[Free] Get all latest Microsoft 70-687 Actual Tests 141-150

Ensurepass

QUESTION 141

Employees are permitted to bring personally owned portable computers that run Windows 8 to

the office. They are permitted to install corporate applications by using the management

infrastructure agent and access corporate email by using Windows Mail. An employee’s

personally owned portable computer is stolen. You need to protect the corporate applications

and email messages on the computer. Which two actions should you perform? (Each correct

answer presents part of the solution. Choose two.)

 

A.      Prevent the computer from connecting to the corporate wireless network.

B.      Disconnect the computer from the management infrastructure.

C.      Change the user’s password.

D.      Initiate a remote wipe.

 

Correct Answer: CD

 

 

QUESTION 142

A company has lab computers that run Windows 8. On all lab computers, Internet Explorer has

the Display intranet sites in Compatibility View option enabled and the Download updated

compatibility lists from Microsoft option disabled. All lab computers access only internal

corporate websites. A corporate website was designed for a previous version of Internet Explorer.

When viewed on the lab computers, menus and images on the website are displayed out of place. You need to ensure that all corporate websites display correctly on the lab computers. What

should you do?

 

A.      Enable the Display all websites in Compatibility View option.

B.      Manually add the corporate website to the compatibility view settings.

C.      Manually download an updated compatibility list from Microsoft.

D.      Disable the Display intranet sites in Compatibility View option.

 

Correct Answer: A

 

 

QUESTION 143

You administer Windows 8 Pro computers in your company network. The computers are

configured to allow remote connections. You attempt to create a Remote Desktop Connection to

a computer named Computer1. You receive the following message: ”Remote Desktop can’t

connect to the remote computer.” You are able to ping Computer1. You discover that Remote

Desktop Firewall rules are not present on Computer1. You need to connect to Computer1 by

using Remote Desktop. Which PowerShell commands should you run on Computer1?

 

A.      New-NetFirewallRule -DisplayName RdpTCPin -localPort 3389 -Protocol TCP

B.      Set-NetFirewallRule -Name RemoteSvcAdmin-In-TCP -Enabled True

C.      New-NetFirewallRule -DisplayName RdpTCPout -localPort 3389 -Protocol TCP -Direction Out

– Action Allow

D.      Set-NetFirewallRule -Name RemoteFwAdmin-In-TCP -Enabled True

 

Correct Answer: A

 

 

QUESTION 144

A client computer runs Windows 8 and has a 1 TB hard disk drive. You install several third-party

desktop apps on the computer. The hard disk drive has very little available space. After you install

an app update, the computer becomes unresponsive. You have the following requirements:

 

Ÿ   Return the computer and applications to an operational state.

Ÿ   Free additional hard disk space.

 

You need to meet the requirements by using the least amount of administrative effort.

Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)

 

A.      Run the Remove everything and install Windows feature.

B.      Configure the maximum disk space usage for System Restore to 1%.

C.      Configure the maximum disk space usage for System Restore to 5%.

D.      Run the Refresh your PC without affecting your files feature.

E.       Perform a system restore on the client computer.

 

Correct Answer: CE

 

 

QUESTION 145

A company has a client computer that runs Windows 8 with secure boot enabled. You install a

third-party adapter with an Option ROM in the computer. When you start the computer, it starts

in the Windows Recovery Environment (Windows RE). You need to ensure that the computer

starts normally. What should you do?

 

A.      Install a Trusted Platform Module (TPM) chip.

B.      Start the computer in Safe Mode. Then update the adapter drivers.

C.      Replace the third-party adapter with an adapter that is signed by a trusted Certificate

Authority (CA).

D.      Create a self-signed certificate. Associate the certificate with the third-party adapter.

 

Correct Answer: C

 

 

QUESTION 146

A company has an Active Directory Domain Services (AD DS) domain. The company has 100 client

computers and tablets that run Windows 8. Each user has a unique local user account on each

device he or she uses. The company wants to simplify the logon process for all users. You have

the following requirements:

 

Ÿ   Reduce the number of unique user accounts for each user.

Ÿ   Unify the initial Windows 8 theme across all Windows 8 devices.

Ÿ   Ensure that Windows Store apps maintain the last used state across all Windows 8 devices.

 

You need to configure an authentication method that meets the requirements. Which

authentication method should you configure?

 

A.      Pin

B.      Microsoft account

C.      Active Directory user account

D.      Picture password

 

Correct Answer: B

 

 

QUESTION 147

You administer Windows 7 client computers in your company network. The computers are

members of an Active Directory Domain Services (AD DS) domain and have 16-bit applications

installed. You plan to upgrade all of the computers from Windows 7 to Windows 8. You need to

ensure that the 16-bit applications will continue to run on Windows 8. What are two version of

Windows 8 that you could use to achieve this goal? (Each correct answer presents a complete of

the solution. Choose two.)

 

A.      Windows 8 Pro (64-bit)

B.      Windows 8 Enterprise (64-bit)

C.      Windows 8 Pro (32-bit)

D.      Windows RT

E.       Windows 8 Enterprise (32-bit)

 

Correct Answer: CE

 

 

 

 

 

 

 

QUESTION 148

You use a computer that has Windows 8 Pro installed. Your personal files are stored in a storage

pool that is distributed across multiple USB drives. You need to configure a daily backup solution

that meets the following requirements:

 

Ÿ   Automatically backs up all of your personal files that are located in the storage pool.

Ÿ   Automatically backs up operating system files.

Ÿ   Ensures that you can restore any file.

 

What should you do?

 

A.      Create a recovery drive.

B.      Turn on File History.

C.      Configure Windows 7 File Recovery.

D.      Configure system protection.

 

Correct Answer: D

 

 

QUESTION 149

A computer that runs Windows 8 is configured with a 2 TB storage pool. The storage pool

currently shows 1 TB of available space. You try to save 100 MB of files to the storage drive. An

error message states that the drive is full. You need to make an additional 1 TB of space available

in the storage pool. What should you do?

 

A.      Connect a 1 TB drive to the computer and add the new drive to the storage pool.

B.      Connect a 1 TB drive to the computer and assign a drive letter to the new drive.

C.      Set the resiliency type of the storage pool to Parity.

D.      Set the logical size of the storage pool to 2 TB.

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 150

You are troubleshooting a computer that runs Windows 8. The computer is not joined to a

domain. You are unable to change any of the advanced Internet options, which are shown in the

Advanced Internet Options exhibit.

 

clip_image001

 

You need to ensure that you can change the advanced Internet options. Which tool should you

use?

 

A.      Credential Manager

B.      Authorization Manager

C.      Group Policy Object Editor

D.      Ease of Access Center

 

Correct Answer: C

 

Instant Access to Download Testing Software & PDF File for Microsoft 70-687 Real Exam

Instant Access to Try Microsoft 70-687 Free Demo