The Secret of 70-689 certification

Want to know Actualtests 70-689 Exam practice test features? Want to lear more about Microsoft Upgrading Your Skills to MCSA Windows 8 certification experience? Study High quality Microsoft 70-689 answers to Refresh 70-689 questions at Actualtests. Gat a success with an absolute guarantee to pass Microsoft 70-689 (Upgrading Your Skills to MCSA Windows 8) test on your first attempt.

2021 Dec 70-689 cbt nuggets:

Q11. RAG DROP 

Ten client computers run Windows Vista and a custom application. The custom application is compatible with Windows 8. 

You purchase 10 new computers that have Windows 8 pre-installed. You plan to migrate user settings and data from the Windows Vista computers to the Windows 8 computers. You install the User State Migration Toolkit (USMT) on a USB flash drive. 

You need to ensure that the custom application settings are applied to the Windows 8 computers after the migration is complete. 

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q12. You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. 

You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. 

You need to reconfigure the new computer in order to access the HomeGroup resources. 

What should you do? 

A. Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup. 

B. Change the default sharing configuration for the shared folders on the HomeGroup computers. 

C. Reset your account password to match the HomeGroup password. 

D. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers. 

Answer:

Explanation: 

You may receive a misleading error message when trying to join a Windows 7 Homegroup, when the computer’s date and time does not match the date/time of system that owns the homegroup Symptoms When joining a system to a homegroup, you may receive the following error message “The password is incorrect”, even though you have typed the passwordcorrectly. Cause This can be caused by a difference in the Date and Time settings on the computer trying to join the homegroup, and not an invalid password. If the date/time of the computer joining a homegroup is greater than 24 hours apart from the date/time of the system that owns the homegroup, this will cause the error. Resolution Adjust the date/time settings on the system joiningthe homegroup, to match the system that owns the homegroup, and then try to join again. http://support.microsoft.com/kb/2002121 


Q13. Your company has a main office and a branch office. Each office contains several servers that run Windows Server 2012. 

You need to configure BranchCache for the client computers in the branch office. The solution must ensure that all of the cached content is in a central location. 

What should you run on each client computer? 

A. the winrm command 

B. the Enable BCHostedClient cmdlet 

C. the Enable-BCLocal cmdlet 

D. the netdom command 

Answer:


Q14. You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. 

Some employees work from home. 

You need to ensure that employees can log on to their laptops when they work from home. 

What should you do? 

A. Have users run the Manage-bde.exe -unlock command before they disconnect from the company network. 

B. Enable BitLocker To Go. 

C. Provide employees their BitLocker PINs. 

D. Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater. 

Answer:

Explanation: 

Original answer was ‘A’ but, this would require an elevated command prompt. 

What is a BitLocker Drive Encryption startup key orPIN? 

Reference: 

http://windows.microsoft.com/en-US/windows-vista/What-is-a-BitLocker-Drive-Encryption-startup-key-or-PIN 

In addition to the option of creating a startup key, you have the option of creating a startup 

personal identification number (PIN). You can create either the startup key or the startup 

PIN, but not both. The startup PIN can be any number that you choose from 4 to 20 digits 

in length. The PIN is stored on your computer. You will have to type the PIN each time you 

start the computer. 


Q15. OTSPOT 

Your network contains an Active Directory domain. All client computers run Windows 8.1 Enterprise and are located in an organizational unit (OU) named WindowsSComputers. 

The network has Windows Server Update Services (WSUS) installed. All of the computers are configured to receive updates from WSUS. 

The network administrator creates a new computer group named Win8Computers in WSUS. 

You need to ensure that the Windows 8.1 computers receive all of the updates that are assigned to the WinSComputers computer group. 

Which Group Policy setting should you configure? (To answer, select the appropriate setting in the answer area.) 

Answer: 

34. OTSPOT 

You have five client computers that are configured as shown in the following table. 

You verify that each computer supports the installation of the 64-bit version of Windows 8.1 Pro. 

You need to identify which method to use to deploy the 64-bit version of Windows 8.1 Pro to each computer. The solution must minimize the need to reinstall applications and to reconfigure settings. 

In the table below, identify the correct deployment method for each computer. Make only one selection in each row. Each correct selection is worth one point. 

Answer: 


Abreast of the times 70-689 cbt:

Q16. You support desktop computers and tablets that run Windows 8. Domain joined computers are able to connect to your company network from the Internet by using DirectAccess. 

Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements: 

The application is installed locally on the tablets. 

The application installation is hosted in a public cloud. 

The installation must support Windows RT. 

You need to deploy the new application to the tablets. 

... 

What should you do? 

A. Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client on the tablets. 

B. Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets. 

C. Install the application on a local drive on the tablets. 

D. Install the application in a Windows To Go workspace. 

E. Install Hyper-V on tablets. Install the application on a virtual machine. 

F. Publish the application to Windows Store. 

G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot. 

H. Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot. 

Answer:


Q17. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are members of the domain. Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone. 

Users of one client computer are able to download and install an application from a site within the Restricted Sites zone. 

You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone. 

What should you do? 

A. Run the Set-ExecutionPolicy Windows PowerShell cmdlet. 

B. Configure the Software Restriction Policy settings in the local Group Policy of the computer. 

C. Add the blocked application as a software restriction policy to the GPO that configures AppLocker. 

D. Run the Get-AppLockerPolicy Windows PowerShell cmdlet. 

E. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker. 

Answer:

Explanation: 

Only Software Restriction policy allows for the control of applications from a network zone; AppLockerdoes not. 

http://technet.microsoft.com/en-us/library/hh994586.aspx 


Q18. You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8.1 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. 

Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. 

You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. 

What should you do? 

A. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings. 

B. Publish the application through a public file transfer protocol (FTP) site. 

C. Digitally sign the application by using a trusted certificate, and then update the default App Package Deployment policy on all computers. 

D. Change the default Software Restriction Policies on the client computers. 

Answer:

Explanation: Administrators can use software restriction policies for the following tasks: Define what is trusted code 

Design a flexible Group Policy for regulating scripts, executable files, and ActiveX controls 


Q19. A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8. 

A client computer hosts a Windows 8 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. (Click the Exhibit button.) 

The VMs are unable to connect to the domain controller. You have the following requirements: 

. Configure the test environment to allow VMs to communicate with the domain controller. . Ensure that the VMs can communicate with other VMs in the test environment when the domain controller is unavailable. 

You need to meet the requirements. What should you do first? 

A. Change the connection type of the private virtual switch to Internal only. 

B. Create a new virtual switch with a Private Network connection type. 

C. Create a new virtual switch with an ExternalNetwork connection type. 

D. Create a new virtual switch with an Internal Network connection type. 

Answer:


Q20. You deploy several tablet PCs that run Windows 8. 

You need to minimize power usage when the user presses the sleep button. 

What should you do? 

A. Disable the C-State control in the computer's BIOS. 

B. In Power Options, configure the sleep button setting to Sleep. 

C. In Power Options, configure the sleep button setting to Hibernate. 

D. Configure the active power plan to set the system cooling policy to passive. 

Answer:

Explanation: 

Sleep is a power-saving state that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again. Putting your computer into the sleep state is like pausing a DVD player—the computer immediately stops what it’s doing and is ready to start again when you want to resume working. 

Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and settings in memory and draws a small amount of power, hibernation puts your open documents and programs on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hibernation uses the least amount of power. On a laptop, use hibernation when you know that you won't use your laptop for an extended period and won't have an opportunity to charge the battery during that time. 

Hybrid sleep is designed primarily for desktop computers. Hybrid sleep is a combination of sleep and hibernate—it puts any open documents and programs in memory and on your hard disk, and then puts your computer into a low-power state so that you can quickly resume your work. That way, if a power failure occurs, Windows can restore your work from your hard disk. When hybrid sleep is turned on, putting your computer into sleep automatically puts your computer into hybrid sleep. Hybrid sleep is typically turned on by default on desktop computers. 

http://www.eightforums.com/tutorials/14956-power-button-action-change-windows-8-a.html 



see more http://www.2passeasy.com/exam/70-689/