Q1. HOTSPOT
Your company plans to deploy Windows 8 Enterprise to all client computers.
Users in the development department and the sales department will each receive a laptop that runs a corporate image of Windows 8 Enterprise.
In addition to running the corporate image of Windows 8 Enterprise, the users have the requirements described in the following table.
You need to recommend the appropriate technology for each department.
What should you recommend? (To answer, select the appropriate technology for each department in the answer area.)
Answer:
Q2. Your network contains an Active Directory domain. The domain contains client computers that run Windows 8 Enterprise.
Users frequently use USB drives to store sensitive files that are used on multiple computers.
Your corporate security policy states that all removable storage devices, such as USB data drives, must be encrypted.
You need to ensure that if a user forgets the password for a USB disk that is encrypted by using BitLocker To Go, the user can resolve the issue them self.
What should you do?
A. Instruct the user to open BitLocker Drive Encryption, select Backup Recovery Key, and then select Save to your Microsoft account.
B. For each computer, create a USB startup key.
C. Instruct the user to open BitLocker Drive Encryption, select Backup Recovery Key, and then select Print the recovery key.
D. From an elevated command prompt, run Manage-BDE -ForceRecovery.
Answer: C
Q3. Your network contains an Active Directory domain and a subscription to Microsoft Office
365.
Users discover that they must change their Active Directory password more frequently than their Office 365 password.
You need to ensure that the password policies for Office 365 and for Active Directory are the same.
What should you do?
A. From the Office 365 portal, under Subscriptions, click Manage.
B. From the Windows Azure Active Directory Module for Windows PowerShell, run Set-MsolUserPassword.
C. From the Office 365 portal, under Management, click Users.
D. From the Office 365 portal, under Management, click Domains.
Answer: C
Q4. You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets.
The deployment solution must meet the following requirements:
The application is not accessible if a user is working offline.
The application is isolated from other applications.
The application uses the least amount of disk space.
You need to deploy the new application to the tablets.
What should you do?
A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file. Configure the tablets with dual boot.
Answer: A
Q5. You administer computers that run Windows 8 Pro. Your company uses credit card readers that require a custom driver supplied by the manufacturer. The readers frequently are moved from computer to computer.
Your company recently purchased five new computers that run Windows 8 Pro. You want the required drivers to be installed automatically and silently when users connect the readers to the new computers.
You need to pre-stage the credit card reader driver on the new computers.
What should you do?
A. Add a Registry key with a path to a network shared folder that has the driver installation files.
B. Run the pnputil.exe utility. Specify the document scanner driver.
C. Add a Registry key with a path to a local folder on every computer. Copy the driver installation files to the folder.
D. Run the dism.exe utility. Copy the driver files to the C:\Windows\System32\drivers folder in the WIM image.
Answer: B
Q6. Your network contains an Active Directory domain named contoso.com. All client computers in the domain run Windows 8.1 Pro. All domain users have roaming user profiles.
You need to prevent a user named User2 from being able to save changes to his roaming user profile.
Which file you modify?
A. registry.pol
B. ntuser.pol
C. ntuser.dat
D. system.dat
Answer: B
Q7. You support tablets that run Windows 8 Pro. You are designing a remote access server (RAS) that will be placed behind a firewall. The firewall will accept incoming TCP connections to ports 80 and 443 only.
You want to connect to the RAS server from a tablet.
You need to create a virtual private network (VPN) connection to the RAS server.
Which VPN tunneling protocol should you use?
A. IPSec/L2TP
B. SSTP
C. PPTP
D. IPSec/IKEv2
Answer: B
Q8. You have laptops that run Windows 8. The laptops have Microsoft User Experience Virtualization (UE-V) installed.
You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network.
What should you do?
A. From a command prompt, run sc config PeerDistSvc start=auto.
B. From Group Policy Management Editor, configure the Windows Connection Manager settings.
C. From a command prompt, run sc config CscService start=auto.
D. From Group Policy Management Editor, configure the Network Connections settings.
Answer: C
Q9. Your network contains an Active Directory domain named contoso.com. All client computers run Windows 8.1 and Microsoft Office 2013. All of the computers are joined to the domain.
Your company purchases a subscription to Office 365. An administrator creates an Office 365 account for each user and deploys a federated solution for Office 365.
You need to prevent the users from being prompted for a user account and a password each time they access services from Office 365.
Which account should you instruct the users to use when they sign in to their computer?
A. A contoso.com account
B. A Microsoft account
C. An Office 365 account
D. A local user account
Answer: B
Q10. You have a Windows 8.1 Enterprise client computer.
The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data.
You need to prevent any data from being written to the fixed disk.
What should you do?
A. Run the manage-bde command and specify the -lock switch.
B. Run the manage-bde command and specify the -pause switch.
C. Run the manage-bde command and specify the -off switch.
D. Run the manage-bde command and specify the -on switch.
Answer: A
Q11. DRAG DROP
You administer computers that run Windows 8.
The computers on your network are produced by various manufacturers and often require custom drivers.
You need to design a recovery solution that allows the repair of any of the computers by using a Windows Recovery Environment (WinRE).
In which order should you perform the actions? (To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q12. DRAG DROP
Your network contains an Active Directory domain. The domain contains client computers that run Windows 8 Enterprise.
Your company has a subscription to Windows Intune.
You plan to deploy an application named App1 that is stored on a Web server named Server1.
You need to ensure that all of the computers download the source files of App1 from Server1.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q13. DRAG DROP
A company's Windows 8.1 tablets are joined to an Active Directory Domain Services (AD DS) domain. When employees work remotely, they use a mobile data plan to connect their tablets to the Internet.
The company has the following requirements for the mobile data plan:
Management users must synchronize offline files.
Sales users must minimize data usage.
Marketing users must receive all Windows Updates.
You need to ensure that the tablets meet these requirements.
How should the connections be configured? (To answer, drag the appropriate connection type to the corresponding department, Each connection type may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Answer:
Q14. You have Windows 8.1 Pro client computers.
You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort. What should you include in the recommendation?
A. the Mpcmdrun command
B. Windows 7 File Recovery
C. the Refresh your PC push-button reset feature
D. the Program and Features Control Panel item
Answer: D
Q15. DRAG DROP
You have a Windows 8.1 computer. You have a 1-terabyte external hard drive.
You purchase a second 1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both external hard drives. You also
need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q16. DRAG DROP
Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed.
You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop.
You need to create an image and deploy it to the 25 new laptops.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer: