Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 111-120




A company has client computers that run Windows 8.1.


Users can run applications that have been downloaded from the Internet only with administrator approval.


You need to ensure that users can run downloaded applications without administrator approval.


What should you do?



Set the Internet zone privacy level to Low.


Set the Internet zone security level to Medium.


Set the User Account Control (UAC) settings to Never notify.


Turn off Windows SmartScreen.


Answer: D

Explanation: smartscreen-filter-in-windows-8/



Further Information:


The Privacy Level has no relation to running downloaded applications:




The Security Level is no much help either:




And the UAC does not distinguish if an application is downloaded or not. For more details about UAC levels see this article:

How to Change User Account Control (UAC) Settings in Windows 8 and 8.1






You are configuring two client computers that run Windows 8.1: A desktop computer named COMPUTER1 and a portable computer named COMPUTER2.


You have the following requirements:


Store all personal data in a folder named Data on COMPUTER1.

Ensure that you can access all personal data from COMPUTER2, even when a network connection is unavailable.

Synchronize personal data between the computers twice a day.


You need to configure the computers to meet the requirements.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



In Sync Center. configure a schedule for offline files.


From COMPUTER1, connect to COMPUTER2 and configure the Data folder to always

be available offline.


From COMPUTER2, map a network driver to the Data folder on COMPUTER1.


In Sync Center, set up a new sync partnership.


From COMPUTER2, connect to COMPUTER1 and configure the Data folder to always be available offline


Answer: AD


A: A sync partnership is a set of rules that tells Sync Center how and when to sync files or other information between two or more locations. A sync partnership typically controls how files sync between your computer and mobile devices, network servers, or compatible programs.


D: To make files and folders available offline


To be able to work with a file offline, you first need to make it available offline.


Locate the network file or folder that you want to make available offline.


Right-click the file or folder, and then click Always Available Offline.


The Always Available Offline command

The next time you try to access this file or folder, you will be able to open it even if the network version is unavailable.


Reference: Working with network files when you are offline


Offline files and the Sync Center work pretty much the same in Windows 8 as they do in Windows 7. files


Use Network Files While Offline with Sync Center & Offline Files


How to Sync Offline Files & Network Folders on a Set Schedule


You can choose to schedule the sync at a specific time or when an event occurs.


If you select the first option – “At a scheduled time”, you can set the exact day and time when the sync begins and how often it is repeated.


If you select the second option – “When an event occurs”, you can set the events when the sync is performed.




A company has client computers that run Windows 8.1. You set up new virtual private network (VPN) connections on all client computers. The VPN connections require the use of a smart card for authentication.


Users are unable to connect to the corporate network by using the VPN connections. The connection properties are configured as shown in the exhibit. (Click the Exhibit button.)




You need to ensure that the client computers can connect to the corporate network.


What should you do?



Enable Challenge Handshake Authentication Protocol (CHAP).


Change the VPN type to IKEv2.


In the advanced settings, select Use preshared key for authentication.


Change the authentication setting to Use Extensible Authentication Protocol (EAP).


Answer: D



Configuring a VPN to Use Extensible Authentication Protocol (EAP)


EAP can be used to provide an added layer of security to VPN technologies such as Point- to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). EAP enables this functionality through Certificate Authority (CA) and SmartCard technologies, which provide mutual authentication of the client and the server.

Smart cards and remote access VPN connections


The use of smart cards for user authentication is the strongest form of authentication in the Windows Server 2003 family. For remote access VPN connections, you must use Extensible Authentication Protocol (EAP) with the Smart card or other certificate (TLS) EAP type, also known as EAP-Transport Level Security (EAP-TLS).





A company has a main office located in Miami, and branch offices in Boston, Los Angeles, and Portland. The office networks are configured as described in the following table.




A management computer in the main office, named COMPUTER1, runs Windows 8.1 and several third-party management applications.


You are configuring access to COMPUTER1. You have the following requirements:


Ensure that only users in the Boston office can connect to COMPUTER1 by using HTTP.

Ensure that only users in the Los Angeles office can connect to COMPUTER1 by using HTTPS.

Ensure that only users in the Portland office can connect to COMPUTER1 by using FTP.


You need to configure access to COMPUTER1.


How should you configure Windows Firewall? (To answer, drag the appropriate elements to the correct location or locations in the answer area. Elements may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)













A company plans to upgrade its client computer operating systems from Windows 7 to Windows 8.1.


You need to use the User State Migration Tool (USMT) to configure the migration profile to exclude all files in the users’ Documents folders.


Which command should you run on the client computers before the upgrade? (To answer, drag the appropriate command elements to the correct location or locations in the answer area. Each command may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)









You administer Windows 8.1 computers in your company network. All computers include Windows 8.1 compatible Trusted Platform Module (TPM).


You configure a computer that will run a credit card processing application.


You need to ensure that the computer requires a user to enter a PIN code when starting the computer.


Which policy should you configure? (To answer, select the appropriate policy in the answer area.)











A company has client computers that run Windows 8.1. Finance department employees store files in the C:\Finance directory. File History is on.


A Finance department employee attempts to restore a file to a previous version by using File History. The file is not available to restore.


You need to establish why the file history is not available and ensure that it is available in the future.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



Change the File History drive.


Review the File History backup log.


Move the file into a library.


Start the Volume Shadow Copy Service.


Answer: BC


B: Configuring Advanced Settings of Windows 8.1 File History To set some more detailed options, or to clean up File History, click Advanced settings. The Event logs section includes the Open File History event logs to view recent events or errors command that opens File History backup log in Applications and Services Logs section of Event Viewer.



* File History automatically backs up files that are in your libraries, contacts, favorites, Microsoft SkyDrive and on your desktop.

* Do not expect File History to cover all your folders or whole drives – it backs up all your default and custom Libraries (including Public Folders), plus Contacts, Desktop and Favorites folders. Your only way to include other folders is to create your own custom Libraries.

A New Way to Backup: File History in Windows 8


File History only backs up data in libraries, favorites, desktop, and contacts and must use a non-system drive for backup.

Since File History is already on we can assume the drive doesn’t need to be changed. So we should review the log and move the file to a library.







A company has client computers that run Windows 8.1. File History is on.


An employee downloads data to a folder on drive D named Archives.


You need to ensure that the user can restore files from the Archives folder by using File History.


What should you do?



Create a library named History and add the Archives folder to the library.


Start the Windows Backup service.


Turn on the Volume Shadow Copy Service.


Start the Block Level Backup Engine service.


Answer: A


What is File History?


File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

A New Way to Backup: File History in Windows 8


File History is a new feature in Windows 8 that helps to ensure that your personal files are safe. In addition to being a backup solution, File History also provides the capability to restore multiple backup copies (versions) of your files. File history in Windows 8 is easy to setup, powerful, and reliable. This means you can have more confidence when working with files, and also keep less redundant copies around for your own personal “data history”. You can easily configure File History to protect some or all of the files that are in your libraries on Windows 8. You can add folders to your libraries easily in Windows 8, giving you the ability to use File History with any group of folders and files that you choose.










You administer Windows 8.1 client computers in you company network.


You deploy an application that requires a specific Windows update to be installed on the computers.


You need to verify that the update is installed on specific computers.


What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two)



Run The system update readiness tool


Open View updates history


Open the Check for updates applet


Run the DISM command with the /image and /get-packageinfoswiches


Run the DISM command with the /online and /get-packageinfoswiches


Answer: BE



Windows 7: Windows Update – View Update History Details






Deployment Image Servicing and Management Command-Line Options



Specifies that the action is to be taken on the operating system that is currently running. This option cannot be used with the /Image or the /WinDir option. When /Online is used the Windows directory for the online image is automatically detected.



This is the full path to the root directory of the offline Windows image that you will service. If the directory named Windows is not a subdirectory of the root directory, /WinDir must be specified.

This option cannot be used with /Online.

DISM Operating System Package Servicing Command-Line Options

/Get-PackageInfo {/PackageName:< name_in_image> | /PackagePath:< path_to_cabfile>} Displays detailed information about a package provided as a .cab file. Only .cab files can be specified. You cannot use this command to obtain package information for .msu files. /PackagePath can point to either a .cab file or a folder. You can use the /Get-Packages option to find the name of the package in the image, or you can specify the path to the .cab file. The path to the .cab file should point to the original source of the package, not to where the file is installed on the offline image.


Further Information: maintenance.aspx

Windows 8: Updates and Maintenance

What is the System Update Readiness Tool?


The System Update Readiness Tool can help fix problems that might prevent Windows updates and service packs from installing. For example, an update might not install if a damaged system file prevents the update from recognizing the version of Windows that’s running on your computer.




You administer Windows 8.1 Pro computers in your company network.


A user named User1 encrypts a sensitive file named file.txt by using Encrypting file systems (EFS) A user named User2 must be able to read file.txt.


You need to configure unencrypted read access to file.txt for User2


What should you do?



Configure Advanced Attributes


Configure Effective Access


Configure Advanced Security Settings


Share the folder that contains file.txt.


Answer: A





Further Information: efs/

How to Encrypt Files and Folders in Windows 8.1 Pro Using EFS


If you are concerned about other users of your system having access to your files, there has been a simple way to encrypt files and folders in every version of Windows since XP called Encrypted File Service (EFS). We will show you how to apply EFS to your files and folders.


NOTE: Files and folders you encrypt using EFS can only be decrypted using the Windows login that encrypted the file. Other users on the system will be able to see the files but will not be able to open them, even if they are running as administrator. That means that you also need to be careful you do not forget your login, or you will be locked out of your own files.



How to Share Files Using Encrypting File System


This article describes how to share files using EFS, and is intended to assist system architects and administrators in developing best practices for creating data recovery and data protection strategies using Windows XP.


In Windows XP, EFS supports file sharing between multiple users on a single file. This provides an opportunity for data recovery by adding additional users to an encrypted file. Although the use of additional users cannot be enforced through policy or other means, it is a useful and easy method for enabling recovery of encrypted files by multiple users without actually using groups, and without sharing private keys between users.


Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users (not groups) from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.

To add users


1. Click the Add button as shown in Figure 2 below.




Figure 2. Adding users

A new dialog box will be presented showing the existing users and certificates that are cached in the “Other People” certificate store of the local machine. It will also allow new users to be added from the Active Directory by clicking the Find User button.


Note A user must have a valid EFS certificate in the Active Directory to be added.


2. Click the Find User button to find new users as shown in Figure 3 below.




Figure 3. Finding new users from Active Directory

The standard object picker dialog box will be displayed and a search will be conducted.


Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…