Q1. You have Windows 8.1 client computers. The computers use the Microsoft Application Virtualization (App-V) 5.0 client.
You discover that when users sign in to their computer, the App-V client refreshes all of the published packages.
You need to prevent the App-V client from refreshing the published packages at sign-in. The solution must ensure that the users can use App-V applications.
Which Windows PowerShell cmdlet should you run?
A. Set-AppvClientConfiguration
B. Set-AppvClientMode
C. Set-AppvClientPackage
D. Set-AppvPublishingServer
Answer: D
Q2. HOTSPOT
Your network contains an Active Directory domain. All client computers run Windows 8
Enterprise and are located in an organizational unit (OU) named Windows8Computers.
The network has Windows Server update Services (WSUS) installed. All of the computers are configured to receive updates from WSUS.
The network administrator creates a new computer group named Win8Computers in WSUS.
You need to ensure that the Windows 8 computers receive all of the updates that are assigned to the WinSComputers computer group.
Which Group Policy setting should you configure? (To answer, select the appropriate setting in the answer area.)
Answer:
Q3. DRAG DROP
You administer computers that run windows 7 and Windows 8. You run an application that saves files that contain local settings unique to each user.
You want to allow users to synchronize settings for an application to any enterprise computer when they log on to the enterprise computer.
You need to implement a solution that will move a user's settings files to any computer. You also need to ensure that you can roll back the changes if necessary.
Which required task or tasks should you perform with each approach? (To answer, drag the appropriate required task to the corresponding approach. Each required task may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q4. HOTSPOT
You have client computers that run Windows 8 Pro. All of the computers are members of an Active Directory domain.
The Folder Redirection Policy settings of all domain users are configured as shown in the Folder Redirection exhibit. (Click the Exhibit button.)
You enable and configure the Configure slow-link mode Group Policy setting that applies to all of the computers as shown in the Slow-link mode exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibits. Each correct selection is worth one point.
Answer:
Q5. You have 100 Windows 8.1 client computers.
You plan to purchase a USB device for each computer. The driver for the USB device is unavailable in the Windows driver store. The hardware manufacturer of the USB device provides you with a signed driver for the
device,
You need to ensure that when the new USB device is connected to a computer, the driver
is installed automatically without any user intervention.
What should you run?
A. the dism.exe command
B. the Add-WindowsPackage cmdlet
C. the pnputil.exe command
D. the Add-WindowsDriver cmdlet
Answer: D
Q6. Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration.
You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter.
You want to create an image of the reference desktop that retains the custom driver in the image.
You need to edit the unattended answer file.
Which setting in the unattended answer file should you edit?
A. Microsoft-Windows-PnPSysprep | PersistAllDeviceInstalls
B. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
C. Microsoft-Windows-PnpCustomizattonNonWinPE | DriverPaths
D. Microsoft-Windows-Shell-Setup | OEMInformation
Answer: A
Q7. You administer Windows 8.1 Enterprise laptops. All of the computers are members of an Active Directory domain.
You are in a remote office. You connect to a variety of Microsoft clients in the main office, including Windows 8, Windows XP, and Server 2008. The VPN authentication traffic must be encrypted.
You need to establish a VPN connection that will allow you to connect to all Microsoft clients.
Which of the following should you use?
A. EAP-TLS
B. MS-CHAP v2
C. 802.1X
D. RADIUS
E. PPTP
F. L2TP/IPSEC
G. IPSEC/IKEv2
H. SSTP
Answer: G
Q8. You are a systems administrator for Contoso, Ltd.
You disabled picture passwords by using a Group Policy object (GPO) named Picture Password Disable.
Management wants to use picture passwords. You disable and remove the GPO that disables picture passwords.
One user's picture password does not function properly on the user's tablet. The tablet is wirelessly connected to the network. You connect to the tablet and view the screen, which is shown in the following exhibit.
You need to ensure that the tablet is able to use picture passwords. What should you do?
A. Log off of the tablet and then log back on.
B. Run the gpupdate/force command from an elevated command prompt.
C. Run the gpupdate /target:user command from an elevated command prompt.
D. Connect the tablet to a wired connection, and then run the gpresult /F command.
Answer: B
Q9. You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles.
A user reports that she has lost all of her personal data after a computer restart.
You need to configure the user's computer to prevent possible user data loss in the future.
What should you do?
A. Configure the user's documents library to include folders from network shares.
B. Remove the .man extension from the user profile name.
C. Add the .dat extension to the user profile name.
D. Configure Folder Redirection by using the domain group policy.
Answer: D
Q10. A company has 100 Windows 8.1 client computers.
A computer fails and reports a kernel error.
You need to analyze the kernel error to identify what caused the failure.
What should you use?
A. A USB recovery drive created by using the advanced recovery tools on another Windows 8 computer
B. A system repair disk created by using Windows 7 File Recovery on another Windows 8 computer
C. The Windows 8 Debug/Checked Build installation media
D. A recovery disk created by using the Microsoft Diagnostics and Recovery Toolset (DaRT)
Answer: A
Q11. You administer laptops that run Windows 8 Enterprise. The laptops are members of an Active Directory domain and are configured with IPv6 disabled.
Some users require access to the internal company database servers while traveling. You need to configure the requested network connection to the database servers.
What should you configure on the laptops?
A. A DirectAccess connection to the company network
B. A virtual private network (VPN) connection to the company network
C. A metered network connection
D. Out of band management
Answer: B
Q12. Your network contains an Active Directory domain named contoso.com. The domain contains Windows 8.1 Enterprise client computers.
Your company has a subscription to Microsoft Office 365. Each user has a mailbox that is stored in Office 365 and a user account in the contoso.com domain. Each mailbox has two email addresses.
You need to add a third email address for each user.
What should you do?
A. From Windows Azure Active Directory Module for Windows PowerShell, run the Set-Mailbox cmdlet.
B. From Active Directory Users and Computers, modify the E-mail attribute for each user.
C. From Active Directory Domains and Trust add a UPN suffix for each user.
D. From the Office 365 portal, modify the Users settings of each user.
Answer: D
Q13. HOTSPOT
A company has client computers that run Windows 7. The company plans to migrate all of the client computers to Windows 8.1.
Two custom applications named App1 and App2 are installed on all client computers. A company policy restricts network connectivity when App1 is running. App2 must be run in a centralized environment.
You need to ensure that client computers can run the applications after the migration.
What should you use for each application? (Make only one selection in each column. This question is worth two points.)
Answer:
Q14. HOTSPOT
You have the disk configuration shown in the following exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Answer:
Q15. HOTSPOT
Your network contains an Active Directory domain.
The Default Domain Policy contains the AppLocker settings configured as shown in the AppLocker Settings exhibit. (Click the Exhibit button.)
The Default Domain Policy contains the AppLocker properties configured as shown in the AppLocker Properties exhibit. (Click the Exhibit button.)
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.
Answer:
Q16. You are a Windows 8 user. Your organization has purchased an Office 365 subscription.
You install Microsoft Lync and Microsoft Outlook on your computer.
You need to connect Office 365 to Lync and Outlook.
What should you do?
A. Run the Office Professional Plus setup from the Office 365 portal.
B. Run the Windows Mail application. Add a new account by using your Office 365 credentials.
C. Run the People application. Add a new account by using your Office 365 credentials.
D. Run the Office 365 desktop setup from the Office 365 portal.
Answer: D