You can help make notes on the Pdf files. Download the check engine in your PC and commit one or perhaps two hours practicing your Microsoft simulated test daily. You can furthermore visit our Expertise Exchange Forum from Testking home page. And then connect with all our clients who are your Microsoft Microsoft certification candidates. You will become better prepared to the 70-687 exam.
Q81. A company has an Active Directory Domain Services (AD DS) domain with Windows 8.1 client computers.
Internet Explorer does not display warning messages to some users when public websites install software or run other installed applications on the client computers.
You need to configure Internet Explorer to always display warning messages about websites that attempt to install software or run applications.
What should you do?
A. Enable the Turn on Protected Mode Group Policy setting.
B. Enable the Automatic prompting for file downloads Group Policy setting.
C. Disable the Allow software to run or install even if the signature is invalid Group Policy setting.
D. Disable the Launching applications and files in an IFRAME Group Policy setting,
Answer: A
Q82. A company has Windows 8.1 client computers.
Users frequently run a custom web application that modifies the system registry. Each time the application starts, the user is prompted for administrative approval.
You need to ensure that users can run the custom application and not be prompted for administrator approval.
What should you do?
A. Turn off Windows SmartScreen.
B. Set the Internet zone privacy level to Low.
C. Set the User Account Control (UAC) settings to Never notify.
D. Set the Internet zone security level to Medium.
Answer: C
Q83. You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer. Your solution must ensure that the user can read the files on Server1.
What should you do?
A. Create a new VPN connection. Disable local drive mappings.
B. Create a new Remote Desktop connection.
C. Set the Local Computer policy to Disable drives redirection for Remote Desktop Services.
D. Create a new Remote Desktop connection. Set the Local Computer policy to Disable clipboard redirection for Remote Desktop Services.
Answer: C
Q84. Employees are permitted to bring personally owned portable computers that run Windows
8.1 to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using Windows Mail.
An employee's personally owned portable computer is stolen.
You need to protect the corporate applications and email messages on the computer.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Prevent the computer from connecting to the corporate wireless network.
B. Disconnect the computer from the management infrastructure.
C. Change the user's password.
D. Initiate a remote wipe.
Answer: CD
Q85. A company has client computers that run Windows 8.1.
You install a new device on a client computer. The device installation includes an application that runs when the computer starts. You experience problems with the application.
You need to prevent the application from running when the computer starts, without affecting any other application.
What should you do?
A. Configure the application by using Task Manager.
B. Run the bcdedit command.
C. Configure the device by using Device Manager.
D. Run the msconuig command.
Answer: A
Q86. You administer Windows 8.1 Pro computers in your company network.
A user named User1 encrypts a sensitive file named file.txt by using Encrypting file systems (EFS) A user named User2 must be able to read file.txt.
You need to configure unencrypted read access to file.txt for User2
What should you do?
A. Configure Advanced Attributes
B. Configure Effective Access
C. Configure Advanced Security Settings
D. Share the folder that contains file.txt.
Answer: A
Q87. A company has Windows 8.1 client computers. The company uses Windows BitLocker Drive Encryption and BitLocker Network Unlock on all client computers.
Your need to collect information about BitLocker Network Unlock status.
Which command should you run?
A. Run the BitLockerWizard command.
B. Run the bitsadmin command.
C. Run the manage-bde command.
D. Run the BdeHdCfg command.
Answer: C
Q88. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All Sales department employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers.
You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run.
You need to quickly ensure that the application can run.
What should you do?
A. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
B. Configure the AppLocker properties to enforce rules.
C. Run the gpupdate /force command.
D. Create a new AppLocker file hash condition.
Answer: C
Q89. A company has client computers that run Windows 8.1. Users store data on company-issued USB flash drives.
You establish that users are able to store data on personally owned USB flash drives.
You need to ensure that users can save data on company flash drives but not on personal flash drives.
What should you do?
A. Disable driver signature enforcement.
B. Run Device Manager as an administrator.
C. In the local Group Policy, modify the device installation restrictions.
D. In the system properties for hardware, modify the device installation settings.
Answer: C
Q90. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.
You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs.
Which permission should you grant to the Sales group?
A. Manage queue
B. Print
C. Manage documents
D. Manage this printer
E. Manage spooler
Answer: B