Get Braindump2go Microsoft 70-687 Braindumps With Cheap Price And Pass Guaranteed With Money Back (201-210)

QUESTION 201
You administer Windows 8.1 laptops. The laptops are configured to connect to an unsecured wireless access point.
You plan to configure the wireless access point to encrypt wireless traffic and turn off SSID broadcast.
You need to ensure the laptops will join the secured wireless network automatically after the configuration changes.
What should you do?

A.    Set Network Discovery to Enabled for the Public profile.
B.    Create an ad hoc network.
C.    Set the Unidentified Networks Properties User permissions to User can change location.
D.    Create a network profile.

Answer: D

QUESTION 202
You are working with a virtual machine (VM) named NYC-DC1 on a Windows 8.1 computer.
The status of NYC-DC1 in Hyper-V Manager is shown in the following graphic.
 clip_image001[4]
You plan to create a snapshot of NYC-DC1. You select the VM in Hyper-V Manager. The Snapshot option is not available in the Actions pane or in the context menu.
You need to ensure that the Snapshot option is available.
What should you do?

A.    Resume the VM.
B.    Specify a location in which Hyper-V Manager should save snapshot files.
C.    Save the VM.
D.    Connect to the VM.
E.    Increase the Assigned Memory to at least 2048 MB.

Answer: A

QUESTION 203
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?

A.    Use a local account to log on to each computer.
B.    Set the Turn off the Store application group policy to Enabled.
C.    Activate the sideloading product key on each computer.
D.    Set the Allow Store to install apps on Windows To Go workspaces group policy setting to Enabled.

Answer: C
Explanation:
* The average Windows 8 user can only download apps that Microsoft has approved from the Windows Store. Windows 8 offers two ways to sideload unapproved apps, which are intended for developers and businesses with internal apps.
* Windows 8 offers a method for sideloading “line-of-business” apps. This allows businesses and other organizations to load apps onto their own computers without offering them publically through the Windows Store.
There are four requirements to sideload a line-of-business app:
You must be using Windows 8 Enterprise, Windows Server 2012, Windows 8 Pro, or Windows RT. If you’re using Windows 8 Pro or Windows RT, you’ll need to purchase a “sideloading product activation key” from Microsoft.

QUESTION 204
A company has 10 client computers that run Windows 7. All client computers have the same hardware configuration. The hardware configuration includes custom hardware components manufactured by the company.
The computer hard drives are configured as shown in the Disk Management window exhibit. (Click the Exhibit button.)
 clip_image002
The company plans to upgrade the client computers to Windows 8.1.
You need to test hardware compatibility with Windows 8.1 on one client computer and leave the existing Windows 7 installation intact.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A.    Insert the Windows 8 installation media into the computer, and then run the Setup program.
B.    Shrink the current hard drive partition, and then create a new partition for the Windows 8 installation.
C.    Change the hard drive to a dynamic disk and create a new dynamic volume.
D.    Start the computer from the Windows 8 installation media and then select the Custom installation option.

Answer: BD

QUESTION 205
You administer Windows 8.1 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting File System (EFS).
A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2.
What should you do?

A.    Configure Advanced Security Settings.
B.    Share the folder that contains file.txt.
C.    Configure Advanced Attributes.
D.    Configure Effective Access.

Answer: C

QUESTION 206
You use a Windows 8.1 laptop.
You want to back up the Pictures library.
You need to configure a backup strategy that backs up the Pictures library to a network drive every day. Additionally, you need to be able to recover a copy of any files from the library that have been changed within the last month.
What should you do?

A.    Create a system image.
B.    Configure File History.
C.    Create a Storage Pool.
D.    Configure computer restore points.

Answer: B

QUESTION 207
A company has client Windows Vista and Windows 8.1.
You need to ensure that the client computers can share local resources.
Which two actions should you perform on the client computers? (Each correct answer presents part of the solution. Choose two.)

A.    Disable IPv6.
B.    Enable network discovery.
C.    Configure IPSec.
D.    Enable IPv6.
E.    Configure the Windows Firewall.

Answer: BE
Explanation:
By changing your network location to Home or Work, network discovery is automatically turned on . You can also turn on these sharing options individually:
Network discovery
File sharing (in Windows 7, this is automatically turned on when you share a file or folder) Public folder sharing
When you turn on these options, your computer can:
Find other computers and devices on your home network and have other computers find your computer
Share its files and folders
Share its Public folders

QUESTION 208
You administer Windows 8.1 client computers in your company network. The company has an Active Directory Domain Services (AD DS) domain named contoso.com. The domain contains a domain controller configured to lease DHCP and DHCPv6 addresses.
A client computer named Computer1 is configured to obtain IPv4 and IPv6 addresses automatically.
A user reports that an IPv6-enabled application named Appl is not working on Computer1.
You discover that Computer1 has an IPv6 address prefix of FE80::. You are able to ping Computer1 successfully by using IPv4, but when you use IPv6, your ping requests time out.
You need to ensure that Computer1 will support Appl.
Which command should you use?

A.    jpconfig /allcompartments /all
B.    jpconfig /renew
C.    jpconfig /renew6
D.    jpconfig /release6

Answer: C

QUESTION 209
You administer Windows 8.1 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later.
What should you do?

A.    Run the netsh advfirewall export c:\settings.xml command.
B.    Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and
then select the Export Policy action.
C.    Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action.
D.    From Control Panel, open Windows Firewall, click Advanced Settings, and then select the Export Policy action.

Answer: A

QUESTION 210
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain.
An employee is unable to connect his portable client computer to his home office homegroup.
You need to ensure that the network adapter settings of the client computer support joining a homegroup.
What should you do?

A.    Disable IPv6.
B.    Enable IPv4.
C.    Enable IPv6.
D.    Disable IPv4.

Answer: C

Download Free Microsoft 70-687 Exam Questions and Answers from Braindump2go

http://www.braindump2go.com/70-687.html

         

Comments are closed.