PrepAway - Latest Free Exam Questions & Answers

Category: 70-687 (v.2)

Exam 70-687: Configuring Windows 8 (update January 20th, 2015)

You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers…

A company network contains two workgroups named Workgroup1 and Workgroup2.
Workgroup1 contains computers that run Windows 7. Workgroup2 contains computers that
run Windows 8.
You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2
computers.
You need to ensure that administrators can manage the Workgroup1 computers from the
Workgroup2 computers by using Windows PowerShell Remoting.1
Which two actions should you perform? (Each correct answer presents part of the complete
solution. Choose two.)

Which elements will be retained?

DRAG DROP
A company has client computers that run Windows XP or Windows Vista.
The company plans to upgrade all client computers to Windows 8. You are planning a
deployment strategy.
You need to identify the elements that will be retained after the upgrades.
Which elements will be retained? (To answer, drag the appropriate element or elements to
the correct location or locations in the answer area.
Elements may be used once, more than once, or not at all. You may need to drag the split
bar between panes or scroll to view content.)

Which permissions should you assign?

DRAG DROP

A company has an Active Directory Domain Services (AD DS) domain. All client computers
run Windows 8. The company has three departments named Accounting, Human Resources
(HR), and Marketing. User account objects are stored in their respective departmental AD
security groups and have full access to shared folders for each department.
A new company policy requires that the following access rules are in place:
Users must have complete access only to their department’s shared folder.
Accounting department users must be able to change files in the HR folder.
HR department users must be able to change files in the Marketing folder.
Marketing department users must be able to change files in the Accounting folder.
You need to comply with the company policy.
Which permissions should you assign? (To answer, drag the appropriate security group or
groups to the correct location or locations in the answer area.
Security groups may be used once, more than once, or not at all. You may need to drag
the split bar between panes or scroll to view content.)

You need to save the Windows Firewall with Advanced Security configuration settings from the reference compute

You administer Windows 8 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced
Security tool. You want to apply the same settings to other computers.
You need to save the Windows Firewall with Advanced Security configuration settings from
the reference computer. You also need to be able to import the configuration settings into a
Group Policy object later.
What should you do?

You need to prevent the user from downloading any files from Server1 to his local computer

You administer Windows 8 Pro computers in your company network. A server named
Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop
connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer.
Your solution must ensure that the user can read the files on Server1.
What should you do?

You need to identify the most recently installed driver and gather the maximum amount of information about the

A company has 10 client computers that run Windows 8.
An employee updates a device driver on her computer and then restarts the computer.
Windows does not start successfully. You start the computer in Safe Mode.
You need to identify the most recently installed driver and gather the maximum amount of
information about the driver installation.
What should you do?

Which two actions should you perform?

Employees are permitted to bring personally owned portable computers that run Windows 8
to the office. They are permitted to install corporate applications by using the management
infrastructure agent and access corporate email by using Windows Mail. An employee’s
personally owned portable computer is stolen. You need to protect the corporate
applications and email messages on the computer. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)

You need to ensure that all corporate websites display correctly on the lab computers

A company has lab computers that run Windows 8. On all lab computers, Internet Explorer
has the Display intranet sites in Compatibility View option enabled and the Download
updated compatibility lists from Microsoft option disabled. All lab computers access only
internal corporate websites.
A corporate website was designed for a previous version of Internet Explorer. When viewed
on the lab computers, menus and images on the website are displayed out of place. You
need to ensure that all corporate websites display correctly on the lab computers. What
should you do?

Which PowerShell commands should you run on Computer1?

You administer Windows 8 Pro computers in your company network. The computers are
configured to allow remote connections. You attempt to create a Remote Desktop
Connection to a computer named Computer1. You receive the following message:
”Remote Desktop can’t connect to the remote computer.”
You are able to ping Computer1. You discover that Remote Desktop Firewall rules are not
present on Computer1.
You need to connect to Computer1 by using Remote Desktop.
Which PowerShell commands should you run on Computer1?


Page 14 of 22« First...1213141516...20...Last »