Dumps4cert
2018 Jan Microsoft Official New Released 70-687
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/70-687.html

Configuring Windows 8.1

Question No: 121 – (Topic 2)

You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections.

A remote user requires access to files on Server1.

You need to prevent the user from downloading any files from Server1 to his local computer. Your solution must ensure that the user can read the files on Server1.

What should you do?

  1. Create a new VPN connection. Disable local drive mappings.

  2. Create a new Remote Desktop connection.

  3. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.

  4. Create a new Remote Desktop connection. Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.

Answer: C

Explanation: http://technet.microsoft.com/en-us/library/cc725887(v=ws.10).aspx Device and Resource Redirection

Policy settings in this node control access to devices and resources on a client computer in Terminal Services sessions.

Do not allow drive redirection

This policy setting allows you to specify whether to prevent the mapping of client drives in a Terminal Services session (drive redirection).

By default, Terminal Services maps client drives automatically upon connection. Mapped

drives appear in the session folder tree in Windows Explorer or My Computer in the format

lt;drivelettergt; on lt;computernamegt;. You can use this policy setting to override this behavior. If you enable this policy setting, client drive redirection is not allowed in Terminal Services sessions.

If you disable this policy setting, client drive redirection is always allowed.

If you do not configure this policy setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal Services Configuration tool.

Question No: 122 – (Topic 2)

You install a new hard drive as drive D on a Windows 8.1 computer. The computer is shared by two users.

You need to prevent either user from using more than half the available space on drive D of the computer.

What should you do?

  1. Reconfigure drive D and create two volumes of equal size.

  2. Create a share for each user on drive D.

  3. Configure quota management on drive D.

  4. Configure Storage Spaces on drive D.

Answer: C

Explanation: http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring- windows-8-part-4-configure-access-to-resources-14/

configure disk quotas

Disk quotas are set at disk level (not folder/files level) and take properties and go to the Quota tab.

Dumps4Cert 2018 PDF and VCE

By default it is disabled, you enable it by checking Enable quota management and then specify options such if it should only be warning/logging or an actual consequence when you reach the quota such as checking Deny disk space to users exceeding quota limit.

Disk Quota is limited to only one per disk and one level for all users, running Windows Server 2012 you can set different limit per users.

Dumps4Cert 2018 PDF and VCE

Question No: 123 – (Topic 2)

You administer Windows 8.1 client computers in your company network. A computer that is used by non-administrator users has a directory named C:\Folder1.

A shared collection of Microsoft Excel files is stored in the C:\Folder directory, with non- administrator users being granted modify permissions to the directory.

You discover that some files have been incorrectly modified by a user.

You need to determine which user made changes to the directory’s folder’s files.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Failure.

  2. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission.

  3. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success for the Modify permission.

  4. Set local policy: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access to Success.

Answer: C,D

Explanation: We must audit for success, as we want to know which user has modified the file.

http://technet.microsoft.com/en-us/library/cc776774(v=ws.10).aspx Audit object access

This security setting determines whether to audit the event of a user accessing an object- for example, a file, folder, registry key, printer, and so forth-that has its own system access control list (SACL) specified.

If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has an appropriate SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified.

https://blogs.manageengine.com/product-blog/eventloganalyzer/2012/06/20/object-access- auditing-simplified-find-the-who-what-where-when-of-file-folder-access.html

Object Access Auditing Simplified – Find the ‘Who, What, Where, When’ of File amp; Folder Access

Most administrators face the challenge of knowing what actually happened to their files and folders – who accessed them, deleted them, edited them, moved them, where the files and folders went, etc. Object access auditing can help administrators to meet this challenge head-on.

Dumps4Cert 2018 PDF and VCE

If you do not enable the above setting, you will have no record when a file or folder was accessed. Most administrators would like to know only the failure attempts when someone tries to access the file or folder but failed because of improper permission. But it is highly recommended to enable both – failure attempts and success attempts. The reason for enabling success attempts is that sometimes hackers can use administrator privilege and gain access to confidential files and folders.

Your enterprise will have crucial data stored in files and folders such as financial data, employee data, patient records, bank account data, etc. The next step is to go to such files and folders to enable auditing on them. Each file / folder’s auditing settings must be modified to include those users you wish to audit.

These are enabled in Properties-gt;Security-gt;Advanced-gt;Auditing. If you want to audit all access events by everyone, add everyone group, and select Successgt;Full Control. (See Screen Shot Below)

Note:

Select the attributes based on your requirement. Delete and Modify attributes are most recommended.

Enabling all the attributes to users will flood the event viewer in few seconds, and consume more bandwidth. So judiciously select the attributes required for your auditing needs.

Dumps4Cert 2018 PDF and VCE

There are no objects configured to be audited by default. Once this auditing setting for an object is configured, log entries on access attempts (Successful and Failed) start getting recorded and you will be able to view the object access related events in the security log in Event Viewer. (See Screen Shot Below)

Dumps4Cert 2018 PDF and VCE

The events must be opened up individually to inspect their contents, which is a painful process and is totally impossible in an IT enterprise network.

Question No: 124 – (Topic 2)

You administer Windows 8.1 client computers in you company network.

You deploy an application that requires a specific Windows update to be installed on the computers.

You need to verify that the update is installed on specific computers.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two)

  1. Run The system update readiness tool

  2. Open View updates history

  3. Open the Check for updates applet

  4. Run the DISM command with the /image and /get-packageinfoswiches

  5. Run the DISM command with the /online and /get-packageinfoswiches

Answer: B,E

Explanation: http://www.sevenforums.com/tutorials/24367-windows-update-view-update- history-details.html

Windows 7: Windows Update – View Update History Details

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

http://technet.microsoft.com/en-us/library/dd744382(v=ws.10).aspx Deployment Image Servicing and Management Command-Line Options

/Online

Specifies that the action is to be taken on the operating system that is currently running. This option cannot be used with the /Image or the /WinDir option. When /Online is used the Windows directory for the online image is automatically detected.

/Image:lt;path_to_offline_image_directorygt;

This is the full path to the root directory of the offline Windows image that you will service. If the directory named Windows is not a subdirectory of the root directory, /WinDir must be specified.

This option cannot be used with /Online. http://technet.microsoft.com/en-us/library/hh825265.aspx

DISM Operating System Package Servicing Command-Line Options

/Get-PackageInfo {/PackageName:lt; name_in_imagegt; | /PackagePath:lt; path_to_cabfilegt;} Displays detailed information about a package provided as a .cab file. Only .cab files can be specified. You cannot use this command to obtain package information for .msu files.

/PackagePath can point to either a .cab file or a folder.

You can use the /Get-Packages option to find the name of the package in the image, or you can specify the path to the .cab file. The path to the .cab file should point to the original source of the package, not to where the file is installed on the offline image.

Further Information: http://blogs.msdn.com/b/olivnie/archive/2013/04/05/updates-and- maintenance.aspxWindows 8: Updates and Maintenance

http://windows.microsoft.com/en-us/windows7/what-is-the-system-update-readiness-tool What is the System Update Readiness Tool?

The System Update Readiness Tool can help fix problems that might prevent Windows updates and service packs from installing. For example, an update might not install if a damaged system file prevents the update from recognizing the version of Windows that#39;s running on your computer.

Question No: 125 – (Topic 2)

A computer that runs Windows 8.1 is configured with a 2 TB storage pool. The storage pool currently shows 1 TB of available space.

You try to save 100 MB of files to the storage drive. An error message states that the drive is full.

You need to make an additional 1 TB of space available in the storage pool. What should you do?

  1. Connect a 1 TB drive to the computer and add the new drive to the storage pool.

  2. Connect a 1 TB drive to the computer and assign a drive letter to the new drive.

  3. Set the resiliency type of the storage pool to Parity.

  4. Set the logical size of the storage pool to 2 TB.

Answer: A

Question No: 126 DRAG DROP – (Topic 2)

You have a Windows 8.1 computer.

The drive on which your File History is stored is almost full.

You need to move the File History storage location to another drive.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Dumps4Cert 2018 PDF and VCE

Answer:

Dumps4Cert 2018 PDF and VCE

Explanation:

->Open File History from the Control Panel.

->In the File History window, choose the option to change the File History drive.

->Move the stored file history from the old location to the new location.

When choosing a new storage location for File History, if it#39;s a USB drive, there#39;s nowhere to browse to. You can only choose a folder when backing up to a network share.

And when you change the storage location, File History will move the files for you:

Dumps4Cert 2018 PDF and VCE

http://windows.microsoft.com/en-gb/windows-8/what-something-goes-wrong-file-history What if something goes wrong in File History?

Select a different File History drive

If your File History drive is full or almost full, you can start again from scratch with a new drive or you can move your existing files to a new, larger drive.

To select a new drive and start again

->Swipe in from the right edge of the screen, then tap Search. (If you#39;re using a mouse, point to the bottom-right corner of the screen, move the mouse pointer up,

then click Search.)

->Enter File History settings in the search box, then tap or click File History settings.

->Tap or click Select drive.

->Tap or click the new drive.

To select a new drive and move your files to it

->Swipe in from the right edge of the screen, then tap Search. (If you#39;re using a mouse, point to the bottom-right corner of the screen, move the mouse pointer up, then click Search.)

->Enter File History in the search box, then tap or click File History.

->Tap or click Select drive.

->On the Change your File History drive page, do one of the following:

  • To use a new external drive, connect the drive to your PC, refresh the page, then tap or click OK.

  • To use a network location, tap or click Add network location, browse to or enter a location, tap or click Select folder, then tap or click OK.

    ->When you#39;re asked, tap or click Yes to copy all of the versions of your files to the

    new drive.

    Question No: 127 – (Topic 2)

    A computer that runs Windows B has two hard disk drives. The user stores data files in specific storage locations outside of the standard libraries on both drives.

    File search results are delayed.

    You need to return relevant search results more quickly. What should you do?

    1. Remove all directories from indexed locations.

    2. Add the specific storage locations to indexed locations.

    3. Allow indexing of file contents in non-indexed locations.

    4. Add encrypted files to the index.

    Answer: B

    Question No: 128 HOTSPOT – (Topic 2)

    You administer Windows 8.1 client computers in your company network. The computers belong to an Active Directory Domain Services (AD DS) domain and have Windows Firewall enabled. All of the computers are connected to the Internet.

    You ping one of the desktops, which has an IP Address of 10.4.4.4, but you receive the message quot;Request timed out.quot;

    You need to configure the desktop to reply on ping requests.

    From the Windows Firewall with Advanced Security window, which inbound rule should you modify? (To answer, select the appropriate inbound rule in the answer area.)

    Dumps4Cert 2018 PDF and VCE

    Answer:

    Dumps4Cert 2018 PDF and VCE

    Explanation:

    Dumps4Cert 2018 PDF and VCE

    http://www.howtogeek.com/77132/how-to-enable-ping-echo-replies-in-windows-8/ How to Enable Ping Echo Replies in Windows 8

    When you ping a PC running Windows 8, by default it doesn’t reply to the echo request. This is caused by a firewall rule that blocks all incoming ICMP packets, but this can be changed quickly in the Advanced Firewall Settings instead of disabling the entire firewall.

    When the Windows Firewall with Advanced Security snap-in opens, click on inbound rules.

    Now scroll through the list of inbound rules until you find a rule called File and Printer Sharing (Echo Request – ICMPv4-In). Right click on the rule and select Enable rule.

    Note: There is a different rule depending on your network location, there is a one rule that covers Public and Private network locations and a separate rule for the Domain network location. Also this will only allow ICMPv4 packets, if you want be to hear IPv6 echo requests there are two rules below the ICMPv4 rules to enable this functionality.

    Dumps4Cert 2018 PDF and VCE

    Once enabled the rule will turn green.

    Dumps4Cert 2018 PDF and VCE

    Now your PC will be able to answer the echo requests.

    Question No: 129 – (Topic 2)

    A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.

    An employee updates a device driver on his computer and then restarts the computer. Windows does not start successfully. You establish that the updated driver is the cause of the problem.

    You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.

    What should you do?

    1. Use the Windows 8.1 PC Reset feature.

    2. Reset the computer to the manufacturer#39;s system image.

    3. Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.

    4. Use the File History feature.

    Answer: C Explanation:

    http://technet.microsoft.com/en-us/library/jj713340.aspx Getting Started with DaRT 8.0

    How to Get DaRT 8.0

    DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part of Microsoft Software Assurance.

    http://technet.microsoft.com/en-us/library/jj713326.aspx Overview of the Tools in DaRT 8.0

    From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you include when you

    create the DaRT 8.0 recovery image. Exploring the DaRT tools

    Hotfix Uninstall

    The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool when a hotfix or service pack is suspected in preventing the operating system from starting.

    Question No: 130 – (Topic 2)

    A company plans to deploy Windows 8.1 to 100 client computers. Each client computer has 8 GB of memory.

    You have the following requirements:

    ->Ensure that the operating system fully utilizes the available memory.

    ->Ensure that the operating system can be activated by using a Key Management Service (KMS) client setup key.

    ->Minimize the operating system space requirements.

    You need to identify the appropriate edition of Windows 8.1 to install on the client computers.

    Which edition should you install?

    1. Windows 8.1 Enterprise 32-bit

    2. Windows 8.1 64-bit

    3. Windows 8.1 Pro 32-bit

    4. Windows 8.1 Enterprise 64-bit

    5. Windows 8.1 Pro 64-bit

    6. Windows 8.1 32-bit

    Answer: D

    Explanation: http://msdn.microsoft.com/en- us/library/windows/desktop/aa366778(v=vs.85).aspx#physical_memory_limits_wind ows_8

    Memory Limits for Windows and Windows Server Releases

    Physical Memory Limits: Windows 8

    The following table specifies the limits on physical memory for Windows 8.

    Dumps4Cert 2018 PDF and VCE

    http://windows.microsoft.com/en-us/windows-8/system-requirements System requirements

    If you want to run Windows 8.1 on your PC, here#39;s what it takes:

    Processor: 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 (more info) RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)

    Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)

    Graphics card: Microsoft DirectX 9 graphics device with WDDM driver

    http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8- 1/compare/default.aspx

    Compare Windows 8.1 Editions

    For enterprise features like Domain Join and Group Policy you will need the Enterprise version of Windows 8.1.

    Further Information:

    http://technet.microsoft.com/en-us/library/ff793434.aspx Understanding KMS

    KMS activates computers on a local network, eliminating the need for individual computers to connect to Microsoft. To do this, KMS uses a client-server topology. KMS client computers can locate KMS host computers by using Domain Name System (DNS) or a static configuration. KMS clients contact the KMS host by using remote procedure call (RPC).

    100% Free Download!
    Download Free Demo:70-687 Demo PDF
    100% Pass Guaranteed!
    Download 2018 Dumps4cert 70-687 Full Exam PDF and VCE

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2018 Dumps4cert IT Certification PDF and VCE