PrepAway - Latest Free Exam Questions & Answers

Category: 70-687

Exam 70-687: Configuring Windows 8

Which three actions should you perform in sequence?

A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 64-bit
version of Windows 8.
The workgroup contains client computers that run a 32-bit version of Windows 8.
Computers in the workgroup can’t currently print toPRINTER1.
You need to ensure that the workgroup computers canprint to PRINTER1.
Which three actions should you perform in sequence?(To answer, move the appropriate actions to the answer
area and arrange the correct order.)

Which three actions should you perform in sequence?

A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 32-bit
version of Windows 8.
A workgroup contains client computers that run a 64-bit version of Windows 8.
Computers in the workgroup can’t currently print toPRINTER1.
You need to ensure that the workgroup computers canprint to PRINTER1.
Which three actions should you perform in sequence?(To answer, move the appropriate actions to the answer
area and arrange them in the correct order.)

You need to assign security groups to local security policies to meet the requirements

A company has 50 client computers that run Windows 8.
Forty client computers are connected to a secure internal network, and 10 client computers are locatedin public
kiosks.
A new company security policy includes the following requirements:
Visitors can access only kiosk computers.
Employees can access and shut down only internal computers.
Only administrators can access all computers remotely.
Only administrators can shut down kiosk computers.
You need to assign security groups to local security policies to meet the requirements.
What should you do?
(To answer, drag the appropriate security group or groups to the correct location or locations in the answer
area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.)

Which commands should you run?

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to
the domain.
Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
Ensure that COMPUTER2 can run remote commands on COMPUTER1.
Test the solution by successfully running a command from COMPUTER2 that executes on COMPUTER1.
You need to select the commands to run on COMPUTER1and COMPUTER2 to meet the remote management
requirements.
Which commands should you run? (To answer, drag theappropriate command or commands to the correct
location or locations in the answer area.
Commands may be used once, more than once, or not at all. You may need to drag the split bar between
panes or scroll to view content.)

Which commands should you run?

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to
the domain.
Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
Ensure that COMPUTER1 can run remote commands on COMPUTER2.
Test the solution by successfully running a command from COMPUTER1 that executes on COMPUTER2.
You need to select the commands to run on COMPUTER1and COMPUTER2 to meet the remote management
requirements.
Which commands should you run?
(To answer, drag the appropriate command or commands to the correct location or locations in the answer
area. Commands may be used once, more than once, ornot at all. You may need to drag the split bar between
panes or scroll to view content.)

Which commands should you run?

A company has client computers that run Windows 8. All client computers allow incoming Remote Desktop
connections.
You attempt to connect from COMPUTER1 to COMPUTER2 by using Remote Desktop.
Remote Desktop cannot connect to the remote computer.
You establish that the firewall settings on COMPUTER2 have not been set to allow incoming connections.
From COMPUTER1, you need to enable Remote Desktop traffic through Windows Firewall on COMPUTER2.
Which commands should you run?
(To answer, drag the appropriate command or commands to the correct location or locations in the answer
area. Commands may be used once, more than once, ornot at all. You may need to drag the split bar between
panes or scroll to view content.)

Which command segments should you use to complete the command?

A desktop computer runs Windows 8. The computer is joined to an Active Directory Domain Services (AD DS)
domain named contoso.com.
You have two domain user accounts:
A primary account named User1 that does not have domain administrative privileges.
An account named Admin1 that has administrative privileges in the domain.
You are currently logged in as User1. You need to run an application named appl.exe.
You have the following requirements:
Start the application by using your administrative credentials.
Ensure that the user environment is fully available to the application.
You need to complete the command to meet the requirements.
Which command segments should you use to complete the command?
(To answer, drag the appropriate command segments to the correct locations in the answer area. Command
segments may be used once, more than once, or not at all. You may need to drag the split bar between panes
or scroll to view content.)

Which three actions should you perform in sequence?

A company has a branch office with client computersthat run Windows 8.
Files are saved locally on the client computers andare not backed up regularly.
You need to ensure that you can retrieve previous versions of locally saved files from each client computer.
Which three actions should you perform in sequence?(To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.)

Which three actions should you perform in sequence?

You have a computer that runs Windows 8, and three unused external disk drives.
You are creating a volume to store picture files.
You have the following requirements:
Use all three external disk drives.
Ensure that the volume is accessible from a single drive letter.
Maximize the available space.
You need to create the volume.
Which three actions should you perform in sequence?
(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the
correct order.)

Which commands should you run?

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
Some computers have a Trusted Platform Module (TPM)chip.
Members of the ITStaff security group are part of the local Power Users group on each client computer.
You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption
on
all client computers by using the least amount of privilege necessary.
Which commands should you run?
(To answer, drag the appropriate command or commands to the correct location or locations in the answer
area. Commands may be used once, more than once, ornot at all. You may need to drag the split bar between
panes or scroll to view content.)


Page 8 of 13« First...678910...Last »