Managing and Maintaining Windows 8.1
Question No: 131
You are an application developer for a federal government agency. You maintain a legacy application that the agency originally developed for Windows 2000. The agency is upgrading all desktop computers to Windows 8.1.
The legacy application does not run on Windows 8.1. You use the Application Compatibility Toolkit (ACT) to create a shim.
You need to deploy the shim to all Windows 8.1 computers. What should you do?
Run the sdbinst.exe utility on each computer to install the shim locally.
Configure a Group Policy to install the shim with user privileges.
Install the shim on all Windows XP computers prior to the Windows 8.1 upgrade.
Install the shim with a PowerShell script by using the ACT PowerShell add-in.
Explanation: Deploying a custom shim database to users requires the following two actions:
Placing the custom shim database (*.sdb file) in a location to which the user’s computer has access (either locally or on the network)
Calling the sdbinst.exe command-line utility to install the custom shim database locally While any approach that completes these two actions will work, customers commonly use one of the following two approaches:
Packaging the *.sdb file and a script in an .msi file and then deploying the .msi file, making sure to mark the custom action not to impersonate the calling user. For example, if using Microsoft Visual Basic庐 Scripting Edition (VBScript) script, the custom action type would be msidbCustomActionTypeVBScript msidbCustomActionTypeInScript msidbCustomActionTypeNoImpersonate = 0x0006 0x0400 0x0800 = 0x0C06 = 3078 decimal.
Placing the *.sdb file on a network share, and then calling a script on target computers, making sure to call the script at a time when it will receive elevated rights (for example, from a computer start-up script instead of a user log-in script).
Reference: Custom Shim Database Deployment https://technet.microsoft.com/en-us/library/dd837647(v=ws.10).aspx
Question No: 132
Your network contains an Active Directory domain. The domain contains Windows 8.1 Enterprise client computers.
Users frequently use USB drives to store sensitive files that are used on multiple computers.
Your corporate security policy states that all removable storage devices, such as USB data drives, must be encrypted.
You need to ensure that if a user forgets the password for a USB disk that is encrypted by using BitLocker To Go, the user can resolve the issue themself.
What should you do?
Implement the BitLocker Network Unlock feature.
Publish a data recovery agent certificate by using a Group Policy object (GPO).
For each computer, create a USB startup key.
Instruct the user to open BitLocker Drive Encryption, select Back up recovery key, and then select Save to a file.
Question No: 133
You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain.
The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts.
You need to enforce these security policy requirements on the computers. What should you do?
From each computer, navigate to Change Sync Settings and set the Sync Your Settings options for Apps, Browser, and Passwords to Off.
On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can#39;t add or log on with Microsoft accounts.
On the Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can#39;t add Microsoft accounts.
From each computer, navigate to Change Sync Settings and set the Sync Your Settings option to Off.
Explanation: Windows 8 Group Policy Settings: Blocking Connected Accounts
“Connected Accounts”. This is the feature in Windows 8 where you can associate your local or domain user account with your Microsoft account (e.g. Live ID) for the purposes of synchronizing your Windows settings across all of your Windows devices. It’s a nice feature, but not necessarily one that enterprises might find helpful- given the possibility of stuff that may be considered private to the organization such as passwords to websites and apps, being synchronized externally.
The setting is under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts:Block Microsoft Accounts
Question No: 134
You support laptops that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) are deployed on your network on a server named SERVER1.
Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Set Enter status reporting frequency (in minutes) to 120.
Set Enter client checking status frequency (in minutes) to 120.
Set Select Bitlocker Recovery Information to store to Recovery password and key package.
Set MBAM Status reporting endpoint to SERVER1
Set Select Bitlocker Recovery Information to store to Recovery password only.
Set MBAM Recovery and Hardware service endpoint to SERVER1.
Question No: 135 DRAG DROP
You support computers that run Windows 8. A computer receives a STOP error.
You plan to restore the operating system without losing user documents and settings. You need to restore the operating system and user data in the least amount of time.
Which three steps should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Box 1: Select Change PC Settings
Box 2: Select Refresh your PC
Box 3: Insert the Recovery Drive or Windows installation media.
Refresh PC lets you restore all Windows settings to their defaults without deleting your documents, music and other files, and Reset PC reinstalls Windows and wipes out everything, including your files.
To refresh your PC
->Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings.(If you#39;re using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings, and then click Change PC settings.)
->Under PC settings, tap or click General.
->Under Refresh your PC without affecting your files, tap or click Get started.
->Follow the instructions on the screen.
If asked, insert your Windows 8 disc, flash drive, or whatever else you used to first install Windows.
Question No: 136
You administer Windows 8.1 Enterprise laptops. All of the computers are members of an Active Directory domain.
When traveling, users access the corporate network by using a virtual private network (VPN).
You need to implement two-factor authentication. Which of the following should you use?
Explanation: The RADIUS Authentication section allows the administrator to enable and configure RADIUS authentication for the Azure Multi-Factor Authentication Server.
Reference: Widnows RRAS VPN and Multi Factor Authentication
Question No: 137
You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft Exchange 2010 with ActiveSync and Outlook Web Access.
Users will be using the tablets outside of the corporate network.
The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password.
You need to ensure an alphanumeric password is required on all Windows 8 tablets. What should you do?
From the Mail app, add the user#39;s Exchange account.
Set up New Partnership in Sync Center.
From Sync your Settings, set Password to Off.
Create a user profile by using a Microsoft account.
Explanation: http://technet.microsoft.com/en- us/library/bb123783(v=exchg.150).aspx
Question No: 138 HOTSPOT
You have a folder that you plan to share.
You need to configure security for the shared folder to meet the following requirements:
->Members of a security group named Group1 must be able to change and delete files and folders only.
->Members of a security group named Group2 must be able to read files and folders
->Members of a security group named Group3 must be able to take ownership of files.
What should you do? (To answer, select the appropriate options in the answer area.)
Read is the default permission that is assigned to the Everyone group.
The Change permission allows all Read permissions, plus: Adding files and subfolders
Changing data in files Deleting subfolders and files
Full Control allows all Read and Change permissions, plus: Changing permissions (NTFS files and folders only)
Question No: 139
You have Windows 8.1 client computers. The computers use the Microsoft Application Virtualization (App-V) 5.0 client.
You discover that when users sign in to their computer, the App-V client refreshes all of the published packages.
You need to prevent the App-V client from refreshing the published packages at sign-in. The solution must ensure that the users can use App-V applications.
Which Windows PowerShell cmdlet should you run?
Explanation: AppvClientConfiguration – A configuration value for a setting of the App-V Client (E.g. EnablePackageScripts, AllowHighCostLaunch, PackageInstallationRoot) AppvClientMode – The current mode (normal or uninstall) of the client.
AppvClientPackage – An App-V package that is available for use on the App-V Client. AppvPublishingServer – An App-V server that hosts metadata about the packages available to the client over the network.
http://technet.microsoft.com/en-us/library/cc843710.aspx http://technet.microsoft.com/en-us/library/cc843704.aspx http://blogs.technet.com/b/appv/archive/2012/12/03/app-v-5-0-client-powershell-deep- dive.aspx
Question No: 140
You have a Windows 8.1 Enterprise computer. The computer has an external hard drive to support transferring large files between branch offices.
You need to check the external drive for malicious software by using Windows Defender
What should you do?
From Advanced Settings, select the Scam removable drives option.
Detach and reattach the external hard disk. Run a Quick Scan.
Run a full scan and then select the History tab to review all detected malware.
Run a Custom scan and then select the History tab to review all detected malware. Answer: D
100% Free Download!
–Download Free Demo:70-688 Demo PDF
100% Pass Guaranteed!
–Download 2018 Dumps4cert 70-688 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|