All About 70-687 test preparation Apr 2017

Microsoft Microsoft 70-687 exam is meant to measure your abilities and capabilities of problem-solving. Youll be able to achieve 100% good results by employing our Microsoft 70-687 practice question and answers. Our compilers from the 70-687 exam barindumps are dedicating to be able to making improvements from the quality and usability. All the staff members help make great contribution to the Microsoft Microsoft training training course ever given that we started.


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Microsoft 70-687 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 70-687 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/70-687-exam-dumps.html

2017 Apr 70-687 study guide

Q21. You administer Windows 8.1 computers for a software development company. 

The marketing department is going to meet a potential customer to demonstrate the product. You want to configure a laptop that has a stand-alone virtual machine that runs Windows 8.1 Enterprise and the latest build of your software. 

You need to enable BitLocker on the system drive of the virtual machine. 

What should you do first? 

A. Activate Windows. 

B. Join the virtual machine to an Active Directory Domain Services (AD DS) domain. 

C. Turn on the Require additional authentication at startup local policy. 

D. Turn off the Require additional authentication at startup local policy. 

Answer:


Q22. You administer Windows RT tablets in your company network. All users in the company have Microsoft Exchange Server 2010 mailboxes and access them by using Outlook Web Access or Outlook 2010. All tablets are registered on the Microsoft Exchange server as mobile devices. 

A user informs you that he has lost his tablet. The user is able to connect to the company network from his home computer. 

You need to delete Microsoft Exchange information from the lost tablet. 

Which application should you use? 

A. Outlook 2010 

B. Outlook Web Access 

C. Active Directory Users and Computers 

D. Routing and Remote Access Server 

Answer:


Q23. A company has client computers that run Windows 8.1. The client computer systems frequently use IPSec tunnels to securely transmit data. 

You need to configure the IPSec tunnels to use 256-bit encryption keys. 

Which encryption type should you use? 

A. 3DES 

B. DES 

C. RSA 

D. AES 

Answer:


Q24. You are working with a virtual machine (VM) named NYC-DC1 on a Windows 8.1 computer. 

The status of NYC-DC1 in Hyper-V Manager is shown in the following graphic. 

You plan to create a snapshot of NYC-DC1. You select the VM in Hyper-V Manager. The 

Snapshot option is not available in the Actions pane or in the context menu. 

You need to ensure that the Snapshot option is available. 

What should you do? 

A. Resume the VM. 

B. Specify a location in which Hyper-V Manager should save snapshot files. 

C. Save the VM. 

D. Connect to the VM. 

E. Increase the Assigned Memory to at least 2048 MB. 

Answer:


Q25. You administer Windows 8.1 Pro computers in your company network. 

A user named User1 encrypts a sensitive file named file.txt by using Encrypting File System (EFS). 

A user named User2 must be able to read file.txt. 

You need to configure unencrypted read access to file.txt for User2. 

What should you do? 

A. Configure Advanced Security Settings. 

B. Share the folder that contains file.txt. 

C. Configure Advanced Attributes. 

D. Configure Effective Access. 

Answer:


Avant-garde 70-687 exam answers:

Q26. Your computer runs Windows 8.1 and is connected to an Active Directory Domain Services (AD DS) domain. 

You create a folder and share the folder with everyone in your organization. 

You need to modify the NTFS permissions of the folder to meet the following criteria: 

. Users from the Supervisors AD security group must be able to open files, but not modify them. 

. Users from the Marketing AD security group must be able to create, modify, and delete files. 

. Users from both groups must not be able to delete the folder. Which permissions should you set? 

A. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission. 

B. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission. 

C. Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission. 

D. Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission. 

Answer:


Q27. You are employed as an administrator at contoso.com. The contoso.com network is made up of an Active Directory Domain Services (AD DS) domain, named ABC.com. 

All workstations on the contoso.com network, including laptops, have Windows 8.1 installed. 

Your users have just been issued new laptops for use outside the office. 

These users currently log in to their desktop workstations using a Windows domain account. 

They would like their laptops to be set up exactly like their desktop workstations. 

Which of the following would easily allow them to achieve this? 

A. Transfer the user settings with the File and Transfer wizard 

B. Windows Easy Transfer 

C. Migrate the user profiles with USMT 

D. Link the Windows domain accounts to a Windows Live ID. 

Answer:


Q28. You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network. 

You add a new Windows 8.1 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8.1 computer from other computers located outside the perimeter network. 

You need to use the Windows 8.1 computer to manage the Windows servers in the perimeter network. 

What should you do? 

A. Add the Windows 8.1 computer as a Trusted Host to the servers. 

B. Enable PowerShell Remoting on the Windows 8.1 computer. 

C. Add the Windows 8.1 computer as a Trusted Host to computers outside the perimeter network. 

D. Install Remote Server Administration Tools for Windows 8.1 (RSAT) on the Windows 8.1 computer. 

Answer:


Q29. You use a Windows 8.1 Pro computer. The computer stores research data in a folder named C:\Research. 

You turn on File History. 

You need to back up the Research folder. 

What should you do? 

A. Create a new library and include the folder in the library. 

B. Create a new volume mount point in the root of the folder. 

C. Create a new storage space and move the folder to the storage space. 

D. Create a new restore point. 

Answer:


Q30. You are a desktop administrator for your organization. 

You have a small group of Windows 8.1 computers you want to upgrade to Windows 8.1 Pro. 

You need to ensure that these computers have Windows 8.1 Pro installed on them. 

You receive product keys from your contracting team. What should you do next? 

A. Put in a Windows 8.1 DVD. Your current product key will be recognized, and then you can install Windows Pro. 

B. Select Run >Regedit> HKLM > License. Then overwrite the dword license file. 

C. Under Control Panel, select "Add features to Windows 8.1", and choose "Add product key". 

D. Under settings, add roles > Windows 8.1 Pro. Then input the license file. 

Answer: