Upgrade to remove ads
Microsoft 70-687: Configuring Windows 8
Terms in this set (30)
You are implementing the deployment of a standard desktop image for your organization. You have created a reference computer and installed the Windows 8 Enterprise operating system on it. Next you installed the required Office and productivity applications needed by all users in your organization. You need to prepare the computer for imaging, which utility should you use?
You have installed Windows 8 on a reference computer and installed all necessary desktop applications. Next you run the System Preparation tool to prepare the machine for imaging. You restart the machine using a Windows PE bootable disk and need to copy the image from the hard drive to a network server running WDS. What command should you run?
You are attempting to upgrade a computer from Windows XP to Windows 8. You would like to retain all the user and application settings in order to ease the transition to the new operating system. You must perform these actions in the most efficient manner possible for this one computer. What should you do?
Perform a migration using Easy Transfer
What must be installed in order to manage GPOs from a Windows 7 administrative workstation?
What is the primary management utility for Group Policy Objects?
What location on a domain controller is shared and contains the Group Policy settings that are downloaded to a client?
You would like to implement the primary computer setting for users who are using roaming profiles in your environment. What should you do first?
Ensure that a Windows server 2012 domain controllers present
UE-V is natively available in Windows 8.1. True or False?
In order to create a mandatory profile in Windows 8.1 you simply rename the user's folder from Username to Username.man. True or False?
You are trying to rearrange the data storage on your Windows 8 Enterprise computer. You would like to shrink the operating system partition to make more unallocated space in which to create a simple volume. However, the option to shrink the operating system volume is unavailable. What should you do in order to make this option available?
Convert to the NTFS file system
You would like to configure Windows 8.1 to access a new hard disk using the folder location C:\Storage. What should you do in order to configure this?
Configure a mount point
You are looking to implement a three way mirror virtual disk using the Storage Spaces feature in Windows 8.1. How many physical disks are required in the pool in order to implement this configuration?
You are troubleshooting an issue on a client machine. The client machine cannot communicate with any other computers or servers on the network. Other hosts are not having problems connecting to local or remote machines. Where should you look first to troubleshoot the problem?
You have a client that is attempting to connect to an unnamed wireless network in a remote office location. You need to inform the client what to ask for when speaking to the IT person at the remote office location. The client needs the information required to connect to this unnamed network. What should you tell the client to ask for?
Which TCP/IP troubleshooting utility is used to perform DNS lookups from a client using the preferred DNS server?
Mark is a user in the Marketing department and is a member of the Marketing_Users and the Chicago_Users security groups. A data share is located on a Windows 8 machine in the marketing department with the following permissions.
Shared: Everyone - Full Control
NTFS: Marketing_Users - Read and Execute, Read, List Folder Contents
Chicago_Users - Read/Write
Administrators - Full Control
What are Mark's effective permissions when access the data over the network?
John, a user in the Sales department is a member of four different security groups that all have different permissions to a folde ron a Windows 8 machine on your network. What's the easiest way to determine what permissions are in effect for John's user account?
Effective Permissions tool
You are a DST for your organization. You need to manage three print servers running Windows Server 2008 R2 and Windows Server 2012. You would like to do this in the most efficient manner possible using a console that will allow you to see and manage all printer servers simultaneously. What should you do?
Use the Print Management console
You are a DST for your organization. Management has asked to you create a rule in a GPO that will block all programs from a specific vendor named MyWidgetCorp. What type of rule should you create in order to achieve this goal?
AppLocker Publisher Rule
Your organization has a mixture of computers currently running Windows 8, Windows 7, and Windows Vista client operating systems. You have been asked to enforce a new company policy preventing games from being run on the systems. Specifically you need to disable the ability to run solitaire.exe. What type of rules should you create?
SRP Hash Rule
You would like to configure the security settings in Internet Explorer to provide a protection against the saving of browsing data on public computers. You need to instruct users how to use the functionality when they are travelling and accessing their company email from public computers. What feature should you use?
You are implementing IPSEc in order to secure the communication between your Windows 8 client and the SQL servers. You run a custom application that does not provide security. You need to configure a rule to authenticate traffic on a specific port between this machine and the SQL server. Which rule type should you use?
You are troubleshooting a problem using EFS. A user has encrypted a file on the local drive and would like to share that file with another user. The other user does have a certificate which is also stored on the local system. What should you instruct the user to do?
Instruct the user to access the Details button and enable access for the other user
You would like to enable BitLocker encryption so that John, a user in Sales, is able to protect his laptop from being stolen while he is travelling on business. John is running Windows 8 on his laptop. What should you do first?
Install Windows 8 Enterprise on John's laptop
Which tool provided by Windows 8 Enterprise can you use to determine which applications are responsible for the majority of activity on the hard disk?
Which command line utility will you use to edit boot options in Windows 8 Enterprise?
You have been asked to identify the troubleshooting tool that is provided in Windows 8 and performs automatic recovery of common boot issues such as missing files, corrupted boot records, and others. Which tool should you identify?
You are troubleshooting a problem on a remote computer. The user claims they are receiving an error message when using a LOB application. You would like to be able to reproduce the problem and see the error message. What should you do?
Ask the user to request remote assistance, connect to their computer, ask the user to run the program to reproduce the problem
You would like to configure Windows 8 laptops to use VPN connections to connect to the corporate network. You would like to take advantage of the VPN Reconnect option for your users since they frequently are accessing from different hotspots. Which VPN type should you use to support VPN Reconnect?
Ed is a Sales Executive who frequently is off site giving presentations to clients. He has asked you how to configure his machine so that the background is blank and screen saver is disabled using a single click. Which option should you tell him to use?
THIS SET IS OFTEN IN FOLDERS WITH...
EXAM 70-687 Configuring Windows 8 - Less…
70-687 Windows 8.1 Glossary
70-687 Lesson 1, 2 & 3 Review
Microsoft 70-697: Configuring Windows Devices (Win…
YOU MIGHT ALSO LIKE...
Windows 7 Exam Questions
Windows 10 Configuration
OTHER SETS BY THIS CREATOR
70-764 Microsoft SQL 2016 - Administering a SQL Da…
70-765 - Provisioning SQL Databases Flashcards
CompTIA Cybersecurity Analyst (CSA+) Flashcards
MCSA 70-741 Networking with Windows Server 2016
OTHER QUIZLET SETS
AP Psych unit 9
Gov Test 1/22/21