PrepAway - Latest Free Exam Questions & Answers

Category: 70-689 (v.2)

Exam 70-689: Upgrading Your Skills to MCSA Windows 8 (update March 20th, 2016)

Which three actions should you perform in sequence?

DRAG DROP
You administer desktop computers in your company’s research department. The computers run Windows 8
Enterprise and are members of a workgroup.
A new security policy states that all traffic between computers in the research department must be encrypted
and authenticated.
You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced
Security.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)

Which two actions should you perform?

You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain.
Some volumes on the computers are encrypted with BitLOcker. The BitLocker recovery passwords are stored
in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the
protected volume.
You need to provide a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You need to configure the network to support the required remote administration access

You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several
desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP
connections only to ports 80 and 443.
You want to manage disk volumes on the desktop computers from your computer, which is located outside the
protected subnet.
You need to configure the network to support the required remote administration access.
What should you do?

Which three actions should you perform in sequence?

DRAG DROP
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain.
You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit
button.)

You share the folder over the network with Read permission for a domain user account named User1 as shown
in Exhibit 2. (Click the Exhibit button.)

You want to provide access to the shared folder only for the time that User1 is a member of the domain
security group named Project.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)

You need to reconfigure the new computer in order to access the HomeGroup resources

You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8
HomeGroup. The HomeGroup includes one shared printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover
that the shared folders are unavailable, and you receive an error message that indicates the password is
incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?

Which three actions should you perform in sequence?

DRAG DROP
You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second
1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure
that additional external hard drives can be added to the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list
of actions to the answer area and arrange them in the correct order.)

You need to recommend a solution that prevents this warning message from appearing, without compromising the s

You are a systems administrator for your company. The company has employees who work remotely by using
a virtual private network (VPN) connection from their computers, which run Windows 8 Pro.

These employees use an application to access the company intranet database servers. The company recently
decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they
receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without
compromising the security protection of the computers.
What should you do?

You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS i

You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment
Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro.
For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise.
You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS
infrastructure.
What should you do?


Page 4 of 13« First...23456...10...Last »