You are employed as an administrator at contoso.com. The contoso.com network is made up of an Active Directory Domain Services (AD DS) domain, named ABC.com.
All workstations on the contoso.com network, including laptops, have Windows 8 installed. Your users have just been issued new laptops for use outside the office.
These users currently log in to their desktop workstations using a Windows domain account. They would like their laptops to be set up exactly like their desktop workstations.
Which of the following would easily allow them to achieve this?
A. Transfer the user settings with the File and Transfer wizard
B. Windows Easy Transfer
C. Migrate the user profiles with USMT
D. Link the Windows domain accounts to a Windows Live ID.
Signing in with an ID allows you to:
Associate the most commonly used Windows settings with your user account. Saved settings are available when you sign in to your account on any Windows 8 PC. Your PC will be set up just the way you are used to!
Easily reacquire your Metro style apps on multiple Windows 8 PCs. The app’s settings and last-used state Persist across all your Windows 8 PCs.
Save sign-in credentials for the different apps and websites you use and easily get back into them without having to enter credentials every time.
Automatically sign in to apps and services that use Windows Live ID for authentication.
A company has 50 touch-enabled client computers that run Windows 7.
You are planning to migrate the client computers to Windows 8. You have the following requirements:
• Choose the installation or upgrade path that includes touch-optimized desktop versions of Microsoft Word, Excel, PowerPoint, and OneNote.
• Minimize new hardware requirements.
You need to choose the path that meets the requirements.
Which path should you choose?
A. Upgrade to Windows RT
B. Perform a clean installation of Windows 8 Enterprise
C. Purchase hardware with Windows RT pre-installed.
D. upgrade to Windows 8 Enterprise.
Windows RT is Windows for ARM; nothing in this specifies the computers are on ARM machines.
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
You need to ensure that only administrators can access removable storage devices on client computers. Which two Group Policy settings should you configure? (Each correct answer presents part of the solution.
A. Enable the Prevent installation of removable devices policy.
B. Disable the Allow only USB root hub connected Enhanced Storage Features policy.
C. Create an AppLocker deny rule with a path condition of %HOT%.
D. Start the Application Identity service.
E. Enable the Allow administrators to override Device Installation Restriction policies policy.
*Prevent installation of all devices.
In this scenario, the administrator wants to prevent standard users from installing any device but allow administrators to install or update devices. To implement this scenario, you must configure two computer policies: one that prevents all users from installing devices(A)and a second policy to exempt administrators from the restrictions(E).
*A growing variety of external storage devices can be connected to personal computers and servers that are running the Windowsoperating system. Many users now expect to be able to install and use these devices in the office, at home, and in other locations. For administrators, these devices pose potential security and manageability challenge.
The Group Policy settings discussed in this section can be used to limit, prevent, or enable these situations. The default value for these policy settings is Not configured. These policy settings are located in the following locations under Computer Configuration\Administrative Templates\System:
/ (E)Device Installation\Device Installation Restrictions
Device Redirection\Device Redirection Restrictions
Enhanced Storage Access
Removable Storage Access
Reference:Threats and Countermeasures Guide: External Storage Devices
You administer Windows 8 Pro computers in your company network. The computers are configured to allow remote connections. You attempt to create a Remote Desktop Connection to a computer named Computer1. You receive the following message: ”Remote Desktop can’t connect to the remote computer."
You are able to ping Computer1. You discover that Remote Desktop Firewall rules are not present on Computer1.
You need to connect to Computer1 by using Remote Desktop.
Which PowerShell commands should you run on Computer1?
A. New-NetFirewallRule -DisplayName RdpTCPin -localPort 3389 -Protocol TCP
B. Set-NetFirewallRule -Name RemoteSvcAdmin-In-TCP -Enabled True
C. New-NetFirewallRule -DisplayName RdpTCPout -localPort 3389 -Protocol TCP -Direction Out – Action Allow
D. Set-NetFirewallRule -Name RemoteFwAdmin-In-TCP -Enabled True
A client computer runs Windows 8 and has a 1 TB hard disk drive. You install several third-party desktop apps on the computer. The hard disk drive has very little available space.
After you install an app update, the computer becomes unresponsive.
You have the following requirements:
– Return the computer and applications to an operational state.
– Free additional hard disk space.
You need to meet the requirements by using the least amount of administrative effort.
Which two actions should you perform? (Each correct answer presents part of the solution.
A. Run the Remove everything and install Windows feature.
B. Configure the maximum disk space usage for System Restore to 1%.
C. Configure the maximum disk space usage for System Restore to 5%.
D. Run the Refresh your PC without affecting your files feature.
E. Perform a system restore on the client computer.
E: Restore the system state to the state before applying the latest update.
C: Decrease the memory usage for System Restore.
* How much disk space does System Restore require? To store restore points, you need at least 300 megabytes (MB) of free space on each disk that is 500 MB or larger.
System Restore might use between three and five percent of the space on each disk. As the amount of space fills up with restore points, it deletes older restore points to make room for new ones.
Note: *If you’re having problems with your PC, you can try to restore, refresh, or reset it. Restoring your PC is a way to undo recent system changes you’ve made. Refreshing your PC reinstalls Windows and keeps your personal files, settings, and the apps that came with your PC and apps that you installed from Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps–except for the apps that came with your PC.
Incorrect: Not A:Choosing the Remove Everything tool completely erases your copy of Windows, your programs, your apps, and all your files. In other words, the program wipes your computer completely clean. Then, Windows 8 magically reinstalls itself, leaving you with a working computer, but without your programs, your files, or even your user account. Not D: If your PC isn’t performing as well as it once did, and you don’t know why, you can refresh your PC without deleting any of your personal files or changing your settings. The apps that came with your PC or you installed from Windows Store will be reinstalled, but any apps you installed from other websites and DVDs will be removed. Windows puts a list of the removed apps on your desktop after refreshing your PC.
A company has a client computer that runs Windows 8 with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE). You need to ensure that the computer starts normally.
What should you do?
A. Install a Trusted Platform Module (TPM) chip.
B. Start the computer in Safe Mode. Then update the adapter drivers.
C. Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
D. Create a self-signed certificate. Associate the certificate with the third-party adapter.
A company has an Active Directory Domain Services (AD DS) domain. The company has 100 client computers and tablets that run Windows 8. Each user has a unique local user account on each device he or she uses.
The company wants to simplify the logon process for atl users.
You have the following requirements:
– Reduce the number of unique user accounts for each user.
– Unify the initial Windows 8 theme across all Windows 8 devices.
– Ensure that Windows Store apps maintain the last used state across all Windows 8 devices.
You need to configure an authentication method that meets the requirements. Which authentication method should you configure?
B. Microsoft account
C. Active Directory user account
D. Picture password
You administer Windows 7 client computers in your company network. The computers are members of an Active Directory Domain Services (AD DS) domain and have 16-bit applications installed. You plan to upgrade all of the computers from Windows 7 to Windows 8.
You need to ensure that the 16-bit applications will continue to run on Windows 8. What are two version of Windows 8 that you could use to achieve this goal? (Each correct answer presents a complete of the solution. Choose two.)
A. Windows 8 Pro (64-bit)
B. Windows 8 Enterprise (64-bit)
C. Windows 8 Pro (32-bit)
D. Windows RT
E. Windows 8 Enterprise (32-bit)
While 64-bit copies of Windows 8 do not support 16-bit applications, they are still supported on32-bit copies. However, they are not supported by default and must be manually turnedon with a Control Panel applet.
A company has 100 client computers that run Windows 8. You plan to install a custom app that requires a license key.
You need to ensure that the installation process does not prompt for the manual entry of a license key.
What should you do?
A. Install and run the Microsoft Deployment Toolkit.
B. Install and run the Microsoft Assessment and Planning Toolkit.
C. Install and run the Windows App Certification Kit.
D. Install and run the Windows Application Compatibility Toolkit.
Windows Assessment and Deployment Kit for Windows 8:
A company has 100 client computers that run Windows XP 64-bit Edition. You are deploying new computers that run a 32-bit version of Windows 8.
You need to transfer the contents of each user’s Documents folder to the new computer by using the least amount of administrative effort.
What should you do?
A. Back up the folders by running the NTBackup command.
Then restore the backup to the new computer.
B. Manually copy the folder content to a USB flash drive.
Then paste the files to the new computer.
C. Use Windows Easy Transfer.
D. Use the User State Migration Tool.
Neither USMT5 or Easy Transfer support 64 to 32 migration.
If you want to pass Microsoft 70-689 successfully, donot missing to read latest lead2pass Microsoft 70-689 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.