Configuring Windows 8.1
Question No: 111 – (Topic 2)
You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain.
Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store.
You need to ensure that all employees in the HR department can use Timesheet on their new computers.
What should you do?
Set the Allow all trusted applications to install group policy to Enabled.
Set the Turn off the Store application group policy to Enabled.
Install and run the Microsoft Deployment Toolkit.
Install and run the Windows App Certification Kit.
Explanation: Currently, the Consumer Preview and Windows Server 8 Beta are classified as “enterprise sideloading enabled.” This means that when a PC is domain joined, it can be configured to accept non-Windows Store apps from their IT admin. Moving forward, this functionality to install non-Windows Store Metro style apps will be available for Windows
8.1 Enterprise Edition and Windows 8.1 Server editions.
On an enterprise sideloading enabled edition, the IT admins needs to verify: The PC is domain joined.
The group policy is set to “Allow all trusted apps to install”. The app is signed by a CA that is trusted on the target PCs
Note: While the Windows Store will be a great way to deploy apps to business customers, there are apps that IT admins will want to distribute directly to the end-users. This option makes sense for custom and proprietary line-of-business (LOB) apps, or enterprise software purchased directly from an ISV.
Question No: 112 – (Topic 2)
You are troubleshooting a Windows 8.1 computer. The computer is not joined to a domain.
You are unable to change any of the advanced Internet options, which are shown in the Advanced Internet Options exhibit. (Click the Exhibit button.)
You need to ensure that you can change the advanced Internet options. What should you do?
Use the Group Policy Object Editor.
Use the Internet Explorer Administration Kit (IEAK).
Run Internet Explorer and use the Settings charm to change options.
Run the iexplore -k command.
http://technet.microsoft.com/en-us/library/cc731745.aspx Open the Local Group Policy Editor
To open the Local Group Policy Editor from the command line
Click Start , type gpedit.msc in the Start Search box, and then press ENTER .
http://technet.microsoft.com/en-us/library/gg699401.aspx Group Policies in Internet Explorer 9
Group Policy provides a secure way to control Microsoft庐 Windows庐 Internet Explorer庐 9 configurations.
http://msdn.microsoft.com/en-us/library/ie/hh826025(v=vs.85).aspx IE Command-Line Options
-k Starts Internet Explorer in kiosk mode. The browser opens in a maximized window that does not display the address bar, the navigation buttons, or the status bar.
Internet Explorer Administration Kit (IEAK) Information and Downloads
The Internet Explorer Administration Kit (IEAK) simplifies the creation, deployment and management of customized Internet Explorer packages.
Question No: 113 DRAG DROP – (Topic 2)
You administer Windows XP and Windows 7 client computers in your company network. You add 100 new client computers that have Windows 8.1 Enterprise installed.
You need to migrate user profiles, local groups membership, and network mapped drives to the new client computers. You download and copy User State Migration Tool (USMT) files to a network share.
Which three actions should you perform next, in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in
the correct order.)
* / Step One: Plan Your Migration
Modify copies of the Migration.xml and MigDocs.xml files and create custom .xml files, if it is required.
/ Step Two: Collect Files and Settings from the Source Computer Run scanstate on source computers
/ Step Three: Prepare the Destination Computer and Restore Files and Settings Run loadstate on the destination computers.
USMT 5.0 includes three command-line tools: ScanState.exe version 6.2
LoadState.exe version 6.2
UsmtUtils.exe version 6.2-
USMT 5.0 also includes a set of three modifiable .xml files:
http://technet.microsoft.com/en-us/library/cc766203(v=ws.10).aspx USMT .xml Files
This is an optional file that you can create using the /genconfig option on the ScanState command line. You should create and modify this file if you want to exclude certain components from the migration. In addition, you must create and modify this file if you want to exclude any of the operating system settings that are migrated to computers running Windows Vista (because MigSys.xml is not applicable in that scenario). This file has a different format than the migration .xml files because it does not contain any migration rules
– it only contains a list of the operating system components, applications, and the user documents that can be migrated. For an example, see the Sample Config.xml file. For this reason, excluding components using this file is easier than modifying the migration .xml files because you do not need to be familiar with the migration rules and syntax. You cannot use wildcard characters in this file.
http://technet.microsoft.com/en-us/library/cc721992(v=ws.10).aspx USMT Components
You use ScanState to collect the files and settings from the source computer. You use LoadState to restore the user state onto the destination computer.
USMT Components ScanState.exe
ScanState scans the source computer, collects the files and settings and creates a store.
ScanState does not modify the source computer. By default, ScanState compresses the files and stores them as an image file (USMT3.MIG).
LoadState migrates the files and settings from the store to the destination computer. LoadState migrates each file (one by one) from the store to a temporary location on the destination computer – the files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the file to the correct location, deletes the temporary copy, and begins migrating the next file.
Compression improves performance by reducing network bandwidth usage as well as the required space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.
Question No: 114 HOTSPOT – (Topic 2)
You are troubleshooting communication issues on a computer that has Windows 8.1 Enterprise installed.
The relevant portion of the computer configuration is displayed in the exhibit. (Click the Exhibit button.)
You need to find the Windows Firewall service startup and shutdown events.
In the Event Viewer, which event log should you select? (To answer, select the appropriate log in the answer area.)
Question No: 115 – (Topic 2)
A company has lab computers that run Windows 8.1. On all lab computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled and the Download updated compatibility lists from Microsoft option disabled. All lab computers access only internal corporate websites.
A corporate website was designed for a previous version of Internet Explorer. When viewed on the lab computers, menus and images on the website are displayed out of place.
You need to ensure that all corporate websites display correctly on the lab computers. What should you do?
Enable the Display all websites in Compatibility View option.
Manually add the corporate website to the compatibility view settings.
Manually download an updated compatibility list from Microsoft.
Disable the Display intranet sites in Compatibility View option.
Explanation: Fix site display problems with Compatibility View
Sometimes websites don#39;t look like you expect them to-images might not appear, menus might be out of place, and text could be jumbled together. This might be caused by a compatibility problem between Internet Explorer and the site you#39;re on. Sometimes this can be fixed by adding the site to your Compatibility View list.
Question No: 116 – (Topic 2)
You use a Windows 8.1 Pro computer. The computer stores research data in a folder named C:\Research.
You turn on File History.
You need to back up the Research folder. What should you do?
Create a new library and include the folder in the library.
Create a new volume mount point in the root of the folder.
Create a new storage space and move the folder to the storage space.
Create a new restore point.
Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
It’s a feature introduced in Windows 8 that offers a new way to protect files for consumers. It supersedes the existing Windows Backup and Restore features of Windows 7.
Before you start using File History to back up your files, you#39;ll need to set up a drive to save files to. We recommend that you use an external drive or network location to help protect your files against a crash or other PC problem.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you can add them to one of your existing libraries or create a new library.
Advanced settings can be accessed from the File History control panel applet.
File History also supports new storage features introduced in Windows 8. Users who have lots of data to back up can use Storage Spaces to create a resilient storage pool using off- the-shelf USB drives. When the pool fills up, they can easily add more drives and extra storage capacity to the pool.
Virtualizing storage for scale, resiliency, and efficiency
Windows 8 provides a new capability called Storage Spaces enabling just that. In a nutshell, Storage Spaces allow:
Organization of physical disks into storage pools, which can be easily expanded by simply adding disks. These disks can be connected either through USB, SATA (Serial ATA), or SAS (Serial Attached SCSI). A storage pool can be composed of heterogeneous physical disks – different sized physical disks accessible via different storage interconnects.
Usage of virtual disks (also known as spaces), which behave just like physical disks for all
purposes. However, spaces also have powerful new capabilities associated with them such as thin provisioning (more about that later), as well as resiliency to failures of underlying physical media.
Question No: 117 – (Topic 2)
You administer desktop computers in your company network.
You are developing User State Migration Tool (USMT) procedures.
You need to ensure that the files located in C:\projects are included in the migration package.
What should you do?
Answer: C Explanation:
http://technet.microsoft.com/en-us/library/cc766056(v=ws.10).aspx How To Include Files and Settings
To migrate a specific folder
The following examples show how to migrate a folder from a specific drive, and from any location on the computer.
Including subfolders. The following .xml file migrates all files and subfolders from C:\EngineeringDrafts to the destination computer.
lt;component type=quot;Documentsquot; context=quot;Systemquot;gt;
lt;displayNamegt;Component to migrate all Engineering Drafts Documents including subfolderslt;/displayNamegt;
lt;pattern type=quot;Filequot;gt;C:\EngineeringDrafts\* [*]lt;/patterngt;
Question No: 118 – (Topic 2)
You use a computer that has Windows 8.1 Pro installed.
Your personal files are stored in a storage pool that is distributed across multiple USB drives.
You need to configure a daily backup solution that meets the following requirements:
->Automatically backs up all of your personal files that are located in the storage pool.
->Automatically backs up operating system files.
->Ensures that you can restore any file.
What should you do?
Create a recovery drive.
Turn on File History.
Configure Windows 7 File Recovery.
Configure system protection.
Answer: C Explanation:
http://windows.microsoft.com/en-us/windows-8/storage-spaces-pools Storage Spaces: FAQ
What is Storage Spaces?
Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to create storage spaces.
Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it’s easy to work with files on them.
You can create large storage spaces and add more drives to them when you run low on pool capacity.
If you have two or more drives in the storage pool, you can create storage spaces that won#39;t be affected by a drive failure-or even the failure of two drives, if you create a three- way mirror storage space.
Backup and Recovery of Windows 8 amp; Windows 8.1 – Tip-of-the-Day
Update for Windows 8.1: Note that System Image Backup in Windows 8.1 has been moved to the lower left corner of the File History tool in Control Panel as shown below.
In addition, the Windows 7 File Recovery tool in Control Panel has been renamed to the Recovery tool in Windows 8.1.
Launching Windows System Backup
Windows System Backup is still included in Windows 8! To launch the Windows Backup tool, open the Control Panel -gt; Windows 7 File Recovery applet and click the quot;Set up Backupquot; button. Alternatively, you can launch quot;sdclt.exequot; from the Command Prompt to start this applet.
All of the old familiar options are there! Using Windows Backup, you can backup a full system image or selected files amp; folders to an external drive or network location. You can also create a system repair disc for repairing and restoring the system in the event that you encounter any boot issues.
System protection tab in Windows 8:
http://technet.microsoft.com/en-us/library/dn390929.aspx Windows Server Backup and Storage Pools
Backup and recovery process and storage pools
Windows Server Backup does not differentiate a storage pool from other storage. Therefore the presence of a storage pool (both in the online mode and offline Windows RE mode) and its storage space are handled by Windows Server Backup in the same way as normal disks and volumes. Windows Server Backup can be used for any backup or recovery operations either to or from storage pool disks.
Question No: 119 – (Topic 2)
A company has an Active Directory Domain Services (AD DS) domain. All client computers are joined to the domain and run Window 8.1. You set up a management computer named COMPUTER1.
You plan to administer COMPUTER1 by using Windows Remote Shell (WinRS) from your client computer.
You are unable to connect to COMPUTER1 by running the winrs command. You need to ensure that you can manage only COMPUTER1 by using WinRS. What should you do?
Run the winrsnetdom join command on all client computers.
Run the winrsnetdom join command only on COMPUTER1.
Run the winrmquickconfig command on all client computers.
Run the winrmquickconfig command only on COMPUTER1.
Run the winrs /ad /u:administrator command on COMPUTER1.
Answer: D Explanation:
http://clintboessen.blogspot.com/2010/01/what-is-winrm.html What is WinRM?
The easiest way to start the WinRM server unless you want to do custom configuration is by using the quot;winrm quickconfigquot; command.
Hit quot;Yquot; to make the change. Next it asks you if you want to allow it to make a HTTP listener and create a windows firewall exception.
Hit quot;Yquot; to make the change. WinRM is now running and can be remotely managed by WinRS (the WinRM client).
Now re-run the quot;winrm enumerate winrm/config/listenerquot; command to see if WinRM is working:
We see it listening on port 5985, this is because I#39;m running Windows 7 on this PC so its using WinRM 2.0.
Now from another PC I can use the WinRS client to remotely execute commands against that workstation/server by using quot;winrs -r:https://myserver.comquot; command. Please note that you need to run the command as a user in the remote computers quot;Administratorsquot; group.
By default WinRS will use your active windows credentials. However I do not run my computer as administrator for security purposes so I will need to specify a user account with Domain Admins rights to ensure I have correct access by using the -u: switch.
http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx Installation and Configuration for Windows Remote Management
The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:
Starts the WinRM service, and sets the service startup type to auto-start. Configures a listener for the ports that send and receive WS-Management protocol messages using either HTTP or HTTPS on any IP address.
Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.
Note: The winrm quickconfig command creates a firewall exception only for the current user profile. If the firewall profile is changed for any reason, winrm quickconfig should be run to enable the firewall exception for the new profile; otherwise, the exception might not be enabled.
Question No: 120 – (Topic 2)
A company has Windows 8.1 client computers. Employees use multiple Windows Store apps on the computers.
An employee installs a legacy app on his portable computer and then experiences problems with the computer. He installs two additional legacy apps and the problems increase.
You need to return the computer to its default state and retain all user data and Windows Store apps.
What should you do?
Run the Remove everything and install Windows feature.
Perform a system restore to the most recent restore point.
Use Windows 7 File Recovery to restore all Windows system files.
Run the Refresh your PC without affecting your files feature.
Explanation: http://windows.microsoft.com/en-us/windows-8/restore-refresh-reset-pc How to refresh, reset, or restore your PC
If you think an app or driver that you recently installed caused problems with your PC, you can restore Windows back to an earlier point in time, called a restore point. System Restore doesn’t change your personal files, but it might remove recently installed apps and drivers.
100% Free Download!
–Download Free Demo:70-687 Demo PDF
100% Pass Guaranteed!
–Download 2018 EnsurePass 70-687 Full Exam PDF and VCE
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|