Be Care: PassLeader are providing updated and guaranteed exam braindumps for exam 70-687, we ensure the 70-687 exam questions are the latest, and will help you passing exam easily. Visit passleader.com and get the free exam vce and pdf dumps with free vce player.
Exam Code: 70-687
Exam Name: Configuring Windows 8.1
A company has 10 portable client computers that run windows 8.1. The portable client computers have the network connections described in the following table:
None of the computers can discover other computers or devices, regardless of which connection they use. You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. What should you do on the client computers?
A. For the CorpWired connection, select Yes, turn on sharing and connect to devices.
B. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the Hotsport connection, select No, don’t turn on sharing or connect to devices.
C. For the CorpWifi connection, select Yes, turn on sharing and connect to devices.
D. Turn on network discovery for the Private profile.
E. Turn on network discovery for the Public profile.
A company has 10 client computers that run Windows 8.1. Employees log on to resources by using multiple accounts. You need to back up the user name and password for each logon account. What should you do on each client computer?
A. Back up each user’s Personal Information Exchange PKCS #12 (.pfx) certificate.
B. Use Credential Manager to save the information to a USB flash drive.
C. Use File History to back up the ntuser.dat file.
D. Run the Export-Certificate Windows PowerShell cmdlet.
You administer Windows 8.1 computers in you company network. All computers include Windows 8.1 compatible trusted platform modele (TPM). You configure a computer that will run a credit processing application. You need to ensure that the computer requires a user to enter a PIN code when starting the computer. Which policy should you configure? (to answer, select the appropriate policy in the answer area.)
A. Allow Secure Boot for Integrity validation
B. Require Additional authentication at startup
C. Allow enhanced PINs for Startup
D. Configure minimum PIN length for startupalocal
A company has client computers that run Windows 8.1. You implement an AppLocker file hash rule that allows an application to run. You then apply a service pack to the application. When users attempt to run the application, the application is blocked by Group Policy. You need to ensure that the application runs. What should you do?
A. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
B. Set the wired network connection to non-metered.
C. Set the wired network connection to metered.
D. Configure the Automatic Maintenance setting.
A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server. All client computers run Windows 8.1 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement. After deploying Windows Updates to the computers, the web application stops responding. You establish that a specific optional update installed by Windows Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable. You need to remove the optional update from one client computer. What should you do?
A. Install and run the Debugging tools for Windows.
B. Clear the SusClientID registry value on the client computer.
C. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Crash Analyzer tool.
D. Run the wuauclt /resetauthorization command on the client computer.
E. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.
A client computer that runs Windows 8.1 has two hard disk drives: a system drive and a data drive. You are preparing to back up the computer prior to installing a developing software product. You have the following requirements:
– The system disk that is part of the backup must be mountable from within Windows.
– The system disk that is part of the backup must be bootable.
– The backup must be viable to restore in the event of a hard disk failure.
– The backup must contain data from both hard disk drives.
You need to select a backup method. Which method should you use?
A. System repair disk
B. Storage pool
C. System image
D. File History
DISM Image Management Command-Line Options. Deployment Image Servicing and Management (DISM.exe) mounts a Windows image (.wim) file or virtual hard disk (.vhd or .vhdx) for servicing. You can also use the DISM image management command to list the image index numbers, to verify the architecture for the image that you are mounting, append an image, apply an image, capture an image and delete an image.
You administer Windows 8.1 client computers in your company network. You receive a virtual hard disk (VHD) file that has Windows 8.1 Pro preinstalled, along with several business applications. You need to configure your client computer to start from either the VHD file or from your current operating system. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Import the contents of the system store from a file.
B. Export the contents of the system store into a file.
C. Attach the VHD file by using Disk Management.
D. Make the VHD disk bootable.
E. Create a new empty boot configuration data store.
F. Create a new entry in the boot configuration data store.
A company has client computers that run Windows 8.1. The client computer systems frequently use IPSec tunnels to securely transmit data. You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?
You are configuring a computer that will be used in a kiosk in a public area. You install a new internal hard drive. You need to protect the computer from starting an unauthorized operating system. What should you do?
A. Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled.
Install Windows 8 Pro 64-bit using UEFI and install it on the internal hard drive.
B. Install Windows 8 Pro 64-bit on the internal hard drive.
Enable BitLocker on the internal hard disk.
C. Partition the internal hard drive as MBR disk.
Install Windows 8 Enterprise 64-bit.
D. Partition the internal hard drive as GPT disk.
Install Windows 8 Pro 64-bit.
A desktop computer that runs Windows 8.1 downloads updates but does not install them. The computer is connected to the corporate network by using a wired network connection. You need to ensure that the computer automatically installs updates. What should you do?
A. Set the wired network connection to non-metered.
B. Configure the Automatic Maintenance setting.
C. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
D. Set the wired network connection to metered.
Automatic Maintenance. Windows depends on execution of inbox and third party maintenance activity for much of its value-add, including Windows Update, and automatic disk defragmentation, as well as antivirus updates and scans. The goal of Automatic Maintenance is to combine all background maintenance activity in Windows and help third-party developers add their maintenance activity to Windows without negatively impacting performance and energy efficiency. Additionally, Automatic Maintenance enables users as well as enterprises to be in control of maintenance activity scheduling and configuration.
Automatic Maintenance. One of the most important maintenance-related improvements in Windows 8 is Automatic Maintenance. This is a new system maintenance service that can be used by Windows components and apps to schedule maintenance activities on the PC in one scheduled window per day.
You administer a group of 10 client computers that run Windows 8.1. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key. Which two options can you use? (Each correct answer presents a complete solution. Choose two.)
A. Save the recovery key to a file on the BitLocker-encrypted drive.
B. Save the recovery key in the Credential Store.
C. Save the recovery key to SkyDrive.
D. Print the recovery key.
You administer Windows 8.1 computers in your company network. You install a new video driver. The computer will not start properly after restart. You are able to enter Safe Mode with Command Prompt. You need to be able to start normally. You also need to ensure that user data is not lost. What should you do?
A. Run the rstrui.exe command.
B. Roll back the driver.
C. Turn on File History.
D. Create a restore point.
You administer Windows 8.1 Pro client computers in your company network. You need to configure a backup and recovery solution that meets the following requirements:
– Recovers the system if it doesn’t start.
– Recovers the system if the hard drive fails.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Turn on File History.
B. Create a storage space.
C. Configure system protection.
D. Create a system repair disk.
E. Create a system image backup.
* In the event that you are unable to start Windows or wish to restore your hard drives to a previous backup you can use the System Image Recovery program from the Windows 7 or Windows 8 Recovery Environment.
* You should create a system repair disk, which can be used to boot your PC and restore it using the system image backup, in the event of a hard drive issue or other hardware failure.
Incorrect C: System protection is a feature that regularly creates and saves information about your computer’s system files and settings. System protection also saves previous versions of files that you’ve modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. They’re also created automatically once every seven days if no other restore points were created in the previous seven days, but you can create restore points manually at any time.
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)
A. Use the Volume Activation Management Tool.
B. Use the Microsoft Deployment Toolkit.
C. Use the Windows 8 online upgrade tool.
D. Create a catalog (.clg) file by using Windows System Image Manager (SIM).
A: Volume Activation Management Tool (VAMT) 2.0 is a managed MMC plug-in. VAMT uses Windows Management Instrumentation (WMI) to configure managed systems. A convenient command line interface (CLI) allows automated, scheduled VAMT tasks without UI interaction. Using the VAMT console, administrators can perform many activation-related tasks on remote computers: Manage product keys obtained from the Volume Licensing Service Center (VLSC) or other sources including retail and Microsoft subscription programs such as MSDN, TechNet and partner programs — and product activations using those keys. Activate remote systems using Key Management Service (KMS), Multiple Activation Key (MAK) or retail activation methods. Perform disconnected proxy activation and reactivation of systems without each system having to connect with Microsoft activation services individually. Assist with license compliance by enabling IT administrators to monitor system license state, including whether systems are licensed and running genuine Windows or Office.
B: Deploy Windows and Office 2010 with Microsoft Deployment Toolkit 2012 Update 1. MDT is the recommended process and toolset for automating desktop and server deployment. MDT provides you with the following benefits: Unified tools and processes, including a set of guidance, for deploying desktops and servers in a common deployment console. Reduced deployment time and standardized desktop and server images, along with improved security and ongoing configuration management.
You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network. You add a new Windows 8.1 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8.1 computer from other computers located outside the perimeter network. You need to use the Windows 8.1 computer to manage the Windows servers in the perimeter network. What should you do?
A. Add the Windows 8.1 computer as a Trusted Host to the servers.
B. Enable PowerShell Remoting on the Windows 8.1 computer.
C. Add the Windows 8.1 computer as a Trusted Host to computers outside the perimeter network.
D. Install Remote Server Administration Tools for Windows 8.1 (RSAT) on the Windows 8.1 computer.
Remote Server Administration Tools for Windows 8. Remote Server Administration Tools for Windows 8 enables IT administrators to manage roles and features that are installed on computers that are running Windows Server 2012 from a remote computer that is running Windows 8.
Perimeter networks. A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ (Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when deciding where to place systems and services.
Enable-PSRemoting. The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology. On Windows Server® 2012, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled. You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed.
Enable and Use Remote Commands in Windows PowerShell. The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS- Management in Windows. In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer might not be able to authenticate your credentials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the local computer in WinRM.