[Free] 2018(Aug) Ensurepass Microsoft 70-687 Dumps with VCE and PDF 91-100
Configuring Windows 8.1
Question No: 91 – (Topic 1)
A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.1.
A client computer hosts a Windows 8.1 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. (Click the Exhibit button.)
You have the following requirements:
->Configure the test environment to allow VMs to communicate with the host machine.
->Minimize impact on the host machine.
You need to meet the requirements. What should you do?
Create a new virtual switch with a Private Network [CP1] connection type.
Create a new virtual switch with an ExternalNetwork connection type.
Change the VLAN ID of the private virtual switch to Enable Virtual LAN identification.
Create a new virtual switch with an Internal Network connection type.
Answer: D Explanation:
Virtual switches/ Hyper-V VLAN – you can create 3 different types of virtual switches depending the needs of your virtual machines and one single machine can use multiple virtual NICs that is member of different Virtual Switches.
->External – This virtual switch binds to the physical network adapter and create a
new adapter you can see in Control Panel\Network and Internet\Network Connections so if a virtual machine needs contact outside the host machine this one is a must.
->Internal – This virtual switch can be used to connect all virtual machines and the
host machine but cannot go outside that.
->Private – This virtual switch can only be used by the virtual host
http://technet.microsoft.com/en-us/library/cc816585(v=ws.10).aspx Configuring Virtual Networks
Private will not allow communication with the host machine. External will allow communication with the host machine but also allow access to other machines on the host machine#39;s network which is not a requirement.
Question No: 92 – (Topic 1)
A company has client computers that run Windows 8.1. On all client computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled and the Download updated compatibility lists from Microsoft option disabled.
The corporate website was designed for a previous version of Internet Explorer. When viewed on the client computers, menus and image on the corporate website are displayed out of place.
You need to ensure that the corporate website displays correctly on the client computers without negatively impacting the display of any other website.
What should you do?
Manually add the corporate website to the compatibility view settings.
Enable the Display all websites in Compatibility View option.
Disable the Display intranet sites in Compatibility View option.
Manually download an updated compatibility list from Microsoft.
Question No: 93 – (Topic 1)
You deploy several tablet PCs that run Windows 8.1.
You need to minimize power usage when the user presses the sleep button. What should you do?
In Power Options, configure the sleep button setting to Hibernate.
Disable the C-State control in the computer’s BIOS.
Configure the active power plan to set the system cooling policy to passive.
In Power Options, configure the sleep button setting to Sleep.
Explanation: http://www.howtogeek.com/102897/whats-the-difference-between-sleep-and- hibernate-in-windows/
If you’re using a laptop computer, the best option is most likely Hibernate, because it saves the most power compared to Sleep and Hybrid Sleep.
Sleep and hibernation: frequently asked questions
What#39;s the difference between sleep, hibernate, and hybrid sleep?
Sleep is a power-saving state that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again. Putting your computer into the sleep state is like pausing a DVD player – the computer immediately stops what it’s doing and is ready to start again when you want to resume working.
Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and settings in memory and draws a small amount of power, hibernation puts your open documents and programs on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hibernation uses the least amount of power. On a laptop, use hibernation when you know that you won#39;t use your laptop for an extended period and won#39;t have an opportunity to charge the battery during that time.
Hybrid sleep is designed primarily for desktop computers. Hybrid sleep is a combination of sleep and hibernate – it puts any open documents and programs in memory and on your hard disk, and then puts your computer into a low-power state so that you can quickly resume your work. That way, if a power failure occurs, Windows can restore your work from your hard disk. When hybrid sleep is turned on, putting your computer into sleep automatically puts your computer into hybrid sleep. Hybrid sleep is typically turned on by default on desktop computers.
Everything You Need to Know About the CPU C-States Power Saving Modes
In order to save energy when the CPU is idle, the CPU can be commanded to enter a low- power mode. Each CPU has several power modes and they are collectively called quot;C- statesquot; or quot;C-modesquot;.
Question No: 94 – (Topic 1)
A company has a main office and three branch offices. The company has 20 portable computers that run Windows 8.1. Portable computer users can install local devices while in any branch office.
Your manager has instructed you to collect information about faulty devices and drivers within the company’s branch offices.
You need to create a performance report that includes a list of incorrectly installed devices by using the least amount of administrative effort.
What should you do?
Add counters from each portable computer to Performance Monitor, and then print the Performance Monitor output.
Start the System Performance Data Collector Set on each portable computer.
Start the System Diagnostics Data Collector Set on each portable computer.
Create and start a custom Data Collector Set on each portable computer.
Answer: C Explanation:
System Diagnostics You can use this DCS when troubleshooting reliability problems such as problematic hardware, driver failures, or STOP errors. It logs all the information included in the System Performance DCS, plus detailed system information.
http://technet.microsoft.com/en-us/library/cc722173(v=ws.10).aspx Windows Vista Performance and Reliability Monitoring Step-by-Step Guide
Microsoft庐 Windows Vista庐 includes Windows Reliability and Performance Monitor, which is a Microsoft Management Console (MMC) snap-in that combines the functionality of previous stand-alone tools including Performance Logs and Alerts, Server Performance Advisor, and System Monitor. It provides a graphical interface for customizing Data Collector Sets and Event Trace Sessions.
What is performance and reliability monitoring?
The reliability of a system is the measure of how often the system operates as it is configured and expected to perform. Reliability can be reduced when applications stop responding, services stop and restart, drivers fail to initialize, or in the worst case, when operating systems fail.
Reliability Monitor provides you with a quick, visual view of the average stability of your system. In addition, it tracks events that will help you identify what causes reductions in reliability. By recording not only failures (including memory, hard disk, application, and operating system failures), but also key events regarding the configuration of your system (including the installation of new applications and operating system updates), you can see a timeline of changes in both the system and reliability, and can identify how to get your system back to optimal reliability when it does not behave as expected.
Data Collector Sets
An important new feature in Windows Reliability and Performance Monitor is the Data Collector Set, which groups data collectors into reusable elements for use with different performance monitoring scenarios. Once a group of data collectors is stored as a Data Collector Set, operations such as scheduling can be applied to the entire set through a single property change. You can schedule repeated collection of a Data Collector Set to create logs, load it in Performance Monitor to see the data in real time, and save it as a template to use on other computers.
Windows Reliability and Performance Monitor also includes default Data Collector Set templates to help you begin collecting performance data immediately.
http://blogs.interfacett.com/how-to-use-windows-7-performance-tools How to use Windows 7 Performance Tools
We can go to data collector sets, there’s some system defined ones or you can create your own. I’m going to do system diagnostics.
All of these elements are going to be monitored.
I’m going to start this and run it for 10 seconds. I’m going to stop it.
That’s going to generate a report that’s under the system defined system diagnostics. There’s the report I ran.
And it’s generating a report of this system for me to take a look at. It’s going to tell me whether the diagnostics passed or failed.
Question No: 95 – (Topic 1)
A company has client computers that run Windows 8.1 in a kiosk environment.
You need to ensure that Windows updates are automatically applied and cannot be disabled by users.
What should you do?
Configure Windows Update to install updates automatically.
In the local Group Policy, enable the Turn on recommended updates via Automatic Updates policy setting.
msiexec /i app1.msi /qn
In the local Group Policy, configure the Remove access to use all Windows Update features policy setting.
Answer: D Explanation:
If you enable the Remove access to use all Windows Update features policy setting:
Changing the Windows Update settings will be grayed out:
If you enable the Turn on recommended updates via Automatic Updates policy setting, even when logged with a limited rights user, you can still change the Automatic Updates settings:
Question No: 96 – (Topic 1)
A portable computer that runs Windows 8.1 uses a mobile broadband connection for the corporate wireless network. The computer also has a wired corporate network connection. The computer successfully downloads Windows updates when connected to either network.
You need to ensure that the computer automatically downloads updates by using Windows Update only while connected to the wired corporate network connection.
What should you do?
Set the corporate wireless network to metered.
Set the corporate wireless network to non-metered.
Configure the Specify intranet Microsoft update service location local Group Policy setting.
Configure a Windows Firewall connection security rule.
Answer: A Explanation:
To help you gauge the amount of data usage on networks, Windows 8.1 includes a new data usage tracking and metering feature. This is especially useful when using mobile broadband networks, as your service likely has a limit to the amount of data you can use before you#39;re charged overage fees or the speed is throttled, or maybe you#39;re even on a pay-as-you-go plan that charges per usage.
By default, Windows 8.1 tracks the amount of data you transfer over Wi-Fi and mobile broadband networks. The running total (in MBs or GBs) and the time or day since it#39;s been tracked is displayed when you click (or tap) on a network name from the new network list, as shown in the figure below:
You can also set particular networks as a metered connection, which will then disable Windows Update from downloading updates (except for critical security patches) and
possibly disable or reduce data usage from other Microsoft and non-Microsoft applications as well.
Question No: 97 – (Topic 1)
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)
Use the Volume Activation Management Tool.
Use the Microsoft Deployment Toolkit.
Use the Windows 8.1 online upgrade tool.
Create a catalog (.clg) file by using Windows System Image Manager (SIM).
Explanation: http://technet.microsoft.com/en-us/library/hh824953.aspx Volume Activation Management Tool (VAMT) Overview
Applies To: Windows 8, Windows 8.1
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows庐, Microsoft庐 Office, and select other Microsoft products volume and retail-activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems: Windows庐 7
Windows Server 2008 R2 Windows Server庐 2012 Windows Server 2012 R2
http://blogs.technet.com/b/askpfeplat/archive/2013/09/16/getting-started-with-windows- deployment-for-windows-server-2012-or-windows-8-using-microsoft-deployment-toolkit- mdt.aspx
Getting Started with Windows Deployment for Windows Server 2012 or Windows 8 Using Microsoft Deployment Toolkit (MDT)
Use the Microsoft Deployment Toolkit (MDT) to accelerate and automate deployments of Windows 8, Windows Server 2012, Windows 7, Office 2010, and Windows Server 2008 R2.
Here’s a table from the MDT .chm file that lists the available wizard pages and which properties need to be configured in order to skip each wizard page:
Question No: 98 – (Topic 1)
Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain.
You create a folder and share the folder with everyone in your organization.
You need to modify the NTFS permissions of the folder to meet the following criteria:
->Users from the Supervisors AD security group must be able to open files, but not modify them.
->Users from the Marketing AD security group must be able to create, modify, and
->Users from both groups must not be able to delete the folder.
Which permissions should you set?
Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission.
Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission.
Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.
Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission.
Answer: C Explanation:
http://technet.microsoft.com/en-us/library/bb727008.aspx File and Folder Permissions
On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders.
File and Folder Permissions:
Special Permissions for Files:
Special Permissions for Folders:
Question No: 99 – (Topic 1)
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows Vista and are members of the domain. A Group Policy object (GPO) configuring a software restriction policy is implemented in the domain to block a specific application.
You upgrade a computer to Windows 8.1 and implement a GPO that configures an AppLocker rule in the domain. The blocked application runs on the Windows 8.1 computer but not on the Windows Vista computers.
You need to ensure that the application is blocked from running on all computers and the AppLocker rule is applied to the computers in the domain.
What should you do?
Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
Configure the software restriction policy as a local policy on the Windows 8.1 computer.
Add the blocked application as a software restriction policy to the GPO that configures AppLocker.
Answer: A Explanation:
Use AppLocker and Software Restriction Policies in the Same Domain
AppLocker is supported on systems running Windows 7 and above. Software Restriction Policies (SRP) is supported on systems running Windows Vista or earlier. You can continue to use SRP for application control on your pre-Windows 7 computers, but use AppLocker for computers running Windows Server 2008 R2, Windows 7 and later. It is recommended that you author AppLocker and SRP rules in separate GPOs and target the GPO with SRP policies to systems running Windows Vista or earlier. When both SRP and AppLocker policies are applied to computers running Windows Server 2008 R2, Windows 7 and later, the SRP policies are ignored.
Both SRP and AppLocker use Group Policy for domain management. However, when SRP policies and AppLocker policies exist in the same domain and applied through Group Policy, AppLocker policies will take precedence over SRP policies on computers running Windows Server 2012, Windows Server 2008 R2, Windows 8 or Windows 7.
As an example of how both types of policy would affect the bank#39;s quot;Teller softwarequot; application, consider the following scenario where the application is deployed on different Windows desktop operating systems and managed by the Tellers GPO.
The Get-AppLockerPolicy cmdlet retrieves the AppLocker policy from the local Group Policy Object (GPO), a specified Group Policy Object (GPO), or the effective policy on the computer.
By default, the output is an AppLockerPolicy object. If the XML parameter is used, then the output will be the AppLocker policy as an XML-formatted string.
The Set-ExecutionPolicy cmdlet changes the user preference for the Windows PowerShell execution policy.
The execution policy is part of the security strategy of Windows PowerShell. It determines whether you can load configuration files (including your Windows PowerShell profile) and run scripts, and it determines which scripts, if any, must be digitally signed before they will run.
Question No: 100 – (Topic 1)
You manage computers that run Windows 8.1.
You plan to install a desktop app named MarketingApp on one of the client computers. You need to display a progress bar to the user while installing the app.
Which command should you run?
msiexec /i marketingapp.msi Jqn
msiexec /i marketingapp.msi /qb
msiexec /x marketingapp.msi /qb
msiexec /x marketingapp.msi /qn
Answer: B Explanation:
/i installs or configures a product
/qb displays a basic user interface
/qn Displays no user interface.
/x Uninstalls a product.
Topic 2, Volume B
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|