Which three actions should you perform in sequence?
DRAG DROP
You administer Windows 8.1 client computers in your company network. A computer has a
simple (no resiliency) storage space configured. The storage space is assigned to drive
letter E.
You plug an eSATA drive into the computer and extend the storage space.
You need to unplug the eSATA drive without deleting existing data from the storage space.
Which three actions should you perform in sequence? (To answer, move the appropriate
three actions from the list of actions to the answer area and arrange them in the correct order.)
Which Group Policy settings should you enable and configure?
DRAG DROP
You manage Windows 8.1 client computers.
You have the following client computer update requirements:
Ensure that all client computers check for updates twice a day.
Install all critical and available updates, including updates that require a restart, each day.
Restart client computers at 11:00 P.M. if required.
Distribute all updates from a Windows Server Update Services (WSUS) server on the local network.
You need to deploy Group Policy settings to the client computers to meet the update requirements.
Which Group Policy settings should you enable and configure? (To answer, drag the
appropriate Group Policy settings to the correct location or locations in the answer area.
Group Policy settings may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.)
You need to minimize data usage while connected to this hot spot
You use a Window 8.1 tablet. The tablet receives Windows Update updates automatically
from the Internet. The tablet has Wi-Fi and is connected to a 3G mobile broadband Wi-Fi hot
spot. You need to minimize data usage while connected to this hot spot. What should you
do?
Which remote management tool should you choose?
A company has Windows 8.1 client computers.
You are designing a remote management solution. IIS is installed on some remote
computers and configured to use port 80 and port 443. You have the following
requirements:
Ensure that you can perform most of the same tasks through the remote management
solution that you can while working directly on the remote computer.
Ensure that the solution can operate on port 80 and on port 443.
You need to choose the remote management tool to meet the requirements.
Which remote management tool should you choose?
You need to ensure that data loss will not occur if only one hard drive fails
You add three hard drives to a Windows 8.1 computer. The computer has a RAID controller.
You plan to store data only on the three new hard drives.
You need to ensure that data loss will not occur if only one hard drive fails.
What should you do?
Which component should you identify?
You administer a Windows 8.1 computer that runs Hyper-V. The computer hosts a virtual
machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of
RAM.
You discover that the virtual machine pauses automatically and displays the state as
paused-critical. You need to identify the component that is causing the error.
Which component should you identify?
which setting should you configure?
HOTSPOT
You install Windows 8.1 Enterprise on a new laptop that will be shipped to a remote user.
You logon to the laptop with the user credentials, map network drives, and configure the
network drives to be always available offline.
Company policy requires that files with a .db1 extension should be excluded from offline file
synchronization.
You need to prevent the user from creating files with a .dbl extension on the mapped drives.
In the Local Group Policy Editor, which setting should you configure? (To answer, select the
appropriate setting in the answer area.)
You need to ensure that users can run the custom application and not be prompted for administrator approval
A company has Windows 8.1 client computers.
Users frequently run a custom web application that modifies the system registry. Each time
the application starts, the user is prompted for administrative approval.
You need to ensure that users can run the custom application and not be prompted for
administrator approval.
What should you do?