Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 91-100




You administer Windows 8.1 Pro client computers in your company network.


You need to configure a backup and recovery solution that meets the following requirements:


Recovers the system if it doesn’t start.

Recovers the system if the hard drive fails.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



Turn on File History.


Create a storage space.


Configure system protection.


Create a system repair disk.


Create a system image backup.


Answer: DE


Restore Windows 8 with System Image Recovery


What you need

In order to run the System Image Recovery tool as I’ll describe in this article, you’ll need to have created a Recovery Drive as I showed you in the article Create a Recovery Drive in Windows 8. You’ll also need a set of optical discs or on an external drive on which to create a system image of your hard disk.


Launching System Image Recovery

In the case of a hard drive failure, you can restore Windows 8 by running the System Image Recovery tool from the Recovery Drive.




A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro.


You need to choose the methods that do not require the manual entry of a product key during the upgrade.


Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)



Use the Volume Activation Management Tool.


Use the Microsoft Deployment Toolkit.


Use the Windows 8.1 online upgrade tool.


Create a catalog (.clg) file by using Windows System Image Manager (SIM).


Answer: AB


Volume Activation Management Tool (VAMT) Overview

Applies To: Windows 8, Windows 8.1


The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows® Microsoft® Office, and select other Microsoft products volume and retail-activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:


Windows® 7

Windows® 8

Windows 8.1

Windows Server 2008 R2

Windows Server® 2012

Windows Server 2012 R2 deployment-for-windows-server-2012-or-windows-8-using-microsoft-deployment-toolkit-mdt.aspx

Getting Started with Windows Deployment for Windows Server 2012 or Windows 8 Using Microsoft Deployment Toolkit (MDT)


Use the Microsoft Deployment Toolkit (MDT) to accelerate and automate deployments of Windows 8, Windows Server 2012, Windows 7, Office 2010, and Windows Server 2008 R2.


Here’s a table from the MDT .chm file that lists the available wizard pages and which properties need to be configured in order to skip each wizard page:






You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network.


You add a new Windows 8.1 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8.1 computer from other computers located outside the perimeter network.


You need to use the Windows 8.1 computer to manage the Windows servers in the perimeter network.


What should you do?



Add the Windows 8.1 computer as a Trusted Host to the servers.


Enable PowerShell Remoting on the Windows 8.1 computer.


Add the Windows 8.1 computer as a Trusted Host to computers outside the perimeter network.


Install Remote Server Administration Tools for Windows 8.1 (RSAT) on the Windows 8.1 computer.


Answer: D


Remote Server Administration Tools for Windows 8


Remote Server Administration Tools for Windows 8 enables IT administrators to manage roles and features that are installed on computers that are running Windows Server 2012 from a remote computer that is running Windows 8.


Further Information:

Perimeter networks


A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ (Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when deciding where to place systems and services. Enable-PSRemoting


The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.


On Windows Server ® 2012, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled.


You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed.

Enable and Use Remote Commands in Windows PowerShell


The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS- Management in Windows.


In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer might not be able to authenticate your credentials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the local computer in WinRM.




A company has 10 portable client computers that run Windows 8.1.


The portable client computers have the network connections described in the following table.




None of the computers can discover other computers or devices, regardless of which connection they use.


You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections.


What should you do on the client computers?



For the CorpWired connection, select yes, turn on sharing and connect to devices.


Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the HotSpot connection, select No, don’t turn on sharing or connect to devices.


For the CorpWifi connection, select yes, turn on sharing and connect to devices.


Turn on network discovery for the Public profile.


Turn on network discovery for the Private profile.


Answer: B


The CorpWifi and HotSpot connections are already set properly. The private profile has network discovery enabled by default. So we need to deal with the CorpWired without breaking anything else.

CorpWired connection is already public so it doesn’t make sense to set it again to public. Also, enabling network discovery for the Public profile is a dangerous practice. Ideally it would be to set the CorpWired connection to private. However, since this is not one of the available options, turning on sharing basically does the same thing.

Simple Questions: What are Network Locations in Windows 7 & Windows 8?


Network Locations in Windows 8: Private vs Public

Windows 8 further simplifies the concept of network locations, reducing them to only two choices:

Private network – This profile should be applied to your home network or to the network from your workplace. When this profile is assigned to a network connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections are allowed.

Public network – This profile is also named Guest. It is the more secure of the two because network discovery is turned off as well as file and printer sharing. This profile should be used when connecting to public networks you don’t trust, like those found in airports, coffee shops, bars, hotels, etc.

There’s also a third network location profile named Domain network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings applied to this profile are those set by your company and you cannot change them.

How to Change a Network Location in Windows 8



Let’s get back to the Networks list: right click or press and hold your active network connection. A menu is displayed with several options, depending on the network type.




Click or tap “Turn sharing on or off” (the only option common to both wired and wireless networks). For wired networks you will see less options being displayed din the contextual menu.


You are asked if you want to turn on sharing between PCs and connect to devices on this network.




Selecting “No, don’t turn on sharing or connect to devices” is the equivalent of applying the Public profile. Selecting “Yes, turn on sharing and connect to devices” is the equivalent of applying the Private profile.


Make your choice and the appropriate settings are applied.




You administer Windows 8.1 Pro laptops in your company network. Your network has a

Remote Access Server (RAS) in a perimeter network that runs Windows Server 2012.


All laptop users have a PPTP VPN configured on their computer. Users report that their VPN disconnects when they switch between WLAN and WWAN networks.


You need to ensure that if a VPN is disconnected, the laptop will automatically attempt to reconnect.


What should you do?



Create a new VPN connection, and the open Local Computer Policy and define Files not cached policy.


Run the netsh.exe command and include the wlan parameter


Create a new VPN connection, and disable offline files


Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services.

Answer: C




You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.


Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.


You need to ensure that all employees in the HR department can use Timesheet on their new computers.


What should you do?



Use a Microsoft account to log on to each computer.


Use a local account to log on to each computer.


Activate the side loading product key on each computer.


Install and run the Windows App Certification Kit.


Answer: C


Deploying enterprise apps


Preparing your PCs


Windows Server 2012 and Windows 8 Enterprise editions are classified as “enterprise sideloading enabled.” This means that the PCs are ready to receive the apps that you deploy outside of the Windows Store. To make sure a PC is ready, verify that:

The PC is domain joined.

The group policy is set to Allow trusted apps to install.


If you are deploying apps to Windows 8 Pro, Windows RT, or Windows 8 Enterprise, you can configure them for sideloading apps by:

Activating the product key for enterprise sideloading on each PC. Setting the group policy to Allow trusted apps to install.


Further Information:

Try It Out: Sideload Windows Store Apps


By now, you are familiar with Windows Store apps. There are some pretty cool ones available in the store, and publishers are adding more every week. A great thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish them through the Windows Store since that would make them publically available. Instead, you can sideload LOB apps. Sideloading simply means installing a Windows Store app without publishing it in and downloading it from the store. You install it directly.


Verify the Requirements

There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8 Enterprise:

The computer running Windows 8 Enterprise must be joined to the domain. You must enable the “Allow all trusted apps to install” Group Policy setting. The app must be signed by a certificate that is chained to a trusted root certificate. In many cases, the only thing you will have to do is enable the policy setting. Your computers running Windows 8 Enterprise are already joined to the domain, and your developers will sign the app.


Sideload the App for a User

As promised when we started this article, sideloading the sample app is no more difficult than running a few commands in Windows PowerShell. In fact, the first command should not really count, as it just imports the AppX module into Windows PowerShell.


Sideload the App for All Users

DISM is a command-line tool that you can use to service a Windows image — online or offline.

You can use DISM to provision a Windows Store app in an online Windows image for all users who share the computer. To do that, you use the Add-ProvisionedAppxPackage option.


Use a Sideloading Product Key

Earlier in this article, we listed the requirements for sideloading Windows Store apps. The computer must be running Windows 8 Enterprise. It must be joined to the domain, and you must enable the policy setting “Allow all trusted apps to install.” This is great if in a typical enterprise scenario where you use the Enterprise editions and join computers to the domain. What about increasingly common Bring Your Own Device (BYOD) scenarios, where Windows RT devices and computers running Windows 8 Pro are more common; and devices are not always joined to the domain?


You can enable sideloading for these additional scenarios by installing a sideloading product key on the computers.



We hope that experiencing how to sideload Windows Store apps firsthand showed you how simple the process really is. You enable sideloading on computers running Windows 8 Enterprise by simply joining them to the domain and enabling the “Allow all trusted apps to install” policy setting. You can enable app sideloading in the scenarios that Table 1 describes by using a sideloading product key. To sideload an app for an individual user, you use the add-appxpackage cmdlet in Windows PowerShell, and to provision an app for all users, you use the Add-ProvisionedAppxPackage DISM option.




Figure 3. Sideloading Requirements

Windows App Certification Kit


Before you submit your app for certification and listing in the Windows Store, use the Windows App Certification Kit to test your app and make sure it’s ready to go.








A company has client computers that run Windows 8.1. Finance department employees store files in the C:Finance directory. File History is on.


A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.


You need to establish why the file history is not available and ensure that it is available in the future.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



Review the File History backup log.


Move the file into a library.


Restore the data files from the Previous Versions tab located in the folder properties.


Set the Protection Settings for drive C to On.


Answer: AB



File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.

Since File History is already on we can assume the drive doesn’t need to be changed. So we should review the log and move the file to a library.









You administer Windows 8.1 Pro computers in your company network.


A user informs you that he wants to use a picture password on his computer.


You need to configure a picture password with a custom picture for the user.


Which prerequisites should you comply with for each element in order to configure the required picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct element or elements in the answer area. Each prerequisite may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
















You administer Windows 8.1 Enterprise (64-bit) computers in your company network. For some applications, some computers run a 32-bit version of the application, and other computers run a 64-bit version of the application.


You want to distribute a package that contains updates for the 32-bit applications only.


You need to determine if a particular computer is running 32-bit or 64-bit versions of the applications.


From the Select columns window, which column should you add to Task Manager? (To answer, select the appropriate column name in the answer area.)









































You install Windows 8.1 Enterprise on new laptops that will be shipped to remote users in the sales department of your company. You create new VPN connections on the laptops.


Your company security policy requires that the maximum allowed network outage time for the VPN connection should be less than 10 minutes.


You need to configure the required timeout.


Which protocol should you use? (To answer, configure the appropriate option or options in the answer area.)









Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…