• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/115

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

115 Cards in this Set

  • Front
  • Back

A company has 100 client computers that run Windows 8.
You need to assign static IPv6 addresses to the client computers. Which Windows Powershell cmdlet should you run?



A. Set-NetTCPSetting
B. Set-NetIPInterface
C. Set-NetlPv6Protocol
D. set-NetIPAddress

D. set-NetIPAddress


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Portable client computers no longer connect to the corporate wireless network.
You need to ensure that when the corporate wireless network is available, the computers always connect to it automatically. Which two actions would achieve the goal?


(Each Correct Answer presents a complete solution. Choose two.)



A. Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the organizational unit that contains the computers.
B. Configure the corporate wireless network as an unmetered network.
C. Configure the corporate wireless network as a preferred network.
D. Manually connect to the corporate wireless network and select the option to connect automatically to that network.

C. Configure the corporate wireless network as a preferred network.



D. Manually connect to the corporate wireless network and select the option to connect automatically to that network.

A company has client computers that run Windows 8. The corporate network is configured for IPv4 and IPv6.
You need to disable Media Sensing for IPv6 on the client computers without affecting IPv4 communications. What should you do on each client computer?



A. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
B. Run the Disable-NetAdapter Windows PowerShell cmdlet.
C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
D. Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.

C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet


A company has 100 client computers that run Windows 8. The client computers are members of a workgroup.
A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall settings. Which Windows PowerShell cmdlet should you run on each client computer?



A. New-NetFirewallRule
B. Set-NetFirewallSetting
C. Set-NetFirewallRule
D. Set-NetFirewallProfile
E. New-NetIPSecMainModeRule

A. New-NetFirewallRule


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Portable client computers connect to the corporate wireless network.
You have the following requirements:


* Prevent users from configuring a wireless network by using settings from a USB flash drive.
* Do not affect the use of other USB devices.


You need to create a Group Policy object (GPO) to meet the requirements. Which GPO should you create?



A. A GPO that disables the Allow only USB root hub connected Enhanced Storage Features policy setting.
B. A GPO that enables wireless policy processing.
C. A GPO that prohibits connections to mobile broadband networks when roaming.
D. A GPO that configures Windows Connect Now settings.

D. A GPO that configures Windows Connect Now settings.


A company has client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. Which setting should you configure on the home computers?



A. Virtual Private Network connection
B. Remote Desktop local resources
C. DirectAccess connection
D. Remote Desktop Gateway IP address

Correct Answer: A


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Client computers use Window BitLocker Drive Encryption with a Trusted Platform Module (TPM) chip.
You need to create a Group Policy object (GPO) that will secure the TPM owner information. Which policy setting should you configure?



A. Enable the Turn on TPM backup to Active Directory Domain Services policy setting.
B. Enable the Configure the level of TPM usage authorization information available to the registry policy setting.
C. Set the Configure the level of TPM owner authorization information available to operating system policy setting to Full.
D. Enable the Configure TPM platform validation profile policy setting.

A. Enable the Turn on TPM backup to Active Directory Domain Services policy setting.


A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption with the data-only option o all client computers.
You delete a file containing highly confidential information from your computer.
You need to clear the free space on the hard drive to minimize the chance of the confidential information being recovered. Which command should you run on the client computer?



A. manage-bde -w
B. chkdsk/spotfix
C. diskpart clean
D. BdeHdCfg -target c: shrink

A. manage-bde -w


You deploy several tablet PCs that run Windows 8.
You need to minimize power usage when the user presses the sleep button. What should you do?



A. Configure the active power plan to disable Wake Timers.
B. Configure the active power plan to use Fast Startup.
C. In Power Options, configure the sleep button setting to Hibernate.
D. In Power Options, configure the sleep button setting to Sleep.

C. In Power Options, configure the sleep button setting to Hibernate.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain.
You have the following requirements:
* Ensure that files in shared network folders are available offline.
* Maximize efficiency for users who connect to shared network folders from a mobile device.


You need to configure Group Policy settings to meet the requirements. What should you do first?



A. Enable and configure the Configure slow-link mode policy setting.
B. Enable the Enable file synchronization on costed networks policy setting.
C. Enable the Synchronize all offline files when logging on policy setting.
D. Enable and configure the Specify administratively assigned Offline Files policy setting.

B. Enable the Enable file synchronization on costed networks policy setting.


You install Windows 8 on a desktop computer.
You create a system image and then install third-party desktop apps and create personal data.
You disable the creation of restore points. The computer is not running optimally.
You need to remove the third-party applications and preserve files that are stored in your Documents folder.
You start the computer from a system repair disk. Which troubleshooting option should you use?



A. Refresh your PC without affecting your files
B. System Restore
C. Remove everything and install Windows
D. System Image Recovery

A. Refresh your PC without affecting your files


A company has client computers that run Windows 8. File History is on. An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History. What should you do?



A. Configure the File History advanced settings to include the Archives folder.
B. From the File History configuration options, change the drive and select the Archives folder.
C. Create a library named History and add the Archives folder to the library.
D. Move the Archives folder into the Windows system folder.

C. Create a library named History and add the Archives folder to the library.


You have a portable computer that runs Windows 8.
You are creating a backup plan.
You have the following requirements:
* Automatically back up the files in your Documents folder every hour.
* Ensure that you can recover different versions of the backed-up files.
* Do not back up the Windows operating system files.


You need to configure the computer to meet the requirements. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Create a volume mount point in your Documents folder.
B. Connect an external hard drive to the computer.
C. Schedule a task to create a restore point every hour.
D. Create a recovery drive on drive C.
E. Turn on File History.

B. Connect an external hard drive to the computer.



E. Turn on File History.

A company has client computers that run Windows 8.
You install a new device on a client computer. The device installation includes an application that runs when the computer starts.
You experience problems with the application.
You need to prevent the application from running when the computer starts, without affecting any other application. What should you do?



A. Configure the application by using Task Manager.
B. Run the bcdedit command.
C. Configure the device by using Device Manager.
D. Run the msconuig command.

A. Configure the application by using Task Manager.


A company has client computers that run Windows 8. Finance department employees store files in the C:Finance directory. File History on a Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Set the Protection Settings for drive C to On.
B. Restore the data files from the Previous
C. Versions tab located in the folder properties.
D. Review the File History backup log.
E. Move the file into a library.

D. Review the File History backup log.



E. Move the file into a library.


An organization has client computers that run Windows 7.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You capture user settings and data files to a network share, and then perform a clean installation of Windows 8 on the client computers.
You need to apply the user profiles from the Windows 7 installation to the Windows 8 installation. What should you do?



A. Run the Ioadstate command.
B. Copy the Default Profile to a folder on drive C
C. Run the scanstate command.
D. Run Windows Easy Transfer and select the user profile to migrate.
E. Run the ImageX command.

C. Run the scanstate command.


A company has client computers that run Windows 8. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.
You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command-line tools should you use?


(Each Correct Answer presents part of the solution. Choose two.)



A. isoburn
B. BdeHdCfg
C. ImageX
D. bcd boot

C. ImageX



D. bcd boot


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.
You plan to upgrade the client computers to Windows 8 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose?


(Each Correct Answer presents a complete solution. Choose two.)



A. Use the Windows 8 online upgrade tool.
B. Use Group Policy to assign the Windows 8 installation file to the client computers.
C. Use the Microsoft Deployment Toolkit.
D. Extract the contents of the Windows 8 .iso image file to a new shared folder and run the setup program from that folder.

C. Use the Microsoft Deployment Toolkit.



D. Extract the contents of the Windows 8 .iso image file to a new shared folder and run the setup program from that folder.


A company has 100 client computers that run Windows XP 64-bit Edition.
You are deploying new computers that run a 32-bit version of Windows 8.
You need to transfer the contents of each user’s Documents folder to the new computer by using the least amount of administrative effort. What should you do?



A. Back up the folders by running the NTBackup command. Then restore the backup to the new computer.
B. Manually copy the folder content to a USB flash drive. Then paste the files to the new computer.
C. Use Windows Easy Transfer.
D. Use the User State Migration Tool.

B. Manually copy the folder content to a USB flash drive. Then paste the files to the new computer.


A company has 100 client computers that run Windows 8.
You plan to install a custom app that requires a license key.
You need to ensure that the installation process does not prompt for the manual entry of a license key. What should you do?



A. Install and run the Microsoft Deployment Toolkit.
B. Install and run the Microsoft Assessment and Planning Toolkit.
C. Install and run the Windows App Certification Kit.
D. Install and run the Windows Application Compatibility Toolkit.

A. Install and run the Microsoft Deployment Toolkit.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are members of the domain. Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone. Users of one client computer are able to download and install an application from a site within the Restricted Sites zone.
You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone. What should you do?



A. Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
B. Configure the Software Restriction Policy settings in the local Group Policy of the computer.
C. Add the blocked application as a software restriction policy to the GPO that configures AppLocker.
D. Run the Cet-AppLockerPolicy Windows PowerShell cmdlet.
E. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.

B. Configure the Software Restriction Policy settings in the local Group Policy of the computer.


You manage computers that run Windows 8.
You plan to install a desktop app named App1 on one of the client computers.
You need to install the app without any user interaction and without displaying a progress bar. Which command should you run?



A. msiexec /i appl.msi /qb
B. msiexec /x appl.msi /qb
C. msiexec /i appl.msi /qn
D. msiexec /x appl.msi /qn

C. msiexec /i appl.msi /qn


You update the video card driver on a portable computer that runs Windows 8. When a user connects the portable computer to an external monitor, the external monitor duplicates the display on the portable computer screen.
You need to ensure that the user can display additional desktop space on the external monitor. What should you do?



A. Run the DisplaySwitch /extend command.
B. Start the computer from the Windows 8 installation media and perform a system image recovery.
C. Roll back the video card driver to the previous version.
D. Run the sic /scannow command.

A. Run the DisplaySwitch /extend command.


A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.
A client computer hosts a Windows 8 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit.


You have the following requirements:
* Configure the test environment to allow VMs to communicate with the host machine.
* Minimize impact on the host machine.


You need to meet the requirements. What should you do?



A. Create a new virtual switch with a Private Network [CP1] connection type.
B. Create a new virtual switch with an ExternalNetwork connection type.
C. Change the VLAN ID of the private virtual switch to Enable Virtual LAN identification.
D. Create a new virtual switch with an Internal Network connection type.

D. Create a new virtual switch with an Internal Network connection type.


A company has client computers that run Windows 8.
You attempt to roll back a driver for a specific device on a client computer. The Roll Back Driver button is unavailable in Device Manager.
You need to roll back the driver to the previous version. What should you do first?



A. In the system properties for hardware, modify the device installation settings.
B. Disable driver signature enforcement.
C. In the local Group Policy, modify the device installation restrictions.
D. Run Device Manager as an administrator.

D. Run Device Manager as an administrator.


A company has client computers that run Windows 8. On all client computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled and the Download updated compatibility lists from Microsoft option disabled. The corporate website was designed for a previous version of Internet Explorer. When viewed on the client computers, menus and image on the corporate website are displayed out of place.
You need to ensure that the corporate website displays correctly on the client computers without negatively impacting the display of any other website. What should you do?



A. Manually add the corporate website to the compatibility view settings.
B. Enable the Display all websites in Compatibility View option.
C. Disable the Display intranet sites in Compatibility View option.
D. Manually download an updated compatibility list from Microsoft.

A. Manually add the corporate website to the compatibility view settings.


A portable computer that runs Windows 8 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.
You need to ensure that the computer automatically downloads updates by using Windows Update only while connected to the wired corporate network connection. What should you do?



A. Set the corporate wireless network to metered.
B. Set the corporate wireless network to non-metered.
C. Configure the Specify intranet Microsoft update service location local Group Policy setting.
D. Configure a Windows Firewall connection security rule.

A. Set the corporate wireless network to metered.


You manage client computers that run Windows 7 and Windows 8.
You are configuring Windows updates for all client computers.
You have the following requirements:
* All client computers must use a specific Windows Server Update Services (WSUS) server for updates.
* All client computers must check for updates each hour.


You need to configure local Group Policy settings to meet the requirements. Which three actions should you perform?


(Each answer presents part of the solution. Choose three.)



A. Configure the Automatic Maintenance Activation Boundary policy setting.
B. Configure the Automatic Updates detection frequency policy setting.
C. Enable the Specify intranet Microsoft update service location policy setting.
D. Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.
E. Enable the Reschedule Automatic Updates scheduled installations policy setting.

B. Configure the Automatic Updates detection frequency policy setting.



C. Enable the Specify intranet Microsoft update service location policy setting.



D. Enable the Configure Automatic Updates policy setting for automatic download and scheduled installation.


A company has client computers that run Windows 8.
You need to create a baseline performance report that includes disk status by using the least amount of administrative effort. What should you do?



A. Start the System Diagnostics Data Collector Set.
B. Create and start a custom Data Collector Set.
C. Start the System Performance Data Collector Set.
D. Add counters to Performance Monitor, and then print the Performance Monitor output.

A. Start the System Diagnostics Data Collector Set.


A company has client computers that run Windows 8 in a kiosk environment.
You need to ensure that Windows updates are automatically applied and cannot be disabled by users. What should you do?



A. Configure Windows Update to install updates automatically.
B. In the local Group Policy, enable the Turn on recommended updates via Automatic Updates policy setting.
C. msiexec /i app1.msi /qn
D. In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.

D. In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.


A company has client computers that run Windows 8. Each computer has two hard drives.
You need to create a dynamic volume on each computer that maximizes write performance. Which kind of dynamic volume should you create?



A. Striped volume
B. RAID 5 volume
C. Spanned volume
D. Mirrored volume

A. Striped volume


A company has client computers that run Windows 8.
The company implements the following security requirements:
* All client computers must use two-factor authentication.
* At least one authentication method must include exactly four characters or gestures.


You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose?


(Each Correct Answer presents part of the solution. Choose two.)



A. PIN
B. Biometric authentication
C. Picture password
D. Microsoft account

A. PIN



B. Biometric authentication


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs. Which permission should you grant to the Sales group?



A. Manage queue
B. Print
C. Manage documents
D. Manage this printer
E. Manage spooler

B. Print


Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
* Users from the Supervisors AD security group must be able to open files, but not modify them.
* Users from the Marketing AD security group must be able to create, modify, and delete files.
* Users from both groups must not be able to delete the folder.


Which permissions should you set?



A. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission.
B. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission.
C. Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.
D. Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission.

C. Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows Vista and are members of the domain.
A Group Policy object (GPO) configuring a software restriction policy is implemented in the domain to block a specific application.
You upgrade a computer to Windows 8 and implement a GPO that configures an AppLocker rule in the domain. The blocked application runs on the Windows 8 computer but not on the Windows Vista computers.
You need to ensure that the application is blocked from running on all computers and the AppLocker rule is applied to the computers in the domain. What should you do?



A. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
B. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
C. Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
D. Configure the software restriction policy as a local policy on the Windows 8 computer.
E. Add the blocked application as a software restriction policy to the GPO that configures AppLocker.

A. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.


A company has client computers that run Windows 8. Users store data on company-issued USB flash drives.
You establish that users are able to store data on personally owned USB flash drives.
You need to ensure that users can save data on company flash drives but not on personal flash drives. What should you do?



A. Disable driver signature enforcement.
B. Run Device Manager as an administrator.
C. In the local Group Policy, modify the device installation restrictions.
D. In the system properties for hardware, modify the device installation settings.

C. In the local Group Policy, modify the device installation restrictions.


You manage computers that run Windows 8.
You plan to install a desktop app named MarketingApp on one of the client computers.
You need to display a progress bar to the user while installing the app. Which command should you run?



A. msiexec /i marketingapp.msi Jqn
B. msiexec /i marketingapp.msi /qb
C. msiexec /x marketingapp.msi /qb
D. msiexec /x marketingapp.msi /qn

B. msiexec /i marketingapp.msi /qb


A company has 10 client computers that run Windows 8.
You are responsible for technical support.
You purchase a support tool from the Windows Store while logged in with your Microsoft account.
You install the support tool on several client computers. Three months later, you attempt to install the support tool on another client computer. The installation fails.
You need to ensure that you can install the support tool on the client computer. What should you do?



A. Log in with your Microsoft account and remove a computer from the Windows Store device list.
B. On the computer on which you want to install the tool, synchronize the Windows Store application licenses.
C. Disassociate your Microsoft account from the computer on which you want to install the tool. Then reassociate your Microsoft account with the computer.
D. Reset your Microsoft account password.

A. Log in with your Microsoft account and remove a computer from the Windows Store device list.


You update the video card driver on a computer that runs Windows 8.
You can no longer configure the display settings to extend the display to a projector.
You need to restore the display options as quickly as possible and retain all user data.
What should you do?



A. Roll back the video card driver to the previous version.
B. Run the DisplaySwitch/extend command.
C. Run the sic /scannow command.
D. Start the computer from the Windows 8 installation media and perform a system image recovery.

A. Roll back the video card driver to the previous version.


A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.
A client computer hosts a Windows 8 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit.


The VMS are unable to connect to the domain controller.
You have the following requirements:
* Configure the test environment to allow VMs to communicate with the domain controller.
* Ensure that the VMs can communicate with other VMS fl the test environment when the domain controller is unavailable.


You need to meet the requirements. What should you do first?



A. Create a new virtual switch with an Internal Network connection type.
B. Create a new virtual switch with a Private Network connection type.
C. Create a new virtual switch with an External Network connection type.
D. Change the connection type of the private virtual switch to Internal only.

C. Create a new virtual switch with an External Network connection type.


A company has an Active Directory Domain Services domain. All client computers run Windows 8 and are joined to the domain.
You run the ipconfiq command on a client computer. The following output depicts the results. Ethernet adapter Local Area Connection 3:
You need to ensure that you can establish a DirectAccess connection from the client computer to the network. What should you do?



A. Create a new VPN connection.
B. Remove the computer from the domain.
C. Enable IPv6 on the network adapter.
D. Configure a static IPv4 address.

C. Enable IPv6 on the network adapter.


An organization has client computers that run Windows 7.
You upgrade the client computers to Windows 8 without migrating the local user profiles.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You need to migrate the user profiles from the Windows 7 installation to the Windows 8 installation. What should you do first on each client computer?



A. Run the scanstate command.
B. Run Windows Easy Transfer and select the user profile to migrate
C. Run the Ioadstate command.
D. Copy the Default Profile to a folder on drive C
E. Run the ImageX command.

A. Run the scanstate command.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share. Which permission should you grant to the Sales group?



A. Manage queue
B. Manage this printer
C. Print
D. Manage spooler
E. Manage documents

E. Manage documents


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
A notification appears when domain users change Windows settings and when applications try to make changes to client computers.
You need to ensure that a notification appears only when an application tries to make changes to the computer. What should you do?



A. Configure the Notification Area Icons settings on the client computers.
B. Create a Group Policy object (GPO) that enables the Admin Approval Mode for the built-in Administrator account policy.
C. Configure the User Account Control (UAC) settings on the client computers.
D. Create a Group Policy object (GPO) that disables the Run all administrators in Admin Approval Mode policy.

C. Configure the User Account Control (UAC) settings on the client computers.


You deploy several tablet PCs that run Windows 8.
You need to minimize power usage when the user presses the sleep button. What should you do?



A. In Power Options, configure the sleep button setting to Hibernate.
B. Disable the C-State control in the computer’s BIOS.
C. Configure the active power plan to set the system cooling policy to passive.
D. In Power Options, configure the sleep button setting to Sleep.

A. In Power Options, configure the sleep button setting to Hibernate.


Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
* Users from the Marketing security group must be able to open files, but not modify them.
* Users from the Supervisors security group must be able to create, modify, and delete files.
* Users from both groups must not be able to delete the folder.


Which permissions should you set?



A. Assign the Marketing group the Read permission. Assign the Supervisors group the Read and Write permissions and the Delete Subfolders and Files special permission.
B. Assign the Marketing group the Read and Write permissions. Assign the Supervisors group the Full Control permission.
C. Assign the Marketing group the Read and Write permissions. Assign the Supervisors group the Modify permission and the Delete Subfolders and Files special permission.
D. Assign the Marketing group the Read permission. Assign the Supervisors group the Read and Write permissions and the Delete special permission.

A. Assign the Marketing group the Read permission. Assign the Supervisors group the Read and Write permissions and the Delete Subfolders and Files special permission.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry. What should you do?



A. Enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 for the Configure TPM validation profile for native UEFI firmware configuration policy setting.
B. Create a Group Policy object (GPO) that disables the Configure the level of TPM owner authorization information available to operating system policy setting.
C. Create a Group Policy object (GPO) that sets the Configure the level of TPM owner authorization information available to operating system policy setting to None.
D. Create a Group Policy object (GPO) that enables the Turn on TPM Local Encryption policy setting.

C. Create a Group Policy object (GPO) that sets the Configure the level of TPM owner authorization information available to operating system policy setting to None.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain.
You have the following requirements:
* Ensure that files in shared network folders are available offline.
* Minimize all data access times.
* Reduce network bandwidth usage.


You need to configure Group Policy settings to meet the requirements. What should you do first?



A. Enable the Enable file synchronization on costed networks policy setting.
B. Enable and configure the Configure slow-link mode policy setting.
C. Enable and configure the specify administratively assigned Offline Files policy setting.
D. Enable the Synchronize all offline files when logging on policy setting.

B. Enable and configure the Configure slow-link mode policy setting.


A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption with the data-only option on all client computers.
You need to remove data fragments that exist in the free space on the local computer disk drives, without affecting current user data. Which command should you run on the computers?



A. BdeHdCfg
B. diskpart
C. chkdsk
D. manage-bde

D. manage-bde


A company has 100 client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. What should you do?



A. Configure a Virtual Private Network connection.
B. Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.
C. Configure the local resource settings of the Remote Desktop connection.
D. Configure a DirectAccess connection.

B. Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.


You install Windows 8 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app.
You need to remove only the most recently installed third-party desktop app.
You start the computer from a system repair disk. Which troubleshooting option should you use?



A. System Image Recovery
B. Remove everything and install Windows
C. System Restore
D. Refresh your PC without affecting your files

C. System Restore


A company has a main office and three branch offices. The company has 20 portable computers that run Windows 8. Portable computer users can install local devices while in any branch office.
Your manager has instructed you to collect information about faulty devices and drivers within the company’s branch offices.
You need to create a performance report that includes a list of incorrectly installed devices by using the least amount of administrative effort. What should you do?



A. Add counters from each portable computer to Performance Monitor, and then print the Performance Monitor output.
B. Start the System Performance Data Collector Set on each portable computer.
C. Start the System Diagnostics Data Collector Set on each portable computer.
D. Create and start a custom Data Collector Set on each portable computer.

C. Start the System Diagnostics Data Collector Set on each portable computer.


A company has an Active Directory Domain Services (AD DS) domain. Client computers in the Test department run Windows 8 and are connected to the domain.
You need to ensure that Windows updates are not automatically applied and cannot be enabled by users. What should you do?



A. Create a Group Policy object (GPO) to enable the Turn on recommended updates via Automatic Updates policy setting.
B. Configure Windows Update to install updates automatically.
C. Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update features policy setting.
D. Create a Group Policy object (GPO) to configure the Configure Automatic Updates policy setting.

C. Create a Group Policy object (GPO) to configure the Remove access to use all Windows Update features policy setting.


A company has client computers that run Windows 8. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.
You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup. Which three actions should you perform?


(Each Correct Answer presents part of the solution. Choose three.)



A. Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.
B. Create and configure a collector-initiated subscription.
C. Start the Windows Event Collector service on all computers other than COMPUTER1.
D. Start the Windows Event Collector service on COMPUTER1.
E. Create and configure a source computer¡ªinitiated subscription.
F. Start the Windows Event Log service on all computers other than COMPUTER1.
G. Add COMPUTER1 machine account to the Event Log Readers local group on all other computers.

B. Create and configure a collector-initiated subscription.



D. Start the Windows Event Collector service on COMPUTER1.



G. Add COMPUTER1 machine account to the Event Log Readers local group on all other computers.


A portable computer that runs Windows 8 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.
You need to ensure that the computer automatically downloads updates by using Windows Update while also connected to the wireless corporate network connection. What should you do?



A. Set the corporate wireless network to metered.
B. Set the corporate wireless network to non-metered.
C. Configure the Specify intranet Microsoft update service location local Group Policy setting.
D. Configure a Windows Firewall connection security rule.

B. Set the corporate wireless network to non-metered.


A company has client computers that run Windows 8. Each computer has two hard drives.
You need to create a dynamic volume on each computer that maximizes write performance with data fault tolerance. Which kind of dynamic volume should you create?



A. Striped Volume
B. RAID 5 Volume
C. Spanned Volume
D. Mirrored Volume

D. Mirrored Volume


A company has client computers that run Windows 8.
The company implements the following security requirements:
* All client computers must use two-factor authentication.
* At least one authentication method must include more than four characters or gestures.


You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose?


(Each Correct Answer presents part of the solution. Choose two.)



A. PIN
B. Biometric authentication
C. Picture Password
D. Microsoft Account

B. Biometric authentication



D. Microsoft Account


All client computers in a company’s network environment run Windows 8.
A client computer has two internal hard disk drives. The hard drives are configured as shown in the following table.


You are choosing a backup destination for drive C.
You have the following requirements:
* Ensure that the backup file is available if drive C fails.
* Ensure that the backup file can be accessed by other computers on the network.
* Support the backup of multiple system images.


You need to select a backup destination that meets the requirements. Which destination should you select?



A. shared network folder
B. drive D
C. multiple DVDs
D. external hard drive

D. external hard drive


You are in the process of setting up File History on your workstation.
You are configuring the Size of offline cache Advanced settings. Which of the following is the default setting?



A. 2%
B. 5%
C. 10%
D. 20%

B. 5%


You are in the process of setting up File History on your workstation.
You are configuring the Save copies of files Advanced settings. Which of the following is the default setting?



A. 15 minutes
B. 30 minutes
C. 1 hour
D. 6 hours

C. 1 hour


You are employed as an administrator at contoso.com. The network consists of a single Active Directory Domain Services (AD DS) domain, named contoso.com. All workstations on the contoso.com network have Windows 8 installed.
You need to configure files history on a client system.
You notice that the free storage space on the selected drive is low, but you do not have a spare drive to replace it. What should you do?



A. Configure the save copies of files setting to back up files once a day.
B. Configure Size of offline cache setting to 2%.
C. Keep saved versions setting to be 1 month.
D. Keep saved versions setting until space is needed.

D. Keep saved versions setting until space is needed.


You are employed as an administrator at contoso.com. The contoso.com network is made up of an Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the contoso.com network, including laptops, have Windows 8 installed.
Your users have just been issued new laptops for use outside the office. These users currently log in to their desktop workstations using a Windows domain account. They would like their laptops to be set up exactly like their desktop workstations. Which of the following would easily allow them to achieve this?



A. Transfer the user settings with the File and Transfer wizard.
B. Windows Easy Transfer.
C. Migrate the user profiles with USMT.
D. Link the Windows domain accounts to a Windows Live ID.

D. Link the Windows domain accounts to a Windows Live ID.


A company has 50 touch-enabled client computers that run Windows 7.
You are planning to migrate the client computers to Windows 8.
You have the following requirements:
* Choose the installation or upgrade path that includes touch-optimized desktop versions of Microsoft Word, Excel, PowerPoint, and OneNote.
* Minimize new hardware requirements.


You need to choose the path that meets the requirements. Which path should you choose?



A. Upgrade to Windows RT.
B. Perform a clean installation of Windows 8 Enterprise.
C. Purchase hardware with Windows RT pre-installed.
D. Upgrade to Windows 8 Enterprise.

D. Upgrade to Windows 8 Enterprise.


A company has 100 client computers that run Windows Vista. The company uses several custom applications. The company plans to replace the Windows Vista computers with new computers that run Windows 8.
You need to establish which of the currently installed applications will work on Windows 8. What should you do?



A. Install and run the Windows App Certification Kit.
B. Install and run the Microsoft Assessment and Planning Toolkit.
C. Install and run the Microsoft Deployment Toolkit.
D. Install and run the Windows Application Compatibility Toolkit.

B. Install and run the Microsoft Assessment and Planning Toolkit.


A company has 10 client computers that run Windows 8. Employees log on to resources by using multiple accounts.
You need to back up the user name and password for each logon account. What should you do on each client computer?



A. Back up each user’s Personal Information Exchange PKCS #12 (.pfx) certificate.
B. Use Credential Manager to save the information to a USB flash drive.
C. Use File History to back up the ntuser.dat file.
D. Run the Export-Certificate Windows PowerShell cmdlet.

B. Use Credential Manager to save the information to a USB flash drive.


A company has client computers that run Windows 8.
You implement an AppLocker file hash rule that allows an application to run.
You then apply a service pack to the application. When users attempt to run the application, the application is blocked by Group Policy.
You need to ensure that the application runs. What should you do?



A. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
B. Set the wired network connection to non-metered.
C. Set the wired network connection to metered.
D. Configure the Automatic Maintenance setting.

B. Set the wired network connection to non-metered.


A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server. All client computers run Windows 8 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement. After deploying Windows Updates to the computers, the web application stops responding.
You establish that a specific optional update installed by Windows Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable.
You need to remove the optional update from one client computer. What should you do?



A. Install and run the Debugging tools for Windows.
B. Clear the SusClientID registry value on the client computer.
C. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Crash Analyzer tool.
D. Run the wuauclt /resetauthorization command on the client computer.
E. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.

E. Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.


A client computer that runs Windows 8 has two hard disk drives: a system drive and a data drive.
You are preparing to back up the computer prior to installing a developing software product.
You have the following requirements:
* The system disk that is part of the backup must be mountable from within Windows.
* The system disk that is part of the backup must be bootable.
* The backup must be viable to restore in the event of a hard disk failure.
* The backup must contain data from both hard disk drives.
You need to select a backup method. Which method should you use?



A. System repair disk
B. Storage pool
C. System image
D. File History

C. System image


You administer Windows 8 client computers in your company network.
You receive a virtual hard disk (VHD) file that has Windows 8 Pro preinstalled, along with several business applications.
You need to configure your client computer to start from either the VHD file or from your current operating system. Which three actions should you perform?


(Each Correct Answer presents part of the solution. Choose three.)



A. Import the contents of the system store from a file.
B. Export the contents of the system store into a file.
C. Attach the VHD file by using Disk Management.
D. Make the VHD disk bootable.
E. Create a new empty boot configuration data store.
F. Create a new entry in the boot configuration data store.

C. Attach the VHD file by using Disk Management.



D. Make the VHD disk bootable.



F. Create a new entry in the boot configuration data store.


A company has client computers that run Windows 8. The client computer systems frequently use IPSec tunnels to securely transmit data.
You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?



A. 3DES
B. DES
C. RSA
D. AES

D. AES


You are configuring a computer that will be used in a kiosk in a public area.
You install a new internal hard drive.
You need to protect the computer from starting an unauthorized operating system. What should you do?



A. Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled. Install Windows 8 Pro 64-bit using UEFI and install it on the internal hard drive.
B. Install Windows 8 Pro 64-bit on the internal hard drive. Enable BitLocker on the internal hard disk.
C. Partition the internal hard drive as MBR disk. Install Windows 8 Enterprise 64-bit.
D. Partition the internal hard drive as GPT disk. Install Windows 8 Pro 64-bit.

A. Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled. Install Windows 8 Pro 64-bit using UEFI and install it on the internal hard drive.


A desktop computer that runs Windows 8 downloads updates but does not install them. The computer is connected to the corporate network by using a wired network connection.
You need to ensure that the computer automatically installs updates. What should you do?



A. Set the wired network connection to non-metered.
B. Configure the Automatic Maintenance setting.
C. Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
D. Set the wired network connection to metered.

B. Configure the Automatic Maintenance setting.


You administer a group of 10 client computers that run Windows 8. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption.
You need to back up the BitLocker recovery key. Which two options can you use?


(Each correct Answer presents a complete solution. Choose two.)



A. Save the recovery key to a file on the BitLocker-encrypted drive.
B. Save the recovery key in the Credential Store.
C. Save the recovery key to SkyDrive.
D. Print the recovery key.

A. Save the recovery key to a file on the BitLocker-encrypted drive.



D. Print the recovery key.


You administer Windows 8 computers in your company network.
You install a new video driver. The computer will not start properly after restart.
You are able to enter Safe Mode with Command Prompt.
You need to be able to start normally.
You also need to ensure that user data is not lost. What should you do?



A. Run the rstrui.exe command.
B. Roll back the driver.
C. Turn on File History.
D. Create a restore point.

D. Create a restore point.


You administer Windows 8 Pro client computers in your company network.
You need to configure a backup and recovery solution that meets the following requirements:
* Recovers the system if it doesn’t start.
* Recovers the system if the hard drive fails. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Turn on File History.
B. Create a storage space.
C. Configure system protection.
D. Create a system repair disk.
E. Create a system image backup.


D. Create a system repair disk.



E. Create a system image backup.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.
You plan to upgrade the client computers to Windows 8 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose?


(Each Correct Answer presents a complete solution. Choose two.)



A. Use the Volume Activation Management Tool.
B. Use the Microsoft Deployment Toolkit.
C. Use the Windows 8 online upgrade tool.
D. Create a catalog (.clg) file by using Windows System Image Mana
ger (SIM).


A. Use the Volume Activation Management Tool.



B. Use the Microsoft Deployment Toolkit.


You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network.
You add a new Windows 8 computer to the perimeter network.
You enable only Remote Desktop access to the Windows 8 computer from other computers located outside the perimeter network.
You need to use the Windows 8 computer to manage the Windows servers in the perimeter network. What should you do?



A. Add the Windows 8 computer as a Trusted Host to the servers.
B. Enable PowerShell Remoting on the Windows 8 computer.
C. Add the Windows 8 computer as a Trusted Host to computers outside the perimeter network.
D. Install Remote Server Administration Tools for Windows 8 (RSAT) on the Windows 8 computer.


B. Enable PowerShell Remoting on the Windows 8 computer.


A company has 10 portable client computers that run Windows 8. The portable client computers have the network connections described in the following table. clip_image001 None of the computers can discover other computers or devices, regardless of which connection they use.
You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. What should you do on the client computers?



A. For the CorpWired connection, select yes, turn on sharing and connect to devices.
B. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the hotspot connection, select No, don’t turn on sharing or connect to devices.
C. For the CorpWifi connection, select yes, turn on sharing and connect to devices.
D. Turn on network discovery for the Public profile.
E. Turn on network discovery for the Private profile.


B. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the hotspot connection, select No, don’t turn on sharing or connect to devices.


You administer Windows 8 Pro laptops in your company network.
Your network has a Remote Access Server (RAS) in a perimeter network that runs Windows Server 2012. All laptop users have a PPTP VPN configured on their computer. Users report that their VPN disconnects when they switch between WLAN and WWAN networks.
You need to ensure that if a VPN is disconnected, the laptop will automatically attempt to reconnect. What should you do?



A. Create a new VPN connection, and the open Local Computer Policy and define Files not cached policy.
B. Run the netsh.exe command and include the WLAN parameter.
C. Create a new VPN connection, and disable offline files.
D. Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services.


C. Create a new VPN connection, and disable offline files.


You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain. Employees in the human resources (HR) department are getting new Windows 8 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers. What should you do?



A. Use a Microsoft account to log on to each computer.
B. Use a local account to log on to each computer.
C. Activate the sideloading product key on each computer.
D. Install and run the Windows App Certification Kit.


A. Use a Microsoft account to log on to each computer.


A company has client computers that run Windows 8. Finance department employees store files in the C:Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Review the File History backup log.
B. Move the file into a library.
C. Restore the data files from the Previous Versions tab located in the folder properties.
D. Set the Protection Settings for drive C to On.


A. Review the File History backup log.



B. Move the file into a library.


A company has client computers that run Windows 8. Each computer has two hard drives.
You need to create a dynamic volume on each computer to support the following features:
* Fault tolerance
* Fast write performance


What kind of dynamic volume should you create?



A. Striped volume
B. Spanned volume
C. RAID 5 volume
D. Mirrored volume

D. Mirrored volume


A portable computer that runs Windows 8 uses a mobile broadband connection. The computer successfully downloads Windows updates only when not connected to the corporate wireless network.
You need to ensure that the computer automatically downloads updates by using Windows Update while connected to the corporate wireless network. What should you do?



A. Configure the Specify intranet Microsoft update service location local Group Policy setting.
B. Set the corporate wireless network to metered.
C. Set the corporate wireless network to non-metered.
D. Configure a Windows Firewall connection security rule.

C. Set the corporate wireless network to non-metered.


A company has client computers that run Windows 8. The client computers are in a workgroup. Windows Remote Management (WinRM) is configured on all computers.
You need to configure a computer named COMPUTER1 to retrieve Windows event logs from all other computers in the workgroup. Which three actions should you perform?


(Each Correct Answer presents part of the solution. Choose three.)



A. Start the Windows Event Collector service on COMPUTER1.
B. Add machine accounts of all other computers to the Event Log Readers local group on COMPUTER1.
C. Start the Windows Event Log service on all computers other than COMPUTER1.
D. Create and configure a source computer-initiated subscription.
E. Add the COMPUTER1 machine account to the Event Log Readers local group on all computers.
F. Start the Windows Event Collector service on all computers other than COMPUTER1.
G. Create and configure a collector-initiated subscription.

C. Start the Windows Event Log service on all computers other than COMPUTER1.



E. Add the COMPUTER1 machine account to the Event Log Readers local group on all computers.



G. Create and configure a collector-initiated subscription.


You administer Windows 8 Enterprise computers in your company’s Active Directory Domain Services (AD DS) domain.
Your company uses several peripheral devices. The drivers for these devices are not available on Windows Update.
You need to ensure that the drivers install when users connect these devices to their computers. What should you do?



A. For the Group Policy setting Prioritize all digitally signed drivers equally during the driver ranking and selection process, select Disabled.
B. From Device Manager, find the detected scanner device and select Update Driver.
C. Add the following registry key to the computers: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/DevicePath. Add %systemroot%inf and the UNC path to the drivers share.
D. For the Group Policy setting Configure driver search locations, select Enabled. Make the drivers available on the UNC path to the driver’s share.

C. Add the following registry key to the computers: HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/DevicePath. Add %systemroot%inf and the UNC path to the drivers share.


You use a Windows 8 Pro computer. The computer stores research data in a folder named C:Research.
You turn on File History.
You need to back up the Research folder. What should you do?



A. Create a new library and include the folder in the library.
B. Create a new volume mount point in the root of the folder.
C. Create a new storage space and move the folder to the storage space.
D. Create a new restore point.

C. Create a new storage space and move the folder to the storage space.


You administer 100 Windows 8 laptops, all of which have PowerShell Remoting enabled.
You run the following command on a computer named Computer1.


Invoke-Command -filepath \Computer2ShareMyScript.psl -computername Computer2 MyScriptl.psl fails to execute.


You verify that you are able to access it from the network.
You need to be able to execute MyScriptl.psl on Computer1. What should you do?



A. Copy MyScriptl.psl to a local drive on Computer1 and run the Invoke-Command cmdlet on Computer1.
B. Run the Set-ExecutionPolicy cmdlet on Computer1.
C. Run the Enter-PSSession cmdlet on Computer1.
D. Run the Set-ExecutionPolicy cmdlet on Computer2.

B. Run the Set-ExecutionPolicy cmdlet on Computer1.


You administer Windows 8 computers for a software development company. The marketing department is going to meet a potential customer to demonstrate the product.
You want to configure a laptop that has a stand-alone virtual machine that runs Windows 8 Enterprise and the latest build of your software.
You need to enable BitLocker on the system drive of the virtual machine. What should you do first?



A. Activate Windows.
B. Join the virtual machine to an Active Directory Domain Services (AD DS) domain.
C. Turn on the Require additional authentication at startup local policy.
D. Turn off the Require additional authentication at startup local policy.

C. Turn on the Require additional authentication at startup local policy.


A company has a main office and several branch offices. The company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. All printers are deployed to all client computers by using Group Policy. When a user attempts to print from his portable client computer while at a branch office, the main office printer is set as his default printer.
You need to ensure that a location-specific default printer for each branch office is set for the user. What should you do?



A. Create a Group Policy object (GPO) that enables the Computer location policy setting.
B. In the Manage Default Printers dialog box, select the Always use the same printer as my default printer option.
C. In the Manage Default Printers dialog box, select the Change my default printer when I change networks option.
D. Create a Group Policy object (GPO) that enables the Allow Print Spooler to accept client connections policy setting.

C. In the Manage Default Printers dialog box, select the Change my default printer when I change networks option.


You use many Windows Store apps on a computer that runs Windows 8.
You are planning a performance audit on the computer.
You need to establish the volume of data upload from each app over a five-day period. Which three actions should you perform?


(Each Correct Answer presents part of the solution. Choose three.)



A. On the fifth day, review the upload statistics in Task Manger.
B. Configure Task Manager to save usage data to a file.
C. Configure Task Manager to record data upload from each Windows Store app.
D. On the first day, delete any existing application usage history
E. Open Task Manager and add the Uploads column.

A. On the fifth day, review the upload statistics in Task Manger.



B. Configure Task Manager to save usage data to a file.



D. On the first day, delete any existing application usage history


A computer runs Windows 8.
You install an application by running an .msi file.
You need to apply a patch to the application. Which command should you run?



A. dism /Online /add-package:C:MyPatch.msp
B. dism /get-AppPatches /get-PackageInfo:C:MyPatch.msp
C. msiexec /x “C:MyPatch.msp”
D. msiexec/p “C:MyPatch.msp”

D. msiexec/p “C:MyPatch.msp”


A company has client computers that run Windows 8. Users can run applications that have been downloaded from the Internet only with administrator approval.
You need to ensure that users can run downloaded applications without administrator approval. What should you do?



A. Set the Internet zone privacy level to Low.
B. Set the Internet zone security level to Medium.
C. Set the User Account Control (UAC) settings to Never notify.
D. Turn off Windows SmartScreen.


A. Set the Internet zone privacy level to Low.


You are configuring two client computers that run Windows 8:
A desktop computer named COMPUTER1 and a portable computer named COMPUTER2.
You have the following requirements:
* Store all personal data in a folder named Data on COMPUTER1.
* Ensure that you can access all personal data from COMPUTER2, even when a network connection is unavailable.
* Synchronize personal data between the computers twice a day.
You need to configure the computers to meet the requirements. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. In Sync Center. configure a schedule for offline files.
B. From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be available offline.
C. From COMPUTER2,
map a network driver to the Data folder on COMPUTER1.
D. In Sync Center, set up a new sync partnership.
E. From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be available offline


A. In Sync Center. configure a schedule for offline files.



D. In Sync Center, set up a new sync partnership.


A company has client computers that run Windows 8.

You set up new virtual private network (VPN) connections on all client computers. The VPN connections require the use of a smart card for authentication. Users are unable to connect to the corpor...

A company has client computers that run Windows 8.
You set up new virtual private network (VPN) connections on all client computers. The VPN connections require the use of a smart card for authentication. Users are unable to connect to the corporate network by using the VPN connections. The connection properties are configured as shown in the exhibit. clip_image001
You need to ensure that the client computers can connect to the corporate network. What should you do?



A. Enable Challenge Handshake Authentication Protocol (CHAP).
B. Change the VPN type to IKEv2.
C. In the advanced settings, select Use pre-shared key for authentication.
D. Change the authentication setting to Use Extensible Authentication Protocol (EAP).


D. Change the authentication setting to Use Extensible Authentication Protocol (EAP).


A company has client computers that run Windows 8. Finance department employees store files in the C:Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Change the File History drive.
B. Review the File History backup log.
C. Move the file into a library.
D. Start the Volume Shadow Copy Service.


B. Review the File History backup log.



C. Move the file into a library.


A company has client computers that run Windows 8. File History is on. An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History. What should you do?



A. Create a library named History and add the Archives folder to the library.
B. Start the Windows Backup service.
C. Turn on the Volume Shadow Copy Service.
D. Start the Block Level Backup Engine service.


A. Create a library named History and add the Archives folder to the library.


You administer Windows 8 client computers in you company network.
You deploy an application that requires a specific Windows update to be installed on the computers.
You need to verify that the update is installed on specific computers. What are two possible ways to achieve this goal?


(Each Correct Answer presents a complete solution. Choose two)



A. Run the system update readiness tool.
B. Open View updates history.
C. Open the Check for updates applet.
D. Run the DISM command with the /image and /get-packageinfo swiches.
E. Run the DISM command with the /online and /get-packageinfo swiches.


B. Open View updates history.



E. Run the DISM command with the /online and /get-packageinfo swiches.


You administer windows 8 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting file systems (EFS).
A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2. What should you do?



A. Configure Advanced Attributes.
B. Configure Effective Access.
C. Configure Advanced Security Settings.
D. Share the folder that contains file.txt.


A. Configure Advanced Attributes.


You plan to purchase new windows 8 tablets for you company network.
You need to ensure that tablet users are able to use the windows 8 Snap feature. Which hardware specifications should you meet in choosing tablets?



A. monitor and video adapter that support a minimum screen resolution of 1366 x 768
B. monitor that supports at least three simultaneous touches
C. monitor that supports at least five simultaneous touches
D. monitor and video adapter that support a minimum screen resolution of 1024 x 768

A. monitor and video adapter that support a minimum screen resolution of 1366 x 768


You have a computer that runs Windows 8.
You install a custom application by using an .msi file that is located in your Documents library. The computer begins to experience performance issues.
You decide to reinstall the custom application. When you run the .msi file, you receive an error message about a corrupted file.
You need to ensure that you can reinstall the application. What should you do?



A. Run the replace command, specify the application’s .msi file as the source, and then specify the application’s original installation directory as the destination.
B. Use file History to revert the application’s .msi file to a previous version.
C. Run the msiexec /f command and specify the application’s .msi file.
D. Run the reset /f command and specify the application’s .msi file.

B. Use file History to revert the application’s .msi file to a previous version.


You administer windows 8 computers in you company network. All computers include Windows 8 compatible trusted platform module (TPM).
You configure a computer that will run a credit processing application.
You need to ensure that the computer requires a user to enter a PIN code when starting the computer. Which policy should you configure? (To answer, select the appropriate policy in the answer area.)



A. Allow Secure Boot for Integrity validation.
B. Require Additional authentication at startup.
C. Allow enhanced PINs for Startup.
D. Configure minimum PIN length for startup a local.

A. Allow Secure Boot for Integrity validation.


You administer Windows 8 client computers in your company network.
A guest at your company is connected to the Internet as shown in the following exhibit.
You need to ensure that the guest user is able to share network resources over Wi-Fi without lowering the overall security of the computer. What should you do?



A. Change the network location type to Work.
B. Configure File sharing connections settings for All networks.
C. Change the network location type to Private.
D. Configure File and printer sharing settings for Public networks.

C. Change the network location type to Private.


A company has client computers that run Windows 8. When a user tries to print from his portable client computer while connected to the corporate network, he discovers that the default printer is set to his home printer instead of to the office printer.
You need to ensure that the default printer for the computer is the office printer when the computer is connected to the corporate network and the user’s home printer when the computer is connected to his home network. What should you do on the portable computer?



A. In the printer properties of the corporate printer, configure the active port with the correct TCP/IP settings for the printer.
B. Install the corporate printer and set it as the default printer. Then add the home printer to the homegroup settings.
C. Connect to the home network and choose Connect from the shared printer object context menu. Then connect to the corporate network and choose Connect from the shared printer object context menu.
D. Set a default printer for each network.

D. Set a default printer for each network.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power.
You must accomplish this goal by using the least amount of administrative effort. Which two actions should you perform?


(Each Correct Answer presents part of the complete solution. Choose two.)



A. Edit the local Group Policy to configure the Shut Down options.
B. Create a Group Policy object (GPO) that configures the Sleep Management settings.
C. Create a Group Policy object (GPO) that configures the Power Management settings.
D. Link the Group Policy object (GPO) to the organizational unit containing the portable computers.
E. Edit the local Group Policy to configure the Power Management settings.

C. Create a Group Policy object (GPO) that configures the Power Management settings.



D. Link the Group Policy object (GPO) to the organizational unit containing the portable computers.


You install Windows 8 on a client computer. Several days later, you establish that the computer has been infected by malware.
You are unable to establish when the computer was infected.
You need to restore the client computer to full functionality. What should you do?



A. Start the computer using the Last Known Good Configuration option.
B. Use the Refresh your PC without affecting your files function.
C. Start the computer in Safe Mode.
D. Use the Remove everything and install Windows function.

D. Use the Remove everything and install Windows function.


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
You need to ensure that only administrators can access removable storage devices on client computers. Which two Group Policy settings should you configure?


(Each Correct Answer presents part of the solution. Choose two.)



A. Enable the Prevent installation of removable devices policy.
B. Disable the Allow only USB root hub connected Enhanced Storage Features policy.
C. Create an AppLocker deny rule with a path condition of %HOT%.
D. Start the Application Identity service.
E. Enable the Allow administrators to override Device Installation Restriction policies policy.

A. Enable the Prevent installation of removable devices policy.



E. Enable the Allow administrators to override Device Installation Restriction policies policy.


A company has client computers that run Windows 8. Each employee has one client computer at the office. Some employees also have personal computers at home. The company has applications that run only on Windows 8.
You need to deploy Windows To Go so that employees can run the applications on their home computers. Which two command-line tools should you use?


(Each Correct Answer presents part of the solution. Choose two.)



A. bcdedit
B. DISM
C. bcdboot
D. ImageX

B. DISM



C. bcdboot


A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain. All Sales department employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers.
You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run.
You need to quickly ensure that the application can run. What should you do?



A. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
B. Configure the AppLocker properties to enforce rules.
C. Run the gpupdate /force command.
D. Create a new AppLocker file hash condition.

C. Run the gpupdate /force command.


You administer Windows 8 laptops in your company network.
You install several custom desktop applications on the laptops.
You need to create a custom recovery image for Windows to use when selecting the Refresh your PC option. The custom recovery image must include the custom desktop applications. Which command should you use to create the custom recovery image?



A. Recdisc.exe
B. Recover.exe
C. Recimg.exe
D. RecoveryDrive.exe

A. Recdisc.exe


You administer Windows 8 client computers in your company network.
A computer that is used by non-administrator users has a directory named C:Folder1.
A shared collection of Microsoft Excel files is stored in the C:Folder directory, with non-administrator users being granted modify permissions to the directory.
You discover that some files have been incorrectly modified by a user.
You need to determine which user made changes to the directory’s folder’s files. Which two actions should you perform?


(Each Correct Answer presents part of the solution. Choose two.)



A. Set local policy: Computer ConfigurationWindows SettingsSecurity Settings Local PoliciesAudit PolicyAudit object access to Failure.
B. From the Auditing Entry for Folder1, set the Principal to Guests, and then set the Type to Failure for the Modify permission.
C. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success for the Modify permission.
D. Set local policy: Computer ConfigurationWindows SettingsSecurity Settings Local PoliciesAudit PolicyAudit object access to Success.

C. From the Auditing Entry for Folder1, set the Principal to Everyone, and then set the Type to Success for the Modify permission.



D. Set local policy: Computer ConfigurationWindows SettingsSecurity Settings Local PoliciesAudit PolicyAudit object access to Success.


A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1 contains computers that run Windows 7. Workgroup2 contains computers that run Windows 8.
You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers.
You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers by using Windows PowerShell Remoting.1 Which two actions should you perform?


(Each Correct Answer presents part of the complete solution. Choose two.)



A. Install Windows PowerShell 2.0 on the Workgroup1 computers.
B. Run the winrm quickconfig command on the Workgroup2 computers.
C. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM).
D. Run the winrrn quickconfig command on the Workgroup1 computers.
E. On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in Windows Remote Management (WinRM).

B. Run the winrm quickconfig command on the Workgroup2 computers.



C. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM).


A computer that runs Windows B has two hard disk drives. The user stores data files in specific storage locations outside of the standard libraries on both drives. File search results are delayed.
You need to return relevant search results more quickly. What should you do?



A. Remove all directories from indexed locations.
B. Add the specific storage locations to indexed locations.
C. Allow indexing of file contents in non-indexed locations.
D. Add encrypted files to the index.

B. Add the specific storage locations to indexed locations.


You administer Windows 8 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool.
You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer.
You also need to be able to import the configuration settings into a Group Policy object later. What should you do?



A. Run the netsh advfirewall export c:settings.xrnl command.
B. Run the netsh advfirewall export c:settings.txt command.
C. Run the netsh advfirewall export c:settinqs.wfw command.
D. Run the netsh firewall export c:settings.xml command.

C. Run the netsh advfirewall export c:settinqs.wfw command.


You administer Windows 8 Pro computers in your company network.
A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer.
Your solution must ensure that the user can read the files on Server1. What should you do?



A. Create a new VPN connection. Disable local drive mappings.
B. Create a new Remote Desktop connection.
C. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
D. Create a new Remote Desktop connection. Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.

C. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.


A company has 10 client computers that run Windows 8. An employee updates a device driver on her computer and then restarts the computer. Windows does not start successfully.
You start the computer in Safe Mode.
You need to identify the most recently installed driver and gather the maximum amount of information about the driver installation. What should you do?



A. In Device Manager, run a scan for hardware changes.
B. In the Event Viewer console, display the Hardware Events log.
C. In the Programs and Features Control Panel item, display the installed updates.
D. Display the contents of the Windowsinfsetupapi.dev.log file.

D. Display the contents of the Windowsinfsetupapi.dev.log file.