PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which two actions should you perform?

You have a portable computer that runs Windows 8. You are creating a backup plan.
You have the following requirements:
– Automatically back up the files in your Documents folder every hour.
– Ensure that you can recover different versions of the backed-up files.
– Do not back up the Windows operating system files.
You need to configure the computer to meet the requirements.
Which two actions should you perform? (Each correctanswer presents part of the solution. Choose two.)

Which of the following should you recommend?

You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain.
Users travel frequently and access domain resourcesfrom inside client networks or from their home network.
You want to manage the laptops when they are connected to the company network from the external networks.
You need to ensure that the laptops can be managed and maintained while users are not logged on to the
computers.
Which of the following should you recommend?

Which two actions should you perform?

A company has client computers that run Windows 8. Finance department employees store files in the C:
\Finance directory. File History on.
A Finance department employee attempts to restore afile to a previous version by using File History.
The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correctanswer presents part of the solution. Choose two.)

Which certificate or certificates should you use?

You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members
of the Active Directory domain named contoso.com.
Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI),and
no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible
from the Contoso network. The website requires SSL and mutual authentication.
You need to configure the computers to allow contoso.com domain users to access the website without any
warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use?
(To answer, drag the appropriate certificate to thecorrect certificate store. Each certificate may beused once,
more than once, or not at all. You may need to dragthe split bar between panes or scroll to view content.)

You need to configure the network to support the required remote administration access

You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several
desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP
connections only to ports 80 and 443.
You want to manage disk volumes on the desktop computers from your computer, which is located outside the
protected subnet.
You need to configure the network to support the required remote administration access.
What should you do?

Which destination should you select?

All client computers in a company’s network environment run Windows 8. A client computer has two internal
hard disk drives. The hard drives are configured asshown in the following table.
Drive Size Free space Type
———————————————————C 250 GB 20 GB Dynamic
D 500 GB 450 GB Dynamic
You are choosing a backup destination for drive C. You have the following requirements:
Ensure that the backup file is available if driveC fails.
Ensure that the backup file can be accessed by other computers on the network.
Support the backup of multiple system images.
You need to select a backup destination that meets the requirements.
Which destination should you select?

Which three actions should you perform in sequence?

You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.
You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit
button.)
You share the folder over the network with Read permission for a domain user account named User1 as shown
in Exhibit 2. (Refer to the Exhibit.)
You want to provide access to the shared folder only for the time that User1 is a member of the domainsecurity
group named Project. You need to assign the required permissions.
Which three actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.)

You need to deploy the new application to the tablets

You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are ableto
connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution must meet the
following requirements:
– The application is not accessible if a user is working offline.
– The application is stored on an internal solid-state drive (SSD) on the tablets.
– The application is isolated from other applications.
– The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?