New Updated Microsoft MCSA 70-689 Real Exam Questions and Answers Download 31-40

Ensurepass

QUESTION 31

You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. You are planning to add a guest wireless network. You need to collect information about nearby wireless networks, including their encryption methods. Which command should you include in the batch file?

 

A.

Netsh wlan set autoconfig enabled=no interface=”Wireless Network Connection”

B.

ipconfig /allcompartments

C.

netsh wlan show networks

D.

netstat -a

E.

Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘

F.

netsh wlan show hostednetwork

 

Correct Answer: C

 

 

QUESTION 32

DRAG DROP

You administer desktop computers in your company’s research department. The computers run Windows 8 Enterprise and are members of a workgroup. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Security. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image002

 

Correct Answer:

clip_image004

 

 

QUESTION 33

You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLOcker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.

Ask the user for his or her logon name.

B.

Ask the user for a recovery key ID for the protected drive.

C.

Ask the user to run the manage-bde -protectors -disable e: command.

D.

Ask the user for his or her computer name.

 

Correct Answer: BD

 

 

QUESTION 34

You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

 

A.

From Disk Management, create a new spanned volume.

B.

From PowerShell, run the Add-PhysicalDisk cmdlet.

C.

From Diskpart, run the Convert MBR command.

D.

From PowerShell, run the New-VirtualDisk cmdlet.

E.

From Disk Management, convert all of the 3-terabyte disks to GPT.

F.

From Disk Management, bring all disks offline.

 

Correct Answer: AE

 

 

QUESTION 35

You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do?

 

A.

Run the winrm quickconfig command on the desktop computers.

B.

Run the winrm quickconfig command on your computer.

C.

Enable Remote Desktop on the desktop computers.

D.

Install Remote Server Administration Tools (RSAT) on your computer.

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

QUESTION 36

DRAG DROP

You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.

 

You create a folder named C:Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)

 

clip_image006

 

You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)

 

clip_image008

 

You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project.

 

You need to assign the required permissions.

 

Which three actions should you perform in se
quence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image010

 

Correct Answer:

clip_image012

 

 

QUESTION 37

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?

 

A.

Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.

B.

Change the default sharing configuration for the shared folders on the HomeGroup computers.

C.

Reset your account password to match the HomeGroup password.

D.

Adjust the time settings on the new comp
uter to match the time settings of the HomeGroup computers.

 

Correct Answer: D

 

 

QUESTION 38

DRAG DROP

You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image014

 

Correct Answer:

clip_image016

 

 

QUESTION 39

You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?

 

A.

Publish the application through an intranet web site.

B.

Publish the application to Windows Store.

C.

Digitally sign the application by using a trusted certificate, and then update the default App Package Deployment policy on all computers.

D.

Obtain a public certificate for the web server, and then configure the web site to use SSL.

E.

Change the default Applications Control Policies on the client computers.

F.

Change the default Software Restriction Policies on the client computers.

G.

Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.

H.

Publish the application through a public file transfer protocol (FTP) site.

 

Correct Answer: B

 

 

QUESTION 40

DRAG DROP

Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed. You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop. You need to create an image and deploy it to the 25 new laptops. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

clip_image018

 

Correct Answer:

clip_image020

 

Instant Access to Download Latest Complete Collection of Microsoft MCSA 70-689 Real Exam

Try Microsoft MCSA 70-689 Free Demo