PrepAway - Latest Free Exam Questions & Answers

Category: 70-689 (v.1)

Exam 70-689: Upgrading Your Skills to MCSA Windows 8 (update November 10th, 2015)

Which command should you run on the client computer?

A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption
with the data-only option on all client computers.
You delete a file containing highly confidential information from your computer.
You need to clear the free space on the hard drive to minimize the chance of the confidential information
being recovered.
Which command should you run on the client computer?

You need to configure Group Policy settings to meet the requirements

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and
are joined to the domain.
You have the following requirements:
Ensure that files in shared network folders are available offline.
Minimize all data access times.
Reduce network bandwidth usage.
You need to configure Group Policy settings to meet the requirements.
What should you do first?

Which two actions should you perform?

You support laptops that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring
(MBAM) are deployed on your network on a server named SERVER1.
Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2
hours of being started.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to ensure that users that meet the membership criteria are added to the Windows Intune group

You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active
Directory Site. All user account objects in Active Directory have the Manager attribute populated. The
company has purchased a subscription to Windows Intune. The domain security groups are synchronized with
the Microsoft Online directory.
You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the
group has no members.
You need to ensure that users that meet the membership criteria are added to the Windows Intune group.
What should you do?

Which three actions should you perform on the laptop in sequence?

DRAG DROP
You use a desktop computer and a laptop, both of which run Windows 8. You use a Microsoft account to log
on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined
to the HomeGroup and the laptop is a member of a workgroup.
When you access a frequently visited website from your laptop, Internet Explorer saves your password. When
you visit the website from your desktop computer, you are prompted to enter your password.
You need to sync your saved password from your laptop to your desktop computer.
Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions
from the list of actions to the answer area and arrange them in the correct order.)

You need to minimize the time that is required for the user to start App-V applications on the computer

You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V)
client installed. Multiple App-V applications are published on the network.
A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the
user has a roaming profile on the computer.
You need to minimize the time that is required for the user to start App-V applications on the computer.
What should you do?

You need to create a Windows Intune policy that meets the security policy requirements

You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has
purchased a subscription to Windows Intune.
Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is
connected to Windows Intune. Company security policy defines the minimum length of passwords and
required encryption settings.
You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?


Page 3 of 1312345...10...Last »