Which tool should you use?
You have several client computers that run Windows 7 Enterprise.
You plan to configure the computers to dual-boot to Windows 8.1 Enterprise by using a native-boot VHD.
You have a VHD file that contains an installation of Windows 8.1 Enterprise,
You need to inject several device drivers into the VHD file.
Which tool should you use?
You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers tha
You have laptops that run Windows 8. The laptops have Microsoft User Experience Virtualization (UE-V)
installed.
You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers
that are disconnected from the network.
What should you do?
Which two actions should you perform?
Your company has a main office that has a connection to the Internet.
The company has 100 Windows 8.1 Pro client computers that run Microsoft Office 2010.
You purchase a subscription to Office 365 for each user. You download the Office Deployment Tool for Clickto-Run,
You need to deploy Office 365 ProPlus to the computers. The solution must minimize the amount of traffic
over the Internet connection.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which four actions should you perform in sequence?
DRAG DROP
Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and
do not have any operating system installed.
You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on
a reference laptop.
You need to create an image and deploy it to the 25 new laptops.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of
actions to the answer area and arrange them in the correct order.)
You need to ensure that the password policies for Office 365 and for Active Directory are the same
Your network contains an Active Directory domain and a subscription to Microsoft Office 365.
Users discover that they must change their Active Directory password more frequently than their Office 365
password.
You need to ensure that the password policies for Office 365 and for Active Directory are the same.
What should you do?
Which required task or tasks should you perform with each approach?
DRAG DROP
You administer computers that run windows 7 and Windows 8. You run an application that saves files that
contain local settings unique to each user.
You want to allow users to synchronize settings for an application to any enterprise computer when they log
on to the enterprise computer.
You need to implement a solution that will move a user’s settings files to any computer. You also need to
ensure that you can roll back the changes if necessary.
Which required task or tasks should you perform with each approach? (To answer, drag the appropriate
required task to the corresponding approach. Each required task may be used once, more than once, or not at
all. You may need to drag the split bar between panes or scroll to view content.)
What should you recommend?
HOTSPOT
Your company plans to deploy Windows 8.1 Enterprise to all client computers.
Users in the development department and the sales department will each receive a laptop that runs a
corporate image of Windows 8.1 Enterprise.
In addition to running the corporate image of Windows 8.1 Enterprise, the users have the requirements
described in the following table.
You need to recommend the appropriate technology for each department.
What should you recommend? (To answer, select the appropriate technology for each department in the
answer area.)
Which command should you run?
A company has Windows 8.1 client computers. The company uses Windows BitLocker Drive Encryption and
BitLocker Network Unlock on all client computers.
Your need to collect information about BitLocker Network Unlock status.
Which command should you run?
Which two actions should you perform?
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery
power. You must accomplish this goal by using the least amount of administrative effort.
Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose
two.)
Which key protector option should you use?
You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT
department configures all of them to use Bitlocker on all fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?