Attention: Braindump2go Teaches You How to Pass Exam 70-687! (111-120)
Vendor: Microsoft Exam Code: 70-687 Exam Name: Configuring Windows 8.1 QUESTION 111 You administer Windows 8.1 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. You need to save the windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later. What should you do? A. Open Local Group Policy Editor, select the Local Policies node, and then select the Export List action. B. Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action. C. Run the netsh advfirewall export c:settings.wfw command. D. Run the netsh advfirewall export c:settings.xml command. Answer: C Explanation: *Netsh advfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows Firewall and IPsec settings and provides an alternative to console-based management. T * Export subcommand Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer. Syntax export [ Path ] FileName Parameters [ Path ] FileName Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configuration will be written. If the path, file name, or both contain spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name extension is .wfw. Example In the following example, the command exports the complete Windows Firewall with Advanced Security service configuration to the file C:tempwfas.wfw. export c:tempwfas.wfw Reference:Netsh Commands for Windows Firewall with Advanced Security QUESTION 112 An organization has client computers that run Windows 7. You install the Windows Assessment and Deployment Kit (ADK) in the environment. You capture user settings and data files to a network share, and then perform a clean installation of Windows 8.1 on the client computers. You need to apply the user profiles from the Windows 7 installation to the Windows 8.1 installation. What should you do? A. Run the Ioadstate command. B. Copy the Default Profile to a folder on drive C. C. Run the scanstate command. D. Run Windows Easy Transfer and select the user profile to migrate. E. Run the ImageX command Answer: A Explanation: http://4sysops.com/archives/windows-8-migration-user-data-and-settings/ 1 Windows 8 migration User data and settings User State Migration Tools (USMT) You can extract the USMT tools from the Windows ADK. USMT is revised to version 5.0 for Windows Server 2012 and Windows 8, and consists of the following three programs: Scanstate.exe: This tool performs the user state backup Loadstate.exe: This tool performs the user state restore Usmtutils.exe: This tool enables you to verify compressed migration store files as well as extract contents from them QUESTION 113 An organization has client computers that run Windows 7. You upgrade the client computers to Windows 8.1 without migrating the local user profiles. You install the Windows Assessment and Deployment Kit (ADK) in the environment. You need to migrate the user profiles from the Windows 7 installation to the Windows 8.1 installation. What should you do first on each client computer? A. Run the scanstate command. B. Run Windows Easy Transfer and select the user profile to migrate C. Run the Ioadstate command. D. Copy the Default Profile to a folder on drive C. E. Run the ImaqeX command. Answer: A Explanation: http://technet.microsoft.com/en-us/library/hh825093.aspx 2 The ScanState command is used with the User State Migration Tool (USMT) 5.0 to scan the source computer, collect the files and settings, and create a store. QUESTION 114 A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.) A. Use the Windows 8.1 online upgrade tool. B. Use Group Policy to assign the Windows 8.1 installation file to the client computers. C. Use the Microsoft Deployment Toolkit. D. Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder. Answer: CD Explanation: http://msdn.microsoft.com/en-us/library/dn475741.aspx 3 Microsoft Deployment Toolkit The Microsoft Deployment Toolkit (MDT) provides a unified collection of tools, processes, and guidance for automating desktop and server deployments. In addition to reducing deployment time and standardizing desktop and server images, MDT offers improved security and ongoing configuration management. http://www.technize.net/install-windows-8-install-pxe-boot-network-lan/ 4 How To Install Windows 8 Over The Network (LAN) 6. Now share the folder in which Windows 8 setup files are located. At least one user should be able to read the network folder to be able to run the setup remotely. http://technet.microsoft.com/en-us/library/hh824952.aspx 5 Windows Setup Edition Configuration and Product ID Files (EI.cfg and PID.txt) Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 The edition configuration (EI.cfg) file and the product ID (PID.txt) file are optional configuration files that you can use to specify the Windows® product key and the Windows edition during Windows installation. You can use these files to automate the product-key entry page in Windows Setup instead of using an answer file. If you use an EI.cfg file to differentiate volume license media, but you do not include a PID.txt file, the user receives a prompt for a product key to continue Windows Setup. You can reuse the product key in the product ID file for multiple installations. The product key in the product ID file is only used to install Windows. This key is not used to activate Windows. QUESTION 115 A company has 50 client computers that run Windows 8.1. Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks. A new company security policy includes the following requirements: - Visitors can access only kiosk computers. - Employees can access and shut down only internal computers. - Only administrators can access all computers remotely. - Only administrators can shut down kiosk computers. You need to assign security groups to local security policies to meet the requirements. What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) Answer: QUESTION 116 A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers. You are planning a remote management solution. You have the following requirements: - Ensure that COMPUTER2 can run remote commands on COMPUTER1. - Test the solution by successfully running a command from COMPUTER2 that executes on COMPUTER1. You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) Answer: Explanation: http://technet.microsoft.com/en-us/library/dd163506.aspx 6 QUESTION 117 A company has a main office located in Miami, and brach offices in Boston, Los Angeles and Portland. the Office Networks are configured as described in the following table. A management computer in the main office, named COMPUTER1, runs Windows 8.1 and several third-party management applications. - Ensure that only users in the Boston office can connect to COMPUTER1 by using http. - Ensure that only users in the Los Angeles office can connect COMPUTER1 by using https - Ensure that only users in th Portland office can connect to COMPUTER1 by using FTP. You are configuring access to COMPUTER1. How should you configure windows firewall? (To answer, drag the appropriate elements to the correct location or locations in the answer area. Elements may be used once, more than once, or not at all. You ma need to drag the split bar between panes or scroll.) Answer: Explanation: Seems to be TCP on every answer. http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers 7 QUESTION 118 A computer currently runs a 32-bit version of Windows 7 Ultimate. You need to deploy a 64- bit version of Windows 8.1 to the computer. The new deployment must be the only version of Windows on the computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Answer: QUESTION 119 Ten client computers run Windows Vista and a custom application. The custom application is compatible with Windows 8.1. You purchase 10 new computers that have Windows 8.1 pre- installed. You plan to migrate user settings and data from the Windows Vista computers to the Windows 8.1 computers. You install the User State Migration Toolkit (USMT) on a USB flash drive. You need to ensure that the custom application settings are applied to the Windows 8.1 computers after the migration is complete. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Answer: QUESTION 120 A computer currently runs a 64-bit version of Windows 7 Enterprise. You need to deploy a 64-bit version of Windows 8.1 Pro to the computer. The new deployment must not affect the Windows 7 installation on the computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Answer: Explanation: http://lifehacker.com/5840387/how-to-dual+boot-windows-7-and-windows-8-side-by-side 8
Guaranteed 100% Microsoft 70-687 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-687 Dumps PDF & VCE for Instant Download! http://www.braindump2go.com/70-687.html 9
|