Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version (241-250)

QUESTION 241
Your company has five hardware builds for client computers. The hardware builds are configured as shown in the following table.
2411
You plan to provide some users with Windows To Go disks that contain a corporate image of the 64- bit version of Windows 8 Enterprise and several line-of-business (LOB) applications. In the table below, identify whether the hardware build is compatible or incompatible with the Windows To Go disks. Make only one selection in each row. Each correct selection is worth one point.

2412

Answer:

2413

QUESTION 242
Hotspot Questions
You have 10 client computers that run Windows 8 Pro. The Storage Spaces settings of the computers are configured as shown in the following exhibit. (Click the Exhibit button.)
2421
To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.

2422

Answer:

2423

QUESTION 243
Hotspot Questions
Your company has a main office and a branch office. You have client computers that run Windows 8 Enterprise. You are evaluating whether to disable IPv6 on the client computers in the sales, marketing, research, and finance departments. Each user in the sales department has a laptop and frequently accesses the network by using DirectAccess. Each user in the marketing department has a desktop computer located in the branch office. All of the marketing department computers are configured to use BranchCache. Each user in the research department has a desktop computer located in the main office and uses IPSec to access research servers. Each user in the finance department has a laptop and frequently accesses the network by using an SSTP VPN connection.
In the table below, identify which departments require IPv6 and which departments do not require IPv6. Make only one selection in each row. Each correct selection is worth one point.

2431

Answer:

2432

QUESTION 244
Hotspot Questions
Your company has client computers that run Windows 8 Enterprise and Windows RT. The company has a subscription to Windows Intune. You plan to deploy line-of-business (LOB) Windows Store apps to all of the computers by using Windows Intune. The LOB apps will be signed by using a certificate issued by a trusted certification authority (CA). You need to prepare all of the computers for the deployment of the LOB Windows Store apps. In the table below, identify on which operating system each task should be performed. Make only one selection in each row. Each correct selection is worth one point.

2441

Answer:

2442

QUESTION 245
You have client computers that run Windows 8 Enterprise. The network contains a network printer. Users connect to the printer by using a local TCP/IP port. A network administrator changes the IP address of the printer. You need to create a script to update the IP address used by the local TCP/IP port on the computers. Which two Windows PowerShell cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)

A.    Add-PrinterPort
B.    Add- PrinterD river
C.    Set-PrinterConfiguration
D.    Add-Printer
E.    Set-Printer

Answer: AE

QUESTION 246
Your network contains client computers that run Windows 8 Enterprise. The computers are members of an Active Directory domain. Your company purchases a subscription to Windows Intune. Synchronization between Active Directory and Windows Intune is not configured. You enroll all of the computers in Windows Intune. You plan to create groups that contain the computers by using dynamic membership. You need to identify which criteria you can use to populate the groups dynamically. Which three criteria should you identify? (Each correct answer presents a complete solution. Choose three.)

A.    organizational unit (OU)
B.    manager
C.    security group
D.    device type
E.    domain

Answer: ABC

QUESTION 247
Your company has client computers that run Windows 8. All of the computers have the SkyDrive desktop application installed. Windows 7 File Recovery is configured to create a local backup of Microsoft Office 2013 documents. Only one backup is retained. A user deletes a Microsoft Word document from his computer. The document was located in a SkyDrive synchronized folder. You need to recover the document, including the previous versions of the document. What should you use?

A.    the Recycle Bin on the desktop
B.    the SkyDrive website
C.    Windows 7 File Recovery
D.    the SkyDrive desktop application

Answer: B

QUESTION 248
Your network contains a Microsoft Exchange Server 2013 organization. You have an Exchange ActiveSync policy that has the following settings configured:
•    AllowRemoteDesktop
•    AllowInternetSharing
•    RequireDeviceEncryption
•    MinDevicePasswordLength
•    AllowSimpleDevicePassword
You need to identify which settings are applied to devices that run Windows RT. Which three settings should you identify? (Each correct answer presents part of the solution. Choose three.)

A.    MinDevicePasswordLength
B.    AllowRemoteDesktop
C.    AllowInternetSharing
D.    RequireDeviceEncryption
E.    AllowSimpleDevicePassword

Answer: ADE

QUESTION 249
Hotspot Questions
You have a client computer that runs Windows 8 Pro. The computer contains a storage pool. You need to remove a disk named Disk 2 from the storage pool. What should you configure first? (To answer, select the appropriate option in the answer area.)

2491

Answer:

2492

QUESTION 250
Your network contains an Active Directory domain. All client computers run Windows 8 Enterprise. Microsoft System Center 2012 Endpoint Protection is deployed to all of the computers by using the default settings contained in the Default Antimalware Policy. The users in the research department report that a folder named C:\TestApp must not be scanned by the Endpoint Protection client. You need to configure the Endpoint Protection client not to scan the C:\TestApp folder for the computers in the research department only. What should you do first?

A.    In the Endpoint Protection client, modify the Excluded files and locations setting for each research department computer.
B.    Create a new antimalware policy and modify the Threat overrides settings.
C.    Create a new antimalware policy and modify the Exclusion settings.
D.    In the Default Antimalware Policy, modify the Exclusion settings.

Answer: C

Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version