Exam Code: 70-689 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Upgrading Your Skills to MCSA Windows 8
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-689 Exam.
Q21. RAG DROP
A computer currently runs a 64-bit version of Windows 7 Enterprise.
You need to deploy a 64-bit version of Windows 8 Pro to the computer. The new deployment must not affect the Windows 7 installation on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place:
Answer:
Q22. You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise.
You are planning to add a guest wireless network.
You need to collect information about nearby wireless networks, including their encryption methods.
Which command should you include in the batch file?
A. Netsh wlan set autoconfig enabled=no interface="Wireless Network Connection"
B. ipconfig /allcompartments
C. netsh wlan show networks
D. netstat -a
E. Get-WmiObject win32_networkadapterconfiguration -Filter 'ipenabled = "true"'
F. netsh wlan show hostednetwork
Answer: C
Q23. You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory.
A user reports that he has forgotten the BitLocker encryption password for volume E on his computer.
You need to provide the user a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Ask the user to run the manage-bde -unlock E: -pw command.
B. Ask the user for a recovery key ID for the protected volume.
C. Ask the user for his computer name.
D. Ask the user for his logon name.
Answer: C,D
Explanation:
You can use the name of the user’s computer to locate the recovery password in AD DS. If the user doesnot know the name of the computer, ask the user to read the first word of the Drive Label in the BitLocker Drive Encryption Password Entryuser interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.
Verify the user’s identity You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. Another option is to verify that the computer with the name the user provided belongs to the user. http://technet.microsoft.com/en-us/library/cc771778(v=ws.10).aspx#BKMK_VerifyIdentity
Q24. OTSPOT
Your company has several Windows RT 8.1 devices that run. The devices connect to Exchange Online in Microsoft Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.
You need to identify the effective settings on the Windows RT devices.
What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.)
Answer:
32. You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
. Users have offline access to the application only within the first seven days following their latest online session. . The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.
Answer: A
Explanation:
Microsoft Application Virtualization (App-V) enables enterprises to meet the needs of users and IT by empowering anywhere productivity and accelerated application deployment. App-V provides anywhere user access to applications that available on any authorized device without application installs. Virtual applications and user settings are preserved whether users are online or offline. App-V increases business agility through faster application deployment and updates with no user interruptions. It minimizes conflicts between applications, allowing enterprises to reduce application compatibility testing time. App-V together with Microsoft User State Virtualization (USV) provides users witha consistent experience and reliable access to applications and business data, no matter their location and connection to the Internet. http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/virtualization/app-v.aspx
Q25. You administer Windows RT tablets in your company network. All users in the company have Microsoft Exchange Server 2010 mailboxes and access them by using Outlook Web Access or Outlook 2010. All tablets are registered on the Microsoft Exchange server as mobile devices.
A user informs you that he has lost his tablet. The user is able to connect to the company network from his home computer.
You need to delete Microsoft Exchange information from the lost tablet.
Which application should you use?
A. Outlook 2010
B. Outlook Web Access
C. Active Directory Users and Computers
D. Routing and Remote Access Server
Answer: B
Q26. A company has client computers that run Windows 8. Each employee has one client computer at the office. Some employees also have personal computers at home.
The company has applications that run only on Windows 8.
You need to deploy Windows To Go so that employees can run the applications on their home computers.
Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)
A. ImageX
B. bcdboot
C. BdeHdCfg
D. isoburn
Answer: A,B
Explanation:
If you get DISM as an additional option in this question, I would select DISM.
DISM is already integrated in the Windows 8 OS and it is the newer feature than ImageX.
To use ImageX we have to install Windows 8 AIK first.
Q27. RAG DROP
You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q28. Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration.
You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter.
You want to create an image of the reference desktop that retains the custom driver in the image.
You need to edit the unattended answer file.
Which setting in the unattended answer file should you edit?
A. Microsoft-Windows-Shell-Setup | OEMInformation
B. Microsoft-Windows-PnPSysprep | PersistAIIDeviceInstalls
C. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
D. Microsoft-Windows-PnpCustomizationNonWinPE | DriverPaths
Answer: B
Explanation:
The Microsoft-Windows-PnpSysprep component specifies whether all Plug and Play information persists during the generalize pass. Typically, during the generalize pass, all device information is removed from thecomputer.
If the device information is removed during the generalize pass, the next time the computer runs Plug and Play, the devices will be re-initialized. Typically, the next time the computer boots, the specialize pass runs, and Plug and Play runs. PersistAllDeviceInstalls Specifies whether all Plug and Play information persists during the generalize configuration pass. http://technet.microsoft.com/en-us/library/cc766005(v=ws.10).aspx
Q29. At home, you use a desktop computer that runs Windows 8. At work, you use a laptop that runs Windows 8 and is connected to a corporate network. You use the same Microsoft account to log on to both computers.
You have a folder with some personal documents on your desktop computer.
The folder must be available and synced between both computers. You need to ensure that the latest version of these files is available.
What should you do?
A. Create a folder by using SkyDrive for Windows. Move all of the personal documents to the new folder.
B. Right-click the folder and select Share With, and then select Homegroup (view and edit).
C. Install SkyDrive for Windows. In Windows Explorer, move the folder that contains the personal documents to the SkyDrive folder.
D. Right-click the folder and click Include in library, and then click Documents.
E. Move the folder to the Documents folder. Go to PC Settings. Under Sync your settings, enable Other windows settings.
F. Move the folder to the Libraries folder.Go to PC Settings. Under Sync your settings, enable App settings.
G. Move the folder to the Documents folder.Go to PC Settings. Under Homegroup, select Documents to be Shared.
H. Right-click the folder and click Properties. Under Security, provide Full Control for the Microsoft account.
Answer: A
Explanation:
If "Create a folder by using SkyDrive for Windows. Move all of the personal documents to
the new folder." not a ineligible take this answer:
Install SkyDrive for Windows. In Windows Explorer, move the folder that contains the
personal documents to the SkyDrive folder.
Q30. You support laptops that run Windows 8 Pro and are part of a workgroup.
An employee is unable to start Windows Mobility Center on his laptop.
You need to make it possible for the employee to use Windows Mobility Center on the laptop.
What should you do?
A. Use Add features to Windows 8 to add Windows Mobility Center.
B. Use Turn Windows features on or off in Programs and Features to enable Windows Mobility Center.
C. Use Programs and Features to repair the installation of Windows Mobility Center.
D. Use Local Group Policy Editor to set Turn off Windows Mobility Center to Not Configured.
Answer: D
Explanation:
Original answer ‘A’ however, I reviewed in lab and could not find Windows Mobility Center within Windows Features options. User Configuration > Administrative Templates > Windows Components and Windows Mobility Center If you Enable the Turn off Windows Mobility Center setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file does not launch it. If you do not configure this policy setting, Windows Mobility Center is on by default. http://www.sevenforums.com/tutorials/88151-windows-mobility-center-enable-disable.html