70-689 - Upgrading Your Skills to MCSA Windows 8

Go back to Microsoft

Example Questions

You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLOcker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) You have a portable computer that runs Windows 8. You are creating a backup plan. You have the following requirements: Automatically back up the files in your Documents folder every hour. Ensure that you can recover different versions of the backed-up files. Do not back up the Windows operating system files. You need to configure the computer to meet the requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory. You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members. You need to ensure that users that meet the membership criteria are added to the Windows Intune group. What should you do? At home, you use a desktop computer that runs Windows 8. At work, you use a laptop that runs Windows 8 and is connected to a corporate network. You use the same Microsoft account to log on to both computers. You have a folder with some personal documents on your desktop computer. The folder must be available and synced between both computers. You need to ensure that the latest version of these files is available. What should you do? You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker. You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files. You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained. What should you do? A company has client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop. You need to ensure that users can remotely connect to their office computers by using Remote Desktop, users must not be able to access any other corporate network resource from their home computers. Which setting should you configure on the home computers? You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App- V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do? Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration. You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter. You want to create an image of the reference desktop that retains the custom driver in the image. You need to edit the unattended answer file. Which setting in the unattended answer file should you edit? You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do? Your company has purchased a subscription to Windows Intune. You use Windows Intune to automatically deploy Windows updates. You create an automatic approval rule in Windows Intune but notice that previously existing updates are not deployed. You need to ensure that all previously existing updates are automatically approved. What should you do? You administer desktop computers on your company network. You want to deploy a WIM file of Windows 8 Enterprise to 15 desktop computers that have a third-party iSCSI adapter installed. The hardware vendor provided a device driver to support this adapter. You need to update the image to ensure that the device driver is installed when you deploy the image. What should you do? A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are members of the domain. Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone. Users of one client computer are able to download and install an application from a site within the Restricted Sites zone. You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone. What should you do? You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro. For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise. You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. What should you do? You update the video card driver on a portable computer that runs Windows 8. When a user connects the portable computer to an external monitor, the external monitor duplicates the display on the portable computer screen. You need to ensure that the user can display additional desktop space on the external monitor. What should you do? You support computers that run Windows 8 Enterprise and are members of a workgroup. Users are able to download and install any app from Windows Store. You need to ensure that only approved apps can be installed from Windows Store. What should you do? You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain. Users travel frequently and access domain resources from inside client networks or from their home network. You want to manage the laptops when they are connected to the company network from the external networks. You need to ensure that the laptops can be managed and maintained while users are not logged on to the computers. Which of the following should you recommend? You administer a computer that runs Windows 8 Pro. You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer. What should you do? You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do? You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. You need to ensure that file and program activity is always monitored on this computer. What should you do? You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do? You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do? You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user's computer to prevent possible user data loss in the future. What should you do? A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Client computers use Windows BitLocker Drive Encryption with a Trusted Platform Module (TPM) chip. You need to create a Group Policy object (GPO) that will secure the TPM owner information. Which policy setting should you configure? A company has client computers that run Windows 8. File History is on. An employee downloads data to a folder on drive D named Archives. You need to ensure that the user can restore files from the Archives folder by using File History. What should you do? You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption with the data-only option on all client computers. You delete a file containing highly confidential information from your computer. You need to clear the free space on the hard drive to minimize the chance of the confidential information being recovered. Which command should you run on the client computer? An organization has client computers that run Windows 7. You upgrade the client computers to Windows 8 without migrating the local user profiles. You install the Windows Assessment and Deployment Kit (ADK) in the environment. You need to migrate the user profiles from the Windows 7 installation to the Windows 8 installation. What should you do first on each client computer? A company has client computers that run Windows 8. Finance department employees store files in the C:\Finance directory. File History is on. A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore. You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. You need to create a Windows Intune policy that meets the security policy requirements. What should you do? A company has 100 client computers that run Windows XP 64-bit Edition. You are deploying new computers that run a 32-bit version of Windows 8. You need to transfer the contents of each user's Documents folder to the new computer by using the least amount of administrative effort. What should you do? You are a Windows 8 user. Your organization has purchased an Office 365 subscription. You install Microsoft Lync and Microsoft Outlook on your computer. You need to connect Office 365 to Lync and Outlook. What should you do? You support laptops that run Windows 8 Pro and are part of a workgroup. An employee is unable to start Windows Mobility Center on his laptop. You need to make it possible for the employee to use Windows Mobility Center on the laptop. What should you do? A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain. You have the following requirements: Ensure that files in shared network folders are available offline. Minimize all data access times. Reduce network bandwidth usage. You need to configure Group Policy settings to meet the requirements. What should you do first? A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.) You are an administrator for a large company that has an Active Directory domain. Your company has tablets that run Windows RT. Users report that their tablets get locked after one minute of inactivity. They also report that when they change the Personalization setting to 15 minutes, it resets back to 1 minute. You need to ensure that the lockout time for inactivity is set to 15 minutes. What should you do? You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account. You discover new applications on the Start screen of the computers. You need to restrict access to Windows Store for local user accounts on the computers. What should you do? You deploy several tablet PCs that run Windows 8. You need to minimize power usage when the user presses the sleep button. What should you do? You manage computers that run Windows 8. You plan to install a desktop app named App1 on one of the client computers. You need to install the app without any user interaction and without displaying a progress bar. Which command should you run? A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry. What should you do? Ihr Unternehmen hat 100 Clientcomputer, auf denen Windows XP Professional in der 64-Bit Version ausgeführt wird. Sie stellen den Benutzern neue Computer mit der 32-Bit Version von Windows 8 bereit. Sie müssen für jeden Benutzer die Inhalte seines Dokumente-Verzeichnisses auf seinen neuen Computer übertragen. Sie wollen Ihr Ziel mit dem geringstmöglichen administrativen Aufwand erreichen. Wie gehen Sie vor? You install Windows 8 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app. You need to remove only the most recently installed third-party desktop app. You start the computer from a system repair disk. Which troubleshooting option should you use? You administer Windows 8 Pro and Windows RT tablets for your company. Your company network includes a Windows Server 2012 domain and Microsoft Exchange 2010 with ActiveSync and Outlook Web Access. Users will be using the tablets outside of the corporate network. The Microsoft Exchange ActiveSync policy is configured to require an alphanumeric password. You need to ensure an alphanumeric password is required on all Windows 8 tablets. What should you do? You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do? A company has client computers that run Windows 8. You attempt to roll back a driver for a specific device on a client computer. The Roll Back Driver button is unavailable in Device Manager. You need to roll back the driver to the previous version. What should you do first? You are an IT consultant for small and mid-sized businesses. One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do? A company has 100 client computers that run Windows Vista. The company uses several custom applications. The company plans to replace the Windows Vista computers with new computers that run Windows 8. You need to establish which of the currently installed applications will work on Windows 8. What should you do?

Study Guides