Which method should you use?
A client computer that runs Windows 8 has two hard disk drives: a system drive and a data drive.
You are preparing to back up the computer prior to installing a developing software product.
You have the following requirements:
– The system disk that is part of the backup must be mountable from within Windows.
– The system disk that is part of the backup must be bootable.
– The backup must be viable to restore in the eventof a hard disk failure.
– The backup must contain data from both hard disk drives.
You need to select a backup method. Which method should you use?
Which three actions should you perform?
You administer Windows 8 client computers in your company network.
You receive a virtual hard disk (VHD) file that hasWindows 8 Pro preinstalled, along with several business
applications.
You need to configure your client computer to startfrom either the VHD file or from your current operating
system.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
Which encryption type should you use?
A company has client computers that run Windows 8. The client computer systems frequently use IPSec
tunnels to securely transmit data.
You need to configure the IPSec tunnels to use 256-bit encryption keys.
Which encryption type should you use?
You need to protect the computer from starting an unauthorized operating system
You are configuring a computer that will be used ina kiosk in a public area. You install a new
internal hard drive.
You need to protect the computer from starting an unauthorized operating system.
What should you do?
You need to ensure that the computer automatically installs updates
A desktop computer that runs Windows 8 downloads updates but does not install them.
The computer is connected to the corporate network by using a wired network connection.
You need to ensure that the computer automatically installs updates.
What should you do?
Which two options can you use?
You administer a group of 10 client computers that run Windows 8. The client computers are members of a
local workgroup. Employees log on to the client computers by using their Microsoft accounts.
The company plans to use Windows BitLocker Drive Encryption.
You need to back up the BitLocker recovery key.
Which two options can you use? (Each correct answerpresents a complete solution. Choose two.)
You need to be able to start normally
You administer Windows 8 computers in your company network.
You install a new video driver. The computer will not start properly after restart. You are able to enter Safe
Mode with Command Prompt.
You need to be able to start normally. You also need to ensure that user data is not lost.
What should you do?
Which two actions should you perform?
You administer Windows 8 Pro client computers in your company network.
You need to configure a backup and recovery solution that meets the following requirements:
– Recovers the system if it doesn’t start.
– Recovers the system if the hard drive fails.
Which two actions should you perform? (Each correctanswer presents part of the solution.
Choose two.)
Which two methods should you choose?
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7.
You plan to upgrade the client computers to Windows8 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution.
Choose two.)
You need to use the Windows 8 computer to manage the Windows servers in the perimeter network
You administer computers in your company network. All computers in the network belong to a single Active
Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a
perimeter network.
You add a new Windows 8 computer to the perimeter network. You enable only Remote Desktop access to the
Windows 8 computer from other computers located outside the perimeter network.
You need to use the Windows 8 computer to manage the Windows servers in the perimeter network.
What should you do?