[Free] Get all latest Microsoft 70-687 Actual Tests 51-60

Ensurepass

QUESTION 51

DRAG DROP

A client laptop runs Windows 7 Professional and a custom application. The custom application is

compatible with Windows 8. You plan to migrate user settings and data from the client laptop to

a new tablet PC that runs Windows 8 Pro. You install the User State Migration Toolkit (USMT) on a

USB flash drive. You need to ensure that the custom application settings are applied to the tablet

PC after the migration is complete. Which three actions should you perform in sequence?

 

To answer, move the appropriate actions from the list of actions to the answer area and arrange

them in the correct order.

 

Select and Place:

clip_image002

 

Correct Answer:

clip_image004

 

 

 

 

 

 

 

 

 

QUESTION 52

An organization has client computers that run Windows 7. You upgrade the client computers to

Windows 8 without migrating the local user profiles. You install the Windows Assessment and

Deployment Kit (ADK) in the environment. You need to migrate the user profiles from the

Windows 7 installation to the Windows 8 installation. What should you do first on each client

computer?

 

A.      Run the scanstate command.

B.      Run Windows Easy Transfer and select the user profile to migrate.

C.      Run the Ioadstate command.

D.      Copy the Default Profile to a folder on drive C.

E.       Run the ImageX command.

 

Correct Answer: A

 

 

QUESTION 53

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8. A local printer is shared from a client computer. The client computer user is a

member of the Sales AD security group. You need to ensure that members of the Sales security

group can modify the order of documents in the print queue, but not delete the printer share.

Which permission should you grant to the Sales group?

 

A.      Manage queue

B.      Manage this printer

C.      Print

D.      Manage spooler

E.       Manage documents

 

Correct Answer: E

 

 

QUESTION 54

DRAG DROP

A desktop computer runs Windows 8. The computer is joined to an Active Directory Domain

Services (AD DS) domain named contoso.com. You have two domain user accounts:

 

Ÿ   A primary account named User1 that does not have domain administrative privileges.

Ÿ   An account named Admin1 that has administrative privileges in the domain.

 

You are currently logged in as User1. You need to run an application named app1.exe.

 

You have the following requirements:

Ÿ   Start the application by using your administrative credentials.

Ÿ   Ensure that the user environment is fully available to the application.

 

You need to complete the command to meet the requirements. Which command segments

should you use to complete the command?

 

To answer, drag the appropriate command segments to the correct locations in the answer area.

Command segments may be used once, more than once, or not at all. You may need to drag the

split bar between panes or scroll to view content.

 

Select and Place:

clip_image005

 

Correct Answer:

clip_image007

QUESTION 55

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8. A notification appears when domain users change Windows settings and when

applications try to make changes to client computers. You need to ensure that a notification

appears only when an application tries to make changes to the computer. What should you do?

 

A.      Configure the Notification Area Icons settings on the client computers.

B.      Create a Group Policy object (GPO) that enables the Admin Approval Mode for the built-in

Administrator account policy.

C.      Configure the User Account Control (UAC) settings on the client computers.

D.      Create a Group Policy object (GPO) that disables the Run all administrators in Admin

Approval Mode policy.

 

Correct Answer: C

 

 

QUESTION 56

Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS)

domain. You create a folder and share the folder with everyone in your organization. You need to

modify the NTFS permissions of the folder to meet the following criteria:

 

Users from the Marketing security group must be able to open files, but not modify them.

Users from the Supervisors security group must be able to create, modify, and delete files.

Users from both groups must not be able to delete the folder.

 

Which permissions should you set?

 

A.      Assign the Marketing group the Read permission. Assign the Supervisors group the Read and

Write permissions and the Delete Subfolders and Files special permission.

B.      Assign the Marketing group the Read and Write permissions. Assign the Supervisors group

the Full Control permission.

C.      Assign the Marketing group the Read and Write permissions. Assign the Supervisors group

the Modify permission and the Delete Subfolders and Files special permission.

D.      Assign the Marketing group the Read permission. Assign the Supervisors group the Read and

Write permissions and the Delete special permission.

 

Correct Answer: A

 

 

 

 

 

 

QUESTION 57

You deploy several tablet PCs that run Windows 8. You need to minimize power usage when the

user presses the sleep button. What should you do?

 

A.      In Power Options, configure the sleep button setting to Hibernate.

B.      Disable the C-State control in the computer’s BIOS.

C.      Configure the active power plan to set the system cooling policy to passive.

D.      In Power Options, configure the sleep button setting to Sleep.

 

Correct Answer: A

 

 

QUESTION 58

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8. You need to minimize the amount of Trusted Platform Module (TPM) authorization

information that is stored in the registry. What should you do?

 

A.      Enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 for the Configure TPM

validation profile for native UEFI firmware configuration policy setting.

B.      Create a Group Policy object (GPO) that disables the Configure the level of TPM owner

authorization information available to operating system policy setting.

C.      Create a Group Policy object (GPO) that sets the Configure the level of TPM owner

authorization information available to operating system policy setting to None.

D.      Create a Group Policy object (GPO) that enables the Turn on TPM Local Encryption policy

setting.

 

Correct Answer: C

 

 

QUESTION 59

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8 and are joined to the domain. You have the following requirements:

 

Ÿ   Ensure that files in shared network folders are available offline.

Ÿ   Minimize all data access times.

Ÿ   Reduce network bandwidth usage.

 

You need to configure Group Policy settings to meet the requirements. What should you do first?

 

A.      Enable the Enable file synchronization on costed networks policy setting.

B.      Enable and configure the Configure slow-link mode policy setting.

C.      Enable and configure the specify administratively assigned Offline Files policy setting.

D.      Enable the Synchronize all offline files when logging on policy setting.

Correct Answer: B

 

 

QUESTION 60

A company has client computers that run Windows 8. The company uses Windows BitLocker

Drive Encryption with the data-only option on all client computers. You need to remove data

fragments that exist in the free space on the local computer disk drives, without affecting current

user data. Which command should you run on the computers?

 

A.      BdeHdCfg

B.      diskpart

C.      chkdsk

D.      manage-bde

 

Correct Answer: D

 

Instant Access to Download Testing Software & PDF File for Microsoft 70-687 Real Exam

Instant Access to Try Microsoft 70-687 Free Demo