Download New Updated (Spring 2015) Microsoft 70-687 Actual Tests 141-150




Employees are permitted to bring personally owned portable computers that run Windows 8.1 to the office. They are permitted to install corporate applications by using the management infrastructure agent and access corporate email by using Windows Mail.


An employee’s personally owned portable computer is stolen.


You need to protect the corporate applications and email messages on the computer.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



Prevent the computer from connecting to the corporate wireless network.


Disconnect the computer from the management infrastructure.


Change the user’s password.


Initiate a remote wipe.


Answer: CD


Win8: Security: Device wipe and device lock behavior across operating system versions and devices


Device wipe (also known as “remote wipe”) is an Exchange ActiveSync (EAS) directive in which a user or administrator triggers a wipe of a device. Specifically, a user goes to Outlook Web App and then triggers the device wipe behavior, or a Microsoft Exchange administrator invokes device wipe.


Remote device wipe may be triggered when a standard user account uses OWA or when


an administrator uses the Exchange administrator tools. The following screen shot shows the device wipe UI in Outlook Web App for a Windows Mobile phone. The UI is triggered by clicking the “device wipe” button (highlighted in red).




The following table shows the behavior of a mail app when the app receives a device wipe directive from a server.



Doing an ActiveSync Remote Wipe of a Windows 8 or Windows RT Device


Q: If an ActiveSync Remote Wipe is initiated against a Windows 8 or Windows RT device via the built-in Mail application, what’s deleted?


A: A Remote Wipe is the process where a device is selected from a central Microsoft Exchange or management console and chosen to be wiped, for example if the device has


been lost by the owner. The Remote Wipe command is then sent to the device via ActiveSync.


For a device such as a Windows Phone, all data is deleted, including email, contacts, calendar for all accounts and other data on the device such as documents and picture.


However, when ActiveSync Remote Wipe is performed against a Windows 8 or Windows RT device, the scope of the wipe is more limited. Only the email, contacts, and calendar for information stored in the built-in Mail applicationare deleted. Other data on the system is not deleted, including information from the Microsoft Office Outlook client.





A company has lab computers that run Windows 8.1. On all lab computers, Internet Explorer has the Display intranet sites in Compatibility View option enabled and the Download updated compatibility lists from Microsoft option disabled. All lab computers access only internal corporate websites.


A corporate website was designed for a previous version of Internet Explorer. When viewed on the lab computers, menus and images on the website are displayed out of place.


You need to ensure that all corporate websites display correctly on the lab computers.


What should you do?



Enable the Display all websites in Compatibility View option.


Manually add the corporate website to the compatibility view settings.


Manually download an updated compatibility list from Microsoft.


Disable the Display intranet sites in Compatibility View option.


Answer: B


Fix site display problems with Compatibility View

Sometimes websites don’t look like you expect them to-images might not appear, menus might be out of place, and text could be jumbled together. This might be caused by a compatibility problem between Internet Explorer and the site you’re on. Sometimes this can be fixed by adding the site to your Compatibility View list.




You administer Windows 8.1 Pro computers in your company network. The computers are configured to allow remote connections. You attempt to create a Remote Desktop Connection to a computer named Computer1. You receive the following message:


”Remote Desktop can’t connect to the remote computer.”


You are able to ping Computer1. You discover that Remote Desktop Firewall rules are not present on Computer1.


You need to connect to Computer1 by using Remote Desktop.


Which PowerShell commands should you run on Computer1?



New-NetFirewallRule -DisplayNameRdpTCPin -localPort 3389 -Protocol TCP


Set-NetFirewallRule -Name RemoteSvcAdmin-In-TCP -Enabled True


New-NetFirewallRule -DisplayNameRdpTCPout -localPort 3389 -Protocol TCP – Direction Out -Action Allow


Set-NetFirewallRule -Name RemoteFwAdmin-In-TCP -Enabled True


Answer: A




Creates a new inbound or outbound firewall rule and adds the rule to the target computer.



New-NetFirewallRule -DisplayName <String> [-Action <Action> ] [-AsJob] [-Authentication <Authentication> ] [-CimSession <CimSession[]> ] [-Description <String> ] [-Direction <Direction> ] [-DynamicTarget <DynamicTransport> ] [-EdgeTraversalPolicy <EdgeTraversal> ] [-Enabled <Enabled> ] [-Encryption <Encryption> ] [-GPOSession <String> ] [-Group <String> ] [-IcmpType <String[]> ] [-InterfaceAlias <WildcardPattern[]> ] [-InterfaceType <InterfaceType> ] [-LocalAddress <String[]> ] [-LocalOnlyMapping <Boolean> ] [-LocalPort <String[]> ] [-LocalUser <String> ] [-LooseSourceMapping <Boolean> ] [-Name <String> ] [-OverrideBlockRules <Boolean> ] [-Owner <String> ] [- Package <String> ] [-Platform <String[]> ] [-PolicyStore <String> ] [-Profile <Profile> ] [-


Program <String> ] [-Protocol <String> ] [-RemoteAddress <String[]> ] [-RemoteMachine <String> ] [-RemotePort <String[]> ] [-RemoteUser <String> ] [-Service <String> ] [- ThrottleLimit <Int32> ] [-Confirm] [-WhatIf] [ <CommonParameters>]


The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.

Remote Desktop Protocol


By default, the server listens on TCP port 3389 and UDP port 3389.




A client computer runs Windows 8.1 and has a 1 TB hard disk drive. You install several third-party desktop apps on the computer. The hard disk drive has very little available space.


After you install an app update, the computer becomes unresponsive.


You have the following requirements:


Return the computer and applications to an operational state.

Free additional hard disk space.


You need to meet the requirements by using the least amount of administrative effort.


Which two actions should you perform? (Each correct answer presents part of the solution.

Choose two.)



Run the Remove everything and install Windows feature.


Configure the maximum disk space usage for System Restore to 1%.


Configure the maximum disk space usage for System Restore to 5%.


Run the Refresh your PC without affecting your files feature.


Perform a system restore on the client computer.


Answer: BE


The default value for System Restore is 5%. In order to free up some space, we need to lower it, in this case to 1%.



How to refresh, reset, or restore your PC


If you’re having problems with your PC, you can try to refresh, reset, or restore it. Refreshing your PC reinstalls Windows and keeps your personal files and settings. It also keeps the apps that came with your PC and the apps you installed from the Windows Store. Resetting your PC reinstalls Windows but deletes your files, settings, and apps — except for the apps that came with your PC. Restoring your PC is a way to undo recent system changes you’ve made.




A company has a client computer that runs Windows 8.1 with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.


When you start the computer, it starts in the Windows Recovery Environment (Windows RE).


You need to ensure that the computer starts normally.


What should you do?



Install a Trusted Platform Module (TPM) chip.


Start the computer in Safe Mode. Then update the adapter drivers.


Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).


Create a self-signed certificate. Associate the certificate with the third-party adapter.


Answer: C

Explanation: Secure Boot Overview


Secure Boot is a security standard developed by members of the PC industry to help make sure that your PC boots using only software that is trusted by the PC manufacturer.


When the PC starts, the firmware checks the signature of each piece of boot software, including firmware drivers (Option ROMs) and the operating system. If the signatures are good, the PC boots, and the firmware gives control to the operating system.


Frequently asked questions:


Q: What happens if my new hardware isn’t trusted?

A: Your PC may not be able to boot. There are two kinds of problems that can occur:

The firmware may not trust the operating system, option ROM, driver, or app because it is not trusted by the Secure Boot database.

Some hardware requires kernel-mode drivers that must be signed.

Note: many older 32-bit (x86) drivers are not signed, because kernel-mode driver signing is a recent requirement for Secure Boot.


Q: How can I add hardware or run software or operating systems that haven’t been trusted by my manufacturer?

A: You can check for software updates from Microsoft and/or the PC manufacturer. You can contact your manufacturer to request new hardware or software to be added to the Secure Boot database.

For most PCs, you can disable Secure Boot through the PC’s BIOS.


Q: How do I edit my PC’s Secure Boot database?

A: This can only be done by the PC manufacturer.




A company has an Active Directory Domain Services (AD DS) domain. The company has 100 client computers and tablets that run Windows 8.1. Each user has a unique local user account on each device he or she uses.


The company wants to simplify the logon process for atl users.


You have the following requirements:


Reduce the number of unique user accounts for each user.

Unify the initial Windows 8.1 theme across all Windows 8.1 devices.

Ensure that Windows Store apps maintain the last used state across all Windows 8.1 devices.


You need to configure an authentication method that meets the requirements.


Which authentication method should you configure?





Microsoft account


Active Directory user account


Picture password


Answer: B


How to Synchronize Account Data and More with Windows 8 and 8.1


While Windows 8 has a lot of cool features to entice users, arguable the coolest is Account sync. For those who choose to log in to their Windows 8 devices with a Microsoft account, Windows 8 can synchronize a ton of information from one device to the next. You can choose to sync everything from basic settings to themes and wallpapers. Windows 8.1 users can even sync modern applications between accounts.

Connect your Microsoft account to your domain account


You can connect your Microsoft account to your domain account and sync your settings and preferences between them. For example, if you use a domain account in the workplace, you can connect your Microsoft account to it and see the same desktop background, app settings, browser history and favorites, and other Microsoft account settings that you see on your home PC. You’ll also be able to use Microsoft account services from your domain PC without signing in to them individually.




You administer Windows 7 client computers in your company network. The computers are members of an Active Directory Domain Services (AD DS) domain and have 16-bit applications installed.


You plan to upgrade all of the computers from Windows 7 to Windows 8.1.


You need to ensure that the 16-bit applications will continue to run on Windows 8.1.


What are two version of Windows 8.1 that you could use to achieve this goal? (Each correct answer presents a complete of the solution. Choose two.)



Windows 8.1 Pro (64-bit)


Windows 8.1 Enterprise (64-bit)


Windows 8.1 Pro (32-bit)


Windows RT


Windows 8.1 Enterprise (32-bit)


Answer: CE


Microsoft: Windows 8 32-bit can still run 16-bit apps


In response to a comment from a user, Microsoft has revealed in a new post on the Building Windows 8 Twitter page that people interested in running much older software can still do so on the 32-bit version of Windows 8. Microsoft states: ” … you can run 16 bit apps on 32 bit Windows 8. 64 bit doesn’t include the subsystem at all for a variety of reasons.”





You use a computer that has Windows 8.1 Pro installed.


Your personal files are stored in a storage pool that is distributed across multiple USB drives.


You need to configure a daily backup solution that meets the following requirements:


Automatically backs up all of your personal files that are located in the storage pool.

Automatically backs up operating system files.

Ensures that you can restore any file.


What should you do?



Create a recovery drive.


Turn on File History.


Configure Windows 7 File Recovery.


Configure system protection.


Answer: C



Storage Spaces: FAQ


What is Storage Spaces?

Storage Spaces lets you group drives together in a storage pool. Then you can use pool capacity to create storage spaces.

Storage spaces are virtual drives that appear in File Explorer. You can use them like any other drive, so it’s easy to work with files on them. You can create large storage spaces and add more drives to them when you run low on pool capacity.

If you have two or more drives in the storage pool, you can create storage spaces that won’t be affected by a drive failure–or even the failure of two drives, if you create a three- way mirror storage space.

Backup and Recovery of Windows 8 & Windows 8.1 – Tip-of-the-Day


Update for Windows 8.1: Note that System Image Backup in Windows 8.1 has been moved to the lower left corner of the File History tool in Control Panel as shown below.




In addition, the Windows 7 File Recovery tool in Control Panel has been renamed to the Recovery tool in Windows 8.1.


Launching Windows System Backup

Windows System Backup is still included in Windows 8! To launch the Windows Backup tool, open the Control Panel -> Windows 7 File Recovery applet and click the “Set up Backup” button. Alternatively, you can launch “sdclt.exe” from the Command Prompt to start this applet.




All of the old familiar options are there! Using Windows Backup, you can backup a full system image or selected files & folders to an external drive or network location. You can also create a system repair disc for repairing and restoring the system in the event that you encounter any boot issues.


Further information:

System protection tab in Windows 8:



Windows Server Backup and Storage Pools


Backup and recovery process and storage pools

Windows Server Backup does not differentiate a storage pool from other storage. Therefore the presence of a storage pool (both in the online mode and offline Windows RE mode) and its storage space are handled by Windows Server Backup in the same way as normal disks and volumes. Windows Server Backup can be used for any backup or recovery operations either to or from storage pool disks.




A computer that runs Windows 8.1 is configured with a 2 TB storage pool. The storage pool currently shows 1 TB of available space.


You try to save 100 MB of files to the storage drive. An error message states that the drive is full.


You need to make an additional 1 TB of space available in the storage pool.


What should you do?



Connect a 1 TB drive to the computer and add the new drive to the storage pool.


Connect a 1 TB drive to the computer and assign a drive letter to the new drive.


Set the resiliency type of the storage pool to Parity.


Set the logical size of the storage pool to 2 TB.


Answer: A




You are troubleshooting a computer that runs Windows 8.1. The computer is not joined to a domain.


You are unable to change any of the advanced Internet options, which are shown in the Advanced Internet Options exhibit. (Click the Exhibit button.)




You need to ensure that you can change the advanced Internet options.


Which tool should you use?



Credential Manager


Authorization Manager


Group Policy Object Editor


Ease of Access Center


Answer: C


Open the Local Group Policy Editor


To open the Local Group Policy Editor from the command line Click Start , type gpedit.msc in the Start Search box, and then press ENTER .

Group Policies in Internet Explorer 9


Group Policy provides a secure way to control Microsoft® Windows® Internet Explorer® 9 configurations.


Free VCE & PDF File for Microsoft 70-687 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…