You will pass your Microsoft 70-687 exam GUARANTEED using our accurate 70-687 practice questions and answers PDF&VCE dumps. Lead2pass exam dumps will help you not only pass in the first try, but also save your valuable time. Give your career a boost and start earning your Microsoft certification today!
You administer a Windows 8.1 Pro computer. The computer has File History turned on, and system protection turned on for drive C.
You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut.
You need to restore the most recent version of the folder to its original location.
Which approach should you use to restore the folder?
A. Recycle Bin
B. The latest restore point
C. File History
D. A manually selected restore point
You use a computer that has Windows 7 Professional (32-bit) installed.
You need to migrate the computer to Windows 8.1 Pro (64-bit).
Which installation method should you use?
A. Download and run Windows 7 Upgrade Advisor.
B. Download and run Windows 8.1 Upgrade Assistant.
C. Start Windows 8.1 custom installation from a DVD.
D. Open Windows Anytime Upgrade.
Update to Windows 8.1: FAQ
Can I update from a 32-bit version of Windows to a 64-bit version of Windows 8.1?
If your PC has a 64-bit capable processor (CPU) but is currently running a 32-bit version of
Windows, you can install a 64-bit version of Windows 8.1, but you’ll need to buy it as a DVD and perform a clean installation. You won’t be able to keep any files, settings, or apps when you update from a 32-bit to a 64-bit version.
A company has Windows 8.1 client computers.
All user data is stored locally. Each data file has a system access control list (SACL).
You need to ensure that an event is generated when a user modifies a local file.
Which audit policy setting should you configure?
A. Audit process tracking
B. Audit policy change
C. Audit object access
D. Audit privilege use
Audit object access
This security setting determines whether to audit the event of a user accessing an object– for example, a file, folder, registry key, printer, and so forth–that has its own system access control list (SACL) specified.
If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has an appropriate SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified.
A company has Windows 8.1 client computers. A client computer named COMPUTER1 has a shared folder named Computer1 located in the user’s Downloads folder.
Computer1 is shared only with employees in the Marketing department.
All Marketing employees can connect to Computer1 from their client computers.
A Marketing employee is unable to connect to Computer1 from a legacy device that is not compatible with the Windows 8.1 default sharing settings.
The device is able to connect to resources on other client computers.
You need to configure COMPUTER1 to allow the device to connect to Computer1.
Which setting should you enable?
A. Turn off network discovery
B. Use 128-bit encryption to help protect file sharing connections
C. Turn on sharing so anyone with network access can read and write files in the Public folders
D. Enable file sharing for devices that use 40- or 56-bit encryption
E. Turn off password protected sharing
You administer Windows 8.1 Pro computers in your company network, including a computer named Client1.
On Client1, you create a new folder named C:\Folder1 and configure its NTFS permissions.
You need to ensure that only members of a group named Managers can access the folder content.
In the Advanced Security Settings for Folder1 pane, which security setting should you configure? (To answer, select the appropriate setting in the answer area.)
You administer Windows 8.1 computers in your company network.
Music files with the MP3 extension are opening in the Music Windows Store app.
You need to ensure that MP3 files always open in the Windows Media Player desktop application.
What should you do?
A. From Control Panel, open Default Programs, open Set your default programs, and then in associations
for Music, clear the .mp3 selection.
B. From Windows Media Player, select Options, and then on the Player tab, select the Add local media
files to library when played option.
C. Right-click an MP3 file, select Open With, choose default program, and then select Windows Media
Player with the use this app for all .MP3 files option selected.
D. From Control Panel, open Default Programs, open Change AutoPlay setting, and then select the Play
(Windows Media Player) setting for Music.
A Windows 8.1 computer hosts multiple virtual machines.
The computer contains one hard drive with two partitions.
You need to configure a new virtual machine to use the second physical partition of the host computer as the primary boot device.
What kind of virtual hard disk should you use?
You attach an external drive to a Windows 8.1 computer.
You need to ensure that scheduled defragmentation does not run on the external drive.
What should you do?
A. Disable write caching on the external drive.
B. Run the defrag command and configure the schedule settings.
C. Run the diskpart command and select the external drive.
D. Configure the Optimize Drives setting to exclude the external drive.
http://www.eightforums.com/tutorials/8616-optimize-drives-schedule-change-windows-8-a.html How to Change "Optimize Drives" Schedule Settings in Windows 8 and 8.1
Optimize Drives, previously called Disk Defragmenter, helps to optimize the different types of drives that PCs use today. No matter which type of drive your PC uses, Windows automatically chooses the optimization that’s right for your drive. By default, Optimize Drives runs automatically on a weekly schedule during the time you have set for automatic maintenance. But you can also optimize drives on your PC manually.
You administer Windows RT tablets in your company network. All users in the company have Microsoft Exchange Server 2010 mailboxes and access them by using Outlook Web Access or Outlook 2010. All tablets are registered on the Microsoft Exchange server as mobile devices.
A user informs you that he has lost his tablet.
The user is able to connect to the company network from his home computer.
You need to delete Microsoft Exchange information from the lost tablet.
Which application should you use?
A. Outlook 2010
B. Outlook Web Access
C. Active Directory Users and Computers
D. Routing and Remote Access Server
Two Windows 8.1 computers named COMPUTER1 and COMPUTER2.
You connect from COMPUTER1 to COMPUTER2 by using Remote Desktop.
You are unable to copy any files between COMPUTER1 and COMPUTER2 during the Remote Desktop session.
You need to ensure that you can copy files between the computers during the Remote Desktop session.
What should you do?
A. On COMPUTER1, open Remote Desktop Connection and configure the Local devices and resources settings.
B. On COMPUTER2, add COMPUTER1 to the trusted hosts in Windows Remote Management (WinRM).
C. On COMPUTER2, open Remote Desktop Connection and configure the Local devices and resources settings.
D. On COMPUTER1, add COMPUTER2 to the trusted hosts in Windows Remote Management (WinRM).
Choose Lead2pass you will get:
Most updated collection of Microsoft 70-687 Exam Questions;
Prepare according to the latest Microsoft 70-687 Exam Syllabus;
Product is instantly available for download and use;
24×7 Customer Support on case of problemwith the product.