Cause all that matters here is passing the Microsoft 70-689 exam. Cause all that you need is a high score of 70-689 Upgrading Your Skills to MCSA Windows 8 exam. The only one thing you need to do is downloading Testking 70-689 exam study guides now. We will not let you down with our money-back guarantee.
Q51. You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account.
You discover new applications on the Start screen of the computers.
You need to restrict access to Windows Store for local user accounts on the computers.
What should you do?
A. From Local Computer Policy, select Store and disable Turn off Automatic Downloads for Updates.
B. From Local Computer Policy, navigate to App Package Deployment and disable All Trusted Apps to Install.
C. From Local Computer Policy, select Store and enable Turn off the Store application.
D. From Local Computer Policy, select Store and disable Allow Store to install apps on Windows To Go workspaces.
Answer: C
Explanation:
NOTE: This option for using group policy is only available in the Windows 8 Proand Windows 8 Enterprise editions.
1.
Open the all users, specific users or groups, or all users except administratorsLocal
Group Policy Editor for how you want this policy applied.
2.
In the left pane, click/tap on to expand User Configuration, Administrative Templates,
Windows
Components, and open Store.
3.
In the right pane of Store, double click/tap on Turn off the Store application.
4.
Do step 5 or 6below for what you would like to do.
5.
To Enable “Store” in Windows 8
A) Select (dot) Disabledor Not Configured, and click/tap on OK. (see screenshot below step
6A)
NOTE: Not Configuredis the default setting.
6.
To Disable “Store” in Windows 8
A) Select (dot) Enabled, and click/tap on OK.
7.
You can now close the Local Group Policy Editor window if you like
http://www.eightforums.com/tutorials/5804-store-enable-disable-windows-8-a.html
Q52. You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user's computer to prevent possible user data loss in the future.
What should you do?
A. Remove the .man extension from the user profile name.
B. Add the .dat extension to the user profile name.
C. Configure the user's documents library to include folders from network shares.
D. Configure Folder Redirection by using the domain group policy.
Answer: D
Explanation:
A mandatory user profile is a special type of pre-configured roaming user profile that administrators can use to specify settings for users. With mandatory user profiles, a user can modify his or her desktop, but the changes are not saved when the user logs off. The next time the user logs on, the mandatory user profile created by the administrator is downloaded. There are two types of mandatory profiles: normal mandatory profiles and super mandatory profiles. User profiles become mandatory profiles when the administrator renames the NTuser.dat file (the registry hive) on the server to NT user.man. The .man extension causes the user profile to be a read-only profile. User profiles become super-mandatory when the folder name of the profile path ends in .man; for example, \\server\share\mandatoryprofile.man\. Super-mandatory user profiles are similar to normalmandatory profiles, with the exception that users who have super-mandatory profiles cannot log on when the server that stores the mandatory profile is unavailable. Users with normal mandatory profiles can log on with the locally cached copy of the mandatory profile. Only system administrators can make changes to mandatory user profiles. http://msdn.microsoft.com/en-us/library/windows/desktop/bb776895(v=vs.85).aspx
Q53. You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1.
Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set MBAM Recovery and Hardware service endpoint to MBAM1.
B. Set Select Bitlocker Recovery Information to store to Recovery password only.
C. Set Enter status reporting frequency (in minutes) to 120.
D. Set Select Bitlocker Recovery Information to store to Recovery password and key package.
E. Set Enter client checking status frequency (in minutes) to 120.
F. Set MBAM Status reporting endpoint to MBAM1.
Answer: A,F
Explanation:
-
MBAM Recovery and Hardware service endpoint. This is the first policy setting that you must configure to enable the MBAM Client BitLocker encryption management. For this setting, enter the endpoint location similar to the following example: http://<MBAM Administration and Monitoring Server Name>:<port the web service is bound to>/MBAMRecoveryAndHardwareService/CoreService.svc.
-
MBAM Status reporting service endpoint. You must configure this setting to enable MBAM Client BitLocker encryption management. Enter an endpoint location that is similar to the following example: http://<MBAM Administration and Monitoring Server Name>:<port the web service is bound to>/ MBAMComplianceStatusService/StatusReportingService.svc. NOTE: Not required to configure "Enter client checking status frequency" as it is set to 90 minutes by default
1.0
http://technet.microsoft.com/en-us/library/jj571500.aspx
2.0
http://technet.microsoft.com/en-us/library/dn186164.aspx http://technet.microsoft.com/en-us/library/dn645301.aspx
Q54. You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker.
You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files.
You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained.
What should you do?
A. Restore computer from the latest restore point.
B. Select Reset your PC.
C. Modify setting in Change default settings for media or devices.
D. Delete the HKEY_CLASSES_ROOT\exefile\shell\open\command registry key.
Answer: A
Q55. OTSPOT
You administer Windows 81 computers in your company network. The security policies of the company require that USB storage devices are allowed only if they are protected with Bitlocker To Go.
You need to prevent users from removing Bitlocker encryption from the USB storage devices.
Which configuration setting should you modify? (To answer, select the appropriate setting in the answer area.)
Answer:
Q56. A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer. Windows does not start successfully.
You establish that the updated driver is the cause of the problem.
You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?
A. Use the Windows 8.1 PC Reset feature.
B. Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.
C. Reset the computer to the manufacturer's system image.
D. Use the File History feature.
Answer: B
Explanation:
Microsoft Software Assurance with Volume Licensing agreement = you can download (DART) http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/mdop/dart.aspx http://www.sophia.org/tutorials/diagnostics-and-recovery-toolset-dart-overview
Q57. Your company has a main office and a branch office. All servers are located in the main office. The branch office contains 20 client computers that are the members of a workgroup.
You need to configure the client computers to use BranchCache. The solution must minimize the amount of traffic between the offices.
Which Windows PowerShell cmdlet should you run?
A. Enable-BCLocal
B. Enable-BCHostedClient
C. Enable-BCHostedServer
D. Enable-BCDistributed
Answer: D
Explanation:
Not sure.
Enable-BCLocal: Sets up this client as a standalone BranchCache client; that is it will look
in its own local cache for content which matches the hashes indicated by the server.
Enable-BCDistributed: Sets up this client to broadcast out to the local network looking for
other potential Distributed BranchCache clients.
Enable-BCHostedClient: Sets up this client to look at a particular static server nominated to
host the
BranchCache cache. Required. Configures the BranchCache service to operate in one of
the following modes. DISABLED disables the BranchCache service. LOCAL uses caching
on the local computer only. DISTRIBUTED enables distributed cache mode, allowing
authorized client computers in branch offices to download and republish content.
HOSTEDSERVER configures the local computer as a hosted cache server.
HOSTEDCLIENT configures the local computer as a hosted cache client.
While you can use a local cache, the real benefits come from distributed and hosted mode,
where the browsing actions of a single employee can benefit the whole office. For instance
if Employee A and Employee B are sitting in the same office and both browse to the same
site then most of the content for Employee B will be retrieved direct from Employee A’s
laptop rather than re-downloading from the server. That’s really powerful particularly where
there are bandwidth constraints in the office and common sites that are used by all
employees. But it requires that the web server serving the content participates in the
Branchcache protocol by installing the BranchCache feature.w
Q58. RAG DROP
Ten client computers run Windows Vista and a custom application. The custom application is compatible with Windows 8.
You purchase 10 new computers that have Windows 8 pre-installed. You plan to migrate user settings and data from the Windows Vista computers to the Windows 8 computers. You install the User State Migration Toolkit (USMT) on a USB flash drive.
You need to ensure that the custom application settings are applied to the Windows 8 computers after the migration is complete.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q59. You administer a computer that runs Windows 8 Pro.
You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer.
What should you do?
A. Run the bcdedit /export command.
B. Create a system restore point.
C. Create a system recovery drive.
D. Perfom a backup to a shared folder by using the wbadmin command with the -allcritical switch.
Answer: D
Explanation:
-allCritical Specifies that all critical volumes (volumes that contain operating system’s state) be included in the backups. This parameter is useful if you are creating a backup for bare metal recovery. It should be used only when -backupTargets specified, otherwise the command will fail. Can be used with the -include option. http://technet.microsoft.com/en-us/library/cc742083(v=ws.10).aspx
Q60. You manage computers that run Windows 8.
You plan to install a desktop app named App1 on one of the client computers.
You need to install the app without any user interaction and without displaying a progress bar.
Which command should you run?
A. msiexec /i app1.msi /qb
B. msiexec /i app1.msi /qn
C. msiexec /x app1.msi /qb
D. msiexec /x app1.msi /qn
Answer: B
Explanation:
/i Installs or configures a product.
/x Uninstall a product,
/qn Displays no user interface.
/qb Displays a basic user interface.
http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx