You administer a company network that includes computers that run Windows 8 Enterprise in an Active Directory domain. The company has purchased a subscription to Windows Intune. Corporate security policy requires that computers in the accounting department have file and program activity logged. A user in the accounting department uses a computer that is managed by Windows Intune. You need to ensure that file and program activity is always monitored on this computer. What should you do?
A. Create a new Windows Firewall Setting policy in the Windows Intune Admin Console.
B. In the Windows Intune Admin Console, create a new Windows Intune Agent Settings policy that uses the recommended settings.
C. Create a new Windows Intune Mobile Security policy in the Windows Intune Admin Console.
D. Create and deploy a custom policy in the Windows Intune Center Settings template.
Drag and Drop Questions
You use a desktop computer and a laptop, both of which run Windows 8. You use a Microsoft account to log on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined to the HomeGroup and the laptop is a member of a workgroup. When you access a frequently visited website from your laptop, Internet Explorer saves your password. When you visit the website from your desktop computer, you are prompted to enter your password. You need to sync your saved password from your laptop to your desktop computer. Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Drag and Drop Questions
You support computers that run Windows 8 Pro. Your company recently purchased 200 new desktop computers. Company policy requires that the desktop computers include a recovery partition. The partition must contain a bootable image that includes support for incoming Remote Desktop connections. You need to configure the desktop computers to comply with company policy. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1. Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker. You need to make changes to the Configure MBAM Services Group Policy settings. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set MBAM Recovery and Hardware service endpoint to MBAM1.
B. Set Enter status reporting frequency (in minutes) to 120.
C. Set MBAM Status reporting endpoint to MBAM1.
D. Set Select Bitlocker Recovery Information to store to Recovery password and key package.
E. Set Select Bitlocker Recovery Information to store to Recovery password only.
F. Set Enter client checking status frequency (in minutes) to 120.
You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. You need to create a Windows Intune policy that meets the security policy requirements. What should you do?
A. Create a new Windows Intune Center Settings policy.
B. Create a new Windows Intune Agent Settings policy.
C. Create a new Windows Intune Mobile Security policy.
D. Create a new Windows Firewall Settings policy.
You support computers that run Windows 8 Enterprise. Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline. You need to ensure that the App-V applications are available to users only when they are connected to the company network. What should you do?
A. Configure mandatory profiles for laptop users.
B. Reset the App-V client FileSystem cache.
C. Disable the Disconnected operation mode.
D. Change user permissions to the App-V applications.
At work, you use a desktop computer that runs Windows 8 Pro. At home, you use a laptop that runs Windows 8. You use the same Microsoft account to log on to both computers. You want to use the same settings for both computers. You need to ensure that all computer settings, including stored passwords, are synced between the computers. What should you do?
A. Add both computers to the same Active Directory domain.
B. Use the same local accounts for both computers.
C. Install SkyDrive for Windows on both computers.
D. Designate both computers as trusted PCs.
Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration. You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter. You want to create an image of the reference desktop that retains the custom driver in the image. You need to edit the unattended answer file. Which setting in the unattended answer file should you edit?
A. Microsoft-Windows-PnPSysprep | PersistAllDeviceInstalls
B. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
C. Microsoft-Windows-PnpCustomizattonNonWinPE | DriverPaths
D. Microsoft-Windows-Shell-Setup | OEMInformation
Drag and Drop Questions
You administer 50 laptops that run Windows 7 Professional 32-bit. You want to install Windows 8 Pro 64-bit on every laptop. Users will keep their own laptops. You need to ensure that user application settings, Windows settings, and user files are maintained after Windows 8 Pro is installed. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?
A. Publish the application through a public file transfer protocol (FTP) site.
B. Publish the application through an intranet web site.
C. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
D. Publish the application to Windows Store.
Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version