[Free] 2018(Aug) Ensurepass Microsoft 70-687 Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Microsoft Official New Released 70-687
100% Free Download! 100% Pass Guaranteed!

Configuring Windows 8.1

Question No: 131 – (Topic 2)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. A client computer named COMPUTER1 has a shared printer named PRINTER1 installed and Remote Desktop enabled.

A user named Intern is a member of a security group named Sales. The Sales group is a member of the Remote Desktop Users group on COMPUTER1. Only the Sales group has access to PRINTER1.

You need to configure COMPUTER1 to meet the following requirements:

->Allow all members of the Sales group other than Intern to establish Remote Desktop connections to COMPUTER1.

->Allow Intern to print to PRINTER1.

What should you do?

  1. Assign Intern the Deny access to this computer from the network user right. Assign the Sales group the Allow log on locally user right.

  2. Assign Intern the Deny log on through Remote Desktop Services user right.

  3. Remove the Sales group from the Remote Desktop Users group.

  4. Remove Intern from the Sales group.

Answer: B

Question No: 132 – (Topic 2)

You administer Windows 8.1 computers for a software development company.

The marketing department is going to meet a potential customer to demonstrate the product. You want to configure a laptop that has a stand-alone virtual machine that runs Windows 8.1 Enterprise and the latest build of your software.

You need to enable BitLocker on the system drive of the virtual machine. What should you do first?

  1. Activate Windows.

  2. Join the virtual machine to an Active Directory Domain Services (AD DS) domain.

  3. Turn on the Require additional authentication at startup local policy.

  4. Turn off the Require additional authentication at startup local policy.

Answer: C

Explanation: http://rc.partners.org/kbase?cat_id=9amp;art_id=245 How to setup BitLocker Encryption on Windows 8 without TPM

BitLocker is a full disk encryption software that comes standard with PCs running Windows 8 Pro or higher.

This document provides instructions for encrypting the hard drive without Trusted Platform Module (TPM – integrated security chip) present or enabled, and bypasses the USB flash drive encryption key requirement.

->From the Metro UI or the search box, type GPEDIT.MSC and press enter

->Open Computer Configuration =gt; Administrative Templates =gt; Windows Components =gt; BitLocker Drive Encryption =gt; Operating System Drives. From the right pane double-click quot;Require additional authentication at startupquot;

Ensurepass 2018 PDF and VCE

->Select Enabled radio button and check the box for quot;Allow BitLocker without a compatible TPM…quot;. Click OK and close the policy editor.

Ensurepass 2018 PDF and VCE

->Right-click your C drive in the Computer folder, click Turn on BitLocker

Question No: 133 – (Topic 2)

You administer an installation of Windows 8.1 that runs as a virtual machine. The virtual machine has one 60-GB fixed size virtual hard disk with a single partition assigned as Volume C.

The virtual machine runs out of disk space. You increase the size of the virtual hard disk file to 200 GB to support an application demand for increased storage on Volume C.

You discover that Volume C is still 60 GB in File Explorer of the virtual machine. You need to ensure that Volume C is configured to use 200 GB.

What should you do?

  1. Configure the Virtual Disk type from fixed size to dynamic disk.

  2. From Disk Management of the virtual hard disk, run the Extend the volume action task.

  3. From Disk Management of the host computer, extend the Volume C.

  4. Create a new storage space of Simple (no resiliency) type.

Answer: B

Explanation: http://technet.microsoft.com/en-us/library/dn282286.aspx Online Virtual Hard Disk Resizing Overview

Expanding a virtual hard disk

Expanding a virtual hard disk increases the disk capacity of the virtual hard disk. However, to make the additional disk space available to the virtual machine requires some extra configuration. From the perspective of the virtual machine, the virtual hard disk expansion is reflected under Disk Manager as an unallocated disk volume. The size of this unallocated volume is the difference between the original virtual hard disk and the nominated size of the expanded virtual hard disk.

To make the full virtual hard disk capacity available to the virtual machine, you need to use Disk Manager to expand the volume within the virtual machine. You can do this by using the Extend Volume Wizard within Disk Manager. After this is complete, you will be able to view the expanded disk capacity in the operating system of the virtual machine.

Question No: 134 – (Topic 2)

You administer Windows 8.1 Enterprise computers in your company#39;s Active Directory Domain Services (AD DS) domain.

Your company uses several peripheral devices. The drivers for these devices are not available on Windows Update.

You need to ensure that the drivers install when users connect these devices to their computers.

What should you do?

  1. For the Group Policy setting Prioritize all digitally signed drivers equally during the driver ranking and selection process, select Disabled.

  2. From Device Manager, find the detected scanner device and select Update Driver.

  3. Add the following registry key to the computers: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/DevicePath. Add

    掳/osystemroot%\inf and the UNC path to the drivers share.

  4. For the Group Policy setting Configure driver search locations, select Enabled. Make the drivers available on the UNC path to the driver#39;s share.

Answer: C

Explanation: http://technet.microsoft.com/en-us/library/cc753716.aspx Configure Windows to Search Additional Folders for Device Drivers

To configure Windows to Search Additional Folders for Device Drivers

->Start Registry Editor. Click Start, and in the Start Search box type regedit.

->If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.

->Navigate to the following registry key: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version

->In the details pane, double-click DevicePath.

->Add additional folder paths to the setting, separating each folder path with a semi- colon. Ensure that %systemroot%\inf is one of the folders included in the value.

Caution:

Do not remove %systemroot%\inf from the DevicePath registry entry. Removal of that folder can break device driver installation.

Further Information:

http://msdn.microsoft.com/en-us/library/windows/hardware/ff553973(v=vs.85).aspx Where Windows Searches for Drivers

After a device is attached, Windows attempts to locate a matching driver package from which it can install a driver for the device. Windows searches for driver packages from various locations and performs this search in two phases, as described in the following table.

Ensurepass 2018 PDF and VCE

Starting with Windows 7, Windows automatically downloads matching driver packages from Windows Update without prompting the user for permission. If a matching driver package is

found, Windows downloads the package and stages it to the driver store.

If a matching driver package cannot be downloaded, Windows searches for matching driver packages in the driver store. This includes in-box drivers, installed drivers other than in-box drivers, and preinstalled drivers.

Windows also searches for driver packages that were preloaded in the locations that are specified by the DevicePath registry value. This value is under the following subkey of the registry.

HKEY_LOCAL_MACHINE

Software Microsoft Windows CurrentVersion

By default, the DevicePath value specifies the %SystemRoot%\INF directory.

If a matching driver package is found either on Windows Update or in a location that is specified by the DevicePath value, Windows first stages the driver package to the driver store before the driver is installed. In this way, Windows always installs drivers from the driver store.

Question No: 135 – (Topic 2)

A company has 100 client computers that run various editions of Windows 7. The company plans to upgrade or replace computers so that all client computers run an edition of Windows 8.1.

The company plans to use the following programs and features on the Windows 8.1 computers:

->32-bit and 64-bit software

->Desktop apps

->Windows Media Player

->Storage Spaces

You need to identify the installation or upgrade paths that support the programs and features.

Which three paths meet the requirements? (Each correct answer presents a complete solution. Choose three.)

  1. Attach the VHD file by using Disk Management.

  2. Import the contents of the system store from a file.

  3. Export the contents of the system store into a file.

  4. Make the VHD disk bootable.

  5. Create a new empty boot configuration data store.

  6. Create a new entry in the boot configuration data store.

Answer: A,B,C

Question No: 136 – (Topic 2)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All Sales department employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers.

You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run.

You need to quickly ensure that the application can run. What should you do?

  1. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.

  2. Configure the AppLocker properties to enforce rules.

  3. Run the gpupdate /force command.

  4. Create a new AppLocker file hash condition.

Answer: C

Explanation: http://technet.microsoft.com/en-us/library/bb490983.aspx Gpupdate

Refreshes local and Active Directory-based Group Policy settings, including security settings.

/force : Ignores all processing optimizations and reapplies all settings. http://technet.microsoft.com/en-us/library/cc940895.aspx

Group Policy refresh interval for computers

Specifies how often Group Policy for computers is updated while the computer is in use (in the background). This policy specifies a background update rate only for Group Policies in the Computer Configuration folder.

By default, computer Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes. In addition to background updates, Group Policy for the computer is always updated when the system starts.

Further Information:

http://technet.microsoft.com/en-us/library/ee460964.aspx Get-AppLockerPolicy

The Get-AppLockerPolicy cmdlet gets the AppLocker policy from the local Group Policy object (GPO), from a specified GPO, or from the effective AppLocker policy on the computer. The output is an AppLockerPolicy object or an XML-formatted string.

Question No: 137 – (Topic 2)

A company has an Active Directory Domain Services (AD DS) domain. All company employees work on their personally owned computers, which are not members of the domain. The computers are running Windows XP Home, Windows Vista Business, Windows 7 Home Premium, or Windows 8.1. The company is a volume license subscriber.

The company plans to deploy Group Policies to all computers.

You need to ensure that every employee#39;s computer is subject to the Group Policies. What should you do first?

  1. Join all the computers to the same homegroup.

  2. Start each computer from a USB flash drive on which you have installed Windows To Go.

  3. Start each computer from a USB flash drive on which you have installed BitLocker To Go.

  4. Join all the computers to the domain.

Answer: B

Explanation: http://technet.microsoft.com/en-us/library/jj592685.aspx#BKMK_wtggp Deployment Considerations for Windows To Go

From the start, Windows To Go was designed to minimize differences between the user experience of working on a laptop and Windows To Go booted from a USB drive. Given that Windows To Go was designed as an enterprise solution, extra consideration was given to the deployment workflows that enterprises already have in place. Additionally, there has been a focus on minimizing the number of differences in deployment between Windows To Go workspaces and laptop PCs.

Management of Windows To Go using Group Policy

In general, management of Windows To Go workspaces is same as that for desktop and laptop computers. There are Windows To Go specific Group Policy settings that should be considered as part of Windows To Go deployment. Windows To Go Group Policy settings are located at \\Computer Configuration\Administrative Templates\Windows Components\Portable Operating System\ in the Local Group Policy Editor.

The use of the Store on Windows To Go workspaces that are running Windows 8 can also be controlled by Group Policy. This policy setting is located at \\Computer Configuration\Administrative Templates\Windows Components\Store\ in the Local Group Policy Editor.

Question No: 138 – (Topic 2)

You use a Windows 8.1 laptop.

You want to back up the Pictures library.

You need to configure a backup strategy that backs up the Pictures library to a network drive every day. Additionally, you need to be able to recover a copy of any files from the library that have been changed within the last month.

What should you do?

  1. Create a system image.

  2. Configure File History.

  3. Create a Storage Pool.

  4. Configure computer restore points.

Answer: B Explanation:

http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx Protecting user files with File History

File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

As described above, to start protecting your libraries, you need to attach an external drive or select a network location. File History will store versions of your files on this device.

Further Information:

Ensurepass 2018 PDF and VCE

Question No: 139 – (Topic 2)

You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.

Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.

You need to ensure that all employees in the HR department can use Timesheet on their new computers.

What should you do?

  1. Use a local account to log on to each computer.

  2. Set the Turn off the Store application group policy to Enabled.

  3. Activate the sideloading product key on each computer.

  4. Set the Allow Store to install apps on Windows To Go workspaces group policy setting to Enabled.

Answer: C

Explanation: http://msdn.microsoft.com/en-us/library/windows/apps/jj657971.aspx Deploying enterprise apps

Preparing your PCs

Windows Server 2012 and Windows 8 Enterprise editions are classified as quot;enterprise sideloading enabled.quot; This means that the PCs are ready to receive the apps that you deploy outside of the Windows Store. To make sure a PC is ready, verify that:

The PC is domain joined.

The group policy is set to Allow trusted apps to install.

If you are deploying apps to Windows 8 Pro, Windows RT, or Windows 8 Enterprise, you can configure them for sideloading apps by:

Activating the product key for enterprise sideloading on each PC. Setting the group policy to Allow trusted apps to install.

Further Information:

http://technet.microsoft.com/en-US/windows/jj874388.aspx Try It Out: Sideload Windows Store Apps

By now, you are familiar with Windows Store apps. There are some pretty cool ones available in the store, and publishers are adding more every week. A great thing about Windows Store apps is they are super simple to install (and uninstall). But what about line of business (LOB) apps? You probably do not want to publish them through the Windows

Store since that would make them publically available.

Instead, you can sideload LOB apps. Sideloading simply means installing a Windows Store app without publishing it in and downloading it from the store. You install it directly.

Verify the Requirements

There are a small number of requirements computers must meet to sideload Windows Store apps on them. We will start with computers running Windows 8 Enterprise:

The computer running Windows 8 Enterprise must be joined to the domain. You must enable the “Allow all trusted apps to install” Group Policy setting.

The app must be signed by a \ certificate that is chained to a trusted root certificate. In many cases, the only thing you will have to do is enable the policy setting. Your computers running Windows 8 Enterprise are already joined to the domain, and your developers will sign the app.

Sideload the App for a User

As promised when we started this article, sideloading the sample app is no more difficult than running a few commands in Windows PowerShell. In fact, the first command should not really count, as it just imports the AppX module into Windows PowerShell.

Sideload the App for All Users

DISM is a command-line tool that you can use to service a Windows image – online or offline.

You can use DISM to provision a Windows Store app in an online Windows image for all users who share the computer. To do that, you use the Add-ProvisionedAppxPackage option.

Use a Sideloading Product Key

Earlier in this article, we listed the requirements for sideloading Windows Store apps. The computer must be running Windows 8 Enterprise. It must be joined to the domain, and you must enable the policy setting “Allow all trusted apps to install.” This is great if in a typical enterprise scenario where you use the Enterprise editions and join computers to the domain. What about increasingly common Bring Your Own Device (BYOD) scenarios, where Windows RT devices and computers running Windows 8 Pro are more common; and devices are not always joined to the domain?

Easy.

You can enable sideloading for these additional scenarios by installing a sideloading product key on the computers.

Conclusion

We hope that experiencing how to sideload Windows Store apps firsthand showed you how simple the process really is. You enable sideloading on computers running Windows 8 Enterprise by simply joining them to the domain and enabling the “Allow all trusted apps to install” policy setting. You can enable app sideloading in the scenarios that Table 1 describes by using a sideloading product key. To sideload an app for an individual user, you use the add-appxpackage cmdlet in Windows PowerShell, and to provision an app for all users, you use the Add-ProvisionedAppxPackage DISM option.

Ensurepass 2018 PDF and VCE

Figure 3. Sideloading Requirements

http://blogs.msdn.com/b/hyperyash/archive/2012/08/15/enabling-windows-store-on- windows-to-go-machines.aspx

Enabling Windows Store on Windows To Go machines

Windows To Go is a new feature that is introduced in Windows 8 Enterprise version. It enables users to boot directly into an enterprise level Operating System from their external hard-drives. Windows To Go is not intended to replace desktops, laptops or supplant other mobility offerings. Rather, it provides support for efficient use of resources for alternative workplace scenarios.

One of the restrictions that is applied to Windows To Go machines is that the Windows Store is disabled by default. .. But, it is not that you cannot enable it at all. It is possible, and you do it via the group policies. This can be through the Active Directory Group Policy (true for enterprise environments); or through local group policies (true for small environments).

http://newsignature.com/blog/2013/01/17/disabling-the-windows-8-app-store/ Disabling the Windows 8 App store

Once the Group Policy is applied to a workstation, then a user will see the following message if they try to access the App store:

Ensurepass 2018 PDF and VCE

Question No: 140 – (Topic 2)

A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1 contains computers that run Windows 7. Workgroup2 contains computers that run Windows 8.1.

You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers.

You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers by using Windows PowerShell Remoting.1

Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)

  1. Install Windows PowerShell 2.0 on the Workgroup1 computers.

  2. Run the winrmquickconfig command on the Workgroup2 computers.

  3. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM).

  4. Run the winrrnquickconfig command on the Workgroup1 computers.

  5. On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in Windows Remote Management (WinRM).

Answer: C,D Explanation:

http://technet.microsoft.com/en-us/magazine/ff700227.aspx

Enable and Use Remote Commands in Windows PowerShell

The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS- Management in Windows. Computers running Windows 7 and later include WinRM 2.0 or later. On computers running earlier versions of Windows, you need to install WinRM 2.0 or later as appropriate and if supported. Currently, remoting is supported on Windows Vista with Service Pack 1 or later, Windows 7, Windows Server 2008, and Windows Server 2008 Release 2.

In many cases, you will be able to work with remote computers in other domains. However, if the remote computer is not in a trusted domain, the remote computer might not be able to authenticate your credentials. To enable authentication, you need to add the remote computer to the list of trusted hosts for the local computer in WinRM. To do so, type:

winrm s winrm/config/client #39;@{TrustedHosts=quot;RemoteComputerquot;}#39;

Here, RemoteComputer should be the name of the remote computer, such as: winrm s winrm/config/client #39;@{TrustedHosts=quot;CorpServer56quot;}#39;

When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host: winrm quickconfig

This command analyzes and configures the WinRM service.

http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx Installation and Configuration for Windows Remote Management

The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:

Starts the WinRM service, and sets the service startup type to auto-start. Configures a listener for the ports that send and receive WS-Management protocol messages using either HTTP or HTTPS on any IP address.

Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.

Note: The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not

be enabled.

Further Information:

http://technet.microsoft.com/en-us/library/hh849694.aspx Enable-PSRemoting

The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.

You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed.

http://msdn.microsoft.com/en-us/library/ee309369(v=vs.85).aspx What#39;s New in WinRM 2.0

WinRM 2.0 is included in Windows Server 2008 R2 and Windows 7.

http://msdn.microsoft.com/en-us/library/ff637750(v=azure.10).aspx Install Windows PowerShell 2.0

Windows PowerShell 2.0 needs to be installed on Windows Server 2008 and Windows Vista only. It is already installed on Windows Server 2008 R2 and Windows 7.

100% Ensurepass Free Download!
70-687 PDF
100% Ensurepass Free Guaranteed!
70-687 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.