Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 121-130

Ensurepass

 

QUESTION 121

You plan to purchase new Windows 8.1 tablets for you company network.

 

You need to ensure that tablet users are able to use the Windows 8.1 Snap feature.

 

Which hardware specifications should you meet in choosing tablets?

 

A.

monitor and video adapter that support a minimum screen resolution of 1366 x 768

B.

monitor that supports at least three simultaneous touches

C.

monitor that supports at least five simultaneous touches

D.

monitor and video adapter that support a minimum screen resolution of 1024 x 768

 

Answer: A

Explanation:

http://winsupersite.com/article/windows8/windows-8-feature-focus-snap-142986

Windows 8 Feature Focus: Snap

 

While Metro-styled apps are advertised as being full-screen experiences only, they can also support a less-well-known snapped mode, in which they can be used side-by-side onscreen with a second Metro-styled app or the Windows desktop. This Windows 8 feature, not coincidentally, is called Snap, and it’s named after a similar desktop feature that debuted in Windows 7.

 

http://windowsitpro.com/windows-8/q-what-resolution-do-windows-8-metro-ui-and-snap- feature-require

Q: What resolution do the Windows 8 Metro UI and Snap feature require?

 

To use the Snap application capability, which allows two Metro applications to appear on the screen at the same time with one application using up most of the screen and the other giving a summary view, you need a resolution of 1366×768.

 

 

QUESTION 122

You have a computer that runs Windows 8.1. You install a custom application by using an .msi file that is located in your Documents library.

 

The computer begins to experience performance issues. You decide to reinstall the custom application. When you run the .msi file, you receive an error message about a corrupted file.

 

You need to ensure that you can reinstall the application.

 

What should you do?

 

A.

Run the replace command, specify the application’s .msi file as the source, and then specify the application’s original installation directory as the destination.

B.

Use file History to revert the application’s .msi file to a previous version.

C.

Run the msiexec /f command and specify the application’s .msi file.

D.

Run the reset /f command and specify the application’s .msi file.

 

Answer: B

Explanation:

http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx

What is File History?

File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

 

Further information:

http://technet.microsoft.com/en-us/library/cc759262%28v=ws.10%29.aspx

Msiexec (command-line options)

 

To repair a product

Syntax

msiexec /f [p][o][e][d][c][a][u][m][s][v]{Package | ProductCode}

 

 

QUESTION 123

DRAG DROP

A Company has 10 computers that run windows vista. The computers are members of a workgroup.

 

The company plans to upgrade the computers to Windows 8.1. You are planning a deployment strategy.

 

You need to ensure that users can log on to their existing accounts and access their existing data after the upgrade.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image002

 

Answer:

clip_image004

 

 

QUESTION 124

You administer Windows 8.1 computers in you company network. all computers include Windows 8.1 compatible trusted platform modele (TPM).

 

You configure a computer that will run a credit processing application.

 

You need to ensure that the computer requires a user to enter a PIN code when starting the computer.

 

clip_image006

 

Which policy should you configure? (To answer, select the appropriate policy in the answer area.)

 

A.

Allow Secure Boot for Integrity validation

B.

Require Additional authentication at startup

C.

Allow enhanced PINs for Startup

D.

Configure minimum PIN length for startup a local

 

Answer: B

Explanation:

How to enable BitLocker to prompt for PIN during startup

You can do this after BitLocker has encrypted the entire drive. First you have to enable the local policy to require a PIN during startup. You could also do that centrally enterprise wide through Group Policy (GPO). To do this:-

 

Click Start > Run.

Type “gpedit.msc”

Go to Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives.

One the right pane, double-click on Require additional authentication at startup.

Choose Enabled

Uncheck the Allow BitLocker without a compatible TPM

Under Configure TPM startup PIN:, choose Require startup PIN with TPM http://technet.microsoft.com/en-us/library/jj679890.aspx

BitLocker Group Policy Settings

 

Require additional authentication at startup

This policy setting is used to control which unlock options are available for operating system drives.

With this policy setting, you can configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This policy setting is applied when you turn on BitLocker.

 

On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use:

only the TPM for authentication

insertion of a USB flash drive containing the startup key the entry of a 4-digit to 20-digit personal identification number (PIN) a combination of the PIN and the USB flash drive

 

There are four options for TPM-enabled computers or devices:

* Configure TPM startup

Allow TPM

Require TPM

Do not allow TPM

* Configure TPM startup PIN

Allow startup PIN with TPM

Require startup PIN with TPM

Do not allow startup PIN with TPM

* Configure TPM startup key

Allow startup key with TPM

Require startup key with TPM

Do not allow startup key with TPM

* Configure TPM startup key and PIN

Allow TPM startup key with PIN

Require startup key and PIN with TPM

Do not allow TPM startup key with PIN

 

Further Information:

Allow Secure Boot for integrity validation

This policy controls how BitLocker-enabled system volumes are handled in conjunction with the Secure Boot feature. Enabling this feature forces Secure Boot validation during the boot process and verifies Boot Configuration Data (BCD) settings according to the Secure Boot policy.

 

Secure Boot ensures that the computer’s preboot environment loads only firmware that is digitally signed by authorized software publishers. Secure Boot also provides more flexibility for managing preboot configurations than BitLocker integrity checks prior to Windows Server 2012 and Windows 8.

 

When this policy is enabled and the hardware is capable of using Secure Boot for BitLocker scenarios, the Use enhanced Boot Configuration Data validation profile Group Policy setting is ignored, and Secure Boot verifies BCD settings according to the Secure Boot policy setting, which is configured separately from BitLocker.

 

Allow enhanced PINs for startup

This policy setting permits the use of enhanced PINs when you use an unlock method that includes a PIN.

Enhanced startup PINs permit the use of characters (including uppercase and lowercase letters, symbols, numbers, and spaces). This policy setting is applied when you turn on BitLocker.

Not all computers support enhanced PIN characters in the preboot environment. It is strongly recommended that users perform a system check during the BitLocker setup to verify that enhanced PIN characters can be used.

 

Configure minimum PIN length for startup

This policy setting is used to set a minimum PIN length when you use an unlock method that includes a PIN.

This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits.

 

http://4sysops.com/archives/bitlocker-group-policy-changes-in-windows-8/

BitLocker Group Policy changes in Windows 8

 

“Allow Secure Boot for integrity validation” allows you to configure the use of Secure Boot on computers that have UEFI firmware. More specifically, it lets you disable it since the default is to use Secure Boot when it is available on a computer. In the event you do disable it, you can configure the “use enhanced Boot Configuration Data validation profile” to choose specific BCD settings to verify.

 

clip_image008

 

Allow Secure Boot for integrity validation

 

 

QUESTION 125

You administer Windows 8.1 client computers in your company network.

 

A guest at your company is connected to the Internet as shown in the following exhibit.

(Click the Exhibit button.)

 

clip_image009

 

You need to ensure that the guest user is able to share network resources over Wi-Fi without lowering the overall security of the computer.

What should you do?

 

A.

Change the network location type to Work.

B.

Configure File sharing connections settings for All networks.

C.

Change the network location type to Private.

D.

Configure File and printer sharing settings for Public networks.

 

Answer: C

Explanation:

http://www.7tutorials.com/network-locations-explained

Simple Questions: What are Network Locations in Windows 7 & Windows 8?

 

Network Locations in Windows 8: Private vs Public

Windows 8 further simplifies the concept of network locations, reducing them to only two choices:

Private network – This profile should be applied to your home network or to the network from your workplace. When this profile is assigned to a network connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections are allowed.

Public network – This profile is also named Guest. It is the more secure of the two because network discovery is turned off as well as file and printer sharing. This profile should be used when connecting to public networks you don’t trust, like those found in airports, coffee shops, bars, hotels, etc.

There’s also a third network location profile named Domain network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings applied to this profile are those set by your company and you cannot change them.

 

http://www.tekrevue.com/tip/change-network-location-windows-8/

How to Change a Network Location in Windows 8

 

clip_image011

Let’s get back to the Networks list: right click or press and hold your active network connection. A menu is displayed with several options, depending on the network type.

 

clip_image012

 

Click or tap “Turn sharing on or off” (the only option common to both wired and wireless networks). For wired networks you will see less options being displayed din the contextual menu.

 

You are asked if you want to turn on sharing between PCs and connect to devices on this network.

 

clip_image013

 

Selecting “No, don’t turn on sharing or connect to devices” is the equivalent of applying the Public profile. Selecting “Yes, turn on sharing and connect to devices” is the equivalent of applying the Private profile.

 

Make your choice and the appropriate settings are applied.

 

 

QUESTION 126

A company has client computers that run Windows 8.1.

 

When a user tries to print from his portable client computer while connected to the corporate network, he discovers that the default printer is set to his home printer instead of to the office printer.

 

You need to ensure that the default printer for the computer is the office printer when the computer is connected to the corporate network and the user’s home printer when the computer is connected to his home network.

 

What should you do on the portable computer?

 

A.

In the printer properties of the corporate printer, configure the active port with the correct TCP/IP settings for the printer.

B.

Install the corporate printer and set it as the default printer. Then add the home printer to the homegroup settings.

C.

Connect to the home network and choose Connect from the shared printer object context menu. Then connect to the corporate network and choose Connect from the shared printer object context menu.

D.

Set a default printer for each network.

 

Answer: D

Explanation:

http://windows.microsoft.com/en-us/windows-8/set-change-your-default- printer

Set or change your default printer

 

To set a different default printer for each network

 

3. Tap or click any printer, and then tap or click Manage default printers.

4. Select Change my default printer when I change networks.

5. Under Select network, choose the first network you want to set a printer for.

6. Under Select printer, choose the printer you want to be the default on that network, and then tap or click Add.

7. When you’re finished setting a default printer for each network, tap or click OK.

 

Further Information:

http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-3- configure-network-connectivity-15/

configure location-aware printing

 

Location-aware printing is not a new feature, it existed already in Windows 7, it works that your default printer follows you, so at work you can have one default printer and another at home without manually switching.

 

Just click on an installed printer in control panel and select Manage default printers.

 

clip_image014

 

Be sure Change my default printer when I change Networks is selected and then manage per network which printer you want to be default.

 

clip_image015

 

Location-Aware Printing is dependent upon the Network List Service and the Network Location Awareness service. If either one of these services are stopped or malfunctioning, then Windows will not be able to detect network changes and may not switch default printers as expected

 

 

QUESTION 127

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.

 

You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least amount of administrative effort.

 

Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)

 

A.

Edit the local Group Policy to configure the Shut Down options.

B.

Create a Group Policy object (GPO) that configures the Sleep Management settings.

C.

Create a Group Policy object (GPO) that configures the Power Management settings.

D.

Link the Group Policy object (GPO) to the organizational unit containing the portable computers.

E.

Edit the local Group Policy to configure the Power Management settings.

 

Answer: CD

Explanation:

Put the Laptops into an OU.

Create an appropriate GPO.

Link the GPO to the OU.

 

Note:

* Networking power management (not sleep management) refers to the set of features that you can configure to allow the computers in your network to save energy.

 

Incorrect:

Local Group Policy would have to be edited locally on each laptop.

 

http://blogs.technet.com/b/askds/archive/2008/03/19/managing-power-with-group-policy-part-2-or-3.aspx

Managing Power with Group Policy: Part 2 of 3

 

clip_image016

 

Another related policy setting is Specify the System Sleep Timeout, only the value entered (in seconds) indicates how much idle time elapses before Windows enters sleep mode.

 

Further Information:

Put the Laptops into an OU.

Create an appropriate GPO.

Link the GPO to the OU.

 

 

 

 

 

 

 

 

 

QUESTION 128

You install Windows 8.1 on a client computer.

 

Several days later, you establish that the computer has been infected by malware. You are unable to establish when the computer was infected.

 

You need to restore the client computer to full functionality.

 

What should you do?

 

A.

Start the computer using the Last Known Good Configuration option.

B.

Use the Refresh your PC without affecting your files function.

C.

Start the computer in Safe Mode.

D.

Use the Remove everything and install Windows function.

 

Answer: D

Explanation:

http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc

How to refresh, reset, or restore your PC

 

If you’re having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC reinstalls Windows and keeps your personal files and settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps — except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you’ve made.

 

 

QUESTION 129

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.

 

You need to ensure that only administrators can access removable storage devices on client computers.

 

Which two Group Policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)

 

A.

Enable the Prevent installation of removable devices policy.

B.

Disable the Allow only USB root hub connected Enhanced Storage Features policy.

C.

Create an AppLocker deny rule with a path condition of %HOT%.

D.

Start the Application Identity service.

E.

Enable the Allow administrators to override Device Installation Restriction policies policy.

 

Answer: AE

Explanation:

Prevent installation of all devices.

 

In this scenario, the administrator wants to prevent standard users from installing any device but allow administrators to install or update devices. To implement this scenario, you must configure two computer policies: one that prevents all users from installing devices (A) and a second policy to exempt administrators from the restrictions (E).

 

* A growing variety of external storage devices can be connected to personal computers and servers that are running the Windows operating system. Many users now expect to be able to install and use these devices in the office, at home, and in other locations. For administrators, these devices pose potential security and manageability challenge.

 

The Group Policy settings discussed in this section can be used to limit, prevent, or enable these situations. The default value for these policy settings is Not configured. These policy settings are located in the following locations under Computer ConfigurationAdministrative TemplatesSystem:

 

/ (E) Device InstallationDevice Installation Restrictions

 

Device RedirectionDevice Redirection Restrictions

 

Driver Installation

 

Enhanced Storage Access

 

Removable Storage Access

 

Reference: Threats and Countermeasures Guide: External Storage Devices

 

http://technet.microsoft.com/en-us/library/cc753539%28v=ws.10%29.aspx

 

Prevent Installation of Removable Devices

 

You can use this procedure to prevent installation of any removable device.

 

A device is considered removable when its device driver, or the device driver for the bus to which the device is attached, reports that it is a removable device.

If this policy is enabled, in addition to preventing installation of the affected devices, it also prevents users from updating the device drivers for already installed devices that match the policy.

 

http://technet.microsoft.com/en-us/library/cc753015%28v=ws.10%29.aspx

 

Allow Administrators to Override Device Installation Restriction Policies

 

You can use this procedure to ensure that the device installation restriction policies you apply to a computer do not affect members of the Administrators group.

 

By default, a device installation restriction policy affects all users of the computer, including members of the local Administrators group. By enabling this policy, you exempt administrators from the effects of the policy, and allow them to do the device installation tasks they need to do.

 

Further Information:

 

http://www.group-

policy.com/ref/policy/242/Allow_only_USB_root_hub_connected_Enhanced_Storage_devic es

 

Allow only USB root hub connected Enhanced Storage devices

 

..

 

If you disable or do not configure this policy setting, USB Enhanced Storage devices connected to both USB root hubs and non-root hubs will be allowed.

 

http://technet.microsoft.com/en-us/library/dd723678%28v=ws.10%29.aspx

AppLocker

 

You can use AppLocker as part of your overall security strategy for the following scenarios:

 

Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.

 

Prevent users from installing and using unauthorized applications.

 

Implement application control policy to satisfy security policy or compliance requirements in your organization.

 

http://technet.microsoft.com/en-us/library/ee791779%28v=ws.10%29.aspx

Configure the Application Identity Service

 

The Application Identity service determines and verifies the identity of an application. Stopping this service will prevent AppLocker policies from being enforced.

 

 

QUESTION 130

A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at home.

 

The company has applications that run only on Windows 8.1.

 

You need to deploy Windows To Go so that employees can run the applications on their home computers.

 

Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)

 

A.

bcdedit

B.

DISM

C.

bcdboot

D.

ImageX

 

Answer: BC

Explanation:

See step 12 and 13 below.

 

Create Windows To Go on any edition of Windows 8.1:

Launch an administrative level command prompt.

Make sure that your USB Drive is plugged in and then type in diskpart and hit Enter.

List the available disks by running “list disk” and you should see your usb device.

Select your USB drive by typing “select disk #” and hit Enter. For example, “select disk 3”.

Clean the partitions on the disk by typing “clean” and hit Enter.

Now create the boot partition by running the following command:create partition primary size=350

Now create the OS partition by running the following command to create a partition taking up all remaining space:create partition primary

The boot partition needs to be formatted, configured and assigned a drive letter, run the following commands:select partition 1format fs=fat32 quickactiveassign letter=b(if the b drive letter is already in use on your PC, substitute a different letter and replace b with your letter throughout the rest of this guide)

The same must be done for the OS partition, run the following different commands:select partition 2format fs=ntfs quickassign letter=o(if the o drive letter is already in use on your PC, substitute a different letter and replace o with your letter throughout the rest of this guide)

Exit Diskpart by typing Exit.

Extract the install.wim file from the sources directory of the Windows 8.1 install ISO to c:wim. On Windows 8.1 you can just double click an ISO to mount and then browse it.

Use DISM to deploy the Windows 8.1 files to the OS partition of the USB device by running:dism /apply-image /imagefile:c:wiminstall.wim /index:1 /applydir:o:

The boot manager needs to be installed on the boot partition with the help of the bcdboot utility. Run the following command:o:windowssystem32bcdboot

o:windows /f ALL /s b:

Reboot your computer and test your new Windows 8.1 To Go device built on Windows 8.1. Make sure the PC is configured to boot to USB before your local hard drive.

 

Reference: How to Create a Windows To Go USB Drive

 

http://technet.microsoft.com/en-us/library/jj721578.aspx

 

Deploy Windows To Go in Your Organization

 

http://www.thomasmaurer.ch/2012/03/windows-8-how-to-create-a-windows-to-go-usb- drive/

 

Windows 8: How to create a Windows To Go USB drive

 

Microsoft released a new feature called “Windows To Go” with Windows 8. With this feature it is possible to boot your Windows 8 from a USB drive on any PC. In this post I show you how you can do this.

 

Run diskpart

 

With “list disk” you can list all your disk

 

Now select your usb drive (select disk 1) and clean it. After that you can create a new partition and format that and close diskpart.

Now in my case the ISO is mounted as drive F:. Now with dism I can apply the Windows Image to my USB drive (E:)

 

Now you have to make this drive bootable

 

now you are done. You can now boot your USB drive. The first boot will take some time to setup.

 

Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…