A company has Windows 8.1 client computers. File History is on.
An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File
History.
What should you do?
Answer : A
A company has 100 client computers that run Windows Vista. The company uses several custom applications.
The company plans to replace the Windows Vista computers with new computers that run
Windows 8.1.
You need to establish which of the currently installed applications will work on Windows
8.1.
What should you do?
Answer : D
Explanation:
http://technet.microsoft.com/en-us/solutionaccelerators/dd537566.aspx http://www.microsoft.com/en-us/download/details.aspx?id=30652
Windows Assessment and Deployment Kit (ADK) for Windows 8
The Windows Assessment and Deployment Kit (Windows ADK) is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers.
Features available in the Windows ADK include:
Application Compatibility Toolkit (ACT) - The Application Compatibility Toolkit (ACT) helps
IT Professionals understand potential application compatibility issues by identifying which applications are or are not compatible with the new versions of the Windows operating system. ACT helps to lower costs for application compatibility evaluation by providing an accurate inventory of the applications in your organization.
ACT helps you to deploy Windows more quickly by helping to prioritize, test, and detect compatibility issues with your apps
Supported Operating System -
To install the Windows ADK, your computer must be running one of the following operating systems:
Windows 8 -
Windows 7 -
Windows Server 2012 -
Windows Server 2008 R2 -
Windows Vista -
Windows Server 2008 -
Further Information:
http://www.microsoft.com/en-us/download/details.aspx?id=7826
Microsoft Assessment and Planning Toolkit
The Microsoft Assessment and Planning Toolkit makes it easy to assess your current IT infrastructure for a variety of technology migration projects. This Solution Accelerator provides a powerful inventory, assessment, and reporting tool to simplify the migration planning process.
Supported Operating System -
Windows 7 Service Pack 1 -
Windows 8 -
Windows 8.1 -
Windows Server 2008 R2 SP1 -
Windows Server 2012 -
Windows Server 2012 R2 -
http://www.microsoft.com/en-us/download/details.aspx?id=25175
Microsoft Deployment Toolkit (MDT) 2012 Update 1
Microsoft Deployment Toolkit (MDT) 2012 Update 1 is the newest version of MDT, a
Solution Accelerator for operating system and application deployment. MDT 2012 Update 1 supports deployment of Windows 8, Windows 7, Office 2010 and 365, Windows Server
2012, and Windows Server 2008 R2 in addition to deployment of Windows Vista, Windows
Server 2008, Windows Server 2003, and Windows XP.
MDT 2012 Update 1 relies on several Windows deployment tools. After installation of the
.msi package and startup of the Deployment Workbench, the user can choose to download and install the following major tools from the Components:
Windows 8 Assessment and Deployment Kit
A company has an Active Directory Domain Services (AD DS) domain with Windows 8.1 client computers.
You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry.
What should you do?
Answer : A
Explanation:
http://technet.microsoft.com/en-us/library/jj679889.aspx#BKMK_tpmgp_oauthos
Configure the level of TPM owner authorization information available to the operating system
This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information that is stored locally, the Windows operating system and TPM- based applications can perform certain actions in the TPM that require TPM owner authorization without requiring the user to enter the TPM owner password.
There are three TPM owner authentication settings that are managed by the Windows operating system.
You can choose a value of Full, Delegate, or None.
Full - This setting stores the full TPM owner authorization, the TPM administrative delegation blob, and the TPM user delegation blob in the local registry. With this setting, you can use the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios that do not require you to reset the TPM anti-hammering logic or change the TPM owner authorization value. Some TPM- based applications may require that this setting is changed before features that depend on the TPM anti-hammering logic can be used. Delegated - This setting stores only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM antihammering logic. When you use this setting, we recommend using external or remote storage for the full TPM owner authorization valuefor example, backing up the value in
Active Directory Domain Services (AD DS).
None - This setting provides compatibility with previous operating systems and applications. You can also use it for scenarios when TPM owner authorization cannot be stored locally. Using this setting might cause issues with some TPM-based applications.
Further Information:
http://technet.microsoft.com/en-us/library/cc770660.aspx
Active Directory Domain Services (AD DS) can be used to store Trusted Platform Module
(TPM) recovery information.
There is only one TPM owner password per computer; therefore, the hash of the TPM owner password is stored as an attribute of the computer object in AD DS. The attribute has the common name (CN) of ms-TPM-OwnerInformation. http://www.group-policy.com/ref/policy/2859/Configure_TPM_platform_validation_profile
Configure TPM platform validation profile
This policy setting allows you to configure how the computer's Trusted Platform Module
(TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.
If you enable this policy setting before turning on BitLocker, you can configure the boot components that the TPM will validate before unlocking access to the
You are a system administrator for Contoso, Ltd. You manage a remote site that consists of 50 users. Each user has a Windows 8.1 desktop computer. You grant local admin rights to a small group of power users that have proven a level of proficiency with Windows 8.1.
This group helps with minor problems as needed.
One of the power users makes configuration changes on a desktop computer. Now the computer freezes for two minutes during the boot process.
You need to use msconfig to change the boot options to meet the following requirements:
-> Boot in safe mode
-> Boot the computer with a minimal set of drivers
-> Networking enabled
-> See the splash startup screen
-> Read drivers as they are loaded
Which three options should you select? (To answer, select the appropriate three options from the System Configuration Boot tab in the answer area.)
Answer :
Explanation:
You have laptops that run Windows 8. The laptops have Microsoft User Experience
Virtualization (UE-V) installed.
You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network.
What should you do?
Answer : C
Explanation: Problem: UE-V Agent installation fails with error: The Offline Files service is not running
Cause: The UE-V Agent installation failed because Offline Files was not enabled on the system.
Resolution: To resolve the issue, enable Windows Offline files on the system.
Windows 7 and Windows 8 -
Run the following command from an elevated command prompt:
sc config cscservice start=auto
http://technet.microsoft.com/en-US/library/jj680025.aspx
http://technet.microsoft.com/en-US/library/cc990290.aspx
You support Windows 8.1 Enterprise computers that are members of a workgroup.
Users are able to download and install any app from Windows Store.
You need to ensure that only approved apps can be installed from Windows Store.
What should you do?
Answer : D
A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer.
Windows does not start successfully. You establish that the updated driver is the cause of the problem.
You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?
Answer : B
You use Windows 7 (32-bit) on your client computer. You create a complete backup of the client computer.
You need to install Windows 8.1 Pro (64-bit) on the computer.
What should you do?
Answer : B
A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.
Answer : A,B,E
Explanation: * File History has a predefined set of items that it backs up automatically: all your libraries (both default libraries and custom libraries you created), the Desktop, your
Contacts, Internet Explorer favorites and the SkyDrive.
* Library example:
You deploy several Windows 8.1 tablet PCs.
You need to minimize power usage when the user presses the sleep button.
What should you do?
Answer : B
You administer Windows 8.1 Enterprise computers in an Active Directory domain. Your company has purchased a subscription to Windows Intune.
Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft
Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings.
You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?
Answer : B
You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT department configures all of them to use Bitlocker on all fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?
Answer : B
Your company has several Windows RT 8.1 devices. The devices connect to Exchange
Online in Microsoft Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.
Answer :
Explanation:
You are a system administrator for a local accounting firm. Your company uses Windows
8.1 Pro desktop computers. All computers have a secondary D: drive.
You want to enable File History for all your users. You create the folder structure
D:\Backup\File History on all user computers. You launch the File History application and verify that it is turned on. Next, you click Select drive in Configure File History Settings.
However, under Copy Files to: you get the message, "No usable drives were found."
You need to successfully configure file history.
What should you do?
Answer : C
Explanation:
http://windows.microsoft.com/en-us/windows-8/set-drive-file-history
Set up a drive for File History -
Before you start using File History to back up your files, you need to first select where your backups are saved. You can select an externally connected drive, such as a USB drive, or you can save to a drive on a network. There are other choices, but these two provide the best options to help protect your files against a crash or other PC problems.
A Windows 8.1 Pro computer has a single hard disk drive.
You add a second, unformatted, hard disk drive to the computer. You plan to provision
Windows BitLocker Drive Encryption on the second hard drive in preparation for installing an operating system on the hard drive for use in another computer.
You need to configure encryption for the new hard drive without fully completing BitLocker activation.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer :
Explanation:
Box 1: Use the Disk Management tool to create a volume on the drive.
Box 2: Run the bdboot command.
Box 3: Run the BdeHdCfg command.
Box 4: Run the manage-bde command.
Note:
* bcdboot
Use the bcdboot command line tool to move the necessary boot components to the system partition on the disk. This helps ensure that the boot components, operating system versions, and architectures match. The /f ALL parameter indicates that boot components for UEFI and BIOS should be placed on the system partition of the disk. The following example illustrates this step:
W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
* BdeHdCfg
This tool is used to prepare a hard drive with the partitions necessary for BitLocker Drive
Encryption.
* Manage-bde
This tool can be used to turn on or turn off BitLocker, specify unlock mechanisms, update recovery methods, and unlock BitLocker-protected data drives. This tool can be used in place of the BitLocker Drive Encryption Control Panel item.