New Updated Microsoft MCSA 70-687 Real Exam Questions and Answers Download 131-140

Ensurepass

QUESTION 131

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8 and are joined to the domain. All Sales department employees are members of the

Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client

computers. You create a new Group Policy object (GPO) to configure an AppLocker file hash rule.

The file hash rule allows an application to run and links the application to the Sales OU. Several

minutes later, you establish that the AppLocker rule is not present on some computers within

SalesOU and the application cannot run. You need to quickly ensure that the application can run.

What should you do?

 

  1. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.

  2. Configure the AppLocker properties to enforce rules.

  3. Run the gpupdate /force command.

  4. Create a new AppLocker file hash condition.

 

Correct Answer: C

 

 

QUESTION 132

You administer Windows 8 laptops in your company network. You install several custom desktop

applications on the laptops. You need to create a custom recovery image for Windows to use

when selecting the Refresh your PC option. The custom recovery image must include the custom

desktop applications. Which command should you use to create the custom recovery image?

 

  1. Recdisc.exe

  2. Recover.exe

  3. Recimg.exe

  4. RecoveryDrive.exe

 

Correct Answer: A

 

 

QUESTION 133

You administer Windows 8 client computers in your company network. A computer that is used

by non-administrator users has a directory named C:Folder1. A shared collection of Microsoft

Excel files is stored in the C:Folder directory, with non-administrator users being granted modify

permissions to the directory. You discover that some files have been incorrectly modified by a

user. You need to determine which user made changes to the directory’s folder’s files. Which two

actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

  1. Set local policy: Computer ConfigurationWindows SettingsSecurity Settings

Local PoliciesAudit PolicyAudit object access to Failure.

  1. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to

Failure for the Modify permission.

  1. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to

Success for the Modify permission.

  1. Set local policy: Computer ConfigurationWindows SettingsSecurity Settings

Local PoliciesAudit PolicyAudit object access to Success.

 

Correct Answer: CD

 

 

QUESTION 134

A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1

contains computers that run Windows 7. Workgroup2 contains computers that run Windows 8.

You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers. You

need to ensure that administrators can manage the Workgroup1 computers from the

Workgroup2 computers by using Windows PowerShell Remoting.1 Which two actions should you

perform? (Each correct answer presents part of the complete solution. Choose two.)

 

  1. Install Windows PowerShell 2.0 on the Workgroup1 computers.

  2. Run the winrm quickconfig command on the Workgroup2 computers.

  3. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in

Windows Remote Management (WinRM).

  1. Run the winrrn quickconfig command on the Workgroup1 computers.

  2. On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in

Windows Remote Management (WinRM).

 

Correct Answer: BC

 

 

QUESTION 135

A computer that runs Windows B has two hard disk drives. The user stores data files in specific

storage locations outside of the standard libraries on both drives. File search results are delayed.

You need to return relevant search results more quickly. What should you do?

 

  1. Remove all directories from indexed locations.

  2. Add the specific storage locations to indexed locations.

  3. Allow indexing of file contents in non-indexed locations.

  4. Add encrypted files to the index.

 

Correct Answer: B

 

 

QUESTION 136

DRAG DROP

A company has client computers that run Windows XP or Windows Vista. The company plans to

upgrade all client computers to Windows 8. You are planning a deployment strategy. You need to

identify the elements that will be retained after the upgrades. Which elements will be retained?

 

To answer, drag the appropriate element or elements to the correct location or locations in the

answer area. Elements may be used once, more than once, or not at all. You may need to drag

the split bar between panes or scroll to view content.

 

Select and Place:

70-687-demo-57

 

Correct Answer:

70-687-demo-58

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 137

DRAG DROP

A company has an Active Directory Domain Services (AD DS) domain. All client computers run

Windows 8. The company has three departments named Accounting, Human Resources (HR),

and Marketing. User account objects are stored in their respective departmental AD security

groups and have full access to shared folders for each department. A new company policy

requires that the following access rules are in place:

 

  • Users must have complete access only to their department’s shared folder.

  • Accounting department users must be able to change files in the HR folder.

  • HR department users must be able to change files in the Marketing folder.

  • Marketing department users must be able to change files in the Accounting folder.

 

You need to comply with the company policy. Which permissions should you assign?

 

To answer, drag the appropriate security group or groups to the correct location or locations in

the answer area. Security groups may be used once, more than once, or not at all. You may need

to drag the split bar between panes or scroll to view content.

 

Select and Place:

70-687-demo-59

 

Correct Answer:

70-687-demo-60

 

QUESTION 138

You administer Windows 8 Enterprise client computers in your company network. You change

settings on a reference computer by using the Windows Firewall with Advanced Security tool. You

want to apply the same settings to other computers. You need to save the Windows Firewall with

Advanced Security configuration settings from the reference computer. You also need to be able

to import the configuration settings into a Group Policy object later. What should you do?

 

  1. Run the netsh advfirewall export c:settings.xrnl command.

  2. Run the netsh advfirewall export c:settings.txt command.

  3. Run the netsh advfirewall export c:settinqs.wfw command.

  4. Run the netsh firewall export c:settings.xml command.

 

Correct Answer: C

 

 

QUESTION 139

You administer Windows 8 Pro computers in your company network. A server named Server1

runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections. A

remote user requires access to files on Server1. You need to prevent the user from downloading

any files from Server1 to his local computer. Your solution must ensure that the user can read the

files on Server1. What should you do?

 

  1. Create a new VPN connection. Disable local drive mappings.

  2. Create a new Remote Desktop connection.

  3. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.

  4. Create a new Remote Desktop connection. Set the Local Computer policy to Disable

clipboard redirection for Remote Desktop Services.

 

Correct Answer: C

 

 

QUESTION 140

A company has 10 client computers that run Windows 8. An employee updates a device driver on

her computer and then restarts the computer. Windows does not start successfully. You start the

computer in Safe Mode. You need to identify the most recently installed driver and gather the

maximum amount of information about the driver installation. What should you do?

 

  1. In Device Manager, run a scan for hardware changes.

  2. In the Event Viewer console, display the Hardware Events log.

  3. In the Programs and Features Control Panel item, display the installed updates.

  4. Display the contents of the Windowsinfsetupapi.dev.log file.

 

Correct Answer: D

 

Instant Access to Download Latest Complete Collection of Microsoft MCSA 70-687 Real Exam

Try Microsoft MCSA 70-687 Free Demo