Q111. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. 

You have the following requirements: 

. Ensure that files in shared network folders are available offline. 

. Maximize efficiency for users who connect to shared network folders from a mobile device. 

You need to configure Group Policy settings to meet the requirements. 

What should you do first? 

A. Enable and configure the Configure slow-link mode policy setting. 

B. Enable the Enable file synchronization on costed networks policy setting. 

C. Enable the Synchronize all offline files when logging on policy setting. 

D. Enable and configure the Specify administratively assigned Offline Files policy setting. 

Answer:


Q112. A company has Windows 8.1 client computers. A client computer named COMPUTER1 has a shared folder named Computer1 located in the user's Downloads folder. Computer1 is shared only with employees in the Marketing department. All Marketing employees can connect to Computer1 from their client computers. 

A Marketing employee is unable to connect to Computer1 from a legacy device that is not compatible with the Windows 8.1 default sharing settings. The device is able to connect to resources on other client computers. 

You need to configure COMPUTER1 to allow the device to connect to Computer1. 

Which setting should you enable? 

A. Turn off network discovery 

B. Use 128-bit encryption to help protect file sharing connections 

C. Turn on sharing so anyone with network access can read and write files in the Public folders 

D. Enable file sharing for devices that use 40- or 56-bit encryption 

E. Turn off password protected sharing 

Answer:


Q113. You are configuring two client computers that run Windows 8.1: A desktop computer named COMPUTER1 and a portable computer named COMPUTER2. 

You have the following requirements: 

. Store all personal data in a folder named Data on COMPUTER1. 

. Ensure that you can access all personal data from COMPUTER2, even when a network connection is unavailable. 

. Synchronize personal data between the computers twice a day. 

You need to configure the computers to meet the requirements. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. In Sync Center. configure a schedule for offline files. 

B. From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always be available offline. 

C. From COMPUTER2, map a network driver to the Data folder on COMPUTER1. 

D. In Sync Center, set up a new sync partnership. 

E. From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be available offline 

Answer: AD 


Q114. You administer Windows 8.1 Pro computers in your company network. All computers are members of an Active Directory Domain Services (AD DS) domain. 

A server named Server1 runs Windows Server 2012 and has an IP address of 10.10.10.20. Server1 is configured to use port 10987 for Remote Desktop connections. 

From your Windows 8.1 computer, you need to create a Remote Desktop connection to Server1. 

What should you do? 

A. From the General tab of your Remote Desktop connection, enter 10.10.10.20 port: 10987. 

B. Create a new Remote Desktop connection, and then set the Local Computer policy to Disable drives redirection for Remote Desktop Services. 

C. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the server authentication field. 

D. Run mstsc.exe /v:10.10.10.20:10987. 

Answer:


Q115. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1 and are joined to the domain. All Sales department employees are members of the Sales organizational unit (CU). AppLocker rules control the installation of applicatior on client computers. 

You create a new Group Policy object (GPO) to configure an AppLocker file hash rule. The file hash rule allows an application to run and links the application to the Sales OU. Several minutes later, you establish that the AppLocker rule is not present on some computers within SalesOU and the application cannot run. 

You need to quickly ensure that the application can run. 

What should you do? 

A. Run the Get-AppLockerPolicy Windows PowerShell cmdlet. 

B. Configure the AppLocker properties to enforce rules. 

C. Run the gpupdate /force command. 

D. Create a new AppLocker file hash condition. 

Answer:


Q116. You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain. 

Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store. 

You need to ensure that all employees in the HR department can use Timesheet on their new computers. 

What should you do? 

A. Set the Allow all trusted applications to install group policy to Enabled. 

B. Set the Turn off the Store application group policy to Enabled. 

C. Install and run the Microsoft Deployment Toolkit. 

D. Install and run the Windows App Certification Kit. 

Answer:


Q117. You administer client computers in your company network. The network includes an Active Directory Domain Services (AD DS) domain. 

Employees in the human resources (HR) department are getting new Windows 8.1 Enterprise computers. The HR department uses a line of business (LOB) Windows Store app named Timesheet that is not available in Windows Store. 

You need to ensure that all employees in the HR department can use Timesheet on their new computers. 

What should you do? 

A. Use a local account to log on to each computer. 

B. Set the Turn off the Store application group policy to Enabled. 

C. Activate the sideloading product key on each computer. 

D. Set the Allow Store to install apps on Windows To Go workspaces group policy setting to Enabled. 

Answer:


Q118. You administer Windows RT tablets in your company network. All users in the company have Microsoft Exchange Server 2010 mailboxes and access them by using Outlook Web Access or Outlook 2010. All tablets are registered on the Microsoft Exchange server as mobile devices. 

A user informs you that he has lost his tablet. The user is able to connect to the company network from his home computer. 

You need to delete Microsoft Exchange information from the lost tablet. 

Which application should you use? 

A. Outlook 2010 

B. Outlook Web Access 

C. Active Directory Users and Computers 

D. Routing and Remote Access Server 

Answer:


Q119. A company has Windows 8.1 client computers. 

One computer named Computer1 will be used to centralize event logs from other client computers. You configure a Group Policy Object (GPO) that pushes event logs to Computer1. 

You need to configure Computer1 to receive the event logs. 

What should you do? 

A. Create a collector-initiated subscription. 

B. Run the New-EventLogcmdlet. 

C. Run the Get-EventLogcmdlet. 

D. Create a source-computer-initiated subscription. 

Answer:


Q120. You are the desktop administrator for your company, which uses Windows 8.1 computers. 

The company decides to use virtual disks at your location so the programmers can build and test applications in a closed network. 

You need to use the file given as a virtual hard disk and be able to boot to the vhd. 

What should you do? 

A. Copy the vhd file to the root of C;\ run bcdedit and add an entry to the boot options that includes the path to the vhd. 

B. Attach the vhd in computer management and add it to the Boot Menu. 

C. Copy the vhdfile to the root of C:\, open msconfig, and choose Safe Boot and Alternate Shell. 

D. Move the vhd file to a network share, map the network share, and allow a network boot. 

Answer: