Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 31-40

Ensurepass

 

 

QUESTION 31

A portable computer that runs Windows 8.1 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.

 

You need to ensure that the computer automatically downloads updates by using Windows Update only while connected to the wired corporate network connection.

 

What should you do?

 

A.

Set the corporate wireless network to metered.

B.

Set the corporate wireless network to non-metered.

C.

Configure the Specify intranet Microsoft update service location local Group Policy setting.

D.

Configure a Windows Firewall connection security rule.

 

Answer: A

Explanation:

http://www.eightforums.com/tutorials/5371-wireless-network-set-unset-metered-connection- windows-8-a.html

http://www.windowsnetworking.com/articles_tutorials/Using-Wireless-Networks-Windows-8.html

 

To help you gauge the amount of data usage on networks, Windows 8.1 includes a new data usage tracking and metering feature. This is especially useful when using mobile broadband networks, as your service likely has a limit to the amount of data you can use before you’re charged overage fees or the speed is throttled, or maybe you’re even on a pay-as-you-go plan that charges per usage.

By default, Windows 8.1 tracks the amount of data you transfer over Wi-Fi and mobile broadband networks. The running total (in MBs or GBs) and the time or day since it’s been tracked is displayed when you click (or tap) on a network name from the new network list, as shown in the figure below:

 

clip_image001

 

You can also set particular networks as a metered connection, which will then disable Windows Update from downloading updates (except for critical security patches) and possibly disable or reduce data usage from other Microsoft and non-Microsoft applications as well.

 

 

 

 

 

 

QUESTION 32

You manage client computers that run Windows 7 and Windows 8.1.

 

You are configuring Windows updates for all client computers.

 

You have the following requirements:

 

All client computers must use a specific Windows Server Update Services (WSUS) server for updates.

All client computers must check for updates each hour.

 

You need to configure local Group Policy settings to meet the requirements.

 

Which three actions should you perform? (Each answer presents part of the solution.

Choose three.)

 

A.

Configure the Automatic Maintenance Activation Boundary policy setting.

B.

Configure the Automatic Updates detection frequency policy setting.

C.

Enable the Specify intranet Microsoft update service location policy setting.

D.

Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.

E.

Enable the Reschedule Automatic Updates scheduled installations policy setting.

 

Answer: BCD

Explanation:

http://technet.microsoft.com/en-us/library/dn595129.aspx

Step 5: Configure Group Policy Settings for Automatic Updates

 

Automatic Updates detection frequency

Specifies the hours that Windows will use to determine how long to wait before checking for available updates. The exact wait time is determined by using the hours specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20 hour detection frequency, all clients to which this policy is applied will check for updates anywhere between 16 and 20 hours.

Note: The “Specify intranet Microsoft update service location” setting must be enabled for this policy to have effect.

 

Specify intranet Microsoft update service location Specifies an intranet server to host updates from Microsoft Update. You can then use WSUS to automatically update computers on your network.

 

Configure Automatic Updates

Specifies specify whether automatic updates are enabled on this computer.

 

Further Information:

http://technet.microsoft.com/en-us/library/dn595129.aspx

Step 5: Configure Group Policy Settings for Automatic Updates

 

Automatic Maintenance Activation Boundary

Starting Windows 8, you can set updates to install during automatic maintenance instead of using a specific schedule tied to Windows Update. Automatic maintenance will install updates when the computer is not in use, and avoid installing updates when the computer is running on battery power. If automatic maintenance is unable to install updates within days, Windows Update will install updates right away. Users will then be notified about a pending restart. A pending restart will only take place if there is no potential for accidental data loss.

Reschedule Automatic Updates scheduled installations Specifies the amount of time for Automatic Updates to wait following a computer startup, before proceeding with a scheduled installation that was previously missed. If the status is set to Not Configured, a missed scheduled installation will occur one minute after the computer is next started.

 

 

QUESTION 33

A company has client computers that run Windows 8.1.

 

You need to create a baseline performance report that includes disk status by using the least amount of administrative effort.

 

What should you do?

 

A.

Start the System Diagnostics Data Collector Set.

B.

Create and start a custom Data Collector Set.

C.

Start the System Performance Data Collector Set.

D.

Add counters to Performance Monitor, and then print the Performance Monitor output.

 

Answer: A

Explanation:

System Diagnostics and Performance Data Collector Set both deliver the same, 17 performance counters for disk.

Don’t get fooled by the word “Performance Baseline” The System Diagnostics Report includes Basic System Checks (see below), where Disk status is listed.

This item does not appear in the System Performance Report.

 

clip_image003

 

clip_image005

 

 

QUESTION 34

A company has client computers that run Windows 8.1 in a kiosk environment.

 

You need to ensure that Windows updates are automatically applied and cannot be disabled by users.

 

What should you do?

 

A.

Configure Windows Update to install updates automatically.

B.

In the local Group Policy, enable the Turn on recommended updates via Automatic

Updates policy setting.

C.

msiexec /i app1.msi /qn

D.

In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.

 

Answer: D

Explanation:

If you enable the Remove access to use all Windows Update features policy setting:

 

clip_image007

 

Changing the Windows Update settings will be grayed out:

 

clip_image009

 

Further information:

If you enable the Turn on recommended updates via Automatic Updates policy setting, even when logged with a limited rights user, you can still change the Automatic Updates settings:

 

clip_image011

 

clip_image013

 

 

QUESTION 35

DRAG DROP

You have a computer that runs Windows 8.1, and three unused external disk drives.

 

You are creating a volume to store picture files.

 

You have the following requirements:

 

Use all three external disk drives.

Ensure that the volume is accessible from a single drive letter.

Ensure data redundancy between the disk drives in the event of a hardware failure.

 

You need to create the volume.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image014

 

Answer:

clip_image015

 

 

QUESTION 36

A company has client computers that run Windows 8.1. Each computer has two hard drives.

 

You need to create a dynamic volume on each computer that maximizes write performance.

 

Which kind of dynamic volume should you create?

 

A.

Striped volume

B.

RAID 5 volume

C.

Spanned volume

D.

Mirrored volume

 

Answer: A

Explanation:

http://technet.microsoft.com/en-us/library/cc737048%28v=ws.10%29.aspx

What Are Dynamic Disks and Volumes?

 

Types of Dynamic Volumes

A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.

 

Striped Volumes

Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks.

Striped volumes cannot be extended or mirrored and do not offer fault tolerance. If one of the disks containing a striped volume fails, the entire volume fails, and all data on the striped volume becomes inaccessible. The reliability for the striped volume is less than the least reliable disk in the set.

 

Further Information:

RAID-5 Volumes

A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the lost data. RAID-5 volumes are well-suited to storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a RAID-5 volume.

 

Spanned Volumes

Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned volumes require two disks, and you can use up to 32 disks.

 

Mirrored Volumes

A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one of the disks fails, the data on the failed disk becomes unavailable, but the system continues to operate by using the unaffected disk.

Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy of their data on the second disk. Mirrored volumes provide better write performance than RAID-5 volumes.

 

 

QUESTION 37

DRAG DROP 

A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 32-bit version of Windows 8.1. A workgroup contains client computers that run a 64-bit version of Windows 8.1.

 

Computers in the workgroup can’t currently print to PRINTER1.

 

You need to ensure that the workgroup computers can print to PRINTER1.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange them in the correct order.)

 

clip_image017

 

Answer:

clip_image019

 

 

QUESTION 38

A company has client computers that run Windows 8.1.

 

The company implements the following security requirements:

 

All client computers must use two-factor authentication.

At least one authentication method must include exactly four characters or gestures.

 

You need to choose authentication methods that comply with the security requirements.

 

Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

 

A.

PIN

B.

Biometric authentication

C.

Picture password

D.

Microsoft account

 

Answer: AB

Explanation:

Something the user knows: PIN (4 digits)

One might be tempted to think the photo for the picture password is something the User has.

But it is something the User knows, too:

He knows how to draw the gestures (maximum 3 gestures supported with picture password), and it is no physical object (like a token, smart card …)

The MS Account is too something the user knows.

So the answer must be Biometric authentication.

Two-factor authentication requires the use of two of the three authentication factors:

Something the user knows (e.g., password, PIN);

Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint). The factors are identified in the standards and regulations for access to U.S. Federal Government systems.

http://en.wikipedia.org/wiki/Multi-factor_authentication

Multi-factor authentication

 

Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are:

Something only the user knows (e.g., password, PIN, pattern); Something only the user has (e.g., ATM card, smart card, mobile phone); and Something only the user is (e.g., biometric characteristic, such as a fingerprint).

 

1. Something the user knows: PIN

http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to-resources-14/

 

Sign in with PIN code (4-digit code) is not possible for a domain user, it is not even visible in PC Settings -> Users (if machine is not domain joined you see it). To enable it for even domain joined computer/users you can enable the policy Turn on PIN sign-in and it becomes visible.

 

clip_image020

 

2. Something only the user is: Biometric authentication

http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4-configure-access-to-resources-14/

Biometric in Windows 8 is built on Windows Biometric Framework and relies on Windows Biometric service that is set to start up manual by default.

 

clip_image021

 

Further information:

Something the user knows: Picture password

Problem: limited to 3 gestures

 

clip_image023

 

Something the user knows: Microsoft account

Problem: not limited to 4 characters

 

 

QUESTION 39

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.

 

A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.

 

You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs.

 

Which permission should you grant to the Sales group?

 

A.

Manage queue

B.

Print

C.

Manage documents

D.

Manage this printer

E.

Manage spooler

 

Answer: B

Explanation:

http://technet.microsoft.com/en-us/library/cc781446%28v=ws.10%29.aspx

Group types

 

There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and security groups to assign permissions to shared resources.

 

Security groups

Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can:

Assign user rights to security groups in Active Directory Assign permissions to security groups on resources

 

http://my.safaribooksonline.com/book/operating-systems/9780133118025/sharing- printers/ch21lev2sec24

Setting Printer Permissions

 

If you have a workgroup network and have disabled Password Protected Sharing, or if you have set up a homegroup, you don’t need to worry about setting permissions for printers:

anyone can use your shared printer. If you’re on a domain network or have chosen to use detailed user-level permissions on your workgroup network, you can control access to your shared printers with security attributes that can be assigned to users or groups, as shown in Figure 21.9 and described next:

 

clip_image025

 

clip_image026

 

The Security tab lets you assign printer-management permissions for users, groups, and the creator of each print job.

 

 

QUESTION 40

Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain.

 

You create a folder and share the folder with everyone in your organization.

 

You need to modify the NTFS permissions of the folder to meet the following criteria:

 

Users from the Supervisors AD security group must be able to open files, but not modify them.

Users from the Marketing AD security group must be able to create, modify, and delete files.

Users from both groups must not be able to delete the folder.

 

Which permissions should you set?

 

A.

Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission.

B.

Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission.

C.

Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.

D.

Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission.

 

Answer: C

Explanation:

http://technet.microsoft.com/en-us/library/bb727008.aspx

File and Folder Permissions

 

On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders.

 

File and Folder Permissions:

 

clip_image028

 

Special Permissions for Files:

 

clip_image029

 

Special Permissions for Folders:

 

clip_image031

 

Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…