Proper study guides for Improve Microsoft Configuring Windows 8 certified begins with Microsoft 70-687 preparation products which designed to deliver the Validated 70-687 questions by making you pass the 70-687 test at your first time. Try the free 70-687 demo right now.
Q101. A company has a Windows 8.1 client computer with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE).
You need to ensure that the computer starts normally.
What should you do?
A. Configure a system boot password from the system BIOS.
B. Disable C-State configuration from the system BIOS.
C. Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
D. Enable hardware virtualization from the system BIOS.
E. Activate the Trusted Platform Module (TPM).
Answer: C
Q102. You use a Windows 8.1 Pro computer. You turn on File History and install several applications.
The computer becomes slow and unresponsive.
You need to restore the computer to its default settings, You also need to keep your personal files stored on the computer.
What should you do?
A. Run Refresh your PC.
B. Run the Clear-Content PowerShell crndlet.
C. Restore files from File History.
D. Run Reset your PC.
Answer: D
Q103. A company has Windows 8.1 client computers. All user data is stored locally. Each data file has a system access control list (SACL).
You need to ensure that an event is generated when a user modifies a local file.
Which audit policy setting should you configure?
A. Audit process tracking
B. Audit policy change
C. Audit object access
D. Audit privilege use
Answer: C
Q104. You are working with a virtual machine (VM) named NYC-DC1 on a Windows 8.1 computer.
The status of NYC-DC1 in Hyper-V Manager is shown in the following graphic.
You plan to create a snapshot of NYC-DC1. You select the VM in Hyper-V Manager. The
Snapshot option is not available in the Actions pane or in the context menu.
You need to ensure that the Snapshot option is available.
What should you do?
A. Resume the VM.
B. Specify a location in which Hyper-V Manager should save snapshot files.
C. Save the VM.
D. Connect to the VM.
E. Increase the Assigned Memory to at least 2048 MB.
Answer: A
Q105. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain.
You have the following requirements: Ensure that files in shared network folders are available offline. Minimize all data access times. Reduce network bandwidth usage. You need to configure Group Policy settings to meet the requirements.
What should you do first?
A. Enable the Enable file synchronization on costed networks policy setting.
B. Enable and configure the Configure slow-link mode policy setting.
C. Enable and configure the specify administratively assigned Offline Files policy setting.
D. Enable the Synchronize all offline files when logging on policy setting.
Answer: B
Q106. A company has a client computer that runs Windows 8.1 with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE).
You need to ensure that the computer starts normally.
What should you do?
A. Install a Trusted Platform Module (TPM) chip.
B. Start the computer in Safe Mode. Then update the adapter drivers.
C. Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
D. Create a self-signed certificate. Associate the certificate with the third-party adapter.
Answer: C
Q107. A company has Windows 8.1 client computers.
One computer named Computer1 will be used to centralize event logs from other client computers.
You need to configure Computer1 to collect events from other client computers,
What should you do?
A. Run the New-EventLogcmdlet.
B. Create a source-computer-initiated subscription.
C. Run the Get-EventLogcmdlet.
D. Create a collector-initiated subscription.
Answer: D
Q108. A company network contains two workgroups named Workgroup1 and Workgroup2. Workgroup1 contains computers that run Windows 7. Workgroup2 contains computers that run Windows 8.1.
You run the Enable-PSRemoting Windows PowerShell cmdlet on the Workgroup2 computers.
You need to ensure that administrators can manage the Workgroup1 computers from the Workgroup2 computers by using Windows PowerShell Remoting.1
Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)
A. Install Windows PowerShell 2.0 on the Workgroup1 computers.
B. Run the winrmquickconfig command on the Workgroup2 computers.
C. On the Workgroup1 computers, add the Workgroup2 computers to the trusted hosts in Windows Remote Management (WinRM).
D. Run the winrrnquickconfig command on the Workgroup1 computers.
E. On the Workgroup2 computers, add the Workgroup1 computers to the trusted hosts in Windows Remote Management (WinRM).
Answer: CD
Q109. You use a Windows 8.1 computer. You pin some of your favorite websites to the Start screen.
When you click a pinned website, the site opens in Internet Explorer.
You need to ensure that the pinned websites open in Internet Explorer for the desktop.
What should you do?
A. In Internet Options, set Choose how you open links to Always in Internet Explorer on the desktop.
B. In Internet Options, select Open Internet Explorer tiles on the desktop.
C. In Internet Options, select Enable flip ahead.
D. In Internet Options, set Choose how you open links to Let Internet Explorer decide.
Answer: B
Q110. A company has Windows 8.1 client computers. A client computer named COMPUTER1 has a shared folder named Computer1 located in the user's Downloads folder. Computer1 is shared only with employees in the Marketing department. All Marketing employees can connect to Computer1 from their client computers.
A Marketing employee is unable to connect to Computer1 from a legacy device that is not compatible with the Windows 8.1 default sharing settings. The device is able to connect to resources on other client computers.
You need to configure COMPUTER1 to allow the device to connect to Computer1.
Which setting should you enable?
A. Turn off network discovery
B. Use 128-bit encryption to help protect file sharing connections
C. Turn on sharing so anyone with network access can read and write files in the Public folders
D. Enable file sharing for devices that use 40- or 56-bit encryption
E. Turn off password protected sharing
Answer: D