QUESTION 121
A client laptop runs Windows 7 Professional and a custom application. The custom application is compatible with Windows 8. You plan to migrate user settings and data from the client laptop to a new tablet PC that runs Windows 8 Pro.
You install the User State Migration Toolkit (USMT) on a USB flash drive.
You need to ensure that the custom application settings are applied to the tablet PC after the migration is complete. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Explanation:
http://www.utilizewindows.com/7/basics/170-migrate-to-windows-7-using-usmt
QUESTION 122
You have a computer that runs Windows 8, and three unused external disk drives. You are creating a volume to store picture files.
You have the following requirements:
– Use all three external disk drives.
– Ensure that the volume is accessible from a single drive letter.
– Ensure data redundancy between the disk drives in the event of a hardware failure.
You need to create the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Explanation:
http://www.eightforums.com/tutorials/4203-storage-spaces-create-new-pool-storage-space- windows-8- a.html
QUESTION 123
A desktop computer runs Windows 8. The computer is joined to an Active Directory Domain Services (AD DS) domain named contoso.com.
You have two domain user accounts:
– A primary account named User1 that does not have domain administrative privileges.
– An account named Admin1 that has administrative privileges in the domain.
You are currently logged in as User1. You need to run an application named appl.exe.
You have the following requirements: Start the application by using your administrative credentials. Minimize the application load time.
You need to complete the command to meet the requirements. Which command segments should you use to complete the command? (To answer, drag the appropriate command segments to the correct locations in the answer area. Command segments may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
QUESTION 124
A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 64-bit version of Windows 8. The workgroup contains client computers that run a 32-bit version of Windows 8. Computers in the workgroup can’t currently print to PRINTER1.
You need to ensure that the workgroup computers can print to PRINTER1. Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange the correct order.)
Answer:
Explanation:
http://technet.microsoft.com/library/cc732946.aspx
QUESTION 125
You have a computer that runs Windows 8, and three unused external disk drives.
You are creating a volume to store picture files.
You have the following requirements:
• Use all three external disk drives.
• Ensure that the volume is accessible from a single drive letter.
• Maximize the available space.
You need to create the volume.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Explanation:
Disk Management tool does not have a setting for disk resiliency.
In Storage Pool select “Simple” (no resiliency): A simple storage space writes one copy of your data, and doesn’t protect you from drive failures. A simple storage space requires at least one drive.
QUESTION 126
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Some computers have a Trusted Platform Module (TPM) chip. Members of the ITStaff security group are part of the local Power Users group on each client computer.
You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers by using the least amount of privilege necessary. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Explanation:
http://technet.microsoft.com/en-us/library/ee706521(v=ws.10).aspx
QUESTION 127
A Company has 10 computers that run windows vista. The computers are members of a workgroup The company plans to upgrade the computers to windows 8. You are planning a deployment strategy. You need to ensure that users can log on to their existing accounts and access their existing data after the upgrade.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
QUESTION 128
Drag and Drop Question
You administer Windows 8 Pro computers in your company network. A user informs you that he wants to use a picture password on his computer.
You need to configure a picture password with a custom picture for the user. Which prerequisites should you comply with for each element in order to configure the required picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct element or elements in the answer area. Each prerequisite may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
QUESTION 129
Drag and Drop Question
You administer Windows 8 Pro computers in your company network. A user informs you that he wants to use a picture password on his computer. You need to configure a picture password with a custom picture for the user. Which prerequisites should you comply with for each element in order to configure the required picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct element or elements in the answer area. Each prerequisite may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
QUESTION 130
Hotspot Question
You install Windows 8 Enterprise on new laptops that will be shipped to remote users in the sales department of your company. You create new VPN connections on the laptops. Your company security policy requires that the maximum allowed network outage time for the VPN
connection should be less than 10 minutes. You need to configure the required timeout. Which protocol should you use? (To answer, configure the appropriate option or options in the answer
area.)
Answer:
Passing Microsoft 70-687 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-687 Dump:http://www.braindump2go.com/70-687.html