Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 61-70

Ensurepass

 

QUESTION 61

A company has 100 client computers that run Windows 8.1.

 

The client computers are connected to a corporate private network.

 

Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.

 

You need to ensure that users can remotely connect to their office computers by using

Remote Desktop. Users must not be able to access any other corporate network resource from their home computers.

 

What should you do?

 

A.

Configure a Virtual Private Network connection.

B.

Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.

C.

Configure the local resource settings of the Remote Desktop connection.

D.

Configure a DirectAccess connection.

 

Answer: B

Explanation:

Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.

While connecting the computers you will find a couple of options related to VPN and Desktop Assistance.

 

See Understanding Authorization Policies for Remote Desktop Gateway:

http://technet.microsoft.com/en-us/library/cc731435.aspx

 

RD RAPs will enable us to control remote user access to internal network resources. With RD CAPs we can control which Users or Computers can connect via RDP. Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.

 

clip_image001

 

DirectAccess is for Windows Server 2008/2012/Win 7 Ultimate/Enterprise/Win 8 Enterprise only.

RD Gateway setup is only for servers.

Create VPN through manage networks. File -> Allow incoming connections. Connect through Internet and create VPN which will allow one computer at a time to view the hosts resources, and only the hosts resources unlike standard VPNs.

 

 

QUESTION 62

You install Windows 8.1 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app.

 

You need to remove only the most recently installed third-party desktop app.

 

You start the computer from a system repair disk.

 

Which troubleshooting option should you use?

 

A.

System Image Recovery

B.

Remove everything and install Windows

C.

System Restore

D.

Refresh your PC without affecting your files

 

Answer: C

Explanation:

http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC

 

If you think an app or driver that you recently installed caused problems with your PC, you can restore Windows back to an earlier point in time, called a restore point. System Restore doesn’t change your personal files, but it might remove recently installed apps and drivers.

 

 

QUESTION 63  

A company has a main office and three branch offices. The company has 20 portable computers that run Windows 8.1. Portable computer users can install local devices while in any branch office.

 

Your manager has instructed you to collect information about faulty devices and drivers within the company’s branch offices.

 

You need to create a performance report that includes a list of incorrectly installed devices by using the least amount of administrative effort.

 

What should you do?

 

A.

Add counters from each portable computer to Performance Monitor, and then print the Performance Monitor output.

B.

Start the System Performance Data Collector Set on each portable computer.

C.

Start the System Diagnostics Data Collector Set on each portable computer.

D.

Create and start a custom Data Collector Set on each portable computer.

 

Answer: C

Explanation:

System Diagnostics You can use this DCS when troubleshooting reliability problems such as problematic hardware, driver failures, or STOP errors. It logs all the information included in the System Performance DCS, plus detailed system information.

 

http://technet.microsoft.com/en-us/library/cc722173%28v=ws.10%29.aspx

Windows Vista Performance and Reliability Monitoring Step-by-Step Guide

 

Microsoft ® Windows Vista ® includes Windows Reliability and Performance Monitor, which is a Microsoft Management Console (MMC) snap-in that combines the functionality of previous stand-alone tools including Performance Logs and Alerts, Server Performance Advisor, and System Monitor. It provides a graphical interface for customizing Data Collector Sets and Event Trace Sessions.

 

What is performance and reliability monitoring?

 

The reliability of a system is the measure of how often the system operates as it is configured and expected to perform. Reliability can be reduced when applications stop responding, services stop and restart, drivers fail to initialize, or in the worst case, when operating systems fail.

 

Reliability Monitor provides you with a quick, visual view of the average stability of your system. In addition, it tracks events that will help you identify what causes reductions in reliability. By recording not only failures (including memory, hard disk, application, and operating system failures), but also key events regarding the configuration of your system (including the installation of new applications and operating system updates), you can see a timeline of changes in both the system and reliability, and can identify how to get your system back to optimal reliability when it does not behave as expected.

 

Data Collector Sets

 

An important new feature in Windows Reliability and Performance Monitor is the Data Collector Set, which groups data collectors into reusable elements for use with different performance monitoring scenarios. Once a group of data collectors is stored as a Data Collector Set, operations such as scheduling can be applied to the entire set through a single property change. You can schedule repeated collection of a Data Collector Set to create logs, load it in Performance Monitor to see the data in real time, and save it as a template to use on other computers.

 

Windows Reliability and Performance Monitor also includes default Data Collector Set templates to help you begin collecting performance data immediately.

 

Further Information:

http://blogs.interfacett.com/how-to-use-windows-7-performance-tools

How to use Windows 7 Performance Tools

 

We can go to data collector sets, there’s some system defined ones or you can create your own. I’m going to do system diagnostics.

 

clip_image003

 

All of these elements are going to be monitored.

 

clip_image005

 

I’m going to start this and run it for 10 seconds. I’m going to stop it.

 

clip_image007

 

That’s going to generate a report that’s under the system defined system diagnostics.

There’s the report I ran.

 

clip_image009

 

And it’s generating a report of this system for me to take a look at. It’s going to tell me whether the diagnostics passed or failed.

 

clip_image011

 

 

 

 

 

 

QUESTION 64  

A company has an Active Directory Domain Services (AD DS) domain. Client computers in the Test department run Windows 8.1 and are connected to the domain.

 

You need to ensure that Windows updates are not automatically applied and cannot be enabled by users.

 

What should you do?

 

A.

Create a Group Policy object (GPO) to enable the Turn on recommended updates via Automatic Updates policy setting.

B.

Configure Windows Update to install updates automatically.

C.

Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update features policy setting.

D.

Create a Group Policy object (GPO) to configure the Configure Automatic Updates policy setting.

 

Answer: C

Explanation:

Remove access to use all Windows Update features:

This Group Policy setting is located in User ConfigurationAdministrative TemplatesWindows ComponentsWindows Update.

When you enable this setting, the operating system cannot be updated through Windows Update, and Automatic Updates is disabled. Users or administrators can still perform actions such as clicking the Windows Update option on the Start menu, and the Windows Update Web site will appear in the browser. However, it will not be possible to update the operating system through Windows Update, regardless of the type of account being used to log on.

 

 

QUESTION 65

A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.

 

You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup.

 

Which three actions should you perform? (Each correct answer presents part of the

solution. Choose three.)

 

A.

Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.

B.

Create and configure a collector-initiated subscription.

C.

Start the Windows Event Collector service on all computers other than COMPUTER1.

D.

Start the Windows Event Collector service on COMPUTER1.

E.

Create and configure a source computer initiated subscription.

F.

Start the Windows Event Log service on all computers other than COMPUTER1.

G.

Add COMPUTER1 machine account to the Event Log Readers local group on all other computers.

 

Answer: BDG

Explanation:

For best management we want a collector-initiated subscription–meaning we’ll be setting up the subscription at the collecting computer instead of at each individual computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.

The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.

http://blog.oneboredadmin.com/2012/06/windows-event-collection.html

Windows Event Collection

 

The only basic rules are that the source machine should have Winrm2 installed and running on it, and the Event Collector Service should be running on the collector machine. There are two methods available to complete this challenge – collector initiated and source initiated.

 

Collector Initiated

When defining such a subscription, you instruct the collector to open a WinRM session to the source machine(s) using a specified set of credentials (or the computer account) and ask for a subscription.

 

Further Information:

 

For best management we want a collector-initiated subscription–meaning we’ll be setting up the subscription at the collecting computer instead of at each individual computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.

The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.

 

http://msdn.microsoft.com/en-us/library/windows/desktop/bb427443%28v=vs.85%29.aspx Windows Event Collector

 

You can subscribe to receive and store events on a local computer (event collector) that are forwarded from a remote computer (event source).

 

The following list describes the types of event subscriptions:

Source-initiated subscriptions: allows you to define an event subscription on an event collector computer without defining the event source computers. Multiple remote event source computers can then be set up (using a group policy setting) to forward events to the event collector computer. This subscription type is useful when you do not know or you do not want to specify all the event sources computers that will forward events. Collector-initiated subscriptions: allows you to create an event subscription if you know all the event source computers that will forward events. You specify all the event sources at the time the subscription is created.

 

http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription

 

You can subscribe to receive events on a local computer (the event collector) that are forwarded from remote computers (the event sources) by using a collector-initiated subscription. In a collector-initiated subscription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.

 

http://technet.microsoft.com/en-us/library/cc748890.aspx

Configure Computers to Forward and Collect Events

 

Before you can create a subscription to collect events on a computer, you must configure both the collecting computer (collector) and each computer from which events will be collected (source).

 

In a workgroup environment, you can follow the same basic procedure described above to configure computers to forward and collect events. However, there are some additional steps and considerations for workgroups:

You can only use Normal mode (Pull) subscriptions. You must add a Windows Firewall exception for Remote Event Log Management on each source computer.

 

You must add an account with administrator privileges to the Event Log Readers group on each source computer. You must specify this account in the Configure Advanced Subscription Settings dialog when creating a subscription on the collector computer. Type winrm set winrm/config/client @{TrustedHosts=”<sources>”} at a command prompt on the collector computer to allow all of the source computers to use NTLM authentication when communicating with WinRM on the collector computer. Run this command only once.

 

 

QUESTION 66

DRAG DROP

You have a computer that runs Windows 8.1, and three unused external disk drives.

 

You are creating a volume to store picture files. You have the following requirements:

 

Use all three external disk drives.

Ensure that the volume is accessible from a single drive letter.

Maximize the available space.

 

You need to create the volume.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image012

 

Answer:

clip_image013

 

 

QUESTION 67

DRAG DROP

A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 64-bit version of Windows 8.1.

 

The workgroup contains client computers that run a 32-bit version of Windows 8.1. Computers in the workgroup can’t currently print to PRINTER1.

 

You need to ensure that the workgroup computers can print to PRINTER1.

 

Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange the correct order.)

 

clip_image015

 

Answer:

clip_image017

 

 

 

 

 

 

QUESTION 68

DRAG DROP

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers.

 

You are planning a remote management solution. You have the following requirements:

 

Ensure that COMPUTER1 can run remote commands on COMPUTER2.

Test the solution by successfully running a command from COMPUTER1 that executes on COMPUTER2.

 

You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.

 

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

 

clip_image019

 

Answer:

clip_image021

 

 

QUESTION 69

DRAG DROP 

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Some computers have a Trusted Platform Module (TPM) chip. Members of the ITStaff security group are part of the local Power Users group on each client computer.

 

You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers by using the least amount of privilege necessary.

 

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

 

clip_image023

 

Answer:

clip_image025

 

 

QUESTION 70

DRAG DROP

A company has client computers that run Windows 8.1. All client computers allow incoming Remote Desktop connections.

 

You attempt to connect from COMPUTER1 to COMPUTER2 by using Remote Desktop.

 

Remote Desktop cannot connect to the remote computer. You establish that the firewall settings on COMPUTER2 have not been set to allow incoming connections.

 

From COMPUTER1, you need to enable Remote Desktop traffic through Windows Firewall on COMPUTER2.

 

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

 

clip_image027

 

Answer:

clip_image029

 

Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…