Upgrading Your Windows XP Skills to MCSA Windows 8.1 v6.1 (70-692)

Page:    1 / 6   
Total 83 questions

A company has Windows 8.1 client computers. File History is on.
An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File
History.
What should you do?

  • A. Create a library named History and add the Archives folder to the library.
  • B. Move the Archives folder into the Windows system folder.
  • C. Configure the File History advanced settings to include the Archives folder.
  • D. From the File History configuration options, change the drive and select the Archives folder.


Answer : A

A company has 100 client computers that run Windows Vista. The company uses several custom applications.
The company plans to replace the Windows Vista computers with new computers that run
Windows 8.1.
You need to establish which of the currently installed applications will work on Windows
8.1.
What should you do?

  • A. Install and run the Windows App Certification Kit.
  • B. Install and run the Windows Application Compatibility Toolkit.
  • C. Install and run the Microsoft Deployment Toolkit.
  • D. Install and run the Microsoft Assessment and Planning Toolkit.


Answer : D

Explanation:
http://technet.microsoft.com/en-us/solutionaccelerators/dd537566.aspx http://www.microsoft.com/en-us/download/details.aspx?id=30652
Windows Assessment and Deployment Kit (ADK) for Windows 8
The Windows Assessment and Deployment Kit (Windows ADK) is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers.
Features available in the Windows ADK include:
Application Compatibility Toolkit (ACT) - The Application Compatibility Toolkit (ACT) helps
IT Professionals understand potential application compatibility issues by identifying which applications are or are not compatible with the new versions of the Windows operating system. ACT helps to lower costs for application compatibility evaluation by providing an accurate inventory of the applications in your organization.
ACT helps you to deploy Windows more quickly by helping to prioritize, test, and detect compatibility issues with your apps

Supported Operating System -
To install the Windows ADK, your computer must be running one of the following operating systems:

Windows 8 -

Windows 7 -

Windows Server 2012 -

Windows Server 2008 R2 -

Windows Vista -

Windows Server 2008 -
Further Information:
http://www.microsoft.com/en-us/download/details.aspx?id=7826
Microsoft Assessment and Planning Toolkit
The Microsoft Assessment and Planning Toolkit makes it easy to assess your current IT infrastructure for a variety of technology migration projects. This Solution Accelerator provides a powerful inventory, assessment, and reporting tool to simplify the migration planning process.

Supported Operating System -

Windows 7 Service Pack 1 -

Windows 8 -

Windows 8.1 -

Windows Server 2008 R2 SP1 -

Windows Server 2012 -

Windows Server 2012 R2 -
http://www.microsoft.com/en-us/download/details.aspx?id=25175
Microsoft Deployment Toolkit (MDT) 2012 Update 1
Microsoft Deployment Toolkit (MDT) 2012 Update 1 is the newest version of MDT, a
Solution Accelerator for operating system and application deployment. MDT 2012 Update 1 supports deployment of Windows 8, Windows 7, Office 2010 and 365, Windows Server
2012, and Windows Server 2008 R2 in addition to deployment of Windows Vista, Windows
Server 2008, Windows Server 2003, and Windows XP.
MDT 2012 Update 1 relies on several Windows deployment tools. After installation of the
.msi package and startup of the Deployment Workbench, the user can choose to download and install the following major tools from the Components:
Windows 8 Assessment and Deployment Kit

A company has an Active Directory Domain Services (AD DS) domain with Windows 8.1 client computers.
You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry.
What should you do?

  • A. Create a Group Policy object (GPO) that sets the Configure the level of TPM owner authorization information available to operating system policy setting to None.
  • B. Create a Group Policy object (GPO) that enables the Turn on TPM Local Encryption policy setting.
  • C. Create a Group Policy object (GPO) that disables the Configure the level of TPM owner authorization information available to operating system policy setting.
  • D. Enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 for the Configure TPM validation profile for native UEFI firmware configuration policy setting.


Answer : A

Explanation:
http://technet.microsoft.com/en-us/library/jj679889.aspx#BKMK_tpmgp_oauthos
Configure the level of TPM owner authorization information available to the operating system
This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information that is stored locally, the Windows operating system and TPM- based applications can perform certain actions in the TPM that require TPM owner authorization without requiring the user to enter the TPM owner password.
There are three TPM owner authentication settings that are managed by the Windows operating system.
You can choose a value of Full, Delegate, or None.
Full - This setting stores the full TPM owner authorization, the TPM administrative delegation blob, and the TPM user delegation blob in the local registry. With this setting, you can use the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios that do not require you to reset the TPM anti-hammering logic or change the TPM owner authorization value. Some TPM- based applications may require that this setting is changed before features that depend on the TPM anti-hammering logic can be used. Delegated - This setting stores only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM antihammering logic. When you use this setting, we recommend using external or remote storage for the full TPM owner authorization valuefor example, backing up the value in
Active Directory Domain Services (AD DS).
None - This setting provides compatibility with previous operating systems and applications. You can also use it for scenarios when TPM owner authorization cannot be stored locally. Using this setting might cause issues with some TPM-based applications.
Further Information:
http://technet.microsoft.com/en-us/library/cc770660.aspx
Active Directory Domain Services (AD DS) can be used to store Trusted Platform Module
(TPM) recovery information.
There is only one TPM owner password per computer; therefore, the hash of the TPM owner password is stored as an attribute of the computer object in AD DS. The attribute has the common name (CN) of ms-TPM-OwnerInformation. http://www.group-policy.com/ref/policy/2859/Configure_TPM_platform_validation_profile
Configure TPM platform validation profile
This policy setting allows you to configure how the computer's Trusted Platform Module
(TPM) security hardware secures the BitLocker encryption key. This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.
If you enable this policy setting before turning on BitLocker, you can configure the boot components that the TPM will validate before unlocking access to the

You are a system administrator for Contoso, Ltd. You manage a remote site that consists of 50 users. Each user has a Windows 8.1 desktop computer. You grant local admin rights to a small group of power users that have proven a level of proficiency with Windows 8.1.
This group helps with minor problems as needed.
One of the power users makes configuration changes on a desktop computer. Now the computer freezes for two minutes during the boot process.
You need to use msconfig to change the boot options to meet the following requirements:
-> Boot in safe mode
-> Boot the computer with a minimal set of drivers
-> Networking enabled
-> See the splash startup screen
-> Read drivers as they are loaded
Which three options should you select? (To answer, select the appropriate three options from the System Configuration Boot tab in the answer area.)




Answer :

Explanation:



C:\Users\Chaudhry\Desktop\1.jpg -

You have laptops that run Windows 8. The laptops have Microsoft User Experience
Virtualization (UE-V) installed.
You need to ensure that the application settings, which are synchronized by using UE-V, apply to computers that are disconnected from the network.
What should you do?

  • A. From a command prompt, run sc config PeerDistSvc start=auto.
  • B. From Group Policy Management Editor, configure the Windows Connection Manager settings.
  • C. From a command prompt, run sc config CscService start=auto.
  • D. From Group Policy Management Editor, configure the Network Connections settings.


Answer : C

Explanation: Problem: UE-V Agent installation fails with error: The Offline Files service is not running
Cause: The UE-V Agent installation failed because Offline Files was not enabled on the system.
Resolution: To resolve the issue, enable Windows Offline files on the system.

Windows 7 and Windows 8 -
Run the following command from an elevated command prompt:
sc config cscservice start=auto
http://technet.microsoft.com/en-US/library/jj680025.aspx
http://technet.microsoft.com/en-US/library/cc990290.aspx

You support Windows 8.1 Enterprise computers that are members of a workgroup.
Users are able to download and install any app from Windows Store.
You need to ensure that only approved apps can be installed from Windows Store.
What should you do?

  • A. Configure a Software Restriction Policy Certificate rule.
  • B. Configure an AppLocker Publisher rule.
  • C. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option.
  • D. Configure an AppLocker Packaged app rule.


Answer : D

A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer.
Windows does not start successfully. You establish that the updated driver is the cause of the problem.
You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?

  • A. Use the Windows 8.1 PC Reset feature.
  • B. Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.
  • C. Use the File History feature.
  • D. Reset the computer to the manufacturer's system image.


Answer : B

You use Windows 7 (32-bit) on your client computer. You create a complete backup of the client computer.
You need to install Windows 8.1 Pro (64-bit) on the computer.
What should you do?

  • A. Install Windows 8.1 Pro 64-bit on the existing volume by performing an upgrade installation.
  • B. Install Windows 8.1 Pro 64-bit on the existing volume by performing a custom installation.
  • C. Install Windows 8.1 Pro Pack.
  • D. Install Windows 8.1 into a virtual hard disk (VHD) file.


Answer : B

A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.

  • A. Public Documents and Public Pictures
  • B. Contacts, Desktop, and Favorites
  • C. All system files
  • D. C:\Users and C:\ProgramData
  • E. My Documents and My Pictures
  • F. Desktop and Recycle Bin


Answer : A,B,E

Explanation: * File History has a predefined set of items that it backs up automatically: all your libraries (both default libraries and custom libraries you created), the Desktop, your
Contacts, Internet Explorer favorites and the SkyDrive.
* Library example:



C:\Users\Chaudhry\Desktop\1.jpg -
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx
Protecting user files with File History
File History is a backup application that continuously protects your personal files stored in
Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.
Its a feature introduced in Windows 8 that offers a new way to protect files for consumers.
It supersedes the existing Windows Backup and Restore features of Windows 7.
File History only saves copies of files that are in your libraries, contacts, favorites, and on your desktop. If you have folders elsewhere that you want backed up, you can add them to one of your existing libraries or create a new library. http://www.dummies.com/how-to/content/back-up-your-computer-with-windows-8-file- history.html
Back Up Your Computer with Windows 8 File History
File History backs up everything in your libraries: Documents, Music, Pictures, and Videos, as well as the Public folders. That's natural because that's where you store your files.
Further Information:
Default settings:


C:\Users\Chaudhry\Desktop\1.jpg -

You deploy several Windows 8.1 tablet PCs.
You need to minimize power usage when the user presses the sleep button.
What should you do?

  • A. Configure the active power plan to disable Wake Timers.
  • B. In Power Options, configure the sleep button setting to Hibernate.
  • C. Configure the active power plan to use Fast Startup.
  • D. In Power Options, configure the sleep button setting to Sleep.


Answer : B

You administer Windows 8.1 Enterprise computers in an Active Directory domain. Your company has purchased a subscription to Windows Intune.
Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft
Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings.
You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?

  • A. Create a new Windows Intune Agent Settings policy.
  • B. Create a new Windows Intune Mobile Security policy.
  • C. Create a new Windows Firewall Settings policy.
  • D. Create a new Windows Intune Center Settings policy.


Answer : B

You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT department configures all of them to use Bitlocker on all fixed drives.
Many users carry sensitive corporate data on their USB drives.
You need to enable BitLocker for these USB drives.
Which key protector option should you use?

  • A. TPM
  • B. A .tpmfile
  • C. Automatic Unlock
  • D. A smartcard


Answer : B

Your company has several Windows RT 8.1 devices. The devices connect to Exchange
Online in Microsoft Office 365 and to Windows Intune for device management.
The security policies of Office 365 and Windows Intune are configured as shown in the following table.


You need to identify the effective settings on the Windows RT devices.
What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.)



Answer :

Explanation:

http://technet.microsoft.com/en-us/library/dn283963.aspx

You are a system administrator for a local accounting firm. Your company uses Windows
8.1 Pro desktop computers. All computers have a secondary D: drive.
You want to enable File History for all your users. You create the folder structure
D:\Backup\File History on all user computers. You launch the File History application and verify that it is turned on. Next, you click Select drive in Configure File History Settings.
However, under Copy Files to: you get the message, "No usable drives were found."
You need to successfully configure file history.
What should you do?

  • A. Share the File History folder.
  • B. Grant NTFS rights to the File History folder.
  • C. Use a network drive for file history.
  • D. Verify that your local drive has enough free space.


Answer : C

Explanation:
http://windows.microsoft.com/en-us/windows-8/set-drive-file-history

Set up a drive for File History -
Before you start using File History to back up your files, you need to first select where your backups are saved. You can select an externally connected drive, such as a USB drive, or you can save to a drive on a network. There are other choices, but these two provide the best options to help protect your files against a crash or other PC problems.

A Windows 8.1 Pro computer has a single hard disk drive.
You add a second, unformatted, hard disk drive to the computer. You plan to provision
Windows BitLocker Drive Encryption on the second hard drive in preparation for installing an operating system on the hard drive for use in another computer.
You need to configure encryption for the new hard drive without fully completing BitLocker activation.
Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)




Answer :

Explanation:
Box 1: Use the Disk Management tool to create a volume on the drive.
Box 2: Run the bdboot command.
Box 3: Run the BdeHdCfg command.
Box 4: Run the manage-bde command.
Note:
* bcdboot
Use the bcdboot command line tool to move the necessary boot components to the system partition on the disk. This helps ensure that the boot components, operating system versions, and architectures match. The /f ALL parameter indicates that boot components for UEFI and BIOS should be placed on the system partition of the disk. The following example illustrates this step:
W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
* BdeHdCfg
This tool is used to prepare a hard drive with the partitions necessary for BitLocker Drive
Encryption.
* Manage-bde
This tool can be used to turn on or turn off BitLocker, specify unlock mechanisms, update recovery methods, and unlock BitLocker-protected data drives. This tool can be used in place of the BitLocker Drive Encryption Control Panel item.

Page:    1 / 6   
Total 83 questions