[Free] 2017(Oct) EnsurePass Dumpsleader Microsoft 70-687 Dumps with VCE and PDF 11-20

Ensurepass.com : Ensure you pass the IT Exams
2017 Oct Microsoft Official New Released 70-687
100% Free Download! 100% Pass Guaranteed!

Configuring Windows 8.1

Question No: 11 – (Topic 1)

You are in the process of setting up File History on your workstation. You are configuring the Size of offline cache Advanced settings.

Which of the following is the default setting?

  1. 2%

  2. 5% C. 10% D. 20%

Answer: B Explanation:

http://news.softpedia.com/news/Windows-8-Secrets-Incremental-Backup-with-File-History- 299238.shtml

Ensurepass 2017 PDF and VCE

Question No: 12 – (Topic 1)

You manage computers that run Windows 8.1.

You plan to install a desktop app named App1 on one of the client computers.

You need to install the app without any user interaction and without displaying a progress bar.

Which command should you run?

  1. msiexec /i appl.msi /qb

  2. msiexec /x appl.msi /qb

  3. msiexec /i appl.msi /qn

  4. msiexec /x appl.msi /qn

Answer: C Explanation:

http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx Msiexec (command-line options)

Provides the means to install, modify, and perform operations on Windows Installer from the command line.

/i installs or configures a product

/qn displays no user interface

Further information:

/x uninstalls a product.

Question No: 13 – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are members of the domain. Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone.

Users of one client computer are able to download and install an application from a site within the Restricted Sites zone.

You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone.

What should you do?

  1. Run the Set-ExecutionPolicy Windows PowerShell cmdlet.

  2. Configure the Software Restriction Policy settings in the local Group Policy of the computer.

  3. Add the blocked application as a software restriction policy to the GPO that configures AppLocker.

  4. Run the Cet-AppLockerPolicy Windows PowerShell cmdlet.

  5. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.

Answer: B Explanation:

Only Software Restriction policy allows for the control of applications from a network zone; AppLocker does not.

Ensurepass 2017 PDF and VCE

Further information:

http://technet.microsoft.com/en-us/library/ee176961.aspx Using the Set-ExecutionPolicy Cmdlet

The Set-ExecutionPolicy cmdlet enables you to determine which Windows PowerShell scripts (if any) will be allowed to run on your computer.

http://technet.microsoft.com/en-us/library/ee460964.aspx Get-AppLockerPolicy

Gets the local, effective, or domain AppLocker policy.

http://technet.microsoft.com/en-us/library/dd723678(v=ws.10).aspx AppLocker

You can use AppLocker as part of your overall security strategy for the following scenarios: Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.

Prevent users from installing and using unauthorized applications.

Implement application control policy to satisfy security policy or compliance requirements in your organization.

http://technet.microsoft.com/en- us/library/ee619725(v=ws.10).aspx#BKMK_WhatisAppLocker AppLocker: Frequently Asked Questions

Understanding AppLocker – What is AppLocker?

AppLocker is a feature in Windows Server 2012, Windows Server 2008 R2, Windows 8, and Windows 7 that advances the functionality of the Software Restriction Policies feature.

In Windows Server 2008 R2 and Windows 7, you can manage four types of files: executable (.exe), Windows Installer (.msi and .msp), script (.bat, .cmd, .js, .ps1, and .vbs), and DLL (.dll and .ocx). Each of these file types is managed in its own rule collection.

In Windows Server 2012 and Windows 8, in addition to the file types, you can manage .mst and .appx files with AppLocker.

Question No: 14 DRAG DROP – (Topic 1)

A desktop computer runs Windows 8.1. The computer is joined to an Active Directory Domain Services (AD DS) domain named contoso.com.

You have two domain user accounts:

->A primary account named User1 that does not have domain administrative privileges.

->An account named Admin1 that has administrative privileges in the domain.

You are currently logged in as User1. You need to run an application named appl.exe.

You have the following requirements:

->Start the application by using your administrative credentials.

->Ensure that the user environment is fully available to the application.

You need to complete the command to meet the requirements.

Which command segments should you use to complete the command? (To answer, drag the appropriate command segments to the correct locations in the answer area. Command segments may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

http://technet.microsoft.com/en-us/library/cc771525.aspx Runas

Allows a user to run specific tools and programs with different permissions than the user#39;s current logon provides.


runas [{/profile | /noprofile}] [/env] [{/netonly | /savecred}] [/smartcard] [/showtrustlevels] [/trustlevel] /user:lt;UserAccountNamegt; quot;lt;ProgramNamegt; lt;PathToProgramFilegt;quot;



Loads the user#39;s profile. This is the default. This parameter cannot be used with the

/netonly parameter.

/no profile

Specifies that the user#39;s profile is not to be loaded. This allows the application to load more quickly, but it can also cause a malfunction in some applications.

/user:lt;UserAccountNamegt; quot;lt;ProgramNamegt; lt;PathToProgramFilegt;quot;

Specifies the name of the user account under which to run the program, the program name, and the path to the program file. The user account name format should be

lt;Usergt;@lt;Domaingt; or lt;Domaingt;\lt;UserAccountNamegt;.

Question No: 15 – (Topic 1)

A company has client computers that run Windows 8.1. Each computer has two hard drives.

You need to create a dynamic volume on each computer that maximizes write performance with data fault tolerance.

Which kind of dynamic volume should you create?

  1. Striped Volume

  2. RAID 5 Volume

  3. Spanned Volume

  4. Mirrored Volume

Answer: D

Explanation: http://technet.microsoft.com/en-us/library/cc737048(v=ws.10).aspx Types of Dynamic Volumes

A dynamic volume is a volume that is created on a dynamic disk. Dynamic volume types include simple, spanned, and striped volumes.

Mirrored Volumes

A mirrored volume is a fault-tolerant volume that provides a copy of a volume on another disk. Mirrored volumes provide data redundancy by duplicating the information contained on the volume. The two disks that make up a mirrored volume are known as mirrors. Each mirror is always located on a different disk. If one of the disks fails, the data on the failed disk becomes unavailable, but the system continues to operate by using the unaffected disk.

Mirrored volumes are typically created by the user who requires fault-tolerance and who has two disks in their computer. If one disk fails, the user always has a copy of their data on the second disk. Mirrored volumes provide better write performance than RAID-5 volumes.

Further Information: Striped Volumes

Striped volumes improve disk input/output (I/O) performance by distributing I/O requests across disks. Striped volumes are composed of stripes of data of equal size written across each disk in the volume. They are created from equally sized, unallocated areas on two or more disks.

Striped volumes cannot be extended or mirrored and do not offer fault tolerance. If one of the disks containing a striped volume fails, the entire volume fails, and all data on the striped volume becomes inaccessible. The reliability for the striped volume is less than the least reliable disk in the set.

RAID-5 Volumes

A RAID-5 volume is a fault-tolerant volume that stripes data and parity across three or more disks. Parity is a calculated value that is used to reconstruct data if one disk fails. RAID-5 volumes are typically created by the user who requires fault-tolerance and who has at least three disks in their computer. If one of the disks in the RAID-5 volume fails, the data on the remaining disks, along with the parity information, can be used to recover the

lost data. RAID-5 volumes are well-suited to storing data that will need to be read frequently but written to less frequently. Database applications that read randomly work well with the built-in load balancing of a RAID-5 volume.

Spanned Volumes

Spanned volumes combine areas of unallocated space from multiple disks into one logical volume. The areas of unallocated space can be different sizes. Spanned volumes require two disks, and you can use up to 32 disks.

Question No: 16 DRAG DROP – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers.

You are planning a remote management solution. You have the following requirements:

->Ensure that COMPUTER1 can run remote commands on COMPUTER2.

->Test the solution by successfully running a command from COMPUTER1 that executes on COMPUTER2.

You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

Ref: http://technet.microsoft.com/en-us/library/dd163506.aspx

http://msdn.microsoft.com/en-us/library/aa384372(v=vs.85).aspx Installation and Configuration for Windows Remote Management

The winrm quickconfig command (or the abbreviated version winrm qc) performs the following operations:

Starts the WinRM service, and sets the service startup type to auto-start. Configures a listener for the ports that send and receive WS-Management protocol messages using either HTTP or HTTPS on any IP address.

Defines ICF exceptions for the WinRM service, and opens the ports for HTTP and HTTPS.

http://technet.microsoft.com/en-us/library/hh875630.aspx Winrs

Windows Remote Management allows you to manage and execute programs remotely.


winrs [/lt;parametergt;[:lt;valuegt;]] lt;commandgt;



Specifies the target endpoint using a NetBIOS name or the standard connection:

lt;urlgt;: [lt;transportgt;://]lt;targetgt;[:lt;portgt;]

If not specified, /r:localhost is used.

Question No: 17 DRAG DROP – (Topic 1)

A company has 50 client computers that run Windows 8.1. Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks.

A new company security policy includes the following requirements:

->Visitors can access only kiosk computers.

->Employees can access and shut down only internal computers.

->Only administrators can access all computers remotely.

->Only administrators can shut down kiosk computers.

You need to assign security groups to local security policies to meet the requirements.

What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

http://www.softheap.com/internet/the-guest-account-and-everyone-group.html The Guest Account and Everyone Group

Evaluate the need for the Guest account. Most administrators agree that it should be disabled, although removing it remove the ability of anonymous users to access a system. In some organizations, the Guest account is very useful. For example, people who don#39;t normally work with computers might need to occasionally access a system to obtain some information. Factory floor workers might want to look up pension plan information on a kiosk system in the break room. This is a good use for the Guest account. However, consider creating a separate domain for these public services where the Guest account is enabled. Alternatively, use a Web server for this type of system. Note the following: Users who log on as guests can access any shared folder that the Everyone group has access to (i.e., if the Everyone group has Read permissions to the Private folder, guests can access it with Read permissions). You don#39;t know who Guest users are and there is no accountability because all guests log in to the same account. Always disable the Guest account on networks that are connected to untrusted networks such as the Internet. It provides too many opportunities for break-ins.

Question No: 18 – (Topic 1)

A company has 10 portable client computers that run Windows 8.1.

The portable client computers have the network connections described in the following table.

Ensurepass 2017 PDF and VCE

None of the computers can discover other computers or devices, regardless of which connection they use.

You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections.

What should you do on the client computers?

  1. For the CorpWired connection, select yes, turn on sharing and connect to devices.

  2. Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the HotSpot connection, select No, don#39;t turn on sharing or connect to devices.

  3. For the CorpWifi connection, select yes, turn on sharing and connect to devices.

  4. Turn on network discovery for the Public profile.

  5. Turn on network discovery for the Private profile.

Answer: B

Explanation: The CorpWifi and HotSpot connections are already set properly. The private profile has network discovery enabled by default. So we need to deal with the CorpWired without breaking anything else.

CorpWired connection is already public so it doesn#39;t make sense to set it again to public. Also, enabling network discovery for the Public profile is a dangerous practice.

Ideally it would be to set the CorpWired connection to private. However, since this is not one of the available options, turning on sharing basically does the same thing.


Simple Questions: What are Network Locations in Windows 7 amp; Windows 8?

Network Locations in Windows 8: Private vs Public

Windows 8 further simplifies the concept of network locations, reducing them to only two choices:

Private network – This profile should be applied to your home network or to the network from your workplace. When this profile is assigned to a network connection, network discovery is turned on, file and printer sharing are turned on and homegroup connections

are allowed.

Public network – This profile is also named Guest. It is the more secure of the two because network discovery is turned off as well as file and printer sharing. This profile should be used when connecting to public networks you don’t trust, like those found in airports, coffee shops, bars, hotels, etc.

There#39;s also a third network location profile named Domain network. This one cannot be set by a normal user. It is available for enterprise workplaces and it is set by the network administrator. The settings applied to this profile are those set by your company and you cannot change them.

http://www.tekrevue.com/tip/change-network-location-windows-8/How to Change a Network Location in Windows 8

Ensurepass 2017 PDF and VCE

Let#39;s get back to the Networks list: right click or press and hold your active network connection. A menu is displayed with several options, depending on the network type.

Ensurepass 2017 PDF and VCE

Click or tap quot;Turn sharing on or offquot; (the only option common to both wired and wireless networks). For wired networks you will see less options being displayed din the contextual menu.

You are asked if you want to turn on sharing between PCs and connect to devices on this network.

Ensurepass 2017 PDF and VCE

Selecting quot;No, don’t turn on sharing or connect to devicesquot; is the equivalent of applying the Public profile. Selecting quot;Yes, turn on sharing and connect to devicesquot; is the equivalent of applying the Private profile.

Make your choice and the appropriate settings are applied.

Question No: 19 DRAG DROP – (Topic 1)

Ten client computers run Windows Vista and a custom application. The custom application

is compatible with Windows 8.1.

You purchase 10 new computers that have Windows 8.1 pre-installed. You plan to migrate user settings and data from the Windows Vista computers to the Windows 8.1 computers. You install the User State Migration Toolkit (USMT) on a USB flash drive.

You need to ensure that the custom application settings are applied to the Windows 8.1 computers after the migration is complete.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

http://technet.microsoft.com/en-us/library/cc721992(v=ws.10).aspx USMT Components

You use ScanState to collect the files and settings from the source computer. You use LoadState to restore the user state onto the destination computer.

USMT Components ScanState.exe

ScanState scans the source computer, collects the files and settings and creates a store. ScanState does not modify the source computer. By default, ScanState compresses the files and stores them as an image file (USMT3.MIG).


LoadState migrates the files and settings from the store to the destination computer. LoadState migrates each file (one by one) from the store to a temporary location on the destination computer – the files are decompressed (and decrypted if necessary) during this process. Next, LoadState transfers the file to the correct location, deletes the temporary copy, and begins migrating the next file.

Compression improves performance by reducing network bandwidth usage as well as the required space in the store. However, for testing purposes, you can choose to turn off compression with /nocompress.

Question No: 20 HOTSPOT – (Topic 1)

You administer Windows 8.1 Enterprise (64-bit) computers in your company network. For some applications, some computers run a 32-bit version of the application, and other computers run a 64-bit version of the application.

You want to distribute a package that contains updates for the 32-bit applications only.

You need to determine if a particular computer is running 32-bit or 64-bit versions of the applications.

From the Select columns window, which column should you add to Task Manager? (To answer, select the appropriate column name in the answer area.)

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

100% Ensurepass Free Download!
Download Free Demo:70-687 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 70-687 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.