Latest Braindump2go Microsoft 70-689 Exam Dumps Free Download (171-180)

2015 New Updated 70-689 Exam Dumps Questions and Answers are all from Microsoft Official Exam Center! Some new questions added into this new released 70-689 Dumps! Download 70-689 Exam Dumps Full Version Now and Pass one time!

Vendor: Microsoft
Exam Code: 70-689
Exam Name: Microsoft Upgrading Your Skills to MCSA Windows 8.1

QUESTION 171
You have a computer that runs Windows 8.
The computer has a shared folder named C:\Marketing.
The shared folder is on an NTFS volume.
The current NTFS and share permissions are configured as follows:
UserA is a member of both the Everyone group and the Marketing group.
UserA must access C:\Marketing from across the network.
You need to identify the effective permissions of UserA to the C:\Marketing folder.
What permission should you identify?


A.    Read
B.    Full Control
C.    Modify
D.    Read and Execute

Answer: C

QUESTION 172
Drag and Drop Questions
You support a desktop computer that runs Windows 8 Pro.
The computer is joined to an Active Directory domain.
The computer has a folder named C:\Reports.
The folder NTFS permissions are shown in Exhibit 1. (Click the Exhibit button.)

The folder is shared over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)

Members of the domain security group named Accountants must have access to the shared folder.
You need to assign the required permissions.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

Explanation:
Example:
Share Folders From `Users Profile’ Locations & Local Drives
If you want to quickly share a folder residing in local drives or User Profile folders, open Properties dialog from right-click context menu, and then head over to Sharing tab.
From Network File and Folder Sharing section, click Share to open File Sharing dialog.
Now, select Everyone from drop-down menu, and click Add.

This will add Everyone group in File Sharing list, and allow you to change folder access permission. Using Read pull-down menu, you can give read and write permissions to users, and remove Everyonegroup from the File Sharing list.

Once done, click Share to share the folder on the network.
It will open a separate dialog, allowing you to email and copy the shared folder link.

Now, you can access the shared folder from any PC connected on the network.

QUESTION 173
You administer laptops that run Windows 8 Enterprise.
The laptops are members of an Active Directory domain and are configured with IPv6 disabled. Some users require access to the internal company database servers while traveling.
You need to configure the requested network connection to the database servers.
What should you configure on the laptops?

A.    A DirectAccess connection to the company network
B.    A virtual private network (VPN) connection to the company network
C.    A metered network connection
D.    Out of band management

Answer: B

QUESTION 174
You have a desktop computer that runs Windows 8 Enterprise.
You add three new 3-terabyte disks.
You need to create a new 9-terabyte volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    From Disk Management, create a new spanned volume.
B.    From Disk Management, convert all of the 3-terabyte disks to GPT.
C.    From PowerShell, run the New-VirtualDisk cmdlet.
D.    From Disk Management, bring all disks offline.
E.    From Diskpart, run the Convert MBR command.
F.    From PowerShell, run the Add-PhysicalDisk cmdlet.

Answer: AB
Explanation:
Create a Spanned Volume
A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk.
http://technet.microsoft.com/en-us/library/cc772180.aspx
To create a spanned volume using the Windows interface
1. In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the spanned volume.
2. Click New Spanned Volume.
3. Follow the instructions on your screen.
Using GPT Drives
http://msdn.microsoft.com/en-us/library/windows/hardware/gg463524.aspx
A GPT disk uses the GUID partition table (GPT) diskpartitioning system.
A GPT disk offers these benefits:
Allows up to 128 primary partitions.
Master Boot Record (MBR) disks can support up to four primary
partitions and an additional 124 partitions inside extended partitions.
Allows a much larger partition size-reater than 2terabytes (TB), which is the limit for MBR disks.
Provides greater reliability because of replicationand cyclical redundancy check (CRC) protection of the partition table.
Can be used as a storage volume on all x64-based platforms, including platforms running Windows XP Professional x64 Edition.
Starting with Windows Server 2003 SP1, GPT disks can also be used as a storage volume on x86-based Windows platforms.
Can be used as a boot volume on x64-based editions of Windows 7, Windows Vista, and Windows Server 2008. Starting with Windows Server 2003 SP1, GPT disks can also be used as a boot volume on Itanium based systems.
Note: Windows only supports booting from a GPT disk on systems that contain Unified Extensible Firmware Interface (UEFI) boot firmware.

QUESTION 175
You administer laptop and desktop computers that run Windows 8 Pro.
Your company uses Active Directory Domain Services (AD DS) and Active Directory Certificate Services (AD CS).
Your company decides that access to the company network for all users must be controlled by two-factor authentication.
You need to configure the computers to meet this requirement.
What should you do?

A.    Install smart card readers on all computers. Issue smart cards to all users.
B.    Enable the Password must meet complexity requirements policy setting.
Instruct users to log on by using the domain \username format for their username and their
strong password.
C.    Create an Internet Protocol security (IPsec) policy that requires the use of Kerberos to
authenticate all traffic. Apply the IPsec policy to the domain.
D.    Issue photo identification to all users.
Instruct all users to set up and use PIN Logon.

Answer: A

QUESTION 176
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain.
Some volumes on the computers are encrypted with BitLocker.
The BitLocker recovery passwords are stored in Active Directory.
A user forgets the BitLocker password to local drive E: and is unable to access the protected volume.
You need to provide a BitLocker recovery key to unlock the protected volume.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Ask the user to run the manage-bde-protectors-disable e: command.
B.    Ask the user for a recovery key ID for the protected drive.
C.    Ask the user for his or her logon name.
D.    Ask the user for his or her computer name.

Answer: BD
Explanation:
Asking user their logon name is a very lame way to verify their identity.
Answers B & D seem to be the best solution, because:
– You need to know computer name in order to find computer object in AD, where bitlocker passwords are store;
– Without recovery key ID you will not know which bitlocker recovery password to use.
http://www.concurrency.com/blog/enable-bitlocker-automatically-save-keys-to-active-directory/

QUESTION 177
Drag and Drop Questions
You support desktop computers for a company named Fabrikam, Inc.
The computers are members of the Active Directory domain named fabrikam.com.
Fabrikam works with a supplier named Contoso, Ltd.
Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used.
Fabrikam employees regularly use a Contoso website that is hosted on a server in the contoso.com domain.
The website requires SSL and mutual authentication.
You need to configure the computers to allow Fabrikam users to access the Contoso website without any warning prompts.
You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

wps6312.tmp_thumb

Answer:

wps7A1C.tmp_thumb

Explanation:
– contoso.com provided the resources. contoso.com be the trusted root authorities store
– No untrusted certificates
– Not allow access to local computer account (just to user account)
– user account access through client (user) certificate issued by Contoso

QUESTION 178
You administer computers that run Windows 8 Enterprise.
The computers are members of an Active Directory domain.
You have a tablet that runs Windows 8 Enterprise.
You configure the tablet to access your company network by using a virtual private network (VPN) connection.
You need to manage Active Directory from the tablet by using a VPN connection.
What should you do?

A.    Run the winrm.exe qc command.
B.    Install the System Center Configuration Manager (SCCM) 2012 client.
C.    Install the Remote Server Administration Tools (RSAT).
D.    Install the Windows Intune client.

Answer: C

QUESTION 179
You support tablets that run Windows 8 Pro.
You are designing a remote access server (RAS) that will be placed behind a firewall.
The firewall will accept incoming TCP connections to ports 80 and 443 only.
You want to connect to the RAS server from a tablet.
You need to create a virtual private network (VPN) connection to the RAS server.
Which VPN tunneling protocol should you use?

A.    IPSec/L2TP
B.    SSTP
C.    PPTP
D.    IPSec/IKEv2

Answer: B

QUESTION 180
You are a systems administrator of a small branch office.
Computers in the office are joined to a Windows 8 HomeGroup.
The HomeGroup includes one shared printer and several shared folders.
You join a new computer to the HomeGroup and try to access the HomeGroup shared folders.
You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect.
You need to reconfigure the new computer in order to access the HomeGroup resources.
What should you do?

A.    Adjust the time settings on the new computer to match the time settings of the HomeGroup
computers.
B.    Change the HomeGroup password and re-enter it on the computers of all members of the
HomeGroup.
C.    Change the default sharing configuration for the shared folders on the HomeGroup computers.
D.    Reset your account password to match the HomeGroup password.

Answer: A
Explanation:
You may receive a misleading error message when trying to join a Windows 7 Homegroup, when the computer’s date and time does not match the date/time of system that owns the homegroup Symptoms When joining a system to a homegroup, you may receive the following error message “The password is incorrect”, even though you have typed the passwordcorrectly.
Cause This can be caused by a difference in the Date and Time settings on the computer trying to join the homegroup, and not an invalid password. If the date/time of the computer joining a homegroup is greater than 24 hours apart from the date/time of the system that owns the homegroup, this will cause the error.
Resolution
Adjust the date/time settings on the system joiningthe homegroup, to match the system that owns the homegroup, and then try to join again.
http://support.microsoft.com/kb/2002121


Braindump2go New Released 70-689 Dump PDF Free Download, 299 Questions in all, Passing Your Exam 100% Easily!

http://www.braindump2go.com/70-689.html