You have a desktop computer that runs Windows 8 Enterprise. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Disk Management, create a new spanned volume.
B. From PowerShell, run the Add-PhysicalDisk cmdlet.
C. From Diskpart, run the Convert MBR command.
D. From PowerShell, run the New-VirtualDisk cmdlet.
E. From Disk Management, convert all of the 3-terabyte disks to GPT.
F. From Disk Management, bring all disks offline.
You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do?
A. Run the winrm quickconfig command on the desktop computers.
B. Run the winrm quickconfig command on your computer.
C. Enable Remote Desktop on the desktop computers.
D. Install Remote Server Administration Tools (RSAT) on your computer.
Drag and Drop Question
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain. You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)
You share the folder over the network with Read permission for a domain user account named User1 as shown in Exhibit 2. (Click the Exhibit button.)
You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
A. Change the HomeGroup password and re-enter it on the computers of all members of the HomeGroup.
B. Change the default sharing configuration for the shared folders on the HomeGroup computers.
C. Reset your account password to match the HomeGroup password.
D. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
Drag and Drop Question
You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the latest version of the application through using a public cloud. Some users report that every time they try to download the application by using Internet Explorer, they receive a warning message that indicates the application could harm their computer. You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers. What should you do?
A. Obtain a public certificate for the web server, and then configure the web site to use SSL.
B. Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.
C. Digitally sign the application by using a trusted certificate, and then update the default App Package
Deployment policy on all computers.
D. Publish the application through a public file transfer protocol (FTP) site.
Drag and Drop Question
Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed. You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop. You need to create an image and deploy it to the 25 new laptops. Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Your company recently purchased 10 new desktop computers for a remote unconnected location. All of the desktop computers have the same hardware configuration. You install Windows 8 Pro on a reference computer and install a custom driver to support the video adapter. You want to create an image of the reference desktop that retains the custom driver in the image. You need to edit the unattended answer file. Which setting in the unattended answer file should you edit?
A. Microsoft-Windows-Shell-Setup | OEMInformation
B. Microsoft-Windows-PnPSysprep | PersistAIIDevicelnstalls
C. Microsoft-Windows-PnPSysprep | DoNotCleanUpNonPresentDevices
D. Microsoft-Windows-PnpCustomizationNonWinPE | DriverPaths
You administer a computer that runs Windows 8 Pro. You need to create a backup copy of the computer system drive. The backup copy must support a complete system drive restore to another computer. What should you do?
A. Run the bcdedit /export command.
B. Create a system restore point.
C. Create a system recovery drive.
D. Perfom a backup to a shared folder by using the wbadmin command with the -allcritical switch.
You are an administrator for a large company that has an Active Directory domain. Your company has tablets that run Windows RT. Users report that their tablets get locked after one minute of inactivity. They also report that when they change the Personalization setting to 15 minutes, it resets back to 1 minute. You need to ensure that the lockout time for inactivity is set to 15 minutes. What should you do?
A. Modify ActiveSync configuration.
B. Log on to the tablets as a local administrator and run the PowerShell cmdlet Set- ScreenSaverTimeout-Seconds 900.
C. Log on to the tablets as a local administrator and configure the Screensaver wait time and logon options.
D. Modify Group Policy.
E. Configure the local system policy Do not display the lock screen setting to Enabled.
Free Download Pass4sure Microsoft 70-689 VCE Test Engine Full Version