Braindump2go New Published 70-687 Exam Dumps 10% Off Ensure 100% Certification Get Or Money Back! (186-200)
Microsoft Exam Center Adds New Questions and Answers Details to Exam 70-687 Recently! Download Latest Free 70-687 Exam Questions and Answers from Braindump2go Now! Pass Your Exam 100%!
Exam Code: 70-687
Exam Name: Configuring Windows 8.1
Drag and Drop Question
A company has client computers that run Windows 7.
Each employee has two client computers: one at work and one at home.
The company plans to deploy Windows 8.1 to all client computers.
You are planning a deployment strategy.
You have the following requirements:
– Minimize deployment time.
– Ensure that the PC Reset and PC Refresh features can be utilized on all work computers.
You need to plan a deployment strategy that meets the requirements.
What should you do? (To answer, drag the appropriate installation method or methods to the correct location or locations in the answer area. Methods may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has an Active Directory Domain Services (AD DS) domain. All company employees work on their personally owned computers, which are not members of the domain. The computers are running Windows XP Home, Windows Vista Business, Windows 7 Home Premium, or Windows 8.1. The company is a volume license subscriber.
The company plans to deploy Group Policies to all computers.
You need to ensure that every employee’s computer is subject to the Group Policies.
What should you do first?
A. Join all the computers to the same homegroup.
B. Start each computer from a USB flash drive on which you have installed Windows To Go.
C. Start each computer from a USB flash drive on which you have installed BitLocker To Go.
D. Join all the computers to the domain.
http://technet.microsoft.com/en-us/library/jj592685.aspx#BKMK_wtggp Deployment Considerations for Windows To Go
From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB drive. Given that Windows To Go was designed as an enterprise solution, extra consideration was given to the deployment workflows that enterprises already have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs.
Management of Windows To Go using Group Policy
In general, management of Windows To Go workspaces is same as that for desktop and laptop computers. There are Windows To Go specific Group Policy settings that should be considered as part of Windows To Go deployment. Windows To Go Group Policy settings are located at \\Computer Configuration\Administrative Templates\Windows Components\Portable Operating System\ in the Local Group Policy Editor.
The use of the Store on Windows To Go workspaces that are running Windows 8 can also be controlled by Group Policy. This policy setting is located at \\Computer Configuration\Administrative Templates\Windows Components\Store\ in the Local Group Policy Editor.
A company has Windows 8.1 client computers. The company uses Windows BitLocker Drive Encryption and BitLocker Network Unlock on all client computers.
Your need to collect information about BitLocker Network Unlock status.
Which command should you run?
A. Run the BitLockerWizard command.
B. Run the bitsadmin command.
C. Run the manage-bde command.
D. Run the BdeHdCfg command.
BitLocker: How to enable Network Unlock
Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network.
This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware.
Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from hibernation (for example, by Wake on LAN). This can make it difficult to enterprises to roll out software patches to unattended desktops and remotely administered servers.
Network Unlock allows BitLocker-enabled systems with TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works in a similar fashion to the TPM+StartupKey at boot. Rather than needing to read the StartupKey from USB media, however, the key for Network Unlock is composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure session.
Files to gather when troubleshooting BitLocker Network Unlock include:
1. The Windows event logs. Specifically the BitLocker event logs and the Microsoft-Windows-Deployment-Services-Diagnostics-Debug log
2. The DHCP subnet configuration file (if one exists).
3. The output of the BitLocker status on the volume, this can be gathered into a text file using manage-bde -status or Get-BitLockerVolume in Windows PowerShell
4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address
You administer Windows 8.1 computers in your company network.
The security policies of the company require that USB storage devices are allowed only if they are protected with Bitlocker To Go.
You need to prevent users from removing Bitlocker encryption from the USB storage devices.
Which configuration setting should you modify? (To answer, select the appropriate setting in the answer area.)
You connect a portable Windows 8.1 computer to a corporate network by using a VPN connection.
You are unable to access websites on the Internet only when you are using the VPN connection.
You need to ensure that you can access websites when connected to the corporate network.
What should you do?
A. Configure the VPN connection to use only L2TP/IPSec.
B. In the TCP/IPv4 properties of the VPN connection, disable the Use default gateway on remote
C. Configure the VPN connection to use only PPTP.
D. In the TCP/IPv4 properties of the VPN connection, enable the Use default gateway on remote
E. In the TCP/IPv4 properties of the local area connection, disable the Automatic metric setting.
After you use a Virtual Private Network (VPN) connection to log on to a server that is running Routing and Remote Access, you may be unable to connect to the Internet.
This issue may occur if you configure the VPN connection to use the default gateway on the remote network. This setting overrides the default gateway settings that you specify in your Transmission Control Protocol/Internet Protocol (TCP/IP) settings.
To resolve this issue, configure the client computers to use the default gateway setting on the local network for Internet traffic and a static route on the remote network for VPN-based traffic.
To disable the Use Default Gateway on Remote Network setting in the VPN dial-up connection item on the client computer:
Double-click My Computer, and then click the Network and Dial-up Connections link.
Right-click the VPN connection that you want to change, and then click Properties. Click the Networking tab, click Internet Protocol (TCP/IP) in the Components checked are used by this connection list, and then click Properties. Click Advanced, and then click to clear the Use default gateway on remote network check box.
Click OK, click OK, and then click OK.
You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer.
Your solution must ensure that the user can read the files on Server1.
What should you do?
A. Create a new VPN connection. Disable local drive mappings.
B. Create a new VPN connection. Disable offline files.
C. Create a new Remote Desktop connection.
Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
D. Create a new Remote Desktop connection.
Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.
Device and Resource Redirection
Policy settings in this node control access to devices and resources on a client computer in Terminal Services sessions.
Do not allow drive redirection
This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Services session (drive redirection).
By default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My Computer in the format <driveletter> on <computername>. You can use this policy setting to override this behavior. If you enable this policy setting, client drive redirection is not allowed in Terminal Services sessions.
If you disable this policy setting, client drive redirection is always allowed. If you do not configure this policy setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal Services Configuration tool.
A company has an Active Directory Domain Services (AD DS) domain.
The company has 20 Windows 8.1 tablet PCs that are connected to the domain.
You need to configure an authentication method that simplifies the process of logging on to the tablet PCs and maximizes the security.
Which authentication method should you configure?
A. Active Directory user account
C. Picture password
D. Microsoft account
Connect your Microsoft account to your domain account
You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other Microsoft account settings that you see on your home PC. You’ll also be able to use Microsoft account services from your domain PC without signing in to them individually.
Joining a domain, workgroup or homegroup
You install a new hard drive as drive D on a Windows 8.1 computer.
The computer is shared by two users.
You need to prevent either user from using more than half the available space on drive D of the computer.
What should you do?
A. Reconfigure drive D and create two volumes of equal size.
B. Create a share for each user on drive D.
C. Configure quota management on drive D.
D. Configure Storage Spaces on drive D.
Disk quotas are set at disk level (not folder/files level) and take properties and go to the Quota tab.
By default it is disabled, you enable it by checking Enable quota management and then specify options such if it should only be warning/logging or an actual consequence when you reach the quota such as checking Deny disk space to users exceeding quota limit.
Disk Quota is limited to only one per disk and one level for all users, running Windows Server 2012 you can set different limit per users.
Drag and Drop Question
You have a Windows 8.1 computer.
The drive on which your File History is stored is almost full.
You need to move the File History storage location to another drive.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
A company has 10 Windows 8.1 (64-bit) client computers.
You plan to create backup resources to allow the recovery of Windows 8.1 on any of the client computers.
You need to ensure that you can recover the computers from bootable media.
What should you do?
A. Turn on File History.
B. Create a new pool and storage space.
C. Run the Remove everything and install Windows feature.
D. Run the bcdboot command.
E. Run the recdisc command.
A company has Windows 8.1 client computers.
Employees use multiple Windows Store apps on the computers.
An employee installs a legacy app on his portable computer and then experiences problems with the computer. He installs two additional legacy apps and the problems increase.
You need to return the computer to its default state and retain all user data and Windows Store apps.
What should you do?
A. Run the Remove everything and install Windows feature.
B. Perform a system restore to the most recent restore point.
C. Use Windows 7 File Recovery to restore all Windows system files.
D. Run the Refresh your PC without affecting your files feature.
How to refresh, reset, or restore your PC
If you think an app or driver that you recently installed caused problems with your PC, you can restore Windows back to an earlier point in time, called a restore point. System Restore doesn’t change your personal files, but it might remove recently installed apps and drivers.
A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.)
A. Public Documents and Public Pictures
B. Contacts, Desktop, and Favorites
C. All system files
D. C:\Users and C:\ProgramData
E. My Documents and My Pictures
F. Desktop and Recycle Bin
* File History has a predefined set of items that it backs up automatically: all your libraries (both default libraries and custom libraries you created), the Desktop, your Contacts, Internet Explorer favorites and the SkyDrive.
* Library example:
You administer Windows 8.1 client computers in your company network. The company has an Active Directory Domain Services (AD DS) domain. The network uses a DHCP server.
You want to assign a static dynamic host configuration protocol (DHCP) reservation for a client computer. You need to identify the media access control (MAC) address of the client computer.
Which command should you use?
A. ipconfig /allcompartments /all
B. ipconfig /renew
C. ipconfig /all
D. ipconfig /flushdns
You administer Windows 8.1 client computers in your company network.
The computers belong to an Active Directory Domain Services (AD DS) domain and have Windows Firewall enabled. All of the computers are connected to the Internet.
You ping one of the desktops, which has an IP Address of 10.4.4.4, but you receive the message “Request timed out.”
You need to configure the desktop to reply on ping requests.
From the Windows Firewall with Advanced Security window, which inbound rule should you modify? (To answer, select the appropriate inbound rule in the answer area.)
Guaranteed 100% Microsoft 70-687 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-687 Dumps PDF & VCE for Instant Download!