Managing and Maintaining Windows 8.1
Question No: 41
You administer Windows 8.1 Enterprise computers in an Active Directory domain. You have purchased a subscription to Windows Intune.
Company security policy requires that Windows Intune track resolved malware for 15 days, and that a system restore point be created before malware remediation.
You need to meet the requirements specified in the security policy. What should you do?
Create a new Windows Intune Mobile Security Policy in the Windows Intune Admin Console with the recommended settings.
Connect your Microsoft account to your domain account.
Create and deploy a Windows Firewall policy by using a custom policy.
Create a new Windows Intune Center Settings policy with custom settings.
Create and configure an Endpoint Protection scan.
Create a new Windows Intune Agent Settings policy with the recommended settings.
Create a new Automatic Approval Update policy.
Create a new Windows Intune Agent Settings policy with custom settings.
Explanation: Microsoft Intune can help you to secure your managed computers in a number of ways, including:
Endpoint Protection – Provides real-time protection against malware threats, keeps malware definitions up-to date, and automatically scans computers. Endpoint Protection also provides tools that help you to manage and monitor malware attacks.
Windows Firewall settings – Uses policies that allow you to configure Windows Firewall settings on computers.
Reference: Help secure your computers with Endpoint Protection and Windows Firewall policy for Microsoft Intune
Question No: 42
You support Windows 8.1 Enterprise desktop computers.
Your company is deploying proprietary devices that will use a signed device driver. The driver is stored on a server share and is updated frequently by the device manufacturer.
You need to configure the desktop computers to automatically install the most recent version of the device driver from the file share when the proprietary device is plugged in to the computer.
What should you do?
Run the dism.exe tool and specify the /Add-Driver parameter,
Run the pnputil.exe and specify the -e parameter.
Modify the DevicePath value in the HKEY_LOCAL_MACHINE/Microsoft/Windows/CurrentVersion registry key.
Run the pnputil.exe tool and specify the -a parameter.
Explanation: Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store.
Specifies to add the identified INF file.
Specifies to enumerate all third-party INF files. Example: pnputil.exe -a a:\usbcam\USBCAM.INF
Adds the INF file that is specified by USBCAM.INF Reference: Pnputil
Question No: 43
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
->The application is stored locally on the tablets.
->Access to the application is protected with extra logon credentials, in addition to a standard domain account used by users.
->The application utilizes the least amount of network bandwidth.
->The application must maintain access to the current desktop.
You need to deploy the new application to the tablets. What should you do?
Deploy the application as an Application Virtualization (App-V) package. Install the App- V 4.6 client on the tablets.
Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
Install the application on a local drive on the tablets.
Install the application in a Windows To Go workspace.
Install Hyper-V on tablets. Install the application on a virtual machine.
Publish the application to Windows Store.
Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
Explanation: Client Hyper-V Reference:
Question No: 44 DRAG DROP
Your company is migrating from Windows 7 to Windows 8.1.
Before you attempt to migrate a client computer named Computer1. Computer1 fails and can no longer start Windows 7.
You need to migrate the user profile from Computer1 to a client computer named Computer2 that runs Windows 8.1.
Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order.)
LoadState.exe. The LoadState tool migrates the files and settings, one at a time, from the store to a temporary location on the destination computer. The files are decompressed, and decrypted if necessary, during this process. Next, LoadState transfers the file to the correct location, deletes the temporary copy, and begins migrating the next file.
The ScanState tool scans the source computer, collects the files and settings, and then creates a store. ScanState does not modify the source computer. By default, it compresses the files and stores them as a migration store. ScanState copies files into a temporary location and then into the migration store.
http://technet.microsoft.com/en-us/library/dd560755(v=WS.10).aspx http://technet.microsoft.com/en-us/library/bb457090.aspx http://technet.microsoft.com/en-us/library/cc749015(v=WS.10).aspx http://technet.microsoft.com/en-us/library/cc766226(v=ws.10).aspx
Question No: 45 HOTSPOT
Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server.
All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain.
The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.)
In the table below, identify the effective setting for the client computers in each branch office. Make one selection in each column. Each correct selection is worth one point.
Question No: 46
Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012.
You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location.
What should you run on each client computer?
the netdom command
the Enable-BCHostedClient cmdlet
the Enable-BCDistributed cmdlet
the winrm command
Configures BranchCache to operate in hosted cache client mode.
BranchCache is designed to reduce WAN link utilization and improve application responsiveness for branch office workers who access content from servers in remote locations. Branch office client computers use a locally maintained cache of data to reduce traffic over a WAN link. The cache can be distributed across client computers (Distributed Cache mode) or can be housed on a server in the branch (Hosted Cache mode).
BranchCache is disabled by default on client computers. Take the following steps to enable BranchCache on client computers:
Turn on BranchCache.
Enable either Distributed Cache mode or Hosted Cache mode. Configure the client firewall to enable BranchCache protocols. http://technet.microsoft.com/en-us/library/hh848394.aspx http://technet.microsoft.com/en-us/library/hh848398.aspx
Question No: 47
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
Reset your account password to match the HomeGroup password.
Disjoin all HomeGroup members and re-create the HomeGroup.
Change NTFS security permission on the shared folders. Grant Everyone account Read
amp; Execute permission.
Question No: 48 HOTSPOT
Your company has five hardware builds for client computers. The hardware builds are configured as shown in the following table.
You plan to provide some users with Windows To Go disks that contain a corporate image of the 64-bit version of Windows 8.1 Enterprise and several line-of-business (LOB) applications.
In the table below, identify whether the hardware build is compatible or incompatible with the Windows To Go disks. Make only one selection in each row. Each correct selection is worth one point.
Hardware1, Hardware2, hardware5: Works fine. Hardware3, Hardware4: A 64-bit processor is required.
When using a PC as a host, only hardware certified for use with either Windows 7 or Windows 8 operating systems will work well with Windows To Go.
Windows To Go is fully supported on either USB 2.0 ports or USB 3.0 ports on PC’s certified for Windows 7 or Windows 8.
Why does my Windows To Go drive have an MBR disk format with a FAT32 system partition?
This is done to allow Windows To Go to boot from UEFI and legacy systems.
Windows 8.1 Enterprise: System Requirements
Windows 8.1 Enterprise works great on the same hardware that powers Windows 8: Processor: 1 gigahertz (GHz) or faster
RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
Question No: 49
You have Windows 8.1 Enterprise client computers. All of the computers are managed by using Microsoft System Center 2012 Configuration Manager.
You enable Microsoft System Center 2012 Endpoint Protection on the computers.
You need to ensure that Endpoint Protection automatically downloads the latest available malware definition updates when unidentified malware is detected on the computers.
What should you configure form the System Center 2012 Endpoint Protection settings?
Explanation: Microsoft Active Protection Service. Allows the collection and sending of information about detected malware to Microsoft.
Advanced. Use these settings to configure actions such as system restore point creation, client interface visibility, quarantined item deletion period, allowing users to exclude specific folders, and scan and definition update schedule randomization.
Default actions. Allows you to specify how malware is treated once detected based on malware threat level. You have the option of having malware quarantined or removed. You can also configure Endpoint Protection to take whatever action is recommended by Microsoft.
Enable real-time protection. You can use the settings here to enable real time protection. You can also enable or disable scanning of incoming and outgoing files, and all downloaded files and attachments. You can also enable behavior monitoring, which can detect new malware based on behavioral characteristics and also enable protection against network-based exploits.
Question No: 50 HOTSPOT
You have the disk configuration shown in the following exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
The Virtual Hard Disk (VHD) format is a publicly available image format specification that specifies a virtual hard disk encapsulated in a single file, capable of hosting native file systems while supporting standard disk and file operations. http://technet.microsoft.com/en-us/library/dd851645.aspx
Dumps4cert ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No