70-688 - Managing and Maintaining Windows 8

Go back to Microsoft

Example Questions

You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. Users in the Marketing department use Windows 8 Pro computers. A group policy object (GPO) is in place that configures automatic updates on the Marketing computers. The GPO configures the Marketing computers to download updates and install them at 2pm every day. Users in the Marketing department complain that their computers sometimes automatically reboot after the updates have been installed. How can you prevent the automatic reboots? You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do? You have client computers that run Windows 8 Enterprise. The network contains a network printer. Users connect to the printer by using a local TCP/IP port. A network administrator changes the IP address of the printer. You need to create a script to update the IP address used by the local TCP/IP port on the computers. Which two Windows PowerShell cmdlets should you run? (Each correct answer presents part of the solution. Choose two.) You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLocker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker. You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files. You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. A Windows 8 Enterprise computer named Client1 has AppLocker policies in place to restrict access to applications. You have been asked to disable AppLocker on Client1. You log in to Client1 and open the Local Group Policy Editor. You then delete all the AppLocker rules, disable the Application Identity service then run the gpupdate /force command to refresh the policy. You discover that the AppLocker rules are still be applied. You need to disable AppLocker. What should you do? You are a systems administrator for Contoso; Ltd. All client computers run Windows 8 and are members of the contoso.com Active Directory domain. Users log on to their computers by using domain user accounts. Contoso develops an internal line of business (LOB) Windows Store app. You want to deploy the LOB app to the client computers and configure the app to access various resources in the domain. You need to enable all users to run the LOB app and access the required resources from the LOB app. What should you do? You are a Windows 8 user. Your organization has purchased an Office 365 subscription. You install Microsoft Lync and Microsoft Outlook on your computer. You need to connect Office 365 to Lync and Outlook. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. The network includes client computers from different hardware manufacturers. All client computers run Windows 8 Pro. You currently have multiple bootable Windows Recovery Environment (WinRE) disks, each with different drivers for the different hardware configurations. You want to create a single bootable Windows Recovery Environment (WinRE) disk that can be used on all different hardware configurations. You use Deployment Image Servicing and Management (DISM) to mount a WinRE image file. How should you create the WinRE image? You are an IT consultant for small and mid-sized businesses. One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do? You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do? You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do? You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft Exchange 2010 with ActiveSync and Outlook Web Access. Users will be using the tablets outside of the corporate network. The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password. You need to ensure an alphanumeric password is required on all Windows 8 tablets. What should you do? You support laptops that run Windows 8 Pro and are part of a workgroup. An employee is unable to start Windows Mobility Center on his laptop. You need to make it possible for the employee to use Windows Mobility Center on the laptop. What should you do? You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro. For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise. You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. What should you do? You manage a network that includes computers that run Windows 8 Enterprise. All of the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. You need to enforce these security policy requirements on the computers. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. The client computers run either Windows 7 Enterprise or Windows 8 Enterprise. Company users use a custom application named CorpApp. The application is installed on every client computer in the network. The application creates unique files that store settings for each user when the user uses the application. Users often log in to different client computers. You need to recommend a solution that would enable a user to log in to any client computer and retrieve their settings file so that the application does not need to be configured whenever a user logs into a different computer. The solution must enable users to reverse any changes to the settings files if required. Which of the following would be the best solution? You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled. Some users require access to the internal company database servers while traveling. You need to configure the requested network connection to the database servers. What should you configure on the laptops? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All client computers run Windows 8 Enterprise. A user named Jane in the Sales department uses a client computer named YC-Sales03. Jane reports that a print job is stuck in a print queue on YC-Sales03. You need to delete the print job. You open a remote PowerShell session on YC-Sales03 and run the Get-Printer cmdlet to determine the name of the printer. What should you do next? You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user's computer to prevent possible user data loss in the future. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. The company has asked for improved security when logging on to the network. A new company security policy states that logging in to the network should use two-factor authentication. Which of the following solutions would implement two-factor authentication? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2008 R2 and all client computers run Windows 8 Pro. All servers and client computers use IPv4 and have IPv6 disabled. Sales users often work away from the office. The Sales users require access to internal network resources when they are away from the office. You need to recommend a solution for providing the required access. What should you include in your solution? You are an administrator for a large company that has an Active Directory domain. Your company has tablets that run Windows RT. Users report that their tablets get locked after one minute of inactivity. They also report that when they change the Personalization setting to 15 minutes, it resets back to 1 minute. You need to ensure that the lockout time for inactivity is set to 15 minutes. What should you do? Sie sind als Desktopadministrator für das Unternehmen CertBase tätig. Sie administrieren Desktopcomuter, auf denen das Betriebssystem Windows 8.1 Pro ausgeführt wird. Das Unternehmen verwendet Lesegeräte für Kreditkarten. Die Geräte erfordern einen speziellen Treiber, der vom Hersteller bereitgestellt wird. Die Lesegeräte werden häufig an wechselnde Computer angeschlossen. Ihr Unternehmen hat kürzlich fünf neue Computer mit dem Betriebssystem Windows 8.1 Pro angeschafft. Sie möchten, dass der erforderliche Treiber für den Betrieb des Kreditkartenlesegeräts automatisch und ohne Benutzerinterkation installiert wird, wenn eines der Lesegeräte an einen der neuen Computer angeschlossen wird. Wie gehen Sie vor? Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012. You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location. What should you run on each client computer? Your network contains an Active Directory domain. All client computers run Windows 8 Enterprise. Microsoft System Center 2012 Endpoint Protection is deployed to all of the computers by using the default settings contained in the Default Antimalware Policy. The users in the research department report that a folder named C:\TestApp must not be scanned by the Endpoint Protection client. You need to configure the Endpoint Protection client not to scan the C:\TestApp folder for the computers in the research department only. What should you do first? You administer laptop and desktop computers that run Windows 8 Pro. Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS). Your company decides that access to the company network for all users must be controlled by two-factor authentication. You need to configure the computers to meet this requirement. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. You have recently configured an Application Virtualization (App-V) infrastructure. All client computers have the App-V client installed. You plan to deploy an App-V application to computers in the Sales department. You need to configure the Application Virtualization (App-V) infrastructure to ensure that Sales users can only run the App-V application when their computers are connected to the network. What should you configure? Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers habe the same hardware configuration. You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter. You want to create an image of the reference desktop that retains the custom driver in the image. You need to edit the unattended answer file. Which setting in the unattended answer file should you edit? You support tablets that run Windows 8 Pro. You are designing a remote access server (RAS) that will be placed behind a firewall. The firewall will accept incoming TCP connections to ports 80 and 443 only. You want to connect to the RAS server from a tablet. You need to create a virtual private network (VPN) connection to the RAS server. Which VPN tunneling protocol should you use? You have a client computer that runs Windows 8 Enterprise. The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data. You need to prevent any data from being written to the fixed disk. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All client computers run Windows 8 Pro. Company users use bar code scanners that connect to computers via a USB port. A manufacturer supplied custom driver is required on each computer to operate the bar code scanners. You are in the process of configuring ten new Window 8 Pro laptops. You need to ensure that the bar code scanner drivers are automatically installed when users connect a bar code scanner to a new computer. Users should not be prompted to install the drivers. How can you pre-stage the driver on the new computers? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. All client computers are configured with a disk configured a drive E. On all client computers, drive E: is encrypted with BitLocker Drive Encryption and the recovery passwords stored in Active Directory. A user named Clive works in the Sales department. Clive reports that he has forgotten the BitLocker password and is unable to access drive E: on his computer. How can you provide Clive with the Bitlocker recovery key to access his E: drive? You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account. You discover new applications on the Start screen of the computers. You need to restrict access to Windows Store for local user accounts on the computers. What should you do? You administer computers that run Windows 8 Pro. The desktops habe the Application Virtualization (App-V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do? You administer several computers that run Windows 8. The manufacturer of the video display adapters used in these computers issues a new version of the video driver. You need to install the new version of the driver on the computers. What should you do first? You have laptops that run Windows 8. The laptops have Microsoft User Experience Virtualization (UE-V) installed. You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network. What should you do? A company has 10 client computers that run Windows 8. Employees log on to resources by using multiple accounts. You need to back up the user name and password for each logon account. What should you do on each client computer? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. The company has an Application Virtualization (App-V) infrastructure. All client computers have the App-V client installed and run multiple App-V applications. All users in the Sales department have roaming profiles. A new user named Mia works in the Sales department. Mia reports that it takes a long time open App-V applications on her computer. You confirm that locally installed applications launch quickly on Mia's computer. How can you reduce the time it takes for Mia to launch App-V applications? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. Sales users have been issued with tablet computers that run Windows 8 Enterprise. The Sales users want to be able to connect to network resources when they are working away from the office. You are configuring a Windows Server 2012 server as a VPN server to accept the external remote connections. The corporate firewall allows inbound traffic on TCP port 80 and TCP port 443 only. How should you configure the VPN? You support computers that run Windows 8. You are designing a remote access server (RAS). The firewall accepts incoming TCP connections only to ports 80 and 443. You want to connect to the RAS server from a laptop. You need to create a virtual private network (VPN) connection to the RAS server. Which VPN tunneling protocol should you use? You have client computers that run Windows 8 Pro. You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort. What should you include in the recommendation? You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do? You work as a desktop technician at YourCompany.com. The YourCompany.com network consists of an Active Directory Domain Services (AD DS) domain named YourCompany.com. All servers run Windows Server 2012 and all client computers run Windows 8 Enterprise. The company has a Microsoft Exchange email infrastructure. Users use the Mail app to access their Microsoft Exchange mailboxes. You will use a recently purchased Windows Intune subscription to manage the Windows 8 devices and the Microsoft Exchange infrastructure. You need to configure Windows Intune to enforce security settings on the Windows 8 devices that include password length, password expiration and password history. Which of the four Windows Intune policies should you configure to enforce the password settings? At work, you use a desktop computer that runs Windows 8 Pro. At home, you use a laptop that runs Windows 8. You use the same Microsoft account to log on to both computers. You want to use the same settings for both computers. You need to ensure that all computer settings, including stored passwords, are synced between the computers. What should you do? You have 100 client computers that run Windows 8 Pro. Each computer has a single local hard disk drive, a DVD drive, and an external USB drive. Each computer has a different set of line-of-business (LOB) desktop applications that are installed locally. All of the applications store their configurations in the HKEY_Local_Machine\Software registry hive. You need to design a recovery solution to ensure that you can restore the initial state of the locally installed LOB desktop applications if an application is misconfigured. The solution must preserve the existing locally stored user data. What should you do? You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do? You administer computers that run Windows 8 Pro. Your company uses credit card readers that require a custom driver supplied by the manufacturer. The readers frequently are moved from computer to computer. Your company recently purchased five new computers that run Windows 8 Pro. You want the required drivers to be installed automatically and silently when users connect the readers to the new computers. You need to pre-stage the credit card reader driver on the new computers. What should you do? You administer computers that run Windows 8 Enterprise. The computers are members of an Active Directory domain. You have a tablet that runs Windows 8 Enterprise. You configure the tablet to access your company network by using a virtual private network (VPN) connection. You need to manage Active Directory from the tablet by using a VPN connection. What should you do?