Configuring Windows 8
Question: 1 Your computer runs Windows 8 and is connected to an Active Directory Domain Services (AD DS) domain. You create a folder and share the folder with everyone in your organization. You need to modify the NTFS permissions of the folder to meet the following criteria: • Users from the Supervisors AD security group must be able to open files, but not modify them. • Users from the Marketing AD security group must be able to create, modify, and delete files. • Users from both groups must not be able to delete the folder. Which permissions should you set? A. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Modify permission and the Delete Subfolders and Files special permission. B. Assign the Supervisors group the Read and Write permissions. Assign the Marketing group the Full Control permission C. Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete special permission. D. Assign the Supervisors group the Read permission. Assign the Marketing group the Read and Write permissions and the Delete Subfolders and Files special permission.
Answer: D Explanation: Ref: http://technet.microsoft.com/en-us/library/cc771309
Question: 2 A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. A notification appears when domain users change Windows settings and when applications try to make changes to client computers. You need to ensure that a notification appears only when an application tries to make changes to the computer. What should you do? A. Configure the Notification Area Icons settings on the client computers. B. Configure the User Account Control (UAC) settings on the client computers. C. Create a Group Policy object (GPO) that disables the Run all administrators in Admin Approval Mode policy. D. Create a Group Policy object (GPO) that enables the Admin Approval Mode for the built-in Administrator account policy.
Answer: C Explanation: Ref: http://technet.microsoft.com/en-us/library/cc709691(v=WS.10).aspx
Question: 3 A company has 50 client computers that run Windows 8. Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks. A new company security policy includes the following requirements: • Unauthorized users can access only kiosk
computers. • Authorized users can access or shut down only internal computers. • Only administrators can access all computers remotely. • Only administrators can shut down kiosk computers. You need to assign security groups to local security policies to meet the requirements. What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Explanation: Ref: http://msmvps.com/blogs/ad/archive/2008/08/25/windows-server-2008-user-right-assignmentsdefined.aspx
Question: 4 A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 64bit version of Windows 8. The workgroup contains client computers that run a 32-bit version of Windows 8. Computers in the workgroup can't currently print to PRINTER1. You need to ensure that the workgroup computers can print to PRINTER1. Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange the correct order.)
Explanation: Ref: http://technet.microsoft.com/library/cc732946.aspx
Question: 5 A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8. A local printer is shared from a client computer. The client computer user is a member of the Sales AD security group. You need to ensure that members of the Sales security group can modify the order of documents in the print queue, but not delete the printer share. Which permission should you grant to the Sales group? A. Manage queue B. Manage spooler C. Manage this printer D. Manage documents E. Print
Answer: D Explanation: Ref: http://technet.microsoft.com/en-us/library/ee524015(v=ws.10)
Question: 6 A company has client computers that run Windows 8. The company implements the following security requirements: â€˘ All client computers must use two-factor authentication. â€˘ At least one authentication method must include more than four characters or gestures. You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.) A. picture password B. Microsoft account C. biometric authentication D. PIN
Answer: B, C
Explanation: Picture password is wrong because it can use less than 4 gestures (finger swipes on the picture). PIN is wrong because a PIN can be only 4 characters long. Explanation: Ref: http://technet.microsoft.com/en-us/library/hh831396
Question: 7 A desktop computer runs Windows 8. The computer is joined to an Active Directory Domain Services (AD DS) domain named contoso.com. You have two domain user accounts: â€˘ A primary account named User1 that does not have domain administrative privileges. â€˘ An account named Admin1 that has administrative privileges in the domain. You are currently logged in as User1. You need to run an application named appl.exe. You have the following requirements:
Explanation: Ref: http://technet.microsoft.com/en-us/library/bb490994
Question: 8 You install windows 8 on a desktop computer and install a third-party desktop app. The computer runs optimally until you install another third-party desktop app. You need to remove only the most recently installed third-party desktop app. You start the computer from a system repair disk. Which troubleshooting option should you use? A. System Image Recovery B. Reset your PC C. Refresh your PC D. System Restore
Answer: D Explanation: Ref: http://blogs.msdn.com/b/zxue/archive/2012/03/09/windows-8-how-to-29-restore-system-to-aprevious-state-using-restore-point.aspx
Question: 9 A company has a branch office with client computers that run Windows 8. Files are saved locally on the client computers and are not backed up regularly. You need to ensure that you can retrieve previous versions of locally saved files from each client computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Explanation: Ref: http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx
Question: 10 All client computers in a company's network environment run Windows 8. A client computer has two internal hard disk drives. The hard drives are configured as shown in the following table.
You are choosing a backup destination for drive C. You have the following requirements: • Ensure that the backup file is available if drive C fails. • Ensure that the backup file can be accessed by other computers on the network. • Support the backup of multiple system images. You need to select a backup destination that meets the requirements. Which destination should you select? A. shared network folder B. drive D C. multiple DVDs D. external hard drive
Answer: A Explanation: Ref: http://www.howtogeek.com/?post_type=postHYPERLINK "http://www.howtogeek.com/?post_type=post&p=4241"&HYPERLINK "http://www.howtogeek.com/?post_type=post&p=4241"p=4241
You will not find better practice material than testsexpert PDf questions with answers on the web because it provides real exams preparation environment. Our practice tests and PDF question, answers are developed by industry leading experts according to the real exam scenario. At the moment we provides only question with detailed answers at affordable cost. You will not find comparative material elsewhere on the web at this price. We offer Cisco, Microsoft, HP, IBM, Adobe, Comptia, Oracle exams training material and many more.
We also provide PDF Training Material for: 644-906 98-363 98-365 E20-895 E20-885 000-780 E10-001 70-246 000-575 3303
000-271 E20-326 70-243 00M-640 1Y0-A25 E20-918 70-323 9A0-156 648-247 000-332
648-238 E22-186 000-611 COG-701
70-247 000-N24 1Z0-895 000-N11 4A0-M02 312-92 201-01 00M-638 1Z0-520 70-667
000-574 70-599 LX0-101 9A0-092 642-241 9A0-182 00M-639 000-450 HP2-K24 000-N19 HP2-E46 HP0-M58 A00-270 000-575 642-785 HP2-B86 E20-515 HP2-B88 MB6-871 HP2-B94
We provide latest exams preparation material only. Contact US at: firstname.lastname@example.org Join Us at Twitter: www.twitter.com/testsexpert FaceBook: www.facebook.com/testsexpert