Managing and Maintaining Windows 8.1
Question No: 71 DRAG DROP
Your network contains an Active Directory domain and 100 Windows 8.1 Enterprise client computers.
All software is deployed by using Microsoft Application Virtualization (App-V) 5.0. Users are NOT configured as local administrators.
Your company purchases a subscription to Microsoft Office 365 that includes Office 365 ProPlus.
You need to create an App-V package for Office 365 ProPlus.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
Explanation: Run the App-V Sequencer Run Setup/packager
Download the office deployment tool for click-to-run http://technet.microsoft.com/en-us/library/jj713487.aspx http://technet.microsoft.com/en-us/library/jj713421.aspx http://technet.microsoft.com/en-us/library/jj713491.aspx
Question No: 72
You administer client computers that run Windows 8 Enterprise deployed by using
Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro.
For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise.
You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure.
What should you do?
Start the tablets from the Windows To Go workspace.
Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE).
Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share.
Start the tablets from a customized Windows Recovery Environment (WinRE).
Explanation: Walkthrough: Create a Custom Windows PE Image To create a bootable UFD (USB Flash Drive)
During a running Windows Vista operation system or a Windows PE session, insert your UFD device.
At a command prompt, use Diskpart to format the device as FAT32 spanning the entire device, setting the partition to active. For example,
diskpart select disk 1 clean
create partition primary size=lt;size of devicegt; select partition 1
format fs=fat32 assign
where the value of disk 1 is equal to UFD.
On your technician computer, copy all the content in the \ISO directory to your UFD device. You can manually create the directory structure or use the xcopy command to automatically build and copy the appropriate files from your technician computer to your UFD device. For example,
xcopy c:\winpe_x86\iso\*.* /s /e /f f:\
where c is the letter of your technician computer hard disk and f is the letter of your UFD device.
Question No: 73
Your network contains client computers that run Windows 8 Enterprise. The computers are members of an Active Directory domain.
Your company purchases a subscription to Windows Intune.
Synchronization between Active Directory and Windows Intune is not configured. You enroll all of the computers in Windows Intune.
You plan to create groups that contain the computers by using dynamic membership. You need to identify which criteria you can use to populate the groups dynamically.
Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.)
organizational unit (OU)
Explanation: Windows Intune Dynamic membership query criteria include: Security group
Organizational unit (OU)
A group can have direct members (static membership), dynamic query-based members,
or both. When you create a dynamic membership query, you define the criteria that determines the query that Windows Intune runs to retrieve the list of group members. The group is automatically updated with members that meet the criteria whenever changes occur. You can also create groups that have static membership lists. These are groups that you manually define by explicitly adding members.
Windows Intune is a Microsoft cloud-based management solution.
Intune is primarily aimed at small and medium enterprises and service providers who want to manage up to 500 Microsoft Windows computers. Distribution is through a subscription system in which a fixed monthly cost is incurred per PC. The minimum subscription duration is one year. Included in the package is the Windows operating system, currently Windows 8 Enterprise.
Question No: 74 HOTSPOT
You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager.
You enable Microsoft System Center 2012 Endpoint Protection on the computers.
You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers,
What should you configure? (To answer, select the appropriate option in the answer area.)
Microsoft Active Protection Service is an online community that helps you decide how to respond to potential threats.
If YES setting is configured – Yes automatically sends information about detected malware to the Microsoft Active Protection Service.
Question No: 75
You administer Windows 8.1 Pro tablets that are members of an Active Directory domain. Your company policy allows users to download and install only certain few Windows Store apps.
You have created a new AppLocker Packaged Apps policy to help enforce the company
You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company.
What should you do?
Open PowerShell and run the Get-AppLockerPoIicy -Effective cmdlet to retrieve the AppLocker effective policy.
Open Group Policy Management console and run the Group Policy Modeling Wizard.
Open Group Policy Management console and run the Group Policy Results Wizard.
Open Group Policy Management console and enforce the new AppLocker policy in Audit Only mode.
Explanation: Step 1: Enable the Audit only enforcement setting
By using the Audit only enforcement setting, you can ensure that the AppLocker rules that you have created are properly configured for your organization. This setting can be enabled on the Enforcement tab of the AppLocker Properties dialog box.
Step 2: Configure the Application Identity service to start automatically Step 3: Test the policy
Test the AppLocker policy to determine if your rule collection needs to be modified. Because you have created AppLocker rules, enabled the Application Identity service, and enabled the Audit only enforcement setting, the AppLocker policy should be present on all client computers that are configured to receive your AppLocker policy.
Reference: Test and Update an AppLocker Policy
Question No: 76
You have a client Windows 8.1 Enterprise computer. The computer is joined to an Active Directory domain. The computer does not have a Trusted Platform Module (TPM) chip installed.
You need to configure BitLocker Drive Encryption (BitLocker) on the operating system drive.
Which Group Policy object (GPO) setting should you configure?
Configure use of hardware-based encryption for operating system drives.
Allow access to BitLocker-protected fixed data drives from earlier version of Windows.
Require additional authentication at startup.
Allow network unlock at startup.
Question No: 77
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers.
What should you do?
Publish the application through a public file transfer protocol (FTP) site.
Digitally sign the application by using a trusted certificate, and then update the default App Package Deployment policy on all computers.
Change the default Software Restriction Policies on the client computers.
Change the default Applications Control Policies on the client computers.
Explanation: Note: The app package signature ensures that the package and contents haven#39;t been modified after they were signed. If the signing certificate validates to a Trusted Root Certification Authorities Certificate, the signature also identifies who signed the package.
Question No: 78 DRAG DROP
Your network contains Windows RT client computers. All certificates are issued by an internal certification authority (CA). All of the computers are managed by using Windows Intune.
You have a Windows 8.1 client computer named Clientl and a Windows RT client computer named Client2.
On Clientl, you develop a Windows Store app named Appl.
You need to recommend the tasks that must be completed to ensure that Client2 can install Appl.
What should you recommend? (To answer, drag the appropriate tasks to the correct location or locations. Each task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Question No: 79
Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012.
You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location.
What should you run on each client computer?
the Enable-BCLocal cmdlet
the netdom command
the netstat command
the netsh command
Reference: http://dougvitale.wordpress.com/2013/02/07/network-administration- commands-for-microsoft-windows-and-active-directory/#netdom
Question No: 80
You have client Windows 8.1 Enterprise computers. Some of the computers have shared printers.
You need to configure all of the shared printers to use duplexing. The solution must not change the settings of any other printers.
Which two Windows PowerShell cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|