Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ON70-687

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
70-687

Description:
Simulado 70-687

Author:

(Other tests from this author)

Creation Date:
17/11/2015

Category:
Computers

Number of questions: 42
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Portable client computers no longer connect to the corporate wireless network. You need to ensure that when the corporate wireless network is available, the computers always connect to it automatically. Which two actions would achieve the goal? (Each correct answer presents a complete solution. Choose two.) Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the organizational unit that contains the computers. Configure the corporate wireless network as an unmetered network. Configure the corporate wireless network as a preferred network. Manually connect to the corporate wireless network and select the option to connect automatically to that network.
You have a portable computer that runs Windows 8.1. You are creating a backup plan. You have the following requirements: Automatically back up the files in your Documents folder every hour. Ensure that you can recover different versions of the backed-up files. Do not back up the Windows operating system files. You need to configure the computer to meet the requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Create a volume mount point in your Documents folder. Connect an external hard drive to the computer. Schedule a task to create a restore point every hour. Create a recovery drive on drive C. Turn on File History.
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Set the Protection Settings for drive C to On. Restore the data files from the Previous C. Versions tab located in the folder properties. Review the File History backup log. Move the file into a library. .
A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.1. You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.) isoburn BdeHdCfg ImageX bcd boot.
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.) Use the Windows 8.1 online upgrade tool. Use Group Policy to assign the Windows 8.1 installation file to the client computers. Use the Microsoft Deployment Toolkit. Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder. .
You manage client computers that run Windows 7 and Windows 8.1. You are configuring Windows updates for all client computers. You have the following requirements: All client computers must use a specific Windows Server Update Services (WSUS) server for updates. All client computers must check for updates each hour. You need to configure local Group Policy settings to meet the requirements. Which three actions should you perform? (Each answer presents part of the solution. Choose three.) Configure the Automatic Maintenance Activation Boundary policy setting. Configure the Automatic Updates detection frequency policy setting. Enable the Specify intranet Microsoft update service location policy setting. Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation. Enable the Reschedule Automatic Updates scheduled installations policy setting. .
A company has client computers that run Windows 8.1. The company implements the following security requirements: All client computers must use two-factor authentication. At least one authentication method must include exactly four characters or gestures. You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.) PIN Biometric authentication Picture password Microsoft account .
A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers. You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1. Create and configure a collector-initiated subscription. Start the Windows Event Collector service on all computers other than COMPUTER1. Start the Windows Event Collector service on COMPUTER1. Create and configure a source computer¡ªinitiated subscription. Start the Windows Event Log service on all computers other than COMPUTER1. Add COMPUTER1 machine account to the Event Log Readers local group on all other computers. .
A company has client computers that run Windows 8.1. The company implements the following security requirements: All client computers must use two-factor authentication. At least one authentication method must include more than four characters or gestures. You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.) PIN Biometric authentication Picture Password Microsoft Account .
You administer Windows 8.1 client computers in your company network. You receive a virtual hard disk (VHD) file that has Windows 8.1 Pro preinstalled, along with several business applications. You need to configure your client computer to start from either the VHD file or from your current operating system. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) Import the contents of the system store from a file. Export the contents of the system store into a file. Attach the VHD file by using Disk Management. Make the VHD disk bootable. Create a new empty boot configuration data store. Create a new entry in the boot configuration data store. .
You administer a group of 10 client computers that run Windows 8.1. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key. Which two options can you use? (Each correct answer presents a complete solution. Choose two.) Save the recovery key to a file on the BitLocker-encrypted drive. Save the recovery key in the Credential Store. Save the recovery key to SkyDrive. Print the recovery key. .
You administer Windows 8.1 Pro client computers in your company network. You need to configure a backup and recovery solution that meets the following requirements: Recovers the system if it doesn't start. Recovers the system if the hard drive fails. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Turn on File History. Create a storage space. Configure system protection. Create a system repair disk. Create a system image backup. .
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.) Use the Volume Activation Management Tool. Use the Microsoft Deployment Toolkit. Use the Windows 8.1 online upgrade tool. Create a catalog (.clg) file by using Windows System Image Manager (SIM). .
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History is on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Review the File History backup log. Move the file into a library. Restore the data files from the Previous Versions tab located in the folder properties. Set the Protection Settings for drive C to On. .
A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers. You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) Start the Windows Event Collector service on COMPUTER1. Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1. Start the Windows Event Log service on all computers other than COMPUTER1. Create and configure a source computer-initiated subscription. Add the COMPUTER1 machine account to the Event Log Readers local group on all computers. Start the Windows Event Collector service on all computers other than COMPUTER1. Create and configure a collector-initiated subscription. .
You use many Windows Store apps on a computer that runs Windows 8.1. You are planning a performance audit on the computer. You need to establish the volume of data upload from each app over a five-day period. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) On the fifth day, review the upload statistics in Task Manger. Configure Task Manager to save usage data to a file. Configure Task Manager to record data upload from each Windows Store app. On the first day, delete any existing application usage history Open Task Manager and add the Uploads column. .
You are configuring two client computers that run Windows 8.1: A desktop computer named COMPUTER1 and a portable computer named COMPUTER2. You have the following requirements: Store all personal data in a folder named Data on COMPUTER1. Ensure that you can access all personal data from COMPUTER2, even when a network connection is unavailable. Synchronize personal data between the computers twice a day. You need to configure the computers to meet the requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) In Sync Center. configure a schedule for offline files. From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be available offline. From COMPUTER2, map a network driver to the Data folder on COMPUTER1. In Sync Center, set up a new sync partnership. From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be available offline .
A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History is on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Change the File History drive. Review the File History backup log. Move the file into a library. Start the Volume Shadow Copy Service. .
You administer Windows 8.1 client computers in you company network. You deploy an application that requires a specific Windows update to be installed on the computers. You need to verify that the update is installed on specific computers. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two) Run The system update readiness tool Open View updates history Open the Check for updates applet Run the DISM command with the /image and /get-packageinfoswiches Run the DISM command with the /online and /get-packageinfoswiches .
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least amount of administrative effort. Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.) Edit the local Group Policy to configure the Shut Down options. Create a Group Policy object (GPO) that configures the Sleep Management settings. Create a Group Policy object (GPO) that configures the Power Management settings. Link the Group Policy object (GPO) to the organizational unit containing the portable computers. Edit the local Group Policy to configure the Power Management settings. .
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. You need to ensure that only administrators can access removable storage devices on client computers. Which two Group Policy settings should you configure? (Each correct answer presents part of the solution. Choose two.) Enable the Prevent installation of removable devices policy. Disable the Allow only USB root hub connected Enhanced Storage Features policy. Create an AppLocker deny rule with a path condition of %HOT%. Start the Application Identity service. Enable the Allow administrators to override Device Installation Restriction policies policy. .
A company has client computers that run Windows 8.1. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.1. You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.) bcdedit DISM bcdboot ImageX.
You administer Windows 8.1 client computers in your company network. A computer that is used by nonadministrator users has a directory named C:\Folder1. A shared collection of Microsoft Excel files is stored in the C:\Folder directory, with non-administrator users being granted modify permissions to the directory. You discover that some files have been incorrectly modified by a user. You need to determine which user made changes to the directory's folder's files. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy \Audit object access to Failure. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success for the Modify permission. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy \Audit object access to Success. .
A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1 contains computers that run Windows 7. Workgroup2 contains computers that run Windows 8.1. You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers. You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers by using Windows PowerShell Remoting.1 Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.) Install Windows PowerShell 2.0 on the Workgroup1 computers. Run the winrmquickconfig command on the Workgroup2 computers. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM). Run the winrrnquickconfig command on the Workgroup1 computers. On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in Windows Remote Management (WinRM). .
Employees are permitted to bring personally owned portable computers that run Windows 8.1 to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using Windows Mail. An employee's personally owned portable computer is stolen. You need to protect the corporate applications and email messages on the computer. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Prevent the computer from connecting to the corporate wireless network. Disconnect the computer from the management infrastructure. Change the user's password. Initiate a remote wipe. .
A client computer runs Windows 8.1 and has a 1 TB hard disk drive. You install several third-party desktop apps on the computer. The hard disk drive has very little available space. After you install an app update, the computer becomes unresponsive. You have the following requirements: Return the computer and applications to an operational state. Free additional hard disk space. You need to meet the requirements by using the least amount of administrative effort. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Run the Remove everything and install Windows feature. Configure the maximum disk space usage for System Restore to 1%. Configure the maximum disk space usage for System Restore to 5%. Run the Refresh your PC without affecting your files feature. Perform a system restore on the client computer. .
You administer Windows 7 client computers in your company network. The computers are members of an Active Directory Domain Services (AD DS) domain and have 16-bit applications installed. You plan to upgrade all of the computers from Windows 7 to Windows 8.1. You need to ensure that the 16-bit applications will continue to run on Windows 8.1. What are two version of Windows 8.1 that you could use to achieve this goal? (Each correct answer presents a complete of the solution. Choose two.) A. Windows 8.1 Pro (64-bit) Windows 8.1 Enterprise (64-bit) Windows 8.1 Pro (32-bit) Windows RT Windows 8.1 Enterprise (32-bit) .
A company has Windows 8.1 client computers. Users store data files in their user profile libraries. You need to ensure that you can restore data files to any date while minimizing system overhead. Which two actions should you perform? (Each answer presents part of the solution. Choose two.) Enable Storage Spaces. Configure settings to save copies of files daily. Turn on File History. Configure Windows 7 File Recovery. .
A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run an edition of Windows 8.1. The company plans to use the following programs and features on the Windows 8.1 computers: 32- bit and 64-bit software Desktop apps Windows Media Player Storage Spaces You need to identify the installation or upgrade paths that support the programs and features. Which three paths meet the requirements? (Each correct answer presents a complete solution. Choose three.) Attach the VHD file by using Disk Management. Import the contents of the system store from a file. Export the contents of the system store into a file. Make the VHD disk bootable. Create a new empty boot configuration data store. Create a new entry in the boot configuration data store. .
You administer desktop computers in your company network. You are developing User State Migration Tool (USMT) procedures. You need to ensure that the files located in C:\projects are included in the migration package. What should you do? Option A Option B Option C Option D.
A company has Windows 8.1 client computers. A user stores files in multiple locations. You need to determine which of the locations will be included in File History. Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.) Correct Answer: ABE Public Documents and Public Pictures Contacts, Desktop, and Favorites All system files C:\Users and C:\ProgramData My Documents and My Pictures Desktop and Recycle Bin .
A company has 10 client computers that run Windows 7 . All client computers have the same hardware configuration. The hardware configuration includes custom hardware components manufactured by the company. The computer hard drives are configured as shown in the Disk Management window exhibit. (Click the Exhibit button.) The company plans to upgrade the client computers to Windows 8.1. You need to test hardware compatibility with Windows 8.1 on one client computer and leave the existing Windows 7 installation intact. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Insert the Windows 8.1 installation media into the computer, and then run the Setup program. Shrink the current hard drive partition, and then create a new partition for the Windows 8.1 installation. Change the hard drive to a dynamic disk and create a new dynamic volume. Start the computer from the Windows 8.1 installation media and then select the Custom installation option. .
A company has client Windows Vista and Windows 8.1. You need to ensure that the client computers can share local resources. Which two actions should you perform on the client computers? (Each correct answer presents part of the solution. Choose two.) Disable IPv6. Enable network discovery. Configure IPSec. Enable IPv6. Configure the Windows Firewall. .
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All client computers are shared. Employees can log on to any client computer by using individual accounts. The company implements a new security policy. You have the following requirements: Ensure that each employee can log on to all computers by using his or her account. Ensure that employees can reset their credentials from any client computer. You need to choose authentication methods that meet the requirements. Which two authentication methods meet the requirements? (Each correct answer presents a complete solution. Choose two.) Active Directory user account Local user account Microsoft account Pin Picture password .
A company has Windows 8.1 client computers. A user stores files in multiple locations. You need to determine which of the locations will be included in File History. Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.) %appdata% Public Documents and Public Pictures My Documents and My Pictures Contacts, Desktop, and Favorites C:\Program Files All user profile folders .
You manage Windows 7 and Windows 8.1 client computers that run. You are configuring Windows updates for all client computers. You have the following requirements: Ensure that all client computers check for updates twice a day, Install all critical and available updates, including updates that require a restart, each day. If critical updates are installed, restart client computers at 11:00 P.M. You need to configure local Group Policy settings to meet the requirements. Which three actions should you perform? (Each answer presents part of the solution. Choose three.) A. Enable the Reschedule Automatic Updates scheduled installations policy setting. B. Configure the Automatic Maintenance Activation Boundary policy setting. C. Enable the Specify intranet Microsoft update service location policy setting. D. Configure the Automatic Updates detection frequency policy setting. E. Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation. .
A company has Windows 8.1 client computers. The company develops a Windows Store app but does not publish it to the Windows Store. You need to side load the Windows Store app on all client computers. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Run the get-appxpackage Windows PowerShell cmdlet. Run the add-appxpackage Windows PowerShell cmdlet. Enable the Allow all trusted applications to install Group Policy setting. Enable the Allow installation of desktop items Group Policy setting. Run the msiexec command. .
You are the network administrator for Contoso.com and are creating an image for a Windows 8.1 implementation for all of your users. You find out that an application your company has used for many years is not compatible with Windows 8.1 . It has always worked on your Vista computers with SP2. The application requires administrator privileges. You need to configure the correct settings so that the application can run on Windows 8.1. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Using the Application Compatibility toolkit run the Windows Vista Compatibility Evaluator for Windows 8.1, and select the Service Pack 2 option. Modify the User Account Control Settings by adjusting the slider to Never Notify. Assign the application to Run as administrator on the Security tab of the application executable file properties. Using the Compatibility Troubleshooter, check Run this application in compatibility mode for and select Vista ( Service Pack 2). Select Run this program as an administrator in the Compatibility Troubleshooter. .
You provide IT support for a small business. A member of the team needs the ability to use Remote Desktop and VPN to access a desktop computer from a laptop when traveling. This desktop computer is running Windows 8.1 Pro, while the laptop is running Windows 7 Professional. You need to set up a secure Remote Desktop connection on the desktop computer. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Require Network Level Authentication. Allow remote connections. Disable Remote Assistance connections. Make the user account a standard user. .
You are a desktop administrator responsible for migrating Windows Vista computers to Windows 8.164-bit. Each computer has a 20GB hard drive, 800MHz (x54) processor, and 512 MB of system memory. You need to upgrade the computers so they can run Windows 8.1, 64-bit, Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) Upgrade system memory to 2 GB. Upgrade system memory to 1 GB. Add a processor that is 1 Ghz or faster. Increase the hard drive size to 50 GB .
You are the PC Support Specialist for Contoso, Ltd. You are configuring Windows 8.1 so that you can create an image. An additional web browser is installed on the image. You need to ensure that Internet Explorer 10 for the Desktop is the default web browser. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.) Tap the tile of another web browser on the Start Menu and tap the Unpin from start option. On the Security tab of Internet options, click Reset all zones to default level. Under Set program access and computer defaults, select Default Programs, then choose Microsoft Windows. In Default Programs, associate the .htm and .html files with Internet Explorer. Go to Programs and Features in Control Panel and set Internet Explorer as the default application. .
A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run an edition of Windows 8.1. The company plans to use the following programs and features on the Windows 8.1 computers: 32- bit and 64-bit software Desktop apps Windows Media Player Storage Spaces You need to identify the installation or upgrade paths that support the programs and features. Which three paths meet the requirements? (Each correct answer presents a complete solution. Choose three.) Purchase hardware with Windows RT pre-installed. Perform a clean installation of Windows RT. Perform a clean installation of Windows 8.1 Pro. Perform a clean installation of Windows 8.1. Upgrade from Windows 7 Enterprise to Windows 8.1 Enterprise. .
Report abuse Consent Terms of use