm set winrm/config/client @{TrustedHosts="<sources>"} at a command prompt on the collector computer to allow all of the source computers to use
NTLM authentication when communicating with WinRM on the collector computer. Run this command only once.
QUESTION 309
A portable computer that runs Windows 8.1 uses a mobile broadband connection for the corporate wireless network.
The computer also ha a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.
You need to ensure that the computer automatically downloads updates by using Windows Update while also connected to the wireless corporate network
connection.
What should you do?
A.
B.
C.
D.
Set the corporate wireless network to metered.
Set the corporate wireless network to non-metered.
Configure the Specify intranet Microsoft update service location local Group Policy setting.
Configure a Windows Firewall connection security rule.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Setting a Wireless network to METERED allows only critical Windows Updates using that connection.
Setting a Wireless network to NON-METERED allows all Windows Updates using that connection.
Source: http://windows.microsoft.com/en-US/windows-8/metered-internet-connections-frequently- .
askedquestions
http://windows.microsoft.com/en-US/windows-8/metered-internet-connections-frequently-asked-questions Metered Internet connections: FAQ
What's a metered Internet connection?
Internet service providers can charge by the amount of data used (the amount of data sent and received by your PC). That's called a metered Internet connection.
These plans often have a data limit, and if you exceed the limit you might have to pay extra. In some cases, you aren't charged extra but your connec- tion speed
becomes slower until the billing cycle ends.
If you have a metered Internet connection, setting your network connection to metered in Windows can help you reduce the amount of data you send and receive.
How does setting my network connection to metered affect my PC? Any app that relies on an Internet connection to update or display info might be limited in the
amount of data it can download or display. You might notice these and other effects:
Windows Update will only download priority updates.
...
Further Information:
Setting a Wireless network to METERED allows only critical Windows Updates using that connection. Setting a Wireless network to NON-METERED allows all
Windows Updates using that connection.
QUESTION 310
A company has client computers that run Windows 8.1. Each computer has two hard drives.
You need to create a dynamic volume on each computer that maximizes write performance with data fault tolerance.
Which kind of dynamic volume should you create?
A.
B.
C.
D.
Striped Volume
RAID 5 Volume
Spanned Volume
Mirrored Volume
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx Types of Dynamic Volumes
A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.
Mirrored Volumes
A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the
information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one
of the disks fails, the data on the failed disk becomes unavailable, but the system continues to oper- ate by using the unaffected disk.
Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy
of their data on the second disk. Mirrored vol- umes provide better write performance than RAID-5 volumes.
Further Information:
Striped Volumes
Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal
size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks. Striped volumes cannot be extended or
mirrored and do not offer fault tolerance. If one of the disks con- taining a striped volume fails, the entire volume fails, and all data on the striped volume becomes
inacces- sible. The reliability for the striped volume is less than the least reliable disk in the set.
RAID-5 Volumes
A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one
disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the
RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the lost data. RAID-5 volumes are well-suited to
storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a
RAID-5 volume.
Spanned Volumes
Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned
volumes require two disks, and you can use up to 32 disks.
QUESTION 311
A company has client computers that run Windows 8.1.
The company implements the following security requirements:
All client computers must use two-factor authentication.
At least one authentication method must include more than four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)
A.
B.
C.
D.
PIN
Biometric authentication
Picture Password
Microsoft Account
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
More than 4 characters are of course supported with the Microsoft Account. It is something the user knows. The picture password would be another thing the user
knows (gestures).
So there's only MS Account and Biometric authentication left. Two-factor authentication requires the use of two of the three authentication factors:
Something the user knows (e.g., password, PIN);
Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint). The factors
are identified in the standards and regulations for access to U.S. Federal Government systems.
http://en.wikipedia.org/wiki/Multi-factor_authentication
Multi-factor authentication
Two-factor authentication requires the use of two of the three authentication factors. The factors are iden- tified in the standards and regulations for access to U.S.
Federal Government systems. These factors are:
Something only the user knows (e.g., password, PIN, pattern); Something only the user has (e.g., ATM card, smart card, mobile phone); and Something only the
user is (e.g., biometric characteristic, such as a fingerprint).
1. Something the user knows: Microsoft Account
Minimum password length is more than 4 characters.
2. Something only the user is: Biometric authentication
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to- resources-14/
Biometric in Windows 8 is built on Windows Biometric Framework and relies on Windows Biometric ser- vice that is set to start up manual by default.
Further information:
Something the user knows: Picture password
Problem: limited to 3 gestures
Something the user knows:
http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to- resources-14/
Sign in with PIN code (4-digit code) is not possible for a domain user, it is not even visible in PC Settings -> Users (if machine is not domain joined you see it). To
enable it for even domain joined computer/users you can enable the policy Turn on PIN sign-in and it becomes visible.
QUESTION 312
All client computers in a company's network environment run Windows 8.1. A client computer has two internal hard disk drives. The hard drives are configured as
shown in the following table.
You are choosing a backup destination for drive C.
You have the following requirements:
Ensure that the backup file is available if drive C fails.
Ensure that the backup file can be accessed by other
computers on the network.
Support the backup of multiple system images.
You need to select a backup destination that meets the requirements.
Which destination should you select?
A.
B.
C.
D.
shared network folder
drive D
multiple DVDs
external hard drive
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Shared network folder will only support one system image:
That applies to internal / external disks:
http://windows.microsoft.com/en-us/windows7/Back-up-your-programs-system-settings-and-files
Keeping different versions of system images:
If you're saving your system images on an internal or external drive, or on CDs or DVDs, you can keep several versions of system images.
On internal and external hard drives, older system images will be deleted when the drive runs out of space. Conclusion is to use external HDD and share it over the
network.
http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx What Are Dynamic Disks and Volumes?
Like basic disks, which are the most commonly used storage type found on computers running Microsoft Windows, dynamic disks can use the master boot record
(MBR) or GUID partition table (GPT) partitioning scheme. All volumes on dynamic disks are known as dynamic volumes. Dynamic disks were first intro- duced with
Windows 2000 and provide features that basic disks do not, such as the ability to create vol- umes that span multiple disks (spanned and striped volumes), and the
ability to create fault tolerant vol- umes (mirrored and RAID-5 volumes).
http://lifehacker.com/5958865/how-to-use-windows-8s-new-file-history-backup-aka-time-machine-for-windows How to Use Windows 8's New File History Backup
(aka Time Machine for Windows)
The Difference Between File History and Windows Backup
Windows Backup still exists in Windows 8, it's just been renamed to "Windows 7 File Recovery." So, if you want to back up your files, you have the choice of which
system you want to use. Windows Backup (now called "Windows 7 File Recovery") backs up your computer on a schedule you set --for example, once a week on
Sunday at 2am (though the default is once a month). You can choose to back up whatever you want, from a small selection of personal files to program files to
anything else. You can even create a full system image, which is handy when you want to restore your computer to exactly the way it was at a certain point in time.
To restore files, you had to go into it's slightly confusing interface and find the files you were looking for in a set of folders on your backup drive.
QUESTION 313
You are in the process of setting up File History on your workstation.
You are configuring the Size of offline cache Advanced settings.
Which of the following is the default setting?
A.
B.
C.
D.
2%
5%
10%
20%
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://news.softpedia.com/news/Windows-8-Secrets-Incremental-Backup-with-File-History-299238.shtml
QUESTION 314
You are in the process of setting up File History on your workstation. You are configuring the Save copies of files Advanced settings.
Which of the following is the default setting?
A.
B.
C.
D.
15 minutes
30 minutes
1 hour
6 hours
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 315
You are employed as an administrator at contoso.com.
The network consists of a single Active Directory Domain Services (AD DS) domain, named contoso.com.
All workstations on the contoso.com network have Windows 8.1 installed.
You need to configure files history on a client system.
You notice that the free storage space on the selected drive is low, but you do not have a spare drive to replace it.
What should you do?
A.
B.
C.
D.
Configure the save copies of files setting to back up files once a day.
Configure Size of offline cache setting to 2%
Keep saved versions setting to be 1 month
Keep saved versions setting until space is needed
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 316
You are employed as an administrator at contoso.com. The contoso.com network is made up of an Active Directory Domain Services (AD DS) domain, named
ABC.com.
All workstations on the contoso.com network, including laptops, have Windows 8.1 installed.
Your users have just been issued new laptops for use outside the office.
These users currently log in to their desktop workstations using a Windows domain account.
They would like their laptops to be set up exactly like their desktop workstations.
Which of the following would easily allow them to achieve this?
A.
B.
C.
D.
Transfer the user settings with the File and Transfer wizard
Windows Easy Transfer
Migrate the user profiles with USMT
Link the Windows domain accounts to a Windows Live ID.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/b8/archive/2011/09/26/signing-in-to-windows-8-with-a-windows-live-id.aspx Signing in with an ID allows you to:
Associate the most commonly used Windows settings with your user account. Saved settings are available when you sign in to your account on any Windows 8.1
PC. Your PC will be set up just the way you are used to!
Easily reacquire your Metro style apps on multiple Windows 8.1 PCs. The app's settings and last-used state Persist across all your Windows 8.1 PCs.
Save sign-in credentials for the different apps and websites you use and easily get back into them without having to enter credentials every time.
Automatically sign in to apps and services that use Windows Live ID for authentication. http://windows.microsoft.com/en-us/windows-8/connect-microsoft-domainaccount Connect your Microsoft account to your domain account
You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account
in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other
Microsoft account settings that you see on your home PC. You'll also be able to use Microsoft account services from your domain PC without signing in to them
individually.
QUESTION 317
A company has 50 touch-enabled client computers that run Windows 7.
You are planning to migrate the client computers to Windows 8.1. You have the following requirements:
Choose the installation or upgrade path that includes touch- optimized desktop versions of Microsoft Word, Excel,
PowerPoint, and OneNote.
Minimize new hardware requirements.
You need to choose the path that meets the requirements.
Which path should you choose?
A.
B.
C.
D.
Upgrade to Windows RT
Perform a clean installation of Windows 8.1 Enterprise
Purchase hardware with Windows RT pre-installed.
Upgrade to Windows 8.1 Enterprise.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Windows RT is Windows for ARM; nothing in this specifies the computers are on ARM machines.
http://blogs.office.com/2012/07/18/using-the-new-office-with-touch/ Windows 8 provides a number of platform capabilities for enabling highly responsive touch
support in ap- plications, ranging from hardware accelerated graphics and improved touch targeting to the a new app platform that makes it easy to build touchoptimized Windows 8-style apps. The new Office takes advan- tage of these to deliver great new touch-based experiences on Windows 8.
http://www.howtogeek.com/120936/beginner-how-to-enable-touch-mode-in-office-2013/ Beginner: How to Enable Touch Mode in Office 2013
By default, even if you are on a touch enabled PC, Office 2013 doesn't open with a touch optimized inter- face.
Further Information:
Windows RT is Windows for ARM; nothing in this specifies the computers are on ARM machines.
QUESTION 318
A company has 100 client computers that run Windows Vista. The company uses several custom applications.
The company plans to replace the Windows Vista computers with new computers that run Windows 8.1.
You need to establish which of the currently installed applications will work on Windows 8.1.
What should you do?
A. Install and run the Windows App Certification Kit.
B. Install and run the Microsoft Assessment and Planning Toolkit.
C. Install and run the Microsoft Deployment Toolkit.
D. Install and run the Windows Application Compatibility Toolkit.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/solutionaccelerators/dd537566.aspx
Explanation:
http://www.microsoft.com/en-us/download/details.aspx?id=30652 Windows Assessment and Deployment Kit (ADK) for Windows® 8
The Windows® Assessment and Deployment Kit (Windows ADK) is a collection of tools that you can use to customize, assess, and deploy Windows operating
systems to new computers.
Features available in the Windows ADK include:
Application Compatibility Toolkit (ACT) - The Application Compatibility Toolkit (ACT) helps IT Profession- als understand potential application compatibility issues by
identifying which applications are or are not compatible with the new versions of the Windows operating system. ACT helps to lower costs for appli- cation
compatibility evaluation by providing an accurate inventory of the applications in your organiza- tion. ACT helps you to deploy Windows more quickly by helping to
prioritize, test, and detect compati- bility issues with your apps
...
Supported Operating System
To install the Windows ADK, your computer must be running one of the following operating systems:
Windows® 8
Windows® 7
Windows Server® 2012
Windows Server® 2008 R2
Windows Vista®
Windows Server® 2008
Further Information:
http://www.microsoft.com/en-us/download/details.aspx?id=7826 Microsoft Assessment and Planning Toolkit
The Microsoft Assessment and Planning Toolkit makes it easy to assess your current IT infrastructure for a variety of technology migration projects. This Solution
Accelerator provides a powerful inventory, as- sessment, and reporting tool to simplify the migration planning process.
Supported Operating System
Windows 7 Service Pack 1
Windows 8
Windows 8.1
Windows Server 2008 R2 SP1
Windows Server 2012
Windows Server 2012 R2
http://www.microsoft.com/en-us/download/details.aspx?id=25175 Microsoft Deployment Toolkit (MDT) 2012 Update 1
Microsoft Deployment Toolkit (MDT) 2012 Update 1 is the newest version of MDT, a Solution Accelerator for operating system and application deployment. MDT
2012 Update 1 supports deployment of Windows 8, Windows 7, Office 2010 and 365, Windows Server 2012, and Windows Server 2008 R2 in addition to
deployment of Windows Vista, Windows Server 2008, Windows Server 2003, and Windows XP.
MDT 2012 Update 1 relies on several Windows deployment tools. After installation of the .msi package and startup of the Deployment Workbench, the user can
choose to download and install the following ma- jor tools from the Components:
Windows 8 Assessment and Deployment Kit
...
QUESTION 319
A company has 10 client computers that run Windows 8.1. Employees log on to resources by using multiple accounts.
You need to back up the user name and password for each logon account.
What should you do on each client computer?
A.
B.
C.
D.
Back up each user's Personal Information Exchange PKCS #12 (.pfx) certificate.
Use Credential Manager to save the information to a USB flash drive.
Use File History to back up the ntuser.dat file.
Run the Export-Certificate Windows PowerShell cmdlet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.7tutorials.com/credential-manager-where-windows-stores-passwords-other-login-details Credential Manager - Where Windows Stores Passwords &
Login Details
What is the Credential Manager?
Credential Manager is the "digital locker" where Windows stores log-in credentials (username, password, etc.) for other computers on your network, servers or
Internet locations such as websites.
Windows 8 adds one more type of credentials called Web Credentials. As the name implies, such creden- tials are used by Internet Explorer to automatically log
you into certain websites.
http://www.7tutorials.com/how-backup-and-restore-windows-vault-passwords How to Backup and Restore Windows Vault Passwords
One way to use the Credential Manager is to export your Windows credentials to another Windows com- puter, or to back them up and import them after you
reinstall Windows, so that you don't have to manually type them again.
Backup Your Windows User Names and Passwords
Open the Credential Manager. Under the Windows Vault look for the "Back up vault" link and click on it.
This starts the Stored User Names and Passwords wizard.
You are asked to select where you want to backup the Windows credentials stored on your computer. Click on Browse, select the folder and type the name of the
file where the data will be stored. Then, click Next.
...
This procedure has been tested both on Windows 7 and Windows 8. In Windows 8, there are some minor differences but it all works the same.
QUESTION 320
A company has client computers that run Windows 8.1. You implement an AppLocker file hash rule that allows an application to run. You then apply a service pack
to the application.
When users attempt to run the application, the application is blocked by Group Policy.
You need to ensure that the application runs.
What should you do?
A.
B.
C.
D.
Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
Create a new has rule for the updated app
Set the wired network connection to metered.
Configure the Automatic Maintenance setting.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 321
A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server.
All client computers run Windows 8.1 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement.
After deploying Windows Updates to the computers, the web application stops responding. You establish that a specific optional update installed by Windows
Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable.
You need to remove the optional update from one client computer.
What should you do?
A.
B.
C.
D.
E.
Install and run the Debugging tools for Windows.
Clear the SusClientID registry value on the client computer.
Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Crash Analyzer tool.
Run the wuauclt /resetauthorization command on the client computer.
Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/jj713340.aspx
Getting Started with DaRT 8.0
How to Get DaRT 8.0
DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part of Microsoft Soft- ware Assurance.
http://technet.microsoft.com/en-us/library/jj713326.aspx
Overview of the Tools in DaRT 8.0
From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you
include when you create the DaRT 8.0 re- covery image.
Exploring the DaRT tools
...
Hotfix Uninstall
The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool
when a hotfix or service pack is suspected in pre- venting the operating system from starting.
Further Information:
..
Crash Analyzer
Use the Crash Analyzer Wizard to quickly determine the cause of a computer failure by analyzing the memory dump file on the Windows operating system that you
are repairing. Crash Analyzer examines the memory dump file for the driver that caused a computer to fail. You can then disable the problem device driver by using
the Services and Drivers node in the Computer Management tool.
QUESTION 322
A client computer that runs Windows 8.1 has two hard disk drives: a system drive and a data drive.
You are preparing to back up the computer prior to installing a developing software product.
You have the following requirements:
The system disk that is part of the backup must be mountable from within Windows.
The system disk that is part of the backup must be bootable. The backup must be viable to restore in the event of a hard disk failure.
The backup must contain data from both hard disk drives.
You need to select a backup method.
Which method should you use?
A. System repair disk
B. Storage pool
C. System image
D. File History
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/hh825258.aspx
DISM Image Management Command-Line Options
Deployment Image Servicing and Management (DISM.exe) mounts a Windows image (.wim) file or virtual hard disk (.vhd or .vhdx) for servicing. You can also use
the DISM image management command to list the image index numbers, to verify the architecture for the image that you are mounting, append an im- age, apply
an image, capture an image and delete an image.
Further Information:
http://devhammer.net/blog/follow-up-on-backups-mounting-a-system-image Follow-up On Backups: Mounting a System Image
Yesterday, I posted about my practice of using the built in system image creation tools in Windows 7 and Windows 8 to create a backup of my system whenever I'm
getting ready to upgrade.
Now, if something goes tragically wrong, I can just boot to a system repair disk, and restore the image, and I'm back to where I started. But let's suppose the install
goes fine, but I find that there's a file I need to get to from my backup, but I don't want to restore the entire backup, just get that file.
The good news is that you can do this easily, because the system image is stored as a .vhd (or in the case of Windows 8, a .vhdx) file. And Windows 8 can mount a
VHD as a drive, making it easy to access the files from the backup.
Just plug in the external drive you used for your backup, and find the WindowsImageBackup folder (should be at the root of the drive), and inside it find the folder
matching the name of the machine you backed up. Inside that should be a folder that starts with "Backup" and the date of the backup. And finally, inside the backup
folder is a .vhd (or .vhdx) file containing the backup of your system (you might see more than one .vhd(x)...if so, look for the largest one, as shown in the image
below):
If you right-click that file and select "Mount" (as shown below) Windows will mount the VHD file for you, and assign it a drive letter.
QUESTION 323
You have a Windows 8.1 computer.
The drive on which your File History is stored is almost full.
You need to move the File History storage location to another drive.
Which three actions should you perform in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
When choosing a new storage location for File History, if it's a USB drive, there's nowhere to browse to.
You can only choose a folder when backing up to a network share.
And when you change the storage location, File History will move the files for you:
Explanation:
http://windows.microsoft.com/en-gb/windows-8/what-something-goes-wrong-file-history
What if something goes wrong in File History?
..Select a different File History drive
If your File History drive is full or almost full, you can start again from scratch with a new drive or you can
move your existing files to a new, larger drive.
To select a new drive and start again
1. Swipe in from the right edge of the screen, then tap Search. (If you're using a mouse, point to the bottomright corner of the screen, move the mouse pointer up, then click Search.)
2. Enter File History settings in the search box, then tap or click File History settings.
3. Tap or click Select drive.
4. Tap or click the new drive.
To select a new drive and move your files to it
5. Swipe in from the right edge of the screen, then tap Search. (If you're using a mouse, point to the bottomright corner of the screen, move the mouse pointer up, then click Search.)
6. Enter File History in the search box, then tap or click File History.
7. Tap or click Select drive.
8. On the Change your File History drive page, do one of the following:
* To use a new external drive, connect the drive to your PC, refresh the page, then tap or click OK.
* To use a network location, tap or click Add network location, browse to or enter a location, tap or
click Select folder, then tap or click OK.
9. When you're asked, tap or click Yes to copy all of the versions of your files to the new drive.
QUESTION 324
You administer Windows 8.1 client computers in your company network. The computers belong
to an Active Directory Domain Services (AD DS) domain and have Windows Firewall enabled.
All of the computers are connected to the Internet.
You ping one of the desktops, which has an IP Address of 10.4.4.4, but you receive the message
"Request timed out."
You need to configure the desktop to reply on ping requests.
From the Windows Firewall with Advanced Security window, which inbound rule should you
modify? (To answer, select the appropriate inbound rule in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.howtogeek.com/77132/how-to-enable-ping-echo-replies-in-windows-8/
How to Enable Ping Echo Replies in Windows 8
When you ping a PC running Windows 8, by default it doesn’t reply to the echo request. This is caused by
a firewall rule that blocks all incoming ICMP packets, but this can be changed quickly in the Advanced
Firewall Settings instead of disabling the entire firewall.
When the Windows Firewall with Advanced Security snap-in opens, click on inbound rules.
..
Now scroll through the list of inbound rules until you find a rule called File and Printer Sharing (Echo Request
– ICMPv4-In). Right click on the rule and select Enable rule.
Note: There is a different rule depending on your network location, there is a one rule that covers Public
and Private network locations and a separate rule for the Domain network location. Also this will only allow
ICMPv4 packets, if you want be to hear IPv6 echo requests there are two rules below the ICMPv4
rules to enable this functionality.
Once enabled the rule will turn green.
Now your PC will be able to answer the echo requests.
QUESTION 325
You administer Windows 8.1 Pro computers in your company network, including a computer
named Client1.
On Client1, you create a new folder named C:\Folder1 and configure its NTFS permissions.
You need to ensure that only members of a group named Managers can access the folder content.
In the Advanced Security Settings for Folder1 pane, which security setting should you
configure? (To answer, select the appropriate setting in the answer area.)
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
If you remove all inherited permissions on this particular folder, only the Managers will have left permissions
on it.
Explanation:
QUESTION 326
A company has 100 client computers.
The company plans to deploy Windows 8.1 to the client computers and utilize the following
features:
Microsoft Hyper-V 3.0
Snap
Secure boot
You need to establish whether the current hardware supports the features.
What hardware is required to enable each of the features? (To answer, drag the appropriate
hardware requirements to the correct location or locations in the answer area. Requirements may
be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/b8/archive/2011/09/07/bringing-hyper-v-to-windows-8.aspx
Bringing Hyper-V to “Windows 8”
.. Hyper-V requires a 64-bit system that has Second Level Address Translation (SLAT). SLAT is a feature
present in the current generation of 64-bit processors by Intel & AMD. You’ll also need a 64-bit version of
Windows 8, and at least 4GB of RAM. Hyper-V does support creation of both 32-bit and 64-bit operating
systems in the VMs.
..
http://windowsitpro.com/windows-8/q-what-resolution-do-windows-8-metro-ui-and-snap-feature-require
Q: What resolution do the Windows 8 Metro UI and Snap feature require?
..To use the Snap application capability, which allows two Metro applications to appear on the screen at
the same time with one application using up most of the screen and the other giving a summary view, you
need a resolution of 1366x768.
http://technet.microsoft.com/en-us/library/hh824987.aspx
Secure Boot Overview
.. Manufacturing Requirements
Secure Boot requires a PC that meets the UEFI Specifications Version 2.3.1, Errata C or higher.
Secure Boot is supported for UEFI Class 2 and Class 3 PCs. For UEFI Class 2 PCs, when Secure Boot is
enabled, the compatibility support module (CSM) must be disabled so that the PC can only boot authorized,
UEFI-based operating systems.
Secure Boot does not require a Trusted Platform Module (TPM).
QUESTION 327
You administer Windows 8.1 client computers in your company network. A computer has a
simple (no resiliency) storage space configured. The storage space is assigned to drive letter E.
You plug an eSATA drive into the computer and extend the storage space.
You need to unplug the eSATA drive without deleting existing data from the storage space.
Which three actions should you perform in sequence? (To answer, move the appropriate three
actions from the list of actions to the answer area and arrange them in the correct order.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Note:
QUESTION 328
You manage Windows 8.1 client computers.You have the following client computer update requirements:
Ensure that all client computers check for updates twice a day.
Install all critical and available updates, including updates that require a
restart, each day.
Restart client computers at 11:00 P.M. if required.
Distribute all updates from a Windows Server Update Services (WSUS)
server on the local network
.
You need to deploy Group Policy settings to the client computers to meet the update
requirements.
Which Group Policy settings should you enable and configure? (To answer, drag the appropriate
Group Policy settings to the correct location or locations in the answer area. Group Policy
settings may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.)
Select and Place:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 329
You install Windows 8.1 Enterprise on a new laptop that will be shipped to a remote user. You
logon to the laptop with the user credentials, map network drives, and configure the network
drives to be always available offline.
Company policy requires that files with a .db1 extension should be excluded from offline file
synchronization.
You need to prevent the user from creating files with a .dbl extension on the mapped drives.
In the Local Group Policy Editor, which setting should you configure? (To answer, select the
appropriate setting in the answer area.)
Answer:
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 330
You are a system administrator for Fabrikam, Inc.
You are upgrading an end user's computer to Windows 8.1.
You need to evaluate the system's readiness for the upgrade. The computer properties are
displayed in the graphic below:
http://www.gratisexam.com/
Use the drop-down menus to select the answer choice that completes each statement. Each
correct selection is worth one point.
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://windows.microsoft.com/en-us/windows-8/system-requirements
System requirements
Windows 8.1
If you want to run Windows 8.1 on your PC, here's what it takes:
Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more info)
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
http://www.techsoup.org/support/articles-and-how-tos/how-to-upgrade-to-windows-8
How to Upgrade to Windows 8.1
..
Installing Windows 8.1
Once you decide to make the switch to Windows 8.1, you have a few options for deploying it. If you are
upgrading from Windows 7, you can do an in-place upgrade. Your system settings, as well as your installed
applications and user settings, are preserved. This requires minimal reconfiguration, and you won't
need to re-install your programs after you've upgraded.
You can also opt to upgrade from Windows 7 to Windows 8.1 through a custom install, which is also
known as a "clean" install. This means your programs, files, and settings are not preserved. You will need
to back up your files and programs before upgrading and then re-install them afterwards.
..
Further Information:
http://technet.microsoft.com/en-us/library/jj203353.aspx
Windows 8 and Windows 8.1 Upgrade Paths
QUESTION 331
You administer Windows 8.1 Pro computers in your company network, including a computer
named Wst1. Wst1 is configured with multiple shared printer queues.
Wst1 indicates hardware errors. You decide to migrate the printer queues from Wst1 to a new
computer named Client1.
You export the printers on Wst1 to a file. You need to import printers from the file to Client1.
From the Print Management console, which Print Management node should you select? (To
answer, select the appropriate node in the answer area.)
Answer:
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://technet.microsoft.com/en-us/library/cc722360.aspx
Migrate Print Servers
You can export print queues, printer settings, printer ports, and language monitors, and then import them
on another print server running a Windows operating system. This is an efficient way to consolidate multiple
print servers or replace an older print server.
...
To migrate print servers by using Print Management
1. Open Print Management.
2. In left pane, click Print Servers, right-click the print server that contains the printer queues that you
want to export, and then click Export printers to a file. This starts the Printer Migration Wizard.
3. On the Select the file location page, specify the location to save the printer settings, and then click Next
to save the printers.
4. Right-click the destination computer on which you want to import the printers, and then click Import
printers from a file. This launches the Printer Migration Wizard.
5. On the Select the file location page, specify the location of the printer settings file, and then click Next.
6. On the Select import options page, specify the following import options:
* Import mode. Specifies what to do if a specific print queue already exists on the destination computer.
* List in the directory. Specifies whether to publish the imported print queues in the Active Directory
Domain Services.
* Convert LPR Ports to Standard Port Monitors. Specifies whether to convert Line Printer Remote
(LPR) printer ports in the printer settings file to the faster Standard Port Monitor when importing printers.
7. Click Next to import the printers.
...
Reference:http://blogs.technet.com/b/canitpro/archive/2013/06/17/step-by-step-install-use-andremovewindows-server-migration-tools.aspx
QUESTION 332
You are setting up a Windows 8.1 computer.
The computer's network connections are shown in the Network Connections exhibit (Click the
Exhibit button.)
The computer's network settings are shown in the Network Settings exhibit. (Click the Exhibit
button.)
Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings exhibit. (Click the
Exhibit button,)
Consider each of the following statements. Does the information in the three screenshots support
the inference as stated? Each correct selection is worth one point.
Hot Area:
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
http://www.virtualizationadmin.com/articles-tutorials/microsoft-hyper-v-articles/networking/virtualnetworkinghyper-v-part4.html
Virtual Networking for Hyper-V (Part 4)
QUESTION 333
You have a portable computer that runs Windows 8.1. You are creating a backup plan.
You have the following requirements:
Automatically back up the files in your Documents folder every hour.
Ensure that you can recover different versions of the backed-up files.
Do not back up the Windows operating system files.
You need to configure the computer to meet the requirements.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Create a volume mount point in your Documents folder.
Connect an external hard drive to the computer.
Schedule a task to create a restore point every hour.
Create a recovery drive on drive C.
Turn on File History.
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non- system drive for backup.
http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to-backup-file- history-in-windows-8.aspx
A New Way to Backup: File History in Windows 8
File History is a new feature in Windows 8 that helps to ensure that your personal files are safe. In addi- tion to being a backup solution, File History also provides
the capability to restore multiple backup copies (versions) of your files. File history in Windows 8 is easy to setup, powerful, and reliable. This means you can have
more confidence when working with files, and also keep less redundant copies around for your own personal "data history". You can easily configure File History to
protect some or all of the files that are in your libraries on Windows 8. You can add folders to your libraries easily in Windows 8, giving you the ability to use File
History with any group of folders and files that you choose.
QUESTION 334
A company has client computers that run Windows 8.1.
You install a new device on a client computer. The device installation includes an application that runs when the computer starts. You experience problems with the
application.
You need to prevent the application from running when the computer starts, without affecting any other application.
What should you do?
A.
B.
C.
D.
Configure the application by using Task Manager.
Run the bcdedit command.
Configure the device by using Device Manager.
Run the msconuig command.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
It's a new feature of Windows 8.1
http://pcworld.co.nz/pcworld/pcw.nsf/feature/20-essential-windows-8-tips-and-tricks
QUESTION 335
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A.
B.
C.
D.
E.
Set the Protection Settings for drive C to On.
Restore the data files from the Previous
Versions tab located in the folder properties.
Review the File History backup log.
Move the file into a library.
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non- system drive for backup.
Since File History is already on we can assume the drive doesn't need to be changed. So we should review the log and move the file to a library.
Volume shadow copy has been replaced with File History: http://msdn.microsoft.com/en- .
us/library/windows/desktop/hh848072(v=vs.85)
Explanation:
http://blogs.windows.com/windows/b/extremewindows/archive/2012/12/20/a-new-way-to-backup-file-history-in- windows-8.aspx
A New Way to Backup: File History in Windows 8
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.
Since File History is already on we can assume the drive doesn't need to be changed. So we should re- view the log and move the file to a library.
QUESTION 336
An organization has client computers that run Windows 7.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You capture user settings and data files to a network share, and then perform a clean installation of Windows 8.1 on the client computers.
You need to apply the user profiles from the Windows 7 installation to the Windows 8.1 installation.
What should you do?
A.
B.
C.
D.
E.
Run the Ioadstate command.
Copy the Default Profile to a folder on drive C.
Run the scanstate command.
Run Windows Easy Transfer and select the user profile to migrate.
Run the ImageX command
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
http://4sysops.com/archives/windows-8-migration-user-data-and-settings/ Windows 8 migration User data and settings
...
User State Migration Tools (USMT)
You can extract the USMT tools from the Windows ADK.
USMT is revised to version 5.0 for Windows Server 2012 and Windows 8, and consists of the following three programs:
Scanstate.exe: This tool performs the user state backup
Loadstate.exe: This tool performs the user state restore
Usmtutils.exe: This tool enables you to verify compressed migration store files as well as extract con- tents from them
QUESTION 337
A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at
home.
The company has applications that run only on Windows 8.1.
You need to deploy Windows To Go so that employees can run the applications on their home computers.
Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)
A. isoburn
B. BdeHdCfg
C. ImageX
D. bcd boot
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If you get DISM as an additional option in this question, I would select DISM. DISM is already integrated in the Windows 8.1 OS and it is the newer feature than
ImageX.
To use ImageX we have to install Windows 8.1 AIK first.
QUESTION 338
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.
You plan to upgrade the client computers to Windows 8.1 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution.
Choose two.)
A.
B.
C.
D.
Use the Windows 8.1 online upgrade tool.
Use Group Policy to assign the Windows 8.1 installation file to the client computers.
Use the Microsoft Deployment Toolkit.
Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://msdn.microsoft.com/en-us/library/dn475741.aspx
Microsoft Deployment Toolkit
The Microsoft Deployment Toolkit (MDT) provides a unified collection of tools, processes, and guidance for automating desktop and server deployments. In addition
to reducing deployment time and standardiz- ing desktop and server images, MDT offers improved security and ongoing configuration management.
http://www.technize.net/install-windows-8-install-pxe-boot-network-lan/ How To Install Windows 8 Over The Network (LAN)
..
6. Now share the folder in which Windows 8 setup files are located. At least one user should be able to read the network folder to be able to run the setup remotely.
..
http://technet.microsoft.com/en-us/library/hh824952.aspx
Windows Setup Edition Configuration and Product ID Files (EI.cfg and PID.txt) Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012
R2
The edition configuration (EI.cfg) file and the product ID (PID.txt) file are optional configuration files that you can use to specify the Windows® product key and the
Windows edition during Windows installation. You can use these files to automate the product-key entry page in Windows Setup instead of using an an- swer file. If
you use an EI.cfg file to differentiate volume license media, but you do not include a PID.txt file, the user receives a prompt for a product key to continue Windows
Setup.
You can reuse the product key in the product ID file for multiple installations. The product key in the prod- uct ID file is only used to install Windows. This key is not
used to activate Windows.
QUESTION 339
A company has 100 client computers that run Windows XP 64-bit Edition.
You are deploying new computers that run a 32-bit version of Windows B.
You need to transfer the contents of each user's Documents folder to the new computer by using the least amount of administrative effort.
What should you do?
A. Back up the folders by running the NTBackup command.
Then restore the backup to the new computer.
B. Manually copy the folder content to a USB flash drive.
Then paste the files to the new computer.
C. Use Windows Easy Transfer.
D. Use the User State Migration Tool.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Great Lake Bunyip from Australia:
Windows Easy Transfer can't transfer files from a 64-bit version of Windows to a 32-bit version of Windows. If you're transferring from a 64-bit version of Windows
Vista to a 32-bit version of Windows 7, you can move your files manually, or use Backup and Restore in Windows Vista. For more information, see Back up your
files and Restore a backup created on a previous version of Windows on the Windows website. If you're transferring from a 64-bit version of Windows XP, you'll
need to move your files manually.
http://windows.microsoft.com/en-AU/windows7/transferring-files-and-settings-frequently-asked- questions
Windows Easy Transfer can transfer:
Files and folders including photos, music, videos, documents, email messages and contacts User accounts and user account settings
Application configuration data files and settings
Several Windows configuration settings stored in the registry The program does not support transferring entire applications themselves and system files such as
fonts and drivers.
Explanation:
http://windows.microsoft.com/en-au/windows/transferring-files-settings-faq#1TC=windows-7 Transferring files and settings: frequently asked questions
Windows Easy Transfer can't transfer files from a 64-bit version of Windows to a 32-bit version of Windows.
..
If you're transferring from a 64-bit version of Windows XP, you'll need to move your files manually.
..
Further information:
http://www.microsoft.com/en-us/download/details.aspx?id=4220 NTBackup
Windows NT Backup - Restore Utility
Utility for restoring backups made on Windows XP and Windows Server 2003 to computers running Windows Vista and Microsoft® Windows Server® 2008.
http://www.techrepublic.com/blog/windows-and-office/restore-a-windows-xp-backup-in-windows-8/ Restore a Windows XP backup in Windows 8
Regardless of your situation, you will not be happy to learn that Windows 8's backup and restore tools are completely different from the Backup Utility that came
with Windows XP and as such the backup files are incompatible. You'll also not be happy to learn that while Microsoft provided supplemental utilities that were
designed to allow you to restore a Windows XP backup in Windows Vista and for Windows 7; they haven't done so for Windows 8. And, to add insult to injury,
neither of the previous supplemental utilities will work in Windows 8.
http://windowsitpro.com/windows-xp/windows-xp-migration-user-state-migration-toolkit-usmt The Microsoft User State Migration Toolkit (USMT) is a set of
command-line tools that allow you to extract settings and data from one computer and transfer them to another computer.
USMT 5.0 supports running the ScanState component on the following operating systems:
Windows XP Professional (x86 and x64)
Windows Vista (x86) and (x64)
Windows 7 (x86) and (x64)
Windows 8.1/8 (x86) and (x64)
It's important to note that LoadState is supported only on computers running the following operating sys- tems:
Windows Vista (x86) and (x64)
Windows 7 (x86) and (x64)
Windows 8.1/8 (x86) and (x64)
Although you can migrate data from a client running an x86 version of Windows to a client running an x64 version of Windows (and x86 client to x86 client, or x64
client to x64 client), you can't migrate data from a client running an x64 version of Windows to a client running an x86 version of Windows.
QUESTION 340
A company has 100 client computers that run Windows 8.1.
You plan to install a custom app that requires a license key.
You need to ensure that the installation process does not prompt for the manual entry of a license key.
What should you do?
A.
B.
C.
D.
Install and run the Microsoft Deployment Toolkit.
Install and run the Microsoft Assessment and Planning Toolkit.
Install and run the Windows App Certification Kit.
Install and run the Windows Application Compatibility Toolkit.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://tweaks.com/windows/65179/how-to-install-windows-8-without-a-product-key/ Windows Assessment and Deployment Kit for Windows 8.1:
http://technet.microsoft.com/en-us/library/hh825212.aspx
Step-by-Step: Windows 8 Deployment for IT Professionals
This guide uses the tools included in the Windows Assessment and Deployment Kit (Windows ADK). This includes Windows System Image Manager (Windows
SIM), the Deployment Imaging Servicing and Man- agement tool (DISM), and Windows Preinstallation Environment (Windows PE). In addition to the tools that this
guide describes, other tools are available in the Windows ADK that you can use to prepare your organization for migrating to Windows 8 and Windows 8.1:
http://technet.microsoft.com/en-us/library/hh825079.aspx
DISM Global Options for Command-Line Syntax
Global options can be added to most of the servicing and imaging options in the Deployment Image Ser- vicing and Management (DISM) tool. These options can be
used to access the command-line help, spec- ify the location of files to use, and control logging.
Basic Syntax for Servicing Commands
After you have mounted or applied a Windows® image so that it is available offline as a flat file structure, you can specify any DISM global options, the servicing
option that will update your image, and the loca- tion of the offline image. You can use only one servicing option per command line.
If you are servicing a running computer, you can use the /Online option instead of specifying the location of the offline Windows image. The commands and options
that are available for servicing an image de- pend on which Windows operating system you are servicing. They also depend on whether the image is offline or a
running operating system. All commands work on an offline Windows image. Subsets of the commands are available for servicing a running operating system.
The base syntax for DISM servicing commands is:
DISM.exe {/Image:<path_to_image> | /Online} [dism_global_options] {servicing_option} [<servicing_argu- ment>]
http://technet.microsoft.com/en-us/library/hh824882.aspx
DISM App Package (.appx or .appxbundle) Servicing Command-Line Options
You can use app package-servicing commands to add, remove, and list provisioned app packages (.appx or .appxbundle) in a Windows image. An .appxbundle,
new for Windows 8.1, is a collection of app and re- source packages used together to enrich the app experience, while minimizing the disk footprint on a given PC.
Provisioned app packages are added to a Windows image and are then installed for every new or existing user profile the next time the user logs on. For more
information, including requirements for app package provisioning, see Sideload Apps with DISM.
You can also use Windows PowerShell to add, remove, and list app packages (.appx or .appxbundle) per image or per user in a Windows installation.
http://technet.microsoft.com/en-us/library/hh852635.aspx
Sideload Apps with DISM
You can sideload line-of-business (LOB) Windows Store apps to a Windows® image by using Windows PowerShell® or the Deployment Image Servicing and
Management (DISM) platform. Windows Store apps are a new type of application that runs on:
Windows 8.1 devices
Windows 8 devices
Windows Server 2012 R2 devices
Windows Server 2012
Windows Embedded 8 Industry
Typically, Windows Store apps are available only through the Windows® Store. You can submit LOB Windows Store apps to the Windows Store and make them
available outside of your enterprise. However, you can also develop Windows Store apps for use only within your enterprise and add them to Windows devices you
manage through a process we call sideloading. Sideloaded apps do not have to be certified by or installed through the Windows Store.
Further information:
http://msdn.microsoft.com/en-us/library/bb977556.aspx
Microsoft Assessment and Planning Toolkit
The Microsoft Assessment and Planning Toolkit (MAP) is an agentless, automated, multi-product plan- ning and assessment tool for quicker and easier desktop,
server and cloud migrations. MAP provides de- tailed readiness assessment reports with extensive hardware and software information, and actionable
recommendations to help organizations accelerate their IT infrastructure planning process, and gather more detail on assets that reside within their current
environment. MAP also provides server utilization data for Hyper-V server virtualization planning; identifying server placements, and performing virtualiza- tion
candidate assessments.
http://msdn.microsoft.com/en-us/windows/apps/bg127575.aspx
Windows App Certification Kit
Before you submit your app for certification and listing in the Windows Store, use the Windows App Certi- fication Kit to test your app and make sure it's ready to go.
http://msdn.microsoft.com/en-us/library/windows/desktop/dd562082%28v=vs.85%29.aspx Application Compatibility Toolkit (ACT)
The Microsoft Application Compatibility Toolkit (ACT) is a lifecycle management tool that assists in identi- fying and managing your overall application portfolio,
reducing the cost and time involved in resolving ap- plication compatibility issues, and helping you quickly deploy Windows and Windows updates.
QUESTION 341
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are members of the domain. Client computers
maintain a list of sites in the Internet Explorer Restricted Sites security zone.
Users of one client computer are able to download and install an application from a site within the Restricted Sites zone.
You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone.
What should you do?
A.
B.
C.
D.
E.
Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
Configure the Software Restriction Policy settings in the local Group Policy of the computer.
Add the blocked application as a software restriction policy to the GPO that configures AppLocker.
Run the Cet-AppLockerPolicy Windows PowerShell cmdlet.
Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Only Software Restriction policy allows for the control of applications from a network zone; AppLocker does not.
Further information:
http://technet.microsoft.com/en-us/library/ee176961.aspx
Using the Set-ExecutionPolicy Cmdlet
The Set-ExecutionPolicy cmdlet enables you to determine which Windows PowerShell scripts (if any) will be allowed to run on your computer.
http://technet.microsoft.com/en-us/library/ee460964.aspx
Get-AppLockerPolicy
Gets the local, effective, or domain AppLocker policy.
http://technet.microsoft.com/en-us/library/dd723678%28v=ws.10%29.aspx AppLocker
You can use AppLocker as part of your overall security strategy for the following scenarios:
Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.
Prevent users from installing and using unauthorized applications. Implement application control policy to satisfy security policy or compliance requirements in your
organi- zation.
http://technet.microsoft.com/en-us/library/ee619725%28v=ws.10%29.aspx#BKMK_WhatisAppLocker AppLocker: Frequently Asked Questions
...
Understanding AppLocker - What is AppLocker?
AppLocker is a feature in Windows Server 2012, Windows Server 2008 R2, Windows 8, and Windows 7 that advances the functionality of the Software Restriction
Policies feature.
In Windows Server 2008 R2 and Windows 7, you can manage four types of files: executable (.exe), Windows Installer (.msi and .msp), script (.bat, .cmd, .js, .ps1,
and .vbs), and DLL (.dll and .ocx). Each of these file types is managed in its own rule collection.
In Windows Server 2012 and Windows 8, in addition to the file types, you can manage .mst and .appx files with AppLocker.
http://www.gratisexam.com/
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement