A company has client computers that run Windows 8. Users can run applications that have been
downloaded from the Internet only with administrator approval. You need to ensure that users
can run downloaded applications without administrator approval. What should you do?
A. Set the Internet zone privacy level to Low.
B. Set the Internet zone security level to Medium.
C. Set the User Account Control (UAC) settings to Never notify.
D. Turn off Windows SmartScreen.
Correct Answer: A
You are configuring two client computers that run Windows 8: A desktop computer named
COMPUTER1 and a portable computer named COMPUTER2.
You have the following requirements:
Store all personal data in a folder named Data on COMPUTER1.
Ensure that you can access all personal data from COMPUTER2, even when a network
connection is unavailable.
Synchronize personal data between the computers twice a day.
You need to configure the computers to meet the requirements. Which two actions should you
perform? (Each correct answer presents part of the solution. Choose two.)
A. In Sync Center. configure a schedule for offline files.
B. From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be
C. From COMPUTER2, map a network driver to the Data folder on COMPUTER1.
D. In Sync Center, set up a new sync partnership.
E. From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be
Correct Answer: AD
A company has client computers that run Windows 8. You set up new virtual private network
(VPN) connections on all client computers. The VPN connections require the use of a smart card
for authentication. Users are unable to connect to the corporate network by using the VPN
connections. The connection properties are configured as shown in the exhibit.
You need to ensure that the client computers can connect to the corporate network. What should
A. Enable Challenge Handshake Authentication Protocol (CHAP).
B. Change the VPN type to IKEv2.
C. In the advanced settings, select Use pre-shared key for authentication.
D. Change the authentication setting to Use Extensible Authentication Protocol (EAP).
Correct Answer: D
A company has a main office located in Miami, and branch offices in Boston, Los Angeles, and
Portland. The office networks are configured as described in the following table.
A management computer in the main office, named COMPUTER1, runs Windows 8 and several
third-party management applications. You are configuring access to COMPUTER1. You have the
Ensure that only users in the Boston office can connect to COMPUTER1 by using HTTP.
Ensure that only users in the Los Angeles office can connect to COMPUTER1 by using HTTPS.
Ensure that only users in the Portland office can connect to COMPUTER1 by using FTP.
You need to configure access to COMPUTER1. How should you configure Windows Firewall?
To answer, drag the appropriate elements to the correct location or locations in the answer area.
Elements may be used once, more than once, or not at all. You may need to drag the split bar
between panes or scroll to view content.
Select and Place:
A company plans to upgrade its client computer operating systems from Windows 7 to Windows
8. You need to use the User State Migration Tool (USMT) to configure the migration profile to
exclude all files in the users’ Documents folders. Which command should you run on the client
computers before the upgrade?
To answer, drag the appropriate command elements to the correct location or locations in the
answer area. Each command may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.
Select and Place:
You administer Windows 8 computers in your company network. All computers include Windows
8 compatible Trusted Platform Module (TPM). You configure a computer that will run a credit
card processing application. You need to ensure that the computer requires a user to enter a PIN
code when starting the computer. Which policy should you configure?
To answer, select the appropriate policy in the answer area.
A company has client computers that run Windows 8. Finance department employees store files
in the C:Finance directory. File History is on. A Finance department employee attempts to
restore a file to a previous version by using File History. The file is not available to restore. You
need to establish why the file history is not available and ensure that it is available in the future.
Which two actions should you perform? (Each correct answer presents part of the solution.
A. Change the File History drive.
B. Review the File History backup log.
C. Move the file into a library.
D. Start the Volume Shadow Copy Service.
Correct Answer: BC
A company has client computers that run Windows 8. File History is on. An employee downloads
data to a folder on drive D named Archives. You need to ensure that the user can restore files
from the Archives folder by using File History. What should you do?
A. Create a library named History and add the Archives folder to the library.
B. Start the Windows Backup service.
C. Turn on the Volume Shadow Copy Service.
D. Start the Block Level Backup Engine service.
Correct Answer: A
You administer Windows 8 client computers in you company network. You deploy an application
that requires a specific Windows update to be installed on the computers. You need to verify that
the update is installed on specific computers. What are two possible ways to achieve this goal?
(Each correct answer presents a complete solution. Choose two)
A. Run the system update readiness tool.
B. Open View updates history.
C. Open the Check for updates applet.
D. Run the DISM command with the /image and /get-packageinfo swiches.
E. Run the DISM command with the /online and /get-packageinfo swiches.
Correct Answer: BE
You administer windows 8 Pro computers in your company network. A user named User1
encrypts a sensitive file named file.txt by using Encrypting file systems (EFS). A user named User2
must be able to read file.txt. You need to configure unencrypted read access to file.txt for User2.
What should you do?
A. Configure Advanced Attributes.
B. Configure Effective Access.
C. Configure Advanced Security Settings.
D. Share the folder that contains file.txt.
Correct Answer: A