Want to Pass 70-687 Exam In Next HOURS? Get it now →
April 21, 2017

Top Renovate 70-687 sample question Reviews!

Q81. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Portable client computers connect to the corporate wireless network. 

You have the following requirements: 

. Prevent users from configuring a wireless network by using settings from a USB flash drive. . Do not affect the use of other USB devices. 

You need to create a Group Policy object (GPO) to meet the requirements. 

Which GPO should you create? 

A. A GPO that disables the Allow only USB root hub connected Enhanced Storage Features policy setting. 

B. A GPO that enables wireless policy processing. 

C. A GPO that prohibits connections to mobile broadband networks when roaming. 

D. A GPO that configures Windows Connect Now settings. 

Answer:


Q82. You administer Windows 8.1 Enterprise client computers in your company network. 

You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. 

You need to save the Windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later. 

What should you do? 

A. Run the netshadvfirewall export c:\\settings.xml command. 

B. Open Local Group Policy Editor, select the Windows Firewall with Advanced Security node, and then select the Export Policy action. 

C. Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action. 

D. From Control Panel, open Windows Firewall, click Advanced Settings, and then select the Export Policy action. 

Answer:


Q83. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. 

You have the following requirements: Ensure that files in shared network folders are available offline. Minimize all data access times. Reduce network bandwidth usage. You need to configure Group Policy settings to meet the requirements. 

What should you do first? 

A. Enable the Enable file synchronization on costed networks policy setting. 

B. Enable and configure the Configure slow-link mode policy setting. 

C. Enable and configure the specify administratively assigned Offline Files policy setting. 

D. Enable the Synchronize all offline files when logging on policy setting. 

Answer:


Q84. You administer Windows 8.1 Pro computers in your company network. 

A user named User1 encrypts a sensitive file named file.txt by using Encrypting File System (EFS). 

A user named User2 must be able to read file.txt. 

You need to configure unencrypted read access to file.txt for User2. 

What should you do? 

A. Configure Advanced Security Settings. 

B. Share the folder that contains file.txt. 

C. Configure Advanced Attributes. 

D. Configure Effective Access. 

Answer:


Q85. A company has 100 client computers that run Windows 8.1. 

You plan to install a custom app that requires a license key. 

You need to ensure that the installation process does not prompt for the manual entry of a license key. 

What should you do? 

A. Install and run the Microsoft Deployment Toolkit. 

B. Install and run the Microsoft Assessment and Planning Toolkit. 

C. Install and run the Windows App Certification Kit. 

D. Install and run the Windows Application Compatibility Toolkit. 

Answer:


Q86. A client computer that runs Windows 8.1 has two hard disk drives: a system drive and a data drive. 

You are preparing to back up the computer prior to installing a developing software product. 

You have the following requirements: 

The system disk that is part of the backup must be mountable from within Windows. 

The system disk that is part of the backup must be bootable. 

The backup must be viable to restore in the event of a hard disk failure. 

The backup must contain data from both hard disk drives. 

You need to select a backup method. 

Which method should you use? 

A. System repair disk 

B. Storage pool 

C. System image 

D. File History 

Answer:


Q87. A company plans to deploy Windows 8.1 to 100 client computers. Each client computer has 8 GB of memory. 

You have the following requirements: 

. Ensure that the operating system fully utilizes the available memory. 

. Ensure that the operating system can be activated by using a Key Management Service (KMS) client setup key. 

. Minimize the operating system space requirements. 

You need to identify the appropriate edition of Windows 8.1 to install on the client computers. 

Which edition should you install? 

A. Windows 8.1 Enterprise 32-bit 

B. Windows 8.1 64-bit 

C. Windows 8.1 Pro 32-bit 

D. Windows 8.1 Enterprise 64-bit 

E. Windows 8.1 Pro 64-bit 

F. Windows 8.1 32-bit 

Answer:


Q88. Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain. 

You create a folder and share the folder with everyone in your organization. 

You need to modify the NTFS permissions of the folder to meet the following criteria: 

. Users from the Marketing security group must be able to open files, but not modify them. . Users from the Supervisors security group must be able to create, modify, and delete files. . Users from both groups must not be able to delete the folder. 

Which permissions should you set? 

A. Assign the Marketing group the Read permission. 

Assign the Supervisors group the Read and Write permissions and the Delete Subfolders and Files special permission. 

B. Assign the Marketing group the Read and Write permissions. 

Assign the Supervisors group the Full Control permission. 

C. Assign the Marketing group the Read and Write permissions. 

Assign the Supervisors group the Modify permission and the Delete Subfolders and Files special permission. 

D. Assign the Marketing group the Read permission. 

Assign the Supervisors group the Read and Write permissions and the Delete special permission. 

Answer:


Q89. You are the network administrator for Contoso, Ltd. Many users have Windows 8.1 laptops, and your IT department configures all of them to use BitLocker on all fixed drives. 

Many users carry sensitive corporate data on their USB drives. 

You need to enable BitLocker for these USB drives. 

Which key protector option should you use? 

A. A password 

B. A startup key 

C. A.tpm file 

D. TPM 

Answer:


Q90. You use a computer that has Windows 8.1 Pro installed. 

Your personal files are stored in a storage pool that is distributed across multiple USB drives. 

You need to configure a daily backup solution that meets the following requirements: 

. Automatically backs up all of your personal files that are located in the storage pool. 

. Automatically backs up operating system files. 

. Ensures that you can restore any file. 

What should you do? 

A. Create a recovery drive. 

B. Turn on File History. 

C. Configure Windows 7 File Recovery. 

D. Configure system protection. 

Answer:



see more free 70-687 exam dumps