Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Jan Microsoft Official New Released 70-687
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/70-687.html

Configuring Windows 8.1

Question No: 51 – (Topic 1)

A company has client computers that run Windows 8.1.

You attempt to roll back a driver for a specific device on a client computer. The Roll Back Driver button is unavailable in Device Manager.

You need to roll back the driver to the previous version. What should you do first?

  1. In the system properties for hardware, modify the device installation settings.

  2. Disable driver signature enforcement.

  3. In the local Group Policy, modify the device installation restrictions.

  4. Run Device Manager as an administrator.

Answer: D Explanation:

http://technet.microsoft.com/en-us/library/cc732648.aspx Roll Back a Device Driver to a Previous Version

Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure. Review the details in quot;Additional considerationsquot; in this topic.

Question No: 52 – (Topic 1)

A company has client computers that run Windows 8.1.

The company implements the following security requirements:

  • All client computers must use two-factor authentication.

  • At least one authentication method must include more than four characters or gestures. You need to choose authentication methods that comply with the security requirements.

Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

  1. PIN

  2. Biometric authentication

  3. Picture Password

  4. Microsoft Account

    Answer: B,D Explanation:

    More than 4 characters are of course supported with the Microsoft Account.

    It is something the user knows. The picture password would be another thing the user knows (gestures).

    So there#39;s only MS Account and Biometric authentication left.

    Two-factor authentication requires the use of two of the three authentication factors: Something the user knows (e.g., password, PIN);

    Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint).

    The factors are identified in the standards and regulations for access to U.S. Federal Government systems.

    http://en.wikipedia.org/wiki/Multi-factor_authentication Multi-factor authentication

    Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal Government systems. These factors are:

    Something only the user knows (e.g., password, PIN, pattern);

    Something only the user has (e.g., ATM card, smart card, mobile phone); and Something only the user is (e.g., biometric characteristic, such as a fingerprint).

    1. Something the user knows: Microsoft Account Minimum password length is more than 4 characters.

    2. Something only the user is: Biometric authentication

      http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4- configure-access-to-resources-14/

      Biometric in Windows 8 is built on Windows Biometric Framework and relies on Windows Biometric service that is set to start up manual by default.

      Dumps4Cert 2018 PDF and VCE

      Further information:

      Something the user knows: Picture password Problem: limited to 3 gestures

      Dumps4Cert 2018 PDF and VCE

      Something the user knows:

      http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4- configure-access-to-resources-14/

      Sign in with PIN code (4-digit code) is not possible for a domain user, it is not even visible in PC Settings -gt; Users (if machine is not domain joined you see it). To enable it for even domain joined computer/users you can enable the policy Turn on PIN sign-in and it becomes visible.

      Dumps4Cert 2018 PDF and VCE

      Question No: 53 – (Topic 1)

      You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network.

      You add a new Windows 8.1 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8.1 computer from other computers located outside the perimeter network.

      You need to use the Windows 8.1 computer to manage the Windows servers in the perimeter network.

      What should you do?

      1. Add the Windows 8.1 computer as a Trusted Host to the servers.

      2. Enable PowerShell Remoting on the Windows 8.1 computer.

      3. Add the Windows 8.1 computer as a Trusted Host to computers outside the perimeter network.

      4. Install Remote Server Administration Tools for Windows 8.1 (RSAT) on the Windows 8.1 computer.

Answer: D Explanation:

http://www.microsoft.com/en-gb/download/details.aspx?id=28972 Remote Server Administration Tools for Windows 8

Remote Server Administration Tools for Windows 8 enables IT administrators to manage roles and features that are installed on computers that are running Windows Server 2012 from a remote computer that is running Windows 8.

Further Information: http://searchnetworking.techtarget.com/tip/Perimeter-networks Perimeter networks

A perimeter network is the network closest to a router that is not under your control. Usually a perimeter network is the final step a packet takes traversing one of your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet. Most administrators create perimeter networks in order to place their firewall in between them and the outside world so that they can filter packet traffic. Most perimeter networks are part of the DMZ (Demilitarized Zone) if they exist at all. However, perimeter networks have some additional utilities that you might want to consider when deciding where to place systems and services.

http://technet.microsoft.com/en-us/library/hh849694.aspx Enable-PSRemoting

The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.

On Windows Server庐 2012, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled.

You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed.

http://technet.microsoft.com/en-us/magazine/ff700227.aspx Enable and Use Remote Commands in Windows PowerShell

The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS- Management in Windows.

In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer might not be able to authenticate your credentials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the local computer in WinRM.

Question No: 54 – (Topic 1)

A company has client computers that run Windows 8.1. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.

You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

  1. Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.

  2. Create and configure a collector-initiated subscription.

  3. Start the Windows Event Collector service on all computers other than COMPUTER1.

  4. Start the Windows Event Collector service on COMPUTER1.

  5. Create and configure a source computer隆陋initiated subscription.

  6. Start the Windows Event Log service on all computers other than COMPUTER1.

  7. Add COMPUTER1 machine account to the Event Log Readers local group on all other

computers.

Answer: B,D,G Explanation:

For best management we want a collector-initiated subscription-meaning we#39;ll be setting up the subscription at the collecting computer instead of at each individual computer.

The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.

The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log. http://blog.oneboredadmin.com/2012/06/windows-event-collection.html

Windows Event Collection

The only basic rules are that the source machine should have Winrm2 installed and running on it, and the Event Collector Service should be running on the collector machine. There are two methods available to complete this challenge – collector initiated and source initiated.

Collector Initiated

When defining such a subscription, you instruct the collector to open a WinRM session to the source machine(s) using a specified set of credentials (or the computer account) and ask for a subscription.

Further Information:

For best management we want a collector-initiated subscription-meaning we#39;ll be setting up the subscription at the collecting computer instead of at each individual computer. The Windows Event Collector service is requested for subscriptions to work on the computer doing the collecting.

The collecting computer must be a member of the Event Log Readers local group on all computer in order to be able to read the event log.

http://msdn.microsoft.com/en-us/library/windows/desktop/bb427443(v=vs.85).aspx Windows Event Collector

You can subscribe to receive and store events on a local computer (event collector) that are forwarded from a remote computer (event source).

The following list describes the types of event subscriptions:

Source-initiated subscriptions: allows you to define an event subscription on an event collector computer without defining the event source computers. Multiple remote event

source computers can then be set up (using a group policy setting) to forward events to the event collector computer. This subscription type is useful when you do not know or you do not want to specify all the event sources computers that will forward events.

Collector-initiated subscriptions: allows you to create an event subscription if you know all the event source computers that will forward events. You specify all the event sources at the time the subscription is created.

http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652(v=vs.85).aspx Creating a Collector Initiated Subscription

You can subscribe to receive events on a local computer (the event collector) that are forwarded from remote computers (the event sources) by using a collector-initiated subscription. In a collector-initiated subscription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to events and a remote event source can forward events, both computers must be configured for event collecting and forwarding.

http://technet.microsoft.com/en-us/library/cc748890.aspx Configure Computers to Forward and Collect Events

Before you can create a subscription to collect events on a computer, you must configure both the collecting computer (collector) and each computer from which events will be collected (source).

In a workgroup environment, you can follow the same basic procedure described above to configure computers to forward and collect events. However, there are some additional steps and considerations for workgroups:

You can only use Normal mode (Pull) subscriptions.

You must add a Windows Firewall exception for Remote Event Log Management on each source computer.

You must add an account with administrator privileges to the Event Log Readers group on each source computer. You must specify this account in the Configure Advanced Subscription Settings dialog when creating a subscription on the collector computer.

Type winrm set winrm/config/client @{TrustedHosts=quot;lt;sourcesgt;quot;} at a command prompt on the collector computer to allow all of the source computers to use NTLM authentication when communicating with WinRM on the collector computer. Run this command only once.

Question No: 55 – (Topic 1)

A company has client computers that run Windows 8.1.

The company implements the following security requirements:

->All client computers must use two-factor authentication.

->At least one authentication method must include exactly four characters or gestures.

You need to choose authentication methods that comply with the security requirements.

Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

  1. PIN

  2. Biometric authentication

  3. Picture password

  4. Microsoft account

    Answer: A,B Explanation:

    Something the user knows: PIN (4 digits)

    One might be tempted to think the photo for the picture password is something the User has.

    But it is something the User knows, too:

    He knows how to draw the gestures (maximum 3 gestures supported with picture password), and it is no physical object (like a token, smart card …)

    The MS Account is too something the user knows. So the answer must be Biometric authentication.

    Two-factor authentication requires the use of two of the three authentication factors: Something the user knows (e.g., password, PIN);

    Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint).

    The factors are identified in the standards and regulations for access to U.S. Federal Government systems.

    http://en.wikipedia.org/wiki/Multi-factor_authentication Multi-factor authentication

    Two-factor authentication requires the use of two of the three authentication factors. The factors are identified in the standards and regulations for access to U.S. Federal

    Government systems. These factors are:

    Something only the user knows (e.g., password, PIN, pattern);

    Something only the user has (e.g., ATM card, smart card, mobile phone); and Something only the user is (e.g., biometric characteristic, such as a fingerprint).

    1. Something the user knows: PIN

      http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4- configure-access-to-resources-14/

      Sign in with PIN code (4-digit code) is not possible for a domain user, it is not even visible in PC Settings -gt; Users (if machine is not domain joined you see it). To enable it for even domain joined computer/users you can enable the policy Turn on PIN sign-in and it becomes visible.

      Dumps4Cert 2018 PDF and VCE

    2. Something only the user is: Biometric authentication

      http://john.bryntze.net/jbkb-v2/certification-exam-70-687-configuring-windows-8-part-4- configure-access-to-resources-14/

      Biometric in Windows 8 is built on Windows Biometric Framework and relies on Windows

      Biometric service that is set to start up manual by default.

      Dumps4Cert 2018 PDF and VCE

      Further information:

      Something the user knows: Picture password Problem: limited to 3 gestures

      Dumps4Cert 2018 PDF and VCE

      Something the user knows: Microsoft account Problem: not limited to 4 characters

      Question No: 56 – (Topic 1)

      A company has 100 client computers that run Windows Vista. The company uses several custom applications.

      The company plans to replace the Windows Vista computers with new computers that run Windows 8.1.

      You need to establish which of the currently installed applications will work on Windows 8.1.

      What should you do?

      1. Install and run the Windows App Certification Kit.

      2. Install and run the Microsoft Assessment and Planning Toolkit.

      3. Install and run the Microsoft Deployment Toolkit.

      4. Install and run the Windows Application Compatibility Toolkit.

Answer: B Explanation:

http://technet.microsoft.com/en-us/solutionaccelerators/dd537566.aspx

http://www.microsoft.com/en-us/download/details.aspx?id=30652 Windows Assessment and Deployment Kit (ADK) for Windows庐 8

The Windows庐 Assessment and Deployment Kit (Windows ADK) is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers.

Features available in the Windows ADK include:

Application Compatibility Toolkit (ACT) – The Application Compatibility Toolkit (ACT) helps IT Professionals understand potential application compatibility issues by identifying which applications are or are not compatible with the new versions of the Windows operating system. ACT helps to lower costs for application compatibility evaluation by providing an accurate inventory of the applications in your organization. ACT helps you to deploy Windows more quickly by helping to prioritize, test, and detect compatibility issues with your apps

Supported Operating System

To install the Windows ADK, your computer must be running one of the following operating systems:

Windows庐 8

Windows庐 7

Windows Server庐 2012 Windows Server庐 2008 R2 Windows Vista庐

Windows Server庐 2008

Further Information:

http://www.microsoft.com/en-us/download/details.aspx?id=7826 Microsoft Assessment and Planning Toolkit

The Microsoft Assessment and Planning Toolkit makes it easy to assess your current IT infrastructure for a variety of technology migration projects. This Solution Accelerator provides a powerful inventory, assessment, and reporting tool to simplify the migration

planning process.

Supported Operating System Windows 7 Service Pack 1

Windows 8

Windows 8.1

Windows Server 2008 R2 SP1 Windows Server 2012 Windows Server 2012 R2

http://www.microsoft.com/en-us/download/details.aspx?id=25175 Microsoft Deployment Toolkit (MDT) 2012 Update 1

Microsoft Deployment Toolkit (MDT) 2012 Update 1 is the newest version of MDT, a Solution Accelerator for operating system and application deployment. MDT 2012 Update 1 supports deployment of Windows 8, Windows 7, Office 2010 and 365, Windows Server 2012, and Windows Server 2008 R2 in addition to deployment of Windows Vista, Windows Server 2008, Windows Server 2003, and Windows XP.

MDT 2012 Update 1 relies on several Windows deployment tools. After installation of the

.msi package and startup of the Deployment Workbench, the user can choose to download and install the following major tools from the Components:

Windows 8 Assessment and Deployment Kit

Question No: 57 – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server. All client computers run Windows 8.1 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement.

After deploying Windows Updates to the computers, the web application stops responding. You establish that a specific optional update installed by Windows Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable.

You need to remove the optional update from one client computer. What should you do?

  1. Install and run the Debugging tools for Windows.

  2. Clear the SusClientID registry value on the client computer.

  3. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Crash Analyzer tool.

  4. Run the wuauclt /resetauthorization command on the client computer.

  5. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.

Answer: E Explanation:

http://technet.microsoft.com/en-us/library/jj713340.aspx Getting Started with DaRT 8.0

How to Get DaRT 8.0

DaRT 8.0 is a part of the Microsoft Desktop Optimization Pack (MDOP). MDOP is part of Microsoft Software Assurance.

http://technet.microsoft.com/en-us/library/jj713326.aspx Overview of the Tools in DaRT 8.0

From the Diagnostics and Recovery Toolset window in Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0, you can start any of the individual tools that you include when you create the DaRT 8.0 recovery image.

Exploring the DaRT tools Hotfix Uninstall

The Hotfix Uninstall Wizard lets you remove hotfixes or service packs from the Windows operating system on the computer that you are repairing. Use this tool when a hotfix or service pack is suspected in preventing the operating system from starting.

Further Information: Crash Analyzer

Use the Crash Analyzer Wizard to quickly determine the cause of a computer failure by analyzing the memory dump file on the Windows operating system that you are repairing. Crash Analyzer examines the memory dump file for the driver that caused a computer to

fail. You can then disable the problem device driver by using the Services and Drivers node in the Computer Management tool.

Question No: 58 – (Topic 1)

You administer Windows 8.1 Pro laptops in your company network. Your network has a Remote Access Server (RAS) in a perimeter network that runs Windows Server 2012.

All laptop users have a PPTP VPN configured on their computer. Users report that their VPN disconnects when they switch between WLAN and WWAN networks.

You need to ensure that if a VPN is disconnected, the laptop will automatically attempt to reconnect.

What should you do?

  1. Create a new VPN connection, and the open Local Computer Policy and define Files not cached policy.

  2. Run the netsh.exe command and include the wlan parameter

  3. Create a new VPN connection, and disable offline files

  4. Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services.

Answer: C

Question No: 59 – (Topic 1)

A company has 10 client computers that run Windows 8.1. Employees log on to resources by using multiple accounts.

You need to back up the user name and password for each logon account. What should you do on each client computer?

  1. Back up each user#39;s Personal Information Exchange PKCS #12 (.pfx) certificate.

  2. Use Credential Manager to save the information to a USB flash drive.

  3. Use File History to back up the ntuser.dat file.

  4. Run the Export-Certificate Windows PowerShell cmdlet.

Answer: B Explanation:

http://www.7tutorials.com/credential-manager-where-windows-stores-passwords-other- login-details

Credential Manager – Where Windows Stores Passwords amp; Login Details

What is the Credential Manager?

Credential Manager is the quot;digital lockerquot; where Windows stores log-in credentials (username, password, etc.) for other computers on your network, servers or Internet locations such as websites.

Windows 8 adds one more type of credentials called Web Credentials. As the name implies, such credentials are used by Internet Explorer to automatically log you into certain websites.

Dumps4Cert 2018 PDF and VCE

http://www.7tutorials.com/how-backup-and-restore-windows-vault-passwords How to Backup and Restore Windows Vault Passwords

One way to use the Credential Manager is to export your Windows credentials to another Windows computer, or to back them up and import them after you reinstall Windows, so that you don’t have to manually type them again.

Backup Your Windows User Names and Passwords

Open the Credential Manager. Under the Windows Vault look for the quot;Back up vaultquot; link and click on it.

This starts the Stored User Names and Passwords wizard.

Dumps4Cert 2018 PDF and VCE

You are asked to select where you want to backup the Windows credentials stored on your computer. Click on Browse, select the folder and type the name of the file where the data will be stored. Then, click Next.

This procedure has been tested both on Windows 7 and Windows 8. In Windows 8, there are some minor differences but it all works the same.

Question No: 60 – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.

A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.

You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs.

Which permission should you grant to the Sales group?

  1. Manage queue

  2. Print

  3. Manage documents

  4. Manage this printer

  5. Manage spooler

Answer: B Explanation:

http://technet.microsoft.com/en-us/library/cc781446(v=ws.10).aspx Group types

There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and security groups to assign permissions to shared resources.

Security groups

Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can:

Assign user rights to security groups in Active Directory Assign permissions to security groups on resources

http://my.safaribooksonline.com/book/operating-systems/9780133118025/sharing- printers/ch21lev2sec24

Setting Printer Permissions

If you have a workgroup network and have disabled Password Protected Sharing, or if you have set up a homegroup, you don’t need to worry about setting permissions for printers: anyone can use your shared printer. If you’re on a domain network or have chosen to use

detailed user-level permissions on your workgroup network, you can control access to your shared printers with security attributes that can be assigned to users or groups, as shown in Figure 21.9 and described next:

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

The Security tab lets you assign printer-management permissions for users, groups, and

the creator of each print job.

100% Dumps4cert Free Download!
Download Free Demo:70-687 Demo PDF
100% Dumps4cert Free Guaranteed!
Download 2018 Dumps4cert 70-687 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No