[Pass Ensure VCE Dumps] Valid 290q 70-687 Practice Test with Free PDF Study Guide Download (151-170)
Posted on August 25, 2015 | By admin
Need New 70-687 Exam Dumps? Download the valid PassLeader 290q 70-687 exam dumps! PassLeader offer the newest 70-687 pdf and vce dumps, which including all the new 70-687 exam questions and answers. We PassLeader ensure that our 290q 70-687 practice test is the most valid and you can get all real exam questions with our 70-687 study guide and pdf ebook materials. We share the 70-687 sample questions with vce and pdf for free download now!
keywords: 70-687 exam,290q 70-687 exam dumps,290q 70-687 exam questions,70-687 pdf dumps,70-687 vce dumps,70-687 study guide,70-687 practice test,Configuring Windows 8.1 Exam
Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 8.1. You add a new computer named Computer1 to the subnet. You discover that Computer1 has an IP address of 169.254.34.12. You cannot connect to other computers on the network. Other computers on the network can connect to each other. You need to ensure that you can connect to all computers on the network. What should you do?
A. Turn off Windows Firewall.
B. Run Ipconfig.exe /renew.
C. Configure a static TCP/IP address.
D. Run Netsh.exe interface ipv4 install.
You need to prevent a custom application from connecting to the Internet. What should you do?
A. From Windows Firewall, add a program.
B. From Windows Defender, modify the Allowed items list.
C. From Windows Firewall with Advanced Security, create an inbound rule.
D. From Windows Firewall with Advanced Security, create an outbound rule.
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do?
A. From a computer that runs Windows 8.1, change the file system of the USB drive.
B. From a computer that runs Windows 81., disable BitLocker To Go for the USB drive.
C. Log on to Windows XP as member of the Administrators group.
D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.
Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 8.1 installed. You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. What should you do before you start encrypting the disk volumes with BitLocker?
A. Run the cscript Add-TPMSelfWriteACE.vbs script on the portable computers.
B. Run the cscript List-ACEs.vbs script on the portable computers.
C. Run the cscript Get-TPMOwnerInfo.vbs script on the client computers.
D. Select the Turn on Bitlocker backup to Active Directory option in local policy on the portable computers.
A user reports that he is unable to start his computer. He provides the following information:
– The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
– The user cannot locate his BitLocker recovery key.
You need to start Windows 8.1 on the computer. The solution must use the minimum amount of administrative effort. What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 8.1 installation media and select Repair your computer.
C. Start the computer from the Windows 8.1 installation media, press SHIFT + F10, and then run chkdsk.
D. Start the computer from the Windows 8.1 installation media and select Install now.
You have 100 computers that run Windows XP. Each computer has the following features:
– Contains a single hard disk drive.
– Contains a single partition.
– Supports USB devices during startup.
You are planning a clean installation of Windows 8.1. You need to ensure that the installation of Windows 8.1 will support BitLocker Drive Encryption on the system partition. What should you do?
A. Perform a clean installation of Windows 8.1 by using the existing partition. Verify the status of the partition by using manage-bde.exe.
B. Verify that the computers have Trusted Platform Modules (TPM) version 1.2 security devices.
C. Perform a clean installation of Windows 8.1 by using the existing partition. Encrypt a USB drive by using the BitLocker-to-Go-Feature.
D. Perform a clean installation of Windows 8.1 by using the existing partition. Use bdehdcfg.exe to configure the partition.
You have a computer that runs Windows 8.1. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What should you do?
A. From the local Group Policy, modify an application control policy.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From Device Manager, modify the settings of all removable devices.
D. From the local Group Policy, modify a removable storage access policy.
You have a computer that runs Windows 8.1. You need to configure an application to connect to the computer by using the IPV6 loopback address. Which address should you specify?
Your network consists of a single Active Directory domain named contoso.com. You have a server named Server1 that runs a custom network application. Server1 has the following IP addresses:
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. What should you do from the computer?
A. Edit the hosts file.
B. Edit the lmhosts file.
C. Run Ipconfig.exe /flushdns.
D. Run Netsh interface ipv4 reset.
You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table:
You need to test the connection to the IPv6 address from Computer1 to Computer2. Which command should you run?
A. Ping -6 fe80::44df:1b68%12
B. Ping -6 fe80::44df:1b68%10
C. Ping -R fe80::44df:1b68%12
D. Ping -R fe80::44df:1b68%10
You have a computer that runs Windows 8.1. IPv6 is disabled on the computer. The computer has the following IPv4 settings:
– IP address: 10.1.1.193
– Subnet mask: 255.255.0.0
– Default gateway: 10.1.1.194
– Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet. What should you do?
A. Delete the default gateway address.
B. Delete the preferred DNS server IP address.
C. Configure the subnet mask to use 255.255.255.0.
D. Configure the subnet mask to use 255.255.255.192.
To establish a DirectAccess connection to the network, what is the first requirement?
A. A certificate
B. A VPN connection
C. A static IPv4 address
D. A static IPv6 address
You have a computer named Computer1 that runs Windows 8.1. You have a server named Server1 that runs Windows Server 2008. Computer1 and Server1 have IPv4 and IPv6 installed. You need to identify whether you can connect to Server1 by using IPv6. What should you do?
A. Run Ping Server1 -6.
B. Run Ping Server1 -n 6.
C. Run Net view \\Server1.
D. Open \\server1 from the Run dialog box.
A company is setting up a new branch office. You deploy 10 new Windows 8.1 64-bit client computers in the branch office. The computers cannot connect to the Internet. You run the ipconfig command on one computer. The following output depicts a portion of the results.
You need to ensure that the computers can connect to the Internet. What should you do?
A. Deploy a Dynamic Host Configuration Protocol (DHCP) server.
Configure all computers to use DHCP.
B. Deploy an Internet Information Services (IIS) server.
Configure all computers to use IIS.
C. Deploy a Domain Name System (DNS) server.
Configure all computers to use DNS.
D. Deploy a Windows Internet Name Service (WINS) server.
Configure all computers to use WINS.
169.254.0.0/16 addresses explained
Occasionally you may encounter a host which has somehow assigned itself an IP address in the 169.254.0.0/16 range. This is a particularly common symptom of Windows machines which have been configured for DHCP but for whatever reason are unable to contact a DHCP server. When a host fails to dynamically acquire an address, it can optionally assign itself a link-local IPv4 address in accordance with RFC 3927. Microsoft’s term for this is Automatic Private Internet Protocol Addressing (APIPA).
A company has an Active Directory Domain Services (AD DS) domain. All client computers are joined to the domain and run Window 8.1. You set up a management computer named COMPUTER1. You plan to administer COMPUTER1 by using Windows Remote Shell (WinRS) from your client computer. You are unable to connect to COMPUTER1 by running the winrs command. You need to ensure that you can manage only COMPUTER1 by using WinRS. What should you do?
A. Run the winrs netdom join command on all client computers.
B. Run the winrs netdom join command only on COMPUTER1.
C. Run the winrm quickconfig command on all client computers.
D. Run the winrm quickconfig command only on COMPUTER1.
E. Run the winrs /ad /u:administrator command on COMPUTER1.
You administer Windows 8.1 client computers in your company network. A user reports that her Internet connection is slower than usual. You need to identify the Process Identifiers (PIDs) of applications that are making connections to the Internet. Which command should you run?
A. netstat -an
B. jpconfig /showclassid
C. netstat -o
D. netsh set audit-logging
E. netsh show netdlls
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.
netstat [-a] [-e] [-n] [-o] [-p Protocol] [-r] [-s] [Interval]
-a : Displays all active TCP connections and the TCP and UDP ports on which the computer is listening.
-n : Displays active TCP connections, however, addresses and port numbers are expressed numerically and no attempt is made to determine names. -o : Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager. This parameter can be combined with -a, -n, and -p.
You administer Windows 8.1 computers in your company network. You need to configure remote computers to receive Windows Remote Shell commands. Which cmdlet should you run on the remote computers?
The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology.
The Enable-PSRemoting cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the WS-Management technology. On Windows Server® 2012, Windows PowerShell remoting is enabled by default. You can use Enable-PSRemoting to enable Windows PowerShell remoting on other supported versions of Windows and to re-enable remoting on Windows Server 2012 if it becomes disabled. You need to run this command only once on each computer that will receive commands. You do not need to run it on computers that only send commands. Because the configuration activates listeners, it is prudent to run it only where it is needed.
You administer Windows 8.1 Pro computers in your company network. A user reports that her computer experiences frequent STOP errors. You need to repair the Windows 8.1 installation. Your solution must ensure that the user retains her current documents and settings. What should you do?
A. Create a recovery drive.
B. Reinstall Windows 8. Restore the user’s personal files from a backup.
C. Run Reset your PC.
D. Run Refresh your PC.
How to refresh, reset, or restore your PC. If you’re having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC reinstalls Windows and keeps your personal files and settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps — except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you’ve made.
You administer a Windows 8.1 Pro client computer. You disable system protection, install custom drivers, and create a system image. You test a new application and discover that the computer becomes unresponsive. You need to return your computer to the state that existed prior to the installation of the application. What should you do?
A. Start the computer from a system recovery drive, and then perform System Restore.
B. Start the computer from a system repair disk, and then perform System Image Recovery.
C. Start the computer from the system repair disk, and then from the command prompt, run the BCDEdit /copy command.
D. Run Reset your PC.
If you can’t access Control Panel and you don’t have a Windows installation disc or a system repair disc, use this method to restore your computer:
Restart your computer using the computer’s power button.
Do one of the following:
On the Advanced Boot Options screen, use the arrow keys to highlight Repair your computer, and then press Enter.
Select a keyboard layout, and then click Next.
Select a user name, type the password, and then click OK. On the System Recovery Options menu, click System Image Recovery, and then follow the instructions.
A company has Windows 8.1 client computers. Users store data files in their user profile libraries. You need to ensure that you can restore data files to any date while minimizing system overhead. Which two actions should you perform? (Each answer presents part of the solution. Choose two.)
A. Enable Storage Spaces.
B. Configure settings to save copies of files daily.
C. Turn on File History.
D. Configure Windows 7 File Recovery.