Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version (281-290)

QUESTION 281
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. Client computers use Windows BitLocker Drive Encryption with a Trusted Platform Module (TPM) chip. You need to create a Group Policy object (GPO) that will secure the TPM owner information. Which policy setting should you configure?

A.    Enable the Turn on TPM backup to Active Directory Domain Services policy setting.
B.    Enable the Configure TPM platform validation profile policy setting.
C.    Enable the Configure the level of TPM usage authorization information available to the registry policy setting.
D.    Set the Configure the level of TPM owner authorization information available to operating system
policy setting to Full.

Answer: A

QUESTION 282
You support laptops that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) are deployed on your network on a server named SERVER1. Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started. You need to make changes to the Configure MBAM Services Group Policy settings. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Set Select Bitlocker Recovery Information to store to Recovery password and key package.
B.    Set Enter client checking status frequency (in minutes) to 120.
C.    Set MBAM Recovery and Hardware service endpoint to SERVER1.
D.    Set Enter status reporting frequency (in minutes) to 120.
E.    Set MBAM Status reporting endpoint to SERVER1
F.    Set Select Bitlocker Recovery Information to store to Recovery password only.

Answer: BC

QUESTION 283
You are a Windows 8 user. Your organization has purchased an Office 365 subscription. You install Microsoft Lync and Microsoft Outlook on your computer. You need to connect Office 365 to Lync and Outlook. What should you do?

A.    Run the Windows Mail application. Add a new account by using your Office 365 credentials.
B.    Run the People application. Add a new account by using your Office 365 credentials.
C.    Run the Office Professional Plus setup from the Office 365 portal.
D.    Run the Office 365 desktop setup from the Office 365 portal.

Answer: D

QUESTION 284
You administer computers that run Windows 8 Enterprise in an Active Directory domain in a single Active Directory Site. All user account objects in Active Directory have the Manager attribute populated. The company has purchased a subscription to Windows Intune. The domain security groups are synchronized with the Microsoft Online directory. You create a Windows Intune group that specifies a manager as a membership criterion. You notice that the group has no members. You need to ensure that users that meet the membership criteria are added to the Windows Intune group. What should you do?

A.    Ensure that the user who is performing the search has been synchronized with the Microsoft Online directory.
B.    Force Active Directory replication within the domain.
C.    Ensure that all user accounts are identified as synchronized users.
D.    Synchronize the Active Directory Domain Service (AD DS) with the Microsoft Online directory.

Answer: C

QUESTION 285
Drag and Drop Question
You use a desktop computer and a laptop, both of which run Windows 8. You use a Microsoft account to log on to the desktop computer and a local user account to log on to the laptop. The desktop computer is joined to the HomeGroup and the laptop is a member of a workgroup. When you access a frequently visited website from your laptop, Internet Explorer saves your password. When you visit the website from your desktop computer, you are prompted to enter your password. You need to sync your saved password from your laptop to your desktop computer. Which three actions should you perform on the laptop in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

2851

Answer:

2852

QUESTION 286
You administer computers that run Windows 8 Pro. The desktops have the Application Virtualization (App-V) client installed. Multiple App-V applications are published on the network. A user reports that it is taking a long time to launch App-V applications on his computer. You discover that the user has a roaming profile on the computer. You need to minimize the time that is required for the user to start App-V applications on the computer. What should you do?

A.    Change the location of the App-V client cache file on the computer.
B.    Change the user profile to Local.
C.    Increase the size of the App-V client cache on the computer.
D.    Change the user profile to Super-Mandatory.

Answer: C

QUESTION 287
You administer computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune. Users access a Microsoft Exchange environment by using the Mail tile. The Microsoft Exchange environment is connected to Windows Intune. Company security policy defines the minimum length of passwords and required encryption settings. You need to create a Windows Intune policy that meets the security policy requirements.
What should you do?

A.    Create a new Windows Intune Mobile Security policy.
B.    Create a new Windows Firewall Settings policy.
C.    Create a new Windows Intune Center Settings policy.
D.    Create a new Windows Intune Agent Settings policy.

Answer: A

QUESTION 288
You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. You are planning to add a guest wireless network. You need to collect information about nearby wireless networks, including their encryption methods. Which command should you include in the batch file?

A.    Netsh wlan set autoconfig enabled=no interface=”Wireless Network Connection”
B.    ipconfig /allcompartments
C.    netsh wlan show networks
D.    netstat -a
E.    Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘
F.    netsh wlan show hostednetwork

Answer: C

QUESTION 289
Drag and Drop Question
You administer desktop computers in your company’s research department. The computers run Windows 8 Enterprise and are members of a workgroup. A new security policy states that all traffic between computers in the research department must be encrypted and authenticated. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Security. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

2891

Answer:

2892

QUESTION 290
You administer computers that run Windows 8 Enterprise and are members of an Active Directory domain. Some volumes on the computers are encrypted with BitLOcker. The BitLocker recovery passwords are stored in Active Directory. A user forgets the BitLocker password to local drive E: and is unable to access the protected volume. You need to provide a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.    Ask the user for his or her logon name.
B.    Ask the user for a recovery key ID for the protected drive.
C.    Ask the user to run the manage-bde -protectors -disable e: command.
D.    Ask the user for his or her computer name.

Answer: BD

Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version