2014 Latest Pass4sure&Lead2pass Microsoft 70-689 Dumps Part C (11-20)
You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do?
A. Change the location of the App-V client cache file on the computer.
B. Change the user profile to Local.
C. Increase the size of the App-V client cache on the computer.
D. Change the user profile to Super-Mandatory.
You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?
A. Create a new Windows Intune Mobile Security policy.
B. Create a new Windows Firewall Settings policy.
C. Create a new Windows Intune Center Settings policy.
D. Create a new Windows Intune Agent Settings policy.
You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. You are planning to add a guest wireless network. You need to collect information about nearby wireless networks, including their encryption methods. Which command should you include in the batch file?
A. Netsh wlan set autoconfig enabled=no interface="Wireless Network Connection"
B. ipconfig /allcompartments
C. netsh wlan show networks
D. netstat -a
E. Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = "true"’
F. netsh wlan show hostednetwork
Drag and Drop Question
You administer desktop computers in your company’s research department. The computers run Windows 8 Enterprise and are members of a workgroup. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Security. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLOcker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Ask the user for his or her logon name.
B. Ask the user for a recovery key ID for the protected drive.
C. Ask the user to run the manage-bde -protectors -disable e: command.
D. Ask the user for his or her computer name.
You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Disk Management, create a new spanned volume.
B. From PowerShell, run the Add-PhysicalDisk cmdlet.
C. From Diskpart, run the Convert MBR command.
D. From PowerShell, run the New-VirtualDisk cmdlet.
E. From Disk Management, convert all of the 3-terabyte disks to GPT.
F. From Disk Management, bring all disks offline.
You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do?
A. Run the winrm quickconfig command on the desktop computers.
B. Run the winrm quickconfig command on your computer.
C. Enable Remote Desktop on the desktop computers.
D. Install Remote Server Administration Tools (RSAT) on your computer.
Drag and Drop Question
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain. You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)
You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Share Folders From `Users Profile’ Locations & Local Drives If you want to quickly share a folder residing in local drives or User Profile folders, open Properties dialog from right-click context menu, and then head over to Sharing tab. From Network File and Folder Sharing section, click Share to open File Sharing dialog. Now, select Everyone from drop-down menu, and click Add.
This will add Everyone group in File Sharing list, and allow you to change folder access permission. Using Read pull-down menu, you can give read and write permissions to users, and remove Everyonegroup from the File Sharing list.
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
A. Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.
B. Change the default sharing configuration for the shared folders on the HomeGroup computers.
C. Reset your account password to match the HomeGroup password.
D. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
Drag and Drop Question
You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
If you want to pass Microsoft 70-689 successfully, donot missing to read latest lead2pass Microsoft 70-689 dumps.
If you can master all lead2pass questions you will able to pass 100% guaranteed.