OFFER Free Microsoft 70-687 PDF and VCE Exam Dumps 181-190
Exam Code: 70-687
Exam Name: Configuring Windows 8.1
A company has a Microsoft Software Assurance with Volume Licensing agreement.
All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer.
Windows does not start successfully.
You establish that the updated driver is the cause of the problem.
You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?
A. Use the Windows 8.1 PC Reset feature.
B. Reset the computer to the manufacturer’s system image.
C. Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.
D. Use the File History feature.
DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP).
MDOP is part of Microsoft Software Assurance.
From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you include when you create the DaRT 8.0 recovery image.
Exploring the DaRT tools
The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool when a hotfix or service pack is suspected in preventing the operating system from starting.
You administer an installation of Windows 8.1 that runs as a virtual machine.
The virtual machine has one 60-GB fixed size virtual hard disk with a single partition assigned as Volume C.
The virtual machine runs out of disk space.
You increase the size of the virtual hard disk file to 200 GB to support an application demand for increased storage on Volume C.
You discover that Volume C is still 60 GB in File Explorer of the virtual machine.
You need to ensure that Volume C is configured to use 200 GB.
What should you do?
A. Configure the Virtual Disk type from fixed size to dynamic disk.
B. From Disk Management of the virtual hard disk, run the Extend the volume action task.
C. From Disk Management of the host computer, extend the Volume C.
D. Create a new storage space of Simple (no resiliency) type.
Expanding a virtual hard disk
Expanding a virtual hard disk increases the disk capacity of the virtual hard disk. However, to make the additional disk space available to the virtual machine requires some extra configuration. From the perspective of the virtual machine, the virtual hard disk expansion is reflected under Disk Manager as an unallocated disk volume. The size of this unallocated volume is the difference between the original virtual hard disk and the nominated size of the expanded virtual hard disk.
To make the full virtual hard disk capacity available to the virtual machine, you need to use Disk Manager to expand the volume within the virtual machine. You can do this by using the Extend Volume Wizard within Disk Manager. After this is complete, you will be able to view the expanded disk capacity in the operating system of the virtual machine.
You administer client computers in your company network.
The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?
A. Set the Allow all trusted applications to install group policy to Enabled.
B. Set the Turn off the Store application group policy to Enabled.
C. Install and run the Microsoft Deployment Toolkit.
D. Install and run the Windows App Certification Kit.
Currently, the Consumer Preview and Windows Server 8 Beta are classified as "enterprise sideloading enabled." This means that when a PC is domain joined, it can be configured to accept non-Windows Store apps from their IT admin. Moving forward, this functionality to install non-Windows Store Metro style apps will be available for Windows 8 Enterprise Edition and Windows 8 Server editions.
On an enterprise sideloading enabled edition, the IT admins needs to verify:
The PC is domain joined.
The group policy is set to "Allow all trusted apps to install". The app is signed by a CA that is trusted on the target PCs
Note: While the Windows Store will be a great way to deploy apps to business customers, there are apps that IT admins will want to distribute directly to the end-users. This option makes sense for custom and proprietary line-of-business (LOB) apps, or enterprise software purchased directly from an ISV.
You administer Windows 8.1 Enterprise client computers in your company network.
You need to prevent users from installing applications published by a specific publisher in Windows Store.
Which type of AppLocker rule should you create?
A. Packaged app
B. Windows Installer
Packaged Apps and Packaged App Installer Rules in AppLocker
Commonly known as Windows apps, packaged apps can be installed through the Microsoft AppStore or can be side loaded using the Windows PowerShell cmdlets if you have an Enterprise license. Packaged apps can be installed by a standard user unlike some desktop applications that sometimes require administrative privileges for installation. In this topic, desktop applications refer to Win32 apps that run on the classic user desktop.
In Windows Server 2012 and Windows 8, AppLocker enforces rules for packaged apps separately from desktop applications. A single AppLocker rule for a packaged app can control both the installation and the running of an app. Because all packaged apps are signed, AppLocker supports only publisher rules for packaged apps.
A publisher rule for a packaged app is based on the following attributes of the app:
How manage Published (a.k.a Metro) Apps in Windows 8 using Group Policy
Windows 8 is coming REALLY SOON and of course one of the big new things to computer with that is the new (Metro) Packaged Apps that run in the start screen. However these apps are very different and do not install like traditional apps to a path or have a true "executable" file to launch the program. Of course enterprises need a way to control these packaged apps and therefore Microsoft has added a new feature Packaged Apps option to the AppLocker feature.
An administrator can use this feature to only allow certain apps to download from the Windows App Store and/or use it to control what inbuilt Packaged Apps are allowed to run.
You are troubleshooting a Windows 8.1 computer. The computer is not joined to a domain.
You are unable to change any of the advanced Internet options, which are shown in the Advanced Internet Options exhibit. (Click the Exhibit button.)
You need to ensure that you can change the advanced Internet options.
What should you do?
A. Use the Group Policy Object Editor.
B. Use the Internet Explorer Administration Kit (IEAK).
C. Run Internet Explorer and use the Settings charm to change options.
D. Run the iexplore -k command.
Open the Local Group Policy Editor
To open the Local Group Policy Editor from the command line Click Start , type gpedit.msc in the Start Search box, and then press ENTER .
Group Policies in Internet Explorer 9
Group Policy provides a secure way to control Microsoft® Windows® Internet Explorer® 9 configurations.
Drag and Drop Question
A company has client computers that run Windows 7.
Each employee has two client computers: one at work and one at home.
The company plans to deploy Windows 8.1 to all client computers.
You are planning a deployment strategy.
You have the following requirements:
– Minimize deployment time.
– Ensure that the PC Reset and PC Refresh features can be utilized on all work computers.
You need to plan a deployment strategy that meets the requirements.
What should you do? (To answer, drag the appropriate installation method or methods to the correct location or locations in the answer area. Methods may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
A company has an Active Directory Domain Services (AD DS) domain. All company employees work on their personally owned computers, which are not members of the domain. The computers are running Windows XP Home, Windows Vista Business, Windows 7 Home Premium, or Windows 8.1. The company is a volume license subscriber.
The company plans to deploy Group Policies to all computers.
You need to ensure that every employee’s computer is subject to the Group Policies.
What should you do first?
A. Join all the computers to the same homegroup.
B. Start each computer from a USB flash drive on which you have installed Windows To Go.
C. Start each computer from a USB flash drive on which you have installed BitLocker To Go.
D. Join all the computers to the domain.
http://technet.microsoft.com/en-us/library/jj592685.aspx#BKMK_wtggp Deployment Considerations for Windows To Go
From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB drive. Given that Windows To Go was designed as an enterprise solution, extra consideration was given to the deployment workflows that enterprises already have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs.
Management of Windows To Go using Group Policy
In general, management of Windows To Go workspaces is same as that for desktop and laptop computers. There are Windows To Go specific Group Policy settings that should be considered as part of Windows To Go deployment. Windows To Go Group Policy settings are located at \\Computer Configuration\Administrative Templates\Windows Components\Portable Operating System\ in the Local Group Policy Editor.
The use of the Store on Windows To Go workspaces that are running Windows 8 can also be controlled by Group Policy. This policy setting is located at \\Computer Configuration\Administrative Templates\Windows Components\Store\ in the Local Group Policy Editor.
A company has Windows 8.1 client computers. The company uses Windows BitLocker Drive Encryption and BitLocker Network Unlock on all client computers.
Your need to collect information about BitLocker Network Unlock status.
Which command should you run?
A. Run the BitLockerWizard command.
B. Run the bitsadmin command.
C. Run the manage-bde command.
D. Run the BdeHdCfg command.
BitLocker: How to enable Network Unlock
Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network.
This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware.
Without Network Unlock, operating system volumes protected by TPM+PIN protectors require a PIN to be entered when a computer reboots or resumes from hibernation (for example, by Wake on LAN). This can make it difficult to enterprises to roll out software patches to unattended desktops and remotely administered servers.
Network Unlock allows BitLocker-enabled systems with TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works in a similar fashion to the TPM+StartupKey at boot. Rather than needing to read the StartupKey from USB media, however, the key for Network Unlock is composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure session.
Files to gather when troubleshooting BitLocker Network Unlock include:
1. The Windows event logs. Specifically the BitLocker event logs and the Microsoft-Windows-Deployment-Services-Diagnostics-Debug log
2. The DHCP subnet configuration file (if one exists).
3. The output of the BitLocker status on the volume, this can be gathered into a text file using manage-bde -status or Get-BitLockerVolume in Windows PowerShell
4. Network Monitor capture on the server hosting the WDS role, filtered by client IP address
You administer Windows 8.1 computers in your company network.
The security policies of the company require that USB storage devices are allowed only if they are protected with Bitlocker To Go.
You need to prevent users from removing Bitlocker encryption from the USB storage devices.
Which configuration setting should you modify? (To answer, select the appropriate setting in the answer area.)
If you want to pass Microsoft 70-687 exam successfully, donot missing to read latest lead2pass Microsoft 70-687 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.
Why Choose Lead2pass?
If you want to pass the exam successfully in first attempt you have to choose the best IT study material provider, in my opinion, Lead2pass is one of the best way to prepare for the exam.
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|