(New Updated) Recently Updated New Microsoft 70-689 Exam Questions Ensure 100 Percent Pass (1-15)

Kindly Remind: PassLeader have been published the newest 70-689 brain dumps with all the new updated exam questions and answers. We provide the latest version of 70-689 PDF and VCE files with up-to-date questions and answers to ensure your exam 100% pass, and you will get the free new version VCE Player along with your VCE dumps. Welcome to visit our website — passleader.com!

Vendor: Microsoft
Exam Code: 70-689
Exam Name: Microsoft Upgrading Your Skills to MCSA Windows 8.1

QUESTION 1
A company has 10 portable client computers that run windows 8. The portable client computers have the network connections described in the following table:
11_thumb[3]
None of the computers can discover other computers or devices, regardless of which connection they use. You need to configure the connections so that the computers can discover other computers or devices only while connected to the CorpWired or CorpWifi connections. What should you do on the client computers?

A.    For the CorpWired connection, select Yes, turn on sharing and connect to devices.
B.    Change the CorpWired connection to public. Turn on network discovery for the Public profile. For the Hotsport connection, select No, don’t turn on sharing or connect to devices.
C.    For the CorpWifi connection, select Yes, turn on sharing and connect to devices.
D.    Turn on network discovery for the Private profile
E.    Turn on network discovery for the Public profile

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/getting-started-wfas-firewall-profiles-ipsec%28v=ws.10%29.aspx

QUESTION 2
A company has 10 client computers that run Windows 8. Employees log on to resources by using multiple accounts. You need to back up the user name and password for each logon account. What should you do on each client computer?

A.    Back up each user’s Personal Information Exchange PKCS #12 (.pfx) certificate.
B.    Use Credential Manager to save the information to a USB flash drive.
C.    Use File History to back up the ntuser.dat file.
D.    Run the Export-Certificate Windows PowerShell cmdlet.

Answer: B

QUESTION 3
You administer windows 8 computers in you company network. All computers include Windows 8 compatible trusted platform modele (TPM). You configure a computer that will run a credit processing application. You need to ensure that the computer requires a user to enter a PIN code when starting the computer. Which policy should you configure? (to answer, select the appropriate policy in the answer area.)
31_thumb[1]

A.    Allow Secure Boot for Integrity validation
B.    Require Additional authentication at startup
C.    Allow enhanced PINs for Startup
D.    Configure minimum PIN length for startupalocal

Answer: B

QUESTION 4
A company has client computers that run Windows 8. You implement an AppLocker file hash rule that allows an application to run. You then apply a service pack to the application. When users attempt to run the application, the application is blocked by Group Policy. You need to ensure that the application runs. What should you do?

A.    Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
B.    Set the wired network connection to non-metered.
C.    Set the wired network connection to metered.
D.    Configure the Automatic Maintenance setting.

Answer: B

QUESTION 5
A company has an Active Directory Domain Services (AD DS) domain. The corporate environment includes a Windows Software Update Services (WSUS) server. All client computers run Windows 8 and a custom web application. The company has a Microsoft Software Assurance for Volume Licensing agreement. After deploying Windows Updates to the computers, the web application stops responding. You establish that a specific optional update installed by Windows Update is causing the problem. In the Windows Update Control Panel item, the option to remove the update is unavailable. You need to remove the optional update from one client computer. What should you do?

A.    Install and run the Debugging tools for Windows.
B.    Clear the SusClientID registry value on the client computer.
C.    Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Crash Analyzer tool.
D.    Run the wuauclt /resetauthorization command on the client computer.
E.    Restart the computer from a Diagnostic and Repair Toolset (DaRT) boot disk and use the Hotfix Uninstaller tool.

Answer: E

QUESTION 6
A client computer that runs Windows 8 has two hard disk drives: a system drive and a data drive. You are preparing to back up the computer prior to installing a developing software product. You have the following requirements:
– The system disk that is part of the backup must be mountable from within Windows.
– The system disk that is part of the backup must be bootable.
– The backup must be viable to restore in the event of a hard disk failure.
– The backup must contain data from both hard disk drives.
You need to select a backup method. Which method should you use?

A.    System repair disk
B.    Storage pool
C.    System image
D.    File History

Answer: C

QUESTION 7
You administer Windows 8 client computers in your company network. You receive a virtual hard disk (VHD) file that has Windows 8 Pro preinstalled, along with several business applications. You need to configure your client computer to start from either the VHD file or from your current operating system. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A.    Import the contents of the system store from a file.
B.    Export the contents of the system store into a file.
C.    Attach the VHD file by using Disk Management.
D.    Make the VHD disk bootable.
E.    Create a new empty boot configuration data store.
F.    Create a new entry in the boot configuration data store.

Answer: CDF
Explanation:
F: Commands to add an existing VHD to your boot menu:
bcdedit /copy {originalguid} /d “New Windows 7 Installation” bcdedit /set {newguid} device vhd=[D:]\Image.vhd
bcdedit /set {newguid} osdevice vhd=[D:]\Image.vhd
bcdedit /set {newguid} detecthal on


http://www.passleader.com/70-689.html

QUESTION 8
A company has client computers that run Windows 8. The client computer systems frequently use IPSec tunnels to securely transmit data. You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?

A.    3DES
B.    DES
C.    RSA
D.    AES

Answer: D

QUESTION 9
You are configuring a computer that will be used in a kiosk in a public area. You install a new internal hard drive. You need to protect the computer from starting an unauthorized operating system. What should you do?

A.    Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled. Install Windows 8 Pro 64-bit using UEFI and install it on the internal hard drive.
B.    Install Windows 8 Pro 64-bit on the internal hard drive. Enable BitLocker on the internal hard disk.
C.    Partition the internal hard drive as MBR disk. Install Windows 8 Enterprise 64-bit.
D.    Partition the internal hard drive as GPT disk. Install Windows 8 Pro 64-bit.

Answer: A

QUESTION 10
A desktop computer that runs Windows 8 downloads updates but does not install them. The computer is connected to the corporate network by using a wired network connection. You need to ensure that the computer automatically installs updates. What should you do?

A.    Set the wired network connection to non-metered.
B.    Configure the Automatic Maintenance setting.
C.    Enable the Reschedule Automatic Updates scheduled installations Group Policy setting.
D.    Set the wired network connection to metered.

Answer: B

QUESTION 11
You administer a group of 10 client computers that run Windows 8. The client computers are members of a local workgroup. Employees log on to the client computers by using their Microsoft accounts. The company plans to use Windows BitLocker Drive Encryption. You need to back up the BitLocker recovery key. Which two options can you use? (Each correct answer presents a complete solution. Choose two.)

A.    Save the recovery key to a file on the BitLocker-encrypted drive.
B.    Save the recovery key in the Credential Store.
C.    Save the recovery key to SkyDrive.
D.    Print the recovery key.

Answer: AD

QUESTION 12
You administer Windows 8 computers in your company network. You install a new video driver. The computer will not start properly after restart. You are able to enter Safe Mode with Command Prompt. You need to be able to start normally. You also need to ensure that user data is not lost. What should you do?

A.    Run the rstrui.exe command.
B.    Roll back the driver.
C.    Turn on File History.
D.    Create a restore point.

Answer: B

QUESTION 13
You administer Windows 8 Pro client computers in your company network. You need to configure a backup and recovery solution that meets the following requirements:
– Recovers the system if it doesn’t start.
– Recovers the system if the hard drive fails.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Turn on File History.
B.    Create a storage space.
C.    Configure system protection.
D.    Create a system repair disk.
E.    Create a system image backup.

Answer: DE
Explanation:
* In the event that you are unable to start Windows or wish to restore your hard drives to a previous backup you can use the System Image Recovery program from the Windows 7 or Windows 8 Recovery Environment.
* You should create a system repair disk, which can be used to boot your PC and restore it using the system image backup, in the event of a hard drive issue or other hardware failure.
Incorrect:
C: System protection is a feature that regularly creates and saves information about your computer’s system files and settings. System protection also saves previous versions of files that you’ve modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. They’re also created automatically once every seven days if no other restore points were created in the previous seven days, but you can create restore points manually at any time.

QUESTION 14
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)

A.    Use the Volume Activation Management Tool.
B.    Use the Microsoft Deployment Toolkit.
C.    Use the Windows 8 online upgrade tool.
D.    Create a catalog (.clg) file by using Windows System Image Manager (SIM).

Answer: AB
Explanation:
A: Volume Activation Management Tool (VAMT) 2.0 is a managed MMC plug-in. VAMT uses Windows Management Instrumentation (WMI) to configure managed systems. A convenient command line interface (CLI) allows automated, scheduled VAMT tasks without UI interaction. Using the VAMT console, administrators can perform many activation-related tasks on remote computers:
Manage product keys obtained from the Volume Licensing Service Center (VLSC) or other sources including retail and Microsoft subscription programs such as MSDN, TechNet and partner programs — and product activations using those keys.
Activate remote systems using Key Management Service (KMS), Multiple Activation Key (MAK) or retail activation methods.
Perform disconnected proxy activation and reactivation of systems without each system having to connect with Microsoft activation services individually. Assist with license compliance by enabling IT administrators to monitor system license state, including whether systems are licensed and running genuine Windows or Office.
B: Deploy Windows and Office 2010 with Microsoft Deployment Toolkit 2012 Update 1. MDT is the recommended process and toolset for automating desktop and server deployment. MDT provides you with the following benefits:
Unified tools and processes, including a set of guidance, for deploying desktops and servers in a common deployment console.
Reduced deployment time and standardized desktop and server images, along with improved security and ongoing configuration management.

QUESTION 15
You administer computers in your company network. All computers in the network belong to a single Active Directory Domain Services (AD DS) domain. The network includes Windows Server 2012 servers located in a perimeter network. You add a new Windows 8 computer to the perimeter network. You enable only Remote Desktop access to the Windows 8 computer from other computers located outside the perimeter network. You need to use the Windows 8 computer to manage the Windows servers in the perimeter network. What should you do?

A.    Add the Windows 8 computer as a Trusted Host to the servers.
B.    Enable PowerShell Remoting on the Windows 8 computer.
C.    Add the Windows 8 computer as a Trusted Host to computers outside the perimeter network.
D.    Install Remote Server Administration Tools for Windows 8 (RSAT) on the Windows 8 computer.

Answer: B


http://www.passleader.com/70-689.html