Latest MCSA 70-687 Real Exam Download 31-40

Ensurepass

QUESTION  31

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain.

 

You have the following requirements:

Ensure that files in shared network folders are available offline.

Maximize efficiency for users who connect to shared network folders from a mobile device.

 

You need to configure Group Policy settings to meet the requirements. What should you do first?

 

A.   Enable and configure the Configure slow-link mode policy setting.

B.   Enable the Enable file synchronization on costed networks policy setting.

C.   Enable the Synchronize all offline files when logging on policy setting.

D.   Enable and configure the Specify administratively assigned Offline Files policy setting.

 

Correct Answer: B

 

QUESTION  32

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are members of the domain.

Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone. Users of one client computer are able to download and install an application from a site within the Restricted Sites zone.

 

You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone.

 

What should you do?


A.   Run the Set-ExecutionPolicy Windows PowerShell cmdlet.

B.   Configure the Software Restriction Policy settings in the local Group Policy of the computer.

C.   Add the blocked application as a software restriction policy to the GPO that configures AppLocker.

D.   Run the Cet-AppLockerPolicy Windows PowerShell cmdlet.

E.   Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.

 

Correct Answer: B

 

QUESTION  33

A company has an Active Directory Domain Services (AD DS) domain.

All client computers run Windows 8. A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.

 

You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share.

Which permission should you grant to the Sales group?

 

A.   Manage queue

B.   Manage this printer

C.   Print

D.   Manage spooler

E.   Manage documents

 

Correct Answer: E

 

QUESTION  34

Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS) domain.

You create a folder and share the folder with everyone in your organization.

 

You need to modify the NTFS permissions of the folder to meet the following criteria:

 

  Users from the Marketing security group must be able to open files, but not modify them.

  Users from the Supervisors security group must be able to create, modify, and delete files.

  Users from both groups must not be able to delete the folder.

 

Which permissions should you set?

 

A.   Assign the Marketing group the Read permission.

Assign the Supervisors group the Read and Write permissions and the Delete Subfolders and Files special permission.

B.   Assign the Marketing group the Read and Write permissions.

Assign the Supervisors group the Full Control permission.

C.   Assign the Marketing group the Read and Write permissions.

Assign the Supervisors group the Modify permission and the Delete Subfolders and Files special permission.

D.   Assign the Marketing group the Read permission.

Assign the Supervisors group the Read and Write permissions and the Delete special permission.

 

Correct Answer: A

 

QUESTION  35

A company has client computers that run Windows 8.

 

The company implements the following security requirements:

 

  All client computers must use two-factor authentication.

  At least one authentication method must include exactly four characters or gestures.


You need to choose authentication methods that comply with the security requirements.

Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

 

A.   PIN

B.   Biometric authentication

C.   Picture password

D.   Microsoft account

 

Correct Answer: AB

 

QUESTION  36

A company has client computers that run Windows 8.

 

The company implements the following security requirements:

 

  All client computers must use two-factor authentication.

  At least one authentication method must include more than four characters or gestures.

 

You need to choose authentication methods that comply with the security requirements.

Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

 

A.   PIN

B.   Biometric authentication

C.   Picture Password

D.   Microsoft Account

 

Correct Answer: BD

 

QUESTION  37

Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS) domain.

You create a folder and share the folder with everyone in your organization.

 

You need to modify the NTFS permissions of the folder to meet the following criteria:

 

  Users from the Supervisors AD security group must be able to open files, but not modify them.

  Users from the Marketing AD security group must be able to create, modify, and delete files.

  Users from both groups must not be able to delete the folder.

 

Which permissions should you set?

 

A.   Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission.

B.   Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission.

C.   Assign the supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.

D.   Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission.

 

Correct Answer: C

 

QUESTION  38

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.

A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group.


You need to ensure that members of the Sales security group can print to the shared printer and modify only their own print jobs.

Which permission should you grant to the Sales group?

 

A.   Manage queue

B.   Print

C.   Manage documents

D.   Manage this printer

E.   Manage spooler

 

Correct Answer: B

 

QUESTION  39

A company has client computers that run Windows 8.

The client computers are connected to a corporate private network.

Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.

 

You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. Which setting should you configure on the home computers?

 

A.   Virtual Private Network connection

B.   Remote Desktop local resources

C.   DirectAccess connection

D.   Remote Desktop Gateway IP address

 

Correct Answer: D

 

QUESTION  40

A company has 100 client computers that run Windows 8. The client computers are connected to a corporate private network. Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.

 

You need to ensure that users can remotely connect to their office computers by using Remote Desktop. Users must not be able to access any other corporate network resource from their home computers. What should you do?

 

A.   Configure a Virtual Private Network connection.

B.   Configure the Remote Desktop Gateway IP address in the advanced Remote Desktop Connection settings on each client.

C.   Configure the local resource settings of the Remote Desktop connection.

D.   Configure a DirectAccess connection.

 

Correct Answer: B

 

Download Latest 70-687 Real Free Tests , help you to pass exam 100%.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.