2014 Latest Pass4sure&Lead2pass Microsoft 70-689 Dumps Part C (31-40)

QUESTION 31
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application. The deployment solution must meet the following requirements:
?The application does not utilize the company server infrastructure. ?The application is isolated from other applications. ?The application uses the least amount of disk space possible on a solid-state drive (SSD) on the tablets.
?The application utilizes the least amount of network bandwidth. You need to deploy the new application to the tablets. What should you do?

A.    Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client
on the tablets.
B.    Deploy the application as a published application on the Remote Desktop server. Create a Remote
Desktop connection on the tablets.
C.    Install the application on a local drive on the tablets.
D.    Install the application in a Windows To Go workspace.
E.    Install Hyper-V on tablets. Install the application on a virtual machine.
F.    Publish the application to Windows Store.
G.    Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file.
Configure the tablets with dual boot.
H.    Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

Answer: D

QUESTION 32
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
– The application is stored locally on the tablets.
– Access to the application is protected with extra logon credentials, in addition to a standard domain account used by users.
– The application utilizes the least amount of network bandwidth.
– The application must maintain access to the current desktop.
You need to deploy the new application to the tablets.
What should you do?

A.    Deploy the application as an Application Virtualization (App-V) package. Install the App-V 4.6 client
on the tablets.
B.    Deploy the application as a published application on the Remote Desktop server. Create a Remote
Desktop connection on the tablets.
C.    Install the application on a local drive on the tablets.
D.    Install the application in a Windows To Go workspace.
E.    Install Hyper-V on tablets. Install the application on a virtual machine.
F.    Publish the application to Windows Store.
G.    Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file.
Configure the tablets with dual boot.
H.    Install the application within a separate Windows 8 installation in a VHDX file. Configure tablets with dual boot.

Answer: E

QUESTION 33
You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Ask the user to run the manage-bde -unlock E: -pw command.
B.    Ask the user for a recovery key ID for the protected volume.
C.    Ask the user for his computer name.
D.    Ask the user for his logon name.

Answer: BC

QUESTION 34
Drag and Drop Question
You support a desktop computer that runs Windows 8 Pro. The computer is joined to an Active Directory domain. The computer has a folder named C:\Reports. The folder NTFS permissions are shown in Exhibit 1. (Click the Exhibit button.)

image
The folder is shared over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)

 image
Members of the domain security group named Accountants must have access to the shared folder. You need to assign the required permissions. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

image
Answer:

image

QUESTION 35
You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain. Users travel frequently and access domain resources from inside client networks or from their home network. You want to manage the laptops when they are connected to the company network from the external networks. You need to ensure that the laptops can be managed and maintained while users are not logged on to the computers. Which of the following should you recommend?

A.    Remote Assistance
B.    Remote Desktop
C.    Windows Remote Management (WinRM)
D.    DirectAccess

Answer: D

QUESTION 36
You support computers that run Windows 8 and are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to prevent possible user data loss in the future. What should you do?

A.    Remove the .man extension from the user profile name.
B.    Add the .dat extension to the user profile name.
C.    Configure the user’s documents library to include folders from network shares.
D.    Configure Folder Redirection by using the domain group policy.

Answer: D

QUESTION 37
You are an IT consultant for small and mid-sized businesses. One of your clients wants to start using Virtual Smart Cards on its laptops and tablets, which run Windows 8 Pro. Before implementing any changes, the client wants to ensure that the laptops and tablets support Virtual Smart Cards. You need to verify that the client laptops and tablets support Virtual Smart Cards. What should you do?

A.    Ensure that the laptops and tablets are running Windows 8 Enterprise edition.
B.    Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.
C.    Ensure that each laptop and tablet can read a physical smart card.
D.    Ensure that BitLocker Drive Encryption is enabled on a system drive of the laptops and tablets.

Answer: B

QUESTION 38
You support computers that run Windows 8 Enterprise and are members of a workgroup. Users are able to download and install any app from Windows Store. You need to ensure that only approved apps can be installed from Windows Store. What should you do?

A.    Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized
app from the Internet option.
B.    Configure a Software Restriction Policy Certificate rule.
C.    Configure an AppLocker Packaged app rule.
D.    Configure an AppLocker Publisher rule.

Answer: C

QUESTION 39
You support computers that run Windows 8 Enterprise. Your company protects all laptops by using the BitLocker Network Unlock feature. Some employees work from home. You need to ensure that employees can log on to their laptops when they work from home. What should you do?

A.    Have users run the Manage-bde.exe -unlock command before they disconnect from the company network.
B.    Enable BitLocker To Go.
C.    Provide employees their BitLocker PINs.
D.    Ensure that the Trusted Platform Module (TPM) chips in the laptops are version 1.2 or greater.

Answer: C

QUESTION 40
You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. You need to ensure that file and program activity is always monitored on this computer. What should you do?

A.    Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.
B.    Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.
C.    Create and deploy a custom policy in the Windows Intune Center Settings template.
D.    In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that uses
the recommended settings.

Answer: D

If you want to pass Microsoft 70-689 successfully, donot missing to read latest lead2pass Microsoft 70-689 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/70-689.html