Managing and Maintaining Windows 8.1
Question No: 141
You administer Windows 8.1 Enterprise computers in an Active Directory domain. Your company has purchased a subscription to Windows Intune. You are assigned as a Global Administrator for Intune.
You determine that a company employee who works at the help desk requires the following permissions:
->Manage support tickets
You need to assign the appropriate administrative role to the employee. Which role should you assign to the help desk employee?
User Management Administrator
Explanation: People with Intune administrator roles (including tenant administrators and service administrators) are the only ones in your organization who are authorized to access the Intune Administration console and to communicate directly with Microsoft about Intune service requests.
Reference: Microsoft Intune support
Question No: 142
You have Windows 8.1 Enterprise tablet computers.
On a computer named Computed, you have a Wi-Fi connection named Access1. When you connect to Access1 you discover the following behaviors:
->New device software is not installed automatically.
->Video streamed from the Internet is in low resolution by default.
->Only critical updates are downloaded automatically in the background.
->Many Windows Store apps do not perform background network activities.
When you connect to your company#39;s LAN, you do not experience the same behaviors.
You need to ensure that when you connect to Accessl, you have the same user experience as when you connect to the LAN.
What should you do?
Configure Access1 to not allow sharing.
From the PC settings page, enable the Download over metered connections option.
Configure Access1 as a non-metered connection.
From the PC settings page, modify the Wireless devices settings.
Explanation: http://windows.microsoft.com/en-US/windows-8/metered-internet- connections-frequently-asked-questions
Question No: 143
You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing. The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows:
UserA is a member of both the Everyone group and the Marketing group. UserA must access C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder. What permission should you identify?
Read and Execute
For example, a user named Dan is directly granted the Allow Read and Execute permission for a folder called Marketing. However, the Dan user account is a member of the group Marketing Users, which is granted the Allow Full Control permission, and the group Everyone, which granted the Allow Read permission.
Based on the cumulative nature of NTFS permissions, the user Dan would be granted the effective permission Allow Full Control. This example is fairly basic, and production environments typically involve a much greater number of groups, with both allowed and denied permissions. In these cases, the Effective Permissions tab can greatly ease the burden of attempting to determine which permissions will or will not apply for a particular user.
Question No: 144
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
You support Windows 8.1 Enterprise desktop computers and tablets. All of the computers are able to connect to your company network from the Internet by using DirectAccess.
Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
->Users have offline access to the application only within the first seven days following their latest online session.
->The application uses the least amount of disk space.
You need to deploy the new application to the tablets. What should you do?
Deploy the application as an Application Virtualization (App-V) package. Install the App- V 4.6 client on the tablets.
Deploy the application as a published application on the Remote Desktop server. Create a Remote Desktop connection on the tablets.
Install the application on a local drive on the tablets.
Install the application in a Windows To Go workspace.
Install Hyper-V on tablets. Install the application on a virtual machine.
Publish the application to Windows Store.
Install the application within a separate Windows 8.1 installation in a virtual hard disk (VHD) file. Configure the tablets with dual boot.
Install the application within a separate Windows 8.1 installation in a VHDX file. Configure tablets with dual boot.
Question No: 145
You administer several computers that run Windows 8.
The manufacturer of the video display adapters used in these computers issues a new version of the video driver.
You need to install the new version of the driver on the computers. What should you do first?
From the Start screen, search settings for quot;update device drivers.quot;
From the Start screen, search settings for quot;devices and printers.quot;
From the Start screen, right-click the Video tile.
From the Start screen, open the Charms bar and select Devices.
From the Start screen, open the Charms bar and select Settings.
Explanation: http://windows.microsoft.com/en-za/windows/update-driver-hardware-isnt- working-properly#update-driver-hardware-isnt-working-properly=windows-7
Question No: 146 DRAG DROP
You administer computers and printers on your company network. The computers run Window 8 Pro.
An employee wants to add a separator page to her printer task on a network printer. You create a separator page file and save it to the C:\Windows\System32 folder on her computer.
You need to configure the computer to use the separator page for the print task.
Which three actions should you perform in sequence on the computer? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Box 1: Open the Control Panel and navigate to Devices and Printers. Box 2: Right-click on the network printer and select Printer Properties.
Box 3: In the Advanced tab, select Separator Page, then Browse to select the local copy of
the separator page file. Select Open, and then select OK. How to create custom separator page files
Windows allows the specification of a separator page file to be printed at the start of each print job. Several of these files are included with Windows. In addition, custom separator page files may be created to suit individual needs. The Windows quot;Concepts and Planning Guidequot; documents how to create such files.
Question No: 147 DRAG DROP
You support a computer that runs Windows 8 Enterprise.
You want to create a dual-boot configuration by using the native boot virtual hard disk (VHD) method.
You need to create an alternate Windows 8 installation.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
http://social.technet.microsoft.com/Forums/en-US/dc60933c-990b-45b1-943e- a7cd11c48fc5/windows-7-and-windows-8-dual-boot-activation- problems?forum=w7itproinstall
Question No: 148
You have client computers that run Windows 7 Enterprise. All users have roaming user profiles.
You deploy several client computers that run Windows 8 Enterprise.
Users who sign in to both the Windows 8 Enterprise computers and the Windows 7 Enterprise computers report that they no longer see their desktop background and their theme.
You suspect that the user profiles are corrupt. You need to resolve the profile corruption issue. What should you do?
Move all of the user profiles to a file server that runs Windows Server 2012, and then modify the profile path of each user account.
on the Windows 7 computers, configure the Download roaming profiles on primary computers only Group Policy setting.
on the Windows 8 computers, configure the Set roaming profile path for all users logging onto this computer Group Policy setting.
For each user, set the msDs-PrimaryComputer attribute to use a Windows 8 computer.
Explanation: if you try to deploy Windows 8.1 in an environment that uses roaming, mandatory, super-mandatory, or domain default profiles in Windows 7, you experience the following:
->After you use a user account that has an existing Windows 7 profile to log on to a
Windows 8.1-based computer for the first time, the components from Windows 8.1 read and modify the profile state.
->Certain Windows 8.1 features may not work as expected because the expected
profile state is not present.
->When you try to use the same user account to log on to a Windows 7-based computer, the user profile modification that was performed in Windows 8.1 may not work as expected in Windows 7.
->Roaming, mandatory, super-mandatory, and domain default user profiles that were created in one version of Windows must be kept isolated from those that were created in another version of Windows.
->For more information about this issue in Windows 8, click the following article
number to view the article in the Microsoft Knowledge Base:
2887239 Incompatibility between Windows 8 roaming user profiles and roaming profiles in other versions of Windows
Question No: 149
You have a Windows 8.1 Enterprise client computer.
The computer uses BitLocker Drive Encryption (BitLocker) on a fixed disk that only stores data.
You need to prevent any data from being written to the fixed disk. What should you do?
Run the manage-bde command and specify the -lock switch.
Run the manage-bde command and specify the -pause switch.
Run the manage-bde command and specify the -off switch.
Run the manage-bde command and specify the -on switch.
Explanation: -lock Locks a BitLocker-protected drive to prevent access to it unless the unlock key is provided.
-pause Pauses BitLocker encryption or decryption. For examples of how this command can be used,
-off Decrypts the drive and turns off BitLocker. All key protectors are removed when decryption is complete.
Question No: 150
Your network contains an Active Directory domain. The domain contains client computers that run Windows 8 Enterprise.
Users frequently use USB drives to store sensitive files that are used on multiple computers.
Your corporate security policy states that all removable storage devices, such as USB data drives, must be encrypted.
You need to ensure that if a user forgets the password for a USB disk that is encrypted by using BitLocker To Go, the user can resolve the issue them self.
What should you do?
Instruct the user to open BitLocker Drive Encryption, select Backup Recovery Key, and then select Save to your Microsoft account.
For each computer, create a USB startup key.
Instruct the user to open BitLocker Drive Encryption, select Backup Recovery Key, and then select Print the recovery key.
From an elevated command prompt, run Manage-BDE -ForceRecovery.
Answer: C Explanation:
http://technet.microsoft.com/en-us/library/ff829867.aspx http://technet.microsoft.com/en-us/library/jj647767.aspx http://technet.microsoft.com/en-us/library/cc732725(v=WS.10).aspx http://technet.microsoft.com/en-us/library/cc771778(v=WS.10).aspx
Withhold startup key during startup – You can initiate recovery by not inserting the USB flash drive, which contains the startup key, when the computer starts up. When you do not provide the startup key, the pre-Windows recovery console displays a screen for entering a recovery password.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|