Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 101-110

Ensurepass

 

QUESTION 101

A company has client computers that run Windows 8.1. Each computer has two hard drives.

 

You need to create a dynamic volume on each computer to support the following features:

 

Fault tolerance

Fast write performance

 

What kind of dynamic volume should you create?

 

A.

Striped volume

B.

Spanned volume

C.

RAID 5 volume

D.

Mirrored volume

 

Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx

What Are Dynamic Disks and Volumes?

 

Types of Dynamic Volumes

A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.

 

Mirrored Volumes

A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one of the disks fails, the data on the failed disk becomes unavailable, but the system continues to operate by using the unaffected disk.

Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy of their data on the second disk. Mirrored volumes provide better write performance than RAID-5 volumes.

 

Further Information:

 

Striped Volumes

Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks.

Striped volumes cannot be extended or mirrored and do not offer fault tolerance. If one of the disks containing a striped volume fails, the entire volume fails, and all data on the striped volume becomes inaccessible. The reliability for the striped volume is less than the least reliable disk in the set.

 

RAID-5 Volumes

A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the lost data. RAID-5 volumes are well-suited to storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a RAID-5 volume.

 

Spanned Volumes

Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned volumes require two disks, and you can use up to 32 disks.

 

 

QUESTION 102

A portable computer that runs Windows 8.1 uses a mobile broadband connection. The computer successfully downloads Windows updates only when not connected to the corporate wireless network.

 

You need to ensure that the computer automatically downloads updates by using Windows Update while connected to the corporate wireless network.

 

What should you do?

 

A.

Configure the Specify intranet Microsoft update service location local Group Policy setting.

B.

Set the corporate wireless network to metered.

C.

Set the corporate wireless network to non-metered.

D.

Configure a Windows Firewall connection security rule.

Answer: C

Explanation:

http://windows.microsoft.com/en-US/windows-8/metered-internet- connections-frequently-asked-questions

Metered Internet connections: FAQ

 

What’s a metered Internet connection?

Internet service providers can charge by the amount of data used (the amount of data sent and received by your PC). That’s called a metered Internet connection. These plans often have a data limit, and if you exceed the limit you might have to pay extra. In some cases, you aren’t charged extra but your connection speed becomes slower until the billing cycle ends.

If you have a metered Internet connection, setting your network connection to metered in Windows can help you reduce the amount of data you send and receive.

 

How does setting my network connection to metered affect my PC?

Any app that relies on an Internet connection to update or display info might be limited in the amount of data it can download or display. You might notice these and other effects:

Windows Update will only download priority updates.

 

Further Information:

Setting a Wireless network to METERED allows only critical Windows Updates using that connection.

Setting a Wireless network to NON-METERED allows all Windows Updates using that connection.

 

 

QUESTION 103

A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.

 

You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup.

 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

 

A.

Start the Windows Event Collector service on COMPUTER1.

B.

Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.

C.

Start the Windows Event Log service on all computers other than COMPUTER1.

D.

Create and configure a source computer-initiated subscription.

E.

Add the COMPUTER1 machine account to the Event Log Readers local group on all computers.

F.

Start the Windows Event Collector service on all computers other than COMPUTER1.

G.

Create and configure a collector-initiated subscription.

 

Answer: AEG

Explanation:

http://blog.oneboredadmin.com/2012/06/windows-event-collection.html

Windows Event Collection

 

The only basic rules are that the source machine should have Winrm2 installed and running on it, and the Event Collector Service should be running on the collector machine. There are two methods available to complete this challenge – collector initiated and source initiated.

 

Collector Initiated

When defining such a subscription, you instruct the collector to open a WinRM session to the source machine(s) using a specified set of credentials (or the computer account) and ask for a subscription.

 

Further Information:

For best management we want a collector-initiated subscription–meaning we’ll be setting up the subscription at the collecting computer instead of at each individual computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.

The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.

 

http://msdn.microsoft.com/en-us/library/windows/desktop/bb427443%28v=vs.85%29.aspx Windows Event Collector

 

You can subscribe to receive and store events on a local computer (event collector) that are forwarded from a remote computer (event source).

 

The following list describes the types of event subscriptions:

Source-initiated subscriptions: allows you to define an event subscription on an event collector computer without defining the event source computers. Multiple remote event source computers can then be set up (using a group policy setting) to forward events to the event collector computer. This subscription type is useful when you do not know or you do not want to specify all the event sources computers that will forward events.

 

Collector-initiated subscriptions: allows you to create an event subscription if you know all the event source computers that will forward events. You specify all the event sources at the time the subscription is created.

 

http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription

 

You can subscribe to receive events on a local computer (the event collector) that are forwarded from remote computers (the event sources) by using a collector-initiated subscription. In a collector-initiated subscription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.

 

http://technet.microsoft.com/en-us/library/cc748890.aspx

Configure Computers to Forward and Collect Events

 

Before you can create a subscription to collect events on a computer, you must configure both the collecting computer (collector) and each computer from which events will be collected (source).

 

In a workgroup environment, you can follow the same basic procedure described above to configure computers to forward and collect events. However, there are some additional steps and considerations for workgroups:

You can only use Normal mode (Pull) subscriptions. You must add a Windows Firewall exception for Remote Event Log Management on each source computer.

You must add an account with administrator privileges to the Event Log Readers group on each source computer. You must specify this account in the Configure Advanced Subscription Settings dialog when creating a subscription on the collector computer. Type winrm set winrm/config/client @{TrustedHosts=”<sources>”} at a command prompt on the collector computer to allow all of the source computers to use NTLM authentication when communicating with WinRM on the collector computer. Run this command only once.

QUESTION 104  

You administer Windows 8.1 Enterprise computers in your company’s Active Directory Domain Services (AD DS) domain.

 

Your company uses several peripheral devices. The drivers for these devices are not available on Windows Update.

 

You need to ensure that the drivers install when users connect these devices to their computers.

 

What should you do?

 

A.

For the Group Policy setting Prioritize all digitally signed drivers equally during the driver ranking and selection process, select Disabled.

B.

From Device Manager, find the detected scanner device and select Update Driver.

C.

Add the following registry key to the computers:

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/DevicePath. Add ?osystemroot%inf and the UNC path to the drivers share.

D.

For the Group Policy setting Configure driver search locations, select Enabled. Make the drivers available on the UNC path to the driver’s share.

 

Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/cc753716.aspx

Configure Windows to Search Additional Folders for Device Drivers

 

To configure Windows to Search Additional Folders for Device Drivers

Start Registry Editor. Click Start, and in the Start Search box type regedit.

If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.

Navigate to the following registry key:

HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version

In the details pane, double-click DevicePath.

Add additional folder paths to the setting, separating each folder path with a semi- colon. Ensure that %systemroot%inf is one of the folders included in the value.

 

Caution:

Do not remove %systemroot%inf from the DevicePath registry entry. Removal of that folder can break device driver installation.

 

Further Information:

http://msdn.microsoft.com/en-us/library/windows/hardware/ff553973%28v=vs.85%29.aspx Where Windows Searches for Drivers

 

After a device is attached, Windows attempts to locate a matching driver package from which it can install a driver for the device. Windows searches for driver packages from

various locations and performs this search in two phases, as described in the following table.

 

clip_image002

 

Starting with Windows 7, Windows automatically downloads matching driver packages from Windows Update without prompting the user for permission. If a matching driver package is found, Windows downloads the package and stages it to the driver store.

 

If a matching driver package cannot be downloaded, Windows searches for matching driver packages in the driver store. This includes in-box drivers, installed drivers other than in-box drivers, and preinstalled drivers.

 

Windows also searches for driver packages that were preloaded in the locations that are specified by the DevicePath registry value. This value is under the following subkey of the registry.

 

HKEY_LOCAL_MACHINE

Software

Microsoft

Windows

CurrentVersion

 

By default, the DevicePath value specifies the %SystemRoot%INF directory.

 

If a matching driver package is found either on Windows Update or in a location that is specified by the DevicePath value, Windows first stages the driver package to the driver store before the driver is installed. In this way, Windows always installs drivers from the driver store.

 

 

QUESTION 105

You use a Windows 8.1 Pro computer. The computer stores research data in a folder named C:Research.

You turn on File History.

 

You need to back up the Research folder.

 

What should you do?

 

A.

Create a new library and include the folder in the library.

B.

Create a new volume mount point in the root of the folder.

C.

Create a new storage space and move the folder to the storage space.

D.

Create a new restore point.

 

Answer: A

Explanation:

http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx

Protecting user files with File History

 

File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

 

It’s a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of Windows 7.

 

Before you start using File History to back up your files, you’ll need to set up a drive to save files to. We recommend that you use an external drive or network location to help protect your files against a crash or other PC problem.

 

File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you can add them to one of your existing libraries or create a new library.

 

Advanced settings can be accessed from the File History control panel applet.

 

File History also supports new storage features introduced in Windows 8. Users who have lots of data to back up can use Storage Spaces to create a resilient storage pool using off- the-shelf USB drives. When the pool fills up, they can easily add more drives and extra storage capacity to the pool.

 

Further Information:

http://blogs.msdn.com/b/b8/archive/2012/01/05/virtualizing-storage-for-scale-resiliency-and-efficiency.aspx

Virtualizing storage for scale, resiliency, and efficiency

 

Windows 8 provides a new capability called Storage Spaces enabling just that. In a nutshell, Storage Spaces allow:

Organization of physical disks into storage pools, which can be easily expanded by simply adding disks. These disks can be connected either through USB, SATA (Serial ATA), or SAS (Serial Attached SCSI). A storage pool can be composed of heterogeneous physical disks ?different sized physical disks accessible via different storage interconnects. Usage of virtual disks (also known as spaces), which behave just like physical disks for all purposes. However, spaces also have powerful new capabilities associated with them such as thin provisioning (more about that later), as well as resiliency to failures of underlying physical media.

 

 

QUESTION 106

You administer 100 Windows 8.1 laptops, all of which have PowerShell Remoting enabled.

 

You run the following command on a computer named Computer1.

 

Invoke-Command -filepath \Computer2ShareMyScript.ps1 -computer name Computer2

 

MyScriptl.psl fails to execute.

 

You verify that you are able to access it from the network.

 

You need to be able to execute MyScriptl.psl on Computer1.

 

What should you do?

 

A.

Copy MyScriptl.psl to a local drive on Computer1 and run the Invoke-Command cmdlet on Computer1.

B.

Run the Set-ExecutionPolicycmdlet on Computer1.

C.

Run the Enter-PSSessioncmdlet on Computer1.

D.

Run the Set-ExecutionPolicycmdlet on Computer2.

 

Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/hh849719.aspx

Invoke-Command

 

Runs commands on local and remote computers.

 

The Invoke-Command cmdlet runs commands on a local or remote computer and returns all output from the commands, including errors. With a single Invoke-Command command, you can run commands on multiple computers.

 

Parameters

-ComputerName<String[]>

Specifies the computers on which the command runs. The default is the local computer. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used only to run the specified command and is then closed.

 

-FilePath<String>

Runs the specified local script on one or more remote computers. Enter the path and file name of the script, or pipe a script path to Invoke-Command. The script must reside on the local computer or in a directory that the local computer can access. Use the ArgumentList parameter to specify the values of parameters in the script.

 

Further Information:

http://technet.microsoft.com/en-us/library/ee176961.aspx

Using the Set-ExecutionPolicy Cmdlet

 

The Set-ExecutionPolicy cmdlet enables you to determine which Windows PowerShell scripts (if any) will be allowed to run on your computer. Windows PowerShell has four different execution policies:

Restricted – No scripts can be run. Windows PowerShell can be used only in interactive mode.

AllSigned – Only scripts signed by a trusted publisher can be run. RemoteSigned – Downloaded scripts must be signed by a trusted publisher before they can be run.

Unrestricted – No restrictions; all Windows PowerShell scripts can be run.

To assign a particular policy simply call Set-ExecutionPolicy followed by the appropriate policy name.

 

http://technet.microsoft.com/en-us/library/hh849812.aspx

Set-ExecutionPolicy

 

The Set-ExecutionPolicy cmdlet changes the user preference for the Windows PowerShell execution policy.

 

The execution policy is part of the security strategy of Windows PowerShell. It determines whether you can load configuration files (including your Windows PowerShell profile) and run scripts, and it determines which scripts, if any, must be digitally signed before they will run.

 

http://technet.microsoft.com/en-us/library/hh849707.aspx

Enter-PSSession

 

The Enter-PSSession cmdlet starts an interactive session with a single remote computer. During the session, the commands that you type run on the remote computer, just as though you were typing directly on the remote computer. You can have only one interactive session at a time.

 

 

QUESTION 107

You administer Windows 8.1 computers for a software development company.

 

The marketing department is going to meet a potential customer to demonstrate the product. You want to configure a laptop that has a stand-alone virtual machine that runs Windows 8.1 Enterprise and the latest build of your software.

 

You need to enable BitLocker on the system drive of the virtual machine.

 

What should you do first?

 

A.

Activate Windows.

B.

Join the virtual machine to an Active Directory Domain Services (AD DS) domain.

C.

Turn on the Require additional authentication at startup local policy.

D.

Turn off the Require additional authentication at startup local policy.

 

Answer: C

Explanation:

http://rc.partners.org/kbase?cat_id=9&art_id=245

How to setup BitLocker Encryption on Windows 8 without TPM

 

BitLocker is a full disk encryption software that comes standard with PCs running Windows 8 Pro or higher.

 

This document provides instructions for encrypting the hard drive without Trusted Platform Module (TPM – integrated security chip) present or enabled, and bypasses the USB flash drive encryption key requirement.

From the Metro UI or the search box, type GPEDIT.MSC and press enter Open Computer Configuration => Administrative Templates => Windows Components => BitLocker Drive Encryption => Operating System Drives. From the right pane double-click “Require additional authentication at startup”

 

clip_image004

 

Select Enabled radio button and check the box for “Allow BitLocker without a compatible TPM…”. Click OK and close the policy editor.

 

clip_image006

Right-click your C drive in the Computer folder, click Turn on BitLocker

 

 

QUESTION 108

A company has a main office and several branch offices. The company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. All printers are deployed to all client computers by using Group Policy.

 

When a user attempts to print from his portable client computer while at a branch office, the main office printer is set as his default printer.

 

You need to ensure that a location-specific default printer for each branch office is set for the user.

 

What should you do?

 

A.

Create a Group Policy object (GPO) that enables the Computer location policy setting.

B.

In the Manage Default Printers dialog box, select the Always use the same printer as my default printer option.

C.

In the Manage Default Printers dialog box, select the Change my default printer when I change networks option.

D.

Create a Group Policy object (GPO) that enables the Allow Print Spooler to accept client connections policy setting.

 

Answer: C

Explanation:

http://windows.microsoft.com/en-us/windows-8/set-change-your-default-printer

Set or change your default printer

 

To set a different default printer for each network

 

3. Tap or click any printer, and then tap or click Manage default printers.

4. Select Change my default printer when I change networks.

5. Under Select network, choose the first network you want to set a printer for.

6. Under Select printer, choose the printer you want to be the default on that network, and then tap or click Add.

7. When you’re finished setting a default printer for each network, tap or click OK.

 

Further Information:

http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3- configure-network-connectivity-15/

configure location-aware printing

 

Location-aware printing is not a new feature, it existed already in Windows 7, it works that your default printer follows you, so at work you can have one default printer and another at home without manually switching.

 

Just click on an installed printer in control panel and select Manage default printers.

 

clip_image007

 

Be sure Change my default printer when I change Networks is selected and then manage per network which printer you want to be default.

 

clip_image008

 

Location-Aware Printing is dependent upon the Network List Service and the Network Location Awareness service. If either one of these services are stopped or malfunctioning, then Windows will not be able to detect network changes and may not switch default printers as expected

 

 

 

QUESTION 109

You use many Windows Store apps on a computer that runs Windows 8.1.

 

You are planning a performance audit on the computer.

 

You need to establish the volume of data upload from each app over a five-day period.

 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

 

A.

On the fifth day, review the upload statistics in Task Manger.

B.

Configure Task Manager to save usage data to a file.

C.

Configure Task Manager to record data upload from each Windows Store app.

D.

On the first day, delete any existing application usage history

E.

Open Task Manager and add the Uploads column.

 

Answer: ADE

Explanation:

http://www.7tutorials.com/windows-8-task-manager-which-apps-use-most-system- resources

The Windows 8 Task Manager – Which Apps Use the Most Resources?

 

Before you get in to tweak settings, the app history tab will display five columns:

Name – The name of the process or app.

CPU Time – Total amount of CPU time the selected app has taken up.

Network – Total network utilization in MB for the selected app.

Metered Network – Total network utilization on a network that is marked as metered.

Tile Updates – Amount of network usage for updating the chosen app’s live tile.

 

By default, the App History tab will only display usage for modern Windows 8 apps.

 

While the default view displays a pretty good picture of your data using apps, you can take it farther by adding more columns. Right-click or long-press an existing column header to view a list of available data points. You can deselect any of the existing columns to hide them, or select any of the following columns to add them to your view:

Non-Metered Network – Network usage on networks that aren’t marked as metered.

Downloads – Amount of downloads done for the selected app.

Uploads – Amount of uploads done for the selected app.

 

clip_image009

 

How to Clear your App History Data

When viewing your app history data, it can be difficult to discern how quickly your apps are racking up network usage. You may see that Netflix has used gigs of data, but if that’s over a long period that may not be so bad. However, if it’s only been a few minutes since data logging began, you’re in trouble.

 

If you want to clear your data and start counting again from zero, go ahead and click or tap “Delete usage history.”

 

clip_image010

 

All of your recorded history will be deleted and all columns will be zeroed out. With careful monitoring you can now see how quickly your heavy users chew up data.

 

clip_image011

 

 

QUESTION 110

A computer runs Windows 8.1. You install an application by running an .msi file.

 

You need to apply a patch to the application.

 

Which command should you run?

 

A.

dism /Online /add-package:C:MyPatch.msp

B.

dism /get-AppPatches /get-PackageInfo:C:MyPatch.msp

C.

msiexec /x “C:MyPatch.msp”

D.

msiexec/p “C:MyPatch.msp”

 

Answer: D

Explanation:

http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx

Msiexec (command-line options)

 

To apply an update

 

Syntax

msiexec /p UpdatePackage

 

Parameters

/p Applies an update.

UpdatePackage Specific update.

 

Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…