PrepAway - Latest Free Exam Questions & Answers

Category: 70-687 (v.2)

Exam 70-687: Configuring Windows 8 (update January 20th, 2015)

You need to ensure that the client computers can connect to the corporate network

A company has client computers that run Windows 8. You set up new virtual private network
(VPN) connections on all client computers. The VPN connections require the use of a smart
card for authentication. Users are unable to connect to the corporate network by using the
VPN connections. The connection properties are configured as shown in the exhibit. (Click
the Exhibit button.)

You need to ensure that the client computers can connect to the corporate network.
What should you do?

How should you configure Windows Firewall?

DRAG DROP
A company has a main office located in Miami, and branch offices in Boston, Los Angeles,
and Portland. The office networks are configured as described in the following table.

A management computer in the main office, named COMPUTER1, runs Windows 8 and
several third-party management applications.
You are configuring access to COMPUTER1. You have the following requirements:
Ensure that only users in the Boston office can connect to COMPUTER1 by using HTTP.
Ensure that only users in the Los Angeles office can connect to COMPUTER1 by using
HTTPS.
Ensure that only users in the Portland office can connect to COMPUTER1 by using FTP.
You need to configure access to COMPUTER1.
How should you configure Windows Firewall? (To answer, drag the appropriate elements to
the correct location or locations in the answer are Elements may be used once, more than
once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Which command should you run on the client computers before the upgrade?

DRAG DROP
A company plans to upgrade its client computer operating systems from Windows 7 to Windows 8.
You need to use the User State Migration Tool (USMT) to configure the migration profile to
exclude all files in the users’ Documents folders.
Which command should you run on the client computers before the upgrade? (To answer,
drag the appropriate command elements to the correct location or locations in the answer
are Each command may be used once, more than once, or not at all. You may need to drag
the split bar between panes or scroll to view content.)

Which policy should you configure?

HOTSPOT
You administer Windows 8 computers in your company network. All computers include
Windows 8 compatible Trusted Platform Module (TPM).
You configure a computer that will run a credit card processing application.
You need to ensure that the computer requires a user to enter a PIN code when starting the computer.
Which policy should you configure? (To answer, select the appropriate policy in the answer area.)

Which two actions should you perform?

A company has client computers that run Windows 8. Finance department employees store
files in the C:\Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File
History. The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What are two possible ways to achieve this goal?

You administer Windows 8 client computers in you company network.

You deploy an application that requires a specific Windows update to be installed on the
computers.
You need to verify that the update is installed on specific computers.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)

You need to ensure that you can reinstall the application

You have a computer that runs Windows 8. You install a custom application by using an .msi
file that is located in your Documents library.
The computer begins to experience performance issues. You decide to reinstall the custom
application. When you run the .msi file, you receive an error message about a corrupted file.
You need to ensure that you can reinstall the application.
What should you do?

Which three actions should you perform in sequence?

DRAG DROP
A Company has 10 computers that run windows vista. The computers are members of a workgroup.
The company plans to upgrade the computers to windows 8. You are planning a deployment
strategy.
You need to ensure that users can log on to their existing accounts and access their existing
data after the upgrade.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)


Page 12 of 22« First...1011121314...20...Last »