Flydumps Cisco Certification Microsoft 70-689 exam questions which contain almost 100% correct answers are tested and approved by senior Cisco lecturers and experts. They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.
QUESTION 1
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are members of the domain. Client computers maintain a list of sites in the Internet Explorer Restricted Sites security zone.
Users of one client computer are able to download and install an application from a site within the Restricted Sites zone.
You need to ensure that users of the computer can install applications only from sites that are not in the Restricted Sites zone.
What should you do?
A. Run the Set-ExecutionPolicy Windows PowerShell cmdlet.
B. Configure the Software Restriction Policy settings in the local Group Policy of the computer.
C. Add the blocked application as a software restriction policy to the GPO that configures AppLocker.
D. Run the Get-AppLockerPolicy Windows PowerShell cmdlet.
E. Add the blocked application as an additional AppLocker rule to the GPO that configures AppLocker.
Correct Answer: B Explanation
Explanation/Reference:
Explanation:
Only Software Restriction policy allows for the control of applications from a network zone; AppLockerdoes not.
http://technet.microsoft.com/en-us/library/hh994586.aspx
QUESTION 2
A company has 100 client computers that run Windows Vista. The company uses several custom applications.
The company plans to replace the Windows Vista computers with new computers that run Windows 8. You need to establish which of the currently installed applications will work on Windows 8.
What should you do?
A. Install and run the Microsoft Deployment Toolkit.
B. Install and run the Windows App Certification Kit.
C. Install and run the Windows Application Compatibility Toolkit.
D. Install and run the Microsoft Assessment and Planning Toolkit.
Correct Answer: C Explanation
Explanation/Reference:
Explanation: The Microsoft. Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows. operating system. By using ACT, you can obtain compatibility information from Microsoft and software vendors, identify compatibility issues within your own organization, and share compatibility ratings with other ACT users. The tools in ACT help you analyze and mitigate compatibility issues before you deploy a version of Windows to your organization. http://technet.microsoft.com/library/hh825181.aspx http://technet.microsoft.com/en-us/windows/application-compatibility.aspx
QUESTION 3
A company has an Active Directory Domain Services (AD DS) domain with one physical domain controller. All client computers run Windows 8.
A client computer hosts a Windows 8 virtual machine (VM) test environment. The VMs are connected to a private virtual switch that is configured as shown in the Virtual Switch Manager exhibit. (Click the Exhibit button.)
The VMs are unable to connect to the domain controller. You have the following requirements:
Configure the test environment to allow VMs to communicate with the domain controller.
Ensure that the VMs can communicate with other VMs in the test environment when the domain controller is unavailable.
You need to meet the requirements. What should you do first?
A. Change the connection type of the private virtual switch to Internal only.
B. Create a new virtual switch with a Private Network connection type.
C. Create a new virtual switch with an ExternalNetwork connection type.
D. Create a new virtual switch with an Internal Network connection type. Correct Answer: C
Explanation Explanation/Reference:
QUESTION 4
A company has client computers that run Windows 8.
You attempt to roll back a driver for a specific device on a client computer. The Roll Back Driver button is unavailable in Device Manager.
You need to roll back the driver to the previous version.
What should you do first?
A. Disable driver signature enforcement.
B. Run Device Manager as an administrator.
C. In the local Group Policy, modify the device installation restrictions.
D. In the system properties for hardware, modify the device installation settings.
Correct Answer: B Explanation Explanation/Reference:
Explanation:
If there’s no previous version of the driver installed for the selected device, the Roll Back Driver button will be unavailable even if you are logged on as an
administrator.
QUESTION 5
You manage computers that run Windows 8.
You plan to install a desktop app named App1 on one of the client computers.
You need to install the app without any user interaction and without displaying a progress bar.
Which command should you run?
A. msiexec /i app1.msi /qb
B. msiexec /i app1.msi /qn
C. msiexec /x app1.msi /qb
D. msiexec /x app1.msi /qn Correct Answer: B
Explanation Explanation/Reference:
Explanation:
/i Installs or configures a product.
/x Uninstall a product,
/qn Displays no user interface.
/qb Displays a basic user interface.
http://technet.microsoft.com/en-us/library/cc759262(v=ws.10).aspx
QUESTION 6
You update the video card driver on a portable computer that runs Windows 8.
When a user connects the portable computer to an external monitor, the external monitor duplicates the display on the portable computer screen.
You need to ensure that the user can display additional desktop space on the external monitor.
What should you do?
A. Run the DisplaySwitch /extend command.
B. Start the computer from the Windows 8 installation media and perform a system image recovery.
C. Run the sfc /scannow command.
D. Roll back the video card driver to the previous version. Correct Answer: A
Explanation Explanation/Reference:
Explanation: DisplaySwitch.exe /internal DisplaySwitch.exe /external Use this command to switch to the external display only. DisplaySwitch.exe /clone Duplicates the primary display DisplaySwitch.exe /extend Expands your Desktop to the secondary display
QUESTION 7
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows
8 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)
A. Use the Windows 8 online upgrade tool.
B. Use Group Policy to assign the Windows 8 installation file to the client computers.
C. Use the Microsoft Deployment Toolkit.
D. Extract the contents of the Windows 8 .iso image file to a new shared folder and run the setup program from that folder. Correct Answer: CD
Explanation Explanation/Reference:
QUESTION 8
An organization has client computers that run Windows 7. You upgrade the client computers to Windows 8 without migrating the local user profiles.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You need to migrate the user profiles from the Windows 7 installation to the Windows 8 installation.
What should you do first on each client computer?
A. Copy the Default Profile to a folder on drive C.
B. Run Windows Easy Transfer and select the user profile to migrate.
C. Run the scanstate command.
D. Run the loadstate command.
E. Run the ImageX command.
Correct Answer: C Explanation Explanation/Reference:
QUESTION 9
A company has client computers that run Windows 8. Each employee has one client computer at the office. Some employees also have personal computers at home.
The company has applications that run only on Windows 8.
You need to deploy Windows To Go so that employees can run the applications on their home computers.
Which two command-line tools should you use? (Each correct answer presents part of the solution. Choose two.)
A. ImageX
B. bcdboot
C. BdeHdCfg
D. isoburn
Correct Answer: AB Explanation
Explanation/Reference:
Explanation:
If you get DISM as an additional option in this question, I would select DISM. DISM is already integrated in the Windows 8 OS and it is the newer feature than
ImageX.
To use ImageX we have to install Windows 8 AIK first.
QUESTION 10
A company has 100 client computers that run Windows XP 64-bit Edition.
You are deploying new computers that run a 32-bit version of Windows 8.
You need to transfer the contents of each user’s Documents folder to the new computer by using the least amount of administrative effort. What should you do?
A. Manually copy the folder content to a USB flash drive. Then paste the files to the new computer.
B. Use the User State Migration Tool.
C. Use Windows Easy Transfer.
D. Back up the folders by running the NTBackup command. Then restore the backup to the new computer.
Correct Answer: A Explanation
Explanation/Reference:
Explanation:
– Use the User State Migration Tool (http://en.wikipedia.org/wiki/User_State_Migration_Tool) 32-bit to 64-bit migrations are supported, but 64-bit to 32-bit are not.
-Windows Easy Transfer (http://h10025.www1.hp.com/ewfrf/wc/document? docname=c03477022&cc=at&dlc=en&lc=en)
cannot transfer files between a 64-bit version of Windows and a 32-bit version of Windows. Instead, files need to be transferred manually using external storage
devices. -NTBackup (http://superuser.com/questions/541122/restoring-a-windows-xp-ntbackup-file-bkf-file-on- windows-8 or http://www.techrepublic.com/blog/
windows-and-office/restore-a-windows-xp-backup- in-windows-8/)???
-Manually copy the folder content to a USB flash drive. (100 clients!!)
QUESTION 11
A company has client computers that run Windows 8.
You install a new device on a client computer. The device installation includes an application that runs when the computer starts. You experience problems with the application.
You need to prevent the application from running when the computer starts, without affecting any other application.
What should you do?
A. Configure the device by using Device Manager.
B. Run the msconfig command.
C. Run the bcdedit command.
D. Configure the application by using Task Manager.
Correct Answer: D Explanation
Explanation/Reference:
Explanation: it’s a new feature of Windows 8 http://pcworld.co.nz/pcworld/pcw.nsf/feature/20-essential-windows-8-tips-and-tricks
QUESTION 12
A company has client computers that run Windows 8. File History is on.
An employee downloads data to a folder on drive D named Archives.
You need to ensure that the user can restore files from the Archives folder by using File History.
What should you do?
A. Start the Windows Backup service.
B. Start the Block Level Backup Engine service.
C. Turn on the Volume Shadow Copy Service.
D. Create a library named History and add the Archives folder to the library.
Correct Answer: D Explanation
Explanation/Reference:
Explanation:
http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx File History only backs up data in libraries, favorites, desktop, and
contacts and must use a non-system drive for backup.
QUESTION 13
You install Windows 8 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app.
You need to remove only the most recently installed third-party desktop app.
You start the computer from a system repair disk.
Which troubleshooting option should you use?
A. Remove everything and install Windows
B. Refresh your PC without affecting your files
C. System Restore
D. System Image Recovery Correct Answer: C
Explanation Explanation/Reference:
Explanation: http://www.bleepingcomputer.com/tutorials/windows-8-system-restore-guide/
QUESTION 14
A company has client computers that run Windows 8. Finance department employees store files in the
C:\Finance directory. File History is on.
A Finance department employee attempts to restore a file to a previous version by using File History.
The file is not available to restore.
You need to establish why the file history is not available and ensure that it is available in the future. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set the Protection Settings for drive C to On.
B. Restore the data files from the Previous
C. Versions tab located in the folder properties.
D. Review the File History backup log.
E. Move the file into a library. Correct Answer: DE
Explanation Explanation/Reference:
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup. Since File History is already on we can
assume the drive doesn’t need to be changed. So we should review the log and move the file to a library.
Volume shadow copy has been replaced with File History: http://msdn.microsoft.com/en- us/library/windows/desktop/hh848072(v=vs.85).
QUESTION 15
You have a portable computer that runs Windows 8.
You are creating a backup plan. You have the following requirements:
Automatically back up the files in your Documents folder every hour.
Ensure that you can recover different versions of the backed-up files.
Do not back up the Windows operating system files.
You need to configure the computer to meet the requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a volume mount point in your Documents folder.
B. Connect an external hard drive to the computer.
C. Schedule a task to create a restore point every hour.
D. Create a recovery drive on drive C.
E. Turn on File History. Correct Answer: BE
Explanation Explanation/Reference:
Explanation:
File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.
QUESTION 16
A company has client computers that run Windows 8. The client computers are connected to a corporate private network.
Users are currently unable to connect from their home computers to their work computers by using Remote Desktop.
You need to ensure that users can remotely connect to their office computers by using Remote Desktop, users must not be able to access any other corporate
network resource from their home computers.
Which setting should you configure on the home computers?
A. Remote Desktop Gateway IP address
B. DirectAccess connection
C. Remote Desktop local resources
D. Virtual Private Network connection
Correct Answer: A Explanation
Explanation/Reference:
Explanation:
http://technet.microsoft.com/en-us/library/cc731435.aspx Remote Desktop Gateway allows a home computer to remote into the work computer. The Work
computer can access corporate network resources, just as if the worker was at the workstation, but the HOME COMPUTER cannot access corporate resources.
RD RAPs will enable us to control remote user access to internal network resources. With RD CAPs we can control which Users or Computers can connect via
RDP. VPNprovides the HOME computer with an IP Address directly of the Corporate private network, giving the HOME computer access to the corporate private
resources
QUESTION 17
You deploy several tablet PCs that run Windows 8.
You need to minimize power usage when the user presses the sleep button.
What should you do?
A. Disable the C-State control in the computer’s BIOS.
B. In Power Options, configure the sleep button setting to Sleep.
C. In Power Options, configure the sleep button setting to Hibernate.
D. Configure the active power plan to set the system cooling policy to passive.
Correct Answer: C Explanation
Explanation/Reference:
Explanation:
Sleep is a power-saving state that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working
again. Putting your computer into the sleep state is like pausing a DVD player–the computer immediately stops what it’s doing and is ready to start again when you
want to resume working.
Hibernation is a power-saving state designed primarily for laptops. While sleep puts your work and settings in memory and draws a small amount of power,
hibernation puts your open documents and programs on your hard disk, and then turns off your computer. Of all the power-saving states in Windows, hibernation
uses the least amount of power. On a laptop, use hibernation when you know that you won’t use your laptop for an extended period and won’t have an opportunity
to charge the battery during that time.
Hybrid sleep is designed primarily for desktop computers. Hybrid sleep is a combination of sleep and hibernate–it puts any open documents and programs in
memory and on your hard disk, and then puts your computer into a low-power state so that you can quickly resume your work. That way, if a power failure occurs,
Windows can restore your work from your hard disk. When hybrid sleep is turned on, putting your computer into sleep automatically puts your computer into hybrid
sleep. Hybrid sleep is typically turned on by default on desktop computers.
http://www.eightforums.com/tutorials/14956-power-button-action-change-windows-8-a.html
QUESTION 18
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.
You need to minimize the amount of Trusted Platform Module (TPM) authorization information that is stored in the registry.
What should you do?
A. Create a Group Policy object (GPO) that disables the Configure the level of TPM owner authorization information available to operating system policy setting.
B. Create a Group Policy object (GPO) that enables the Turn on TPM Local Encryption policy setting.
C. Enable Platform Configuration Register indices (PCRs) 0, 2, 4, and 11 for the Configure TPM validation profile for native UEFI firmware configuration policy setting.
D. Create a Group Policy object (GPO) that sets the Configure the level of TPM owner authorization information available to operating system policy setting to None.
Correct Answer: D Explanation
Explanation/Reference:
Explanation:
There are three TPM owner authentication settings that are managed by the Windows operating system.
You can choose a value of Full, Delegate, or None.
Full: This setting stores the full TPM owner authorization, the TPM administrative delegation blob, and the TPM user delegation blob in the local registry. With this
setting, you can use the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios that do
not require you to reset the TPM anti-hammering logic or change the TPM owner authorization value. Some TPMbased applications may require that this setting is
changed before features that depend on the TPM antihammering logic can be used.
Delegated: This setting stores only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for
use with TPM-based applications that depend on the TPM antihammering logic. When you use this setting, we recommend using external or remote storage for
the full TPM owner authorization value–for example, backing up the value in Active Directory Domain Services (AD DS). None: This setting provides compatibility
with previous operating systems and applications. You can also use it Explanation:
There are three TPM owner authentication settings that are managed by the Windows operating system.
You can choose a value of Full, Delegate, or None.
Full: This setting stores the full TPM owner authorization, the TPM administrative delegation blob, and the TPM user delegation blob in the local registry. With this
setting, you can use the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios that do
not require you to reset the TPM anti-hammering logic or change the TPM owner authorization value. Some TPMbased applications may require that this setting is
changed before features that depend on the TPM antihammering logic can be used.
Delegated: This setting stores only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for
use with TPM-based applications that depend on the TPM antihammering logic. When you use this setting, we recommend using external or remote storage for
the full TPM owner authorization value–for example, backing up the value in Active Directory Domain Services (AD DS). None: This setting provides compatibility with previous operating systems and applications. You can also use it
QUESTION 19
A company has client computers that run Windows 8. The company uses Windows BitLocker Drive Encryption with the data-only option on all client computers.
You delete a file containing highly confidential information from your computer.
You need to clear the free space on the hard drive to minimize the chance of the confidential information being recovered.
Which command should you run on the client computer?
A. manage-bde -w
B. diskpart clean
C. BdeHdCfg -target c: shrink
D. chkdsk /spotfix Correct Answer: A
Explanation Explanation/Reference:
QUESTION 20
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8 and are joined to the domain.
You have the following requirements:
Ensure that files in shared network folders are available offline.
Minimize all data access times.
Reduce network bandwidth usage.
You need to configure Group Policy settings to meet the requirements. What should you do first?
A. Enable the Enable file synchronization on costed networks policy setting.
B. Enable the Synchronize all offline files when logging on policy setting.
C. Enable and configure the Configure slow-link mode policy setting.
D. Enable and configure the Specify administratively assigned Offline Files policy setting. Correct Answer: C
Explanation Explanation/Reference:
Explanation:
Enable the Always Offline Mode to Provide Faster Access to Files:
To enable the Always Offline mode, use Group Policyto enable the Configure slow-link modepolicy setting and set the latency to 1(millisecond).
Microsoft 70-689 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism.The main purpose of Microsoft 70-689 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification