New Updated Microsoft 70-689 Practice Tests Questuions Offered By Braindump2go Guarantee You A 100% Full Success (111-120)

2015 Latest released Microsoft Official 70-689 Practice Exam Question Free Download From Braindump2go Now! All New Updated 299 Questions And Answers are Real Questions from Microsoft Exam Center!

Vendor: Microsoft
Exam Code: 70-689
Exam Name: Microsoft Upgrading Your Skills to MCSA Windows 8.1

QUESTION 111
You administer Windows 8 Enterprise client computers in your company network.
You change settings on a reference computer by using the Windows Firewall with Advanced Security tool.
You want to apply the same settings to other computers.
You need to save the windows Firewall with Advanced Security configuration settings from the reference computer.
You also need to be able to import the configuration settings into a Group Policy object later.
What should you do?

A.    Open Local Group Policy Editor, select the Local Policies node, and then select the Export
List action.
B.    Open Local Group Policy Editor, select the Security Settings node, and then select the
Export List action.
C.    Run the netsh advfirewall export c:\settings.wfw command.
D.    Run the netsh advfirewall export c:\settings.xml command.

Answer: C
Explanation:
– Netsh advfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows Firewall and IPsec settings and provides an alternative to console-based management.
– Export subcommand Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer.
Syntax export [ Path ]
FileName
Parameters [ Path ] FileName Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configuration will be written. If the path, file name, or both contain spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name extension is .wfw.
Example In the following example, the command exports the complete Windows Firewall with Advanced Security service configuration to the file C:\temp\wfas.wfw. export c:\temp\wfas.wfw
Reference: Netsh Commands for Windows Firewall with Advanced Security

QUESTION 112
An organization has client computers that run Windows 7.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You capture user settings and data files to a network share, and then perform a clean installation of Windows 8 on the client computers.
You need to apply the user profiles from the Windows 7 installation to the Windows 8 installation.
What should you do?

A.    Run the Ioadstate command.
B.    Copy the Default Profile to a folder on drive C.
C.    Run the scanstate command.
D.    Run Windows Easy Transfer and select the user profile to migrate.
E.    Run the ImageX command

Answer: A

QUESTION 113
An organization has client computers that run Windows 7.
You upgrade the client computers to Windows 8 without migrating the local user profiles.
You install the Windows Assessment and Deployment Kit (ADK) in the environment.
You need to migrate the user profiles from the Windows 7 installation to the Windows 8 installation.
What should you do first on each client computer?

A.    Run the scanstate command.
B.    Run Windows Easy Transfer and select the user profile to migrate
C.    Run the Ioadstate command.
D.    Copy the Default Profile to a folder on drive C.
E.    Run the ImaqeX command.

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/hh825093.aspx
The ScanState command is used with the User State Migration Tool (USMT) 5.0 to scan the source computer, collect the files and settings, and create a store.

QUESTION 114
A company has an Active Directory Domain Services (AD DS) domain.
All client computers run Windows 7.
You plan to upgrade the client computers to Windows 8 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)

A.    Use the Windows 8 online upgrade tool.
B.    Use Group Policy to assign the Windows 8 installation file to the client computers.
C.    Use the Microsoft Deployment Toolkit.
D.    Extract the contents of the Windows 8 .iso image file to a new shared folder and run the
setup program from that folder.

Answer: CD

QUESTION 115
A company has 50 client computers that run Windows 8.
Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks.
A new company security policy includes the following requirements:
– Visitors can access only kiosk computers.
– Employees can access and shut down only internal computers.
– Only administrators can access all computers remotely.
– Only administrators can shut down kiosk computers.
You need to assign security groups to local security policies to meet the requirements.
What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)


Answer:

QUESTION 116
A company has an Active Directory Domain Services (AD DS) domain.
All client computers run Windows 8.
Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain.
Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
– Ensure that COMPUTER2 can run remote commands on COMPUTER1.
– Test the solution by successfully running a command from COMPUTER2 that executes on COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.
Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 117
A company has a main office located in Miami, and brach offices in Boston, Los Angeles and Portland.
The Office Networks are configured as described in the following table.

A management computer in the main office, named COMPUTER1, runs windows 8 and several third-party management applications.
– Ensure that only users in the Boston office can connect to COMPUTER1 by using http.
– Ensure that only users in the Los Angeles office can connect COMPUTER1 by using https
– Ensure that only users in th Portland office can connect to COMPUTER1 by using FTP.
You are configuring access to COMPUTER1.
How should you configure windows firewall? (To answer, drag the appropriate elements to the correct location or locations in the answer area. Elements may be used once, more than once, or not at all. You ma need to drag the split bar between panes or scroll.)

Answer:

Explanation:
Seems to be TCP on every answer.
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers

QUESTION 118
A computer currently runs a 32-bit version of Windows 7 Ultimate.
You need to deploy a 64-bit version of Windows 8 to the computer.
The new deployment must be the only version of Windows on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 119
Ten client computers run Windows Vista and a custom application.
The custom application is compatible with Windows 8.
You purchase 10 new computers that have Windows 8 pre-installed.
You plan to migrate user settings and data from the Windows Vista computers to the Windows 8 computers.
You install the User State Migration Toolkit (USMT) on a USB flash drive.
You need to ensure that the custom application settings are applied to the Windows 8 computers after the migration is complete.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 120
A computer currently runs a 64-bit version of Windows 7 Enterprise.
You need to deploy a 64-bit version of Windows 8 Pro to the computer.
The new deployment must not affect the Windows 7 installation on the computer.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

Explanation:
http://lifehacker.com/5840387/how-to-dual+boot-windows-7-and-windows-8-side-by-side


Braindump2go Offers PDF & VCE Dumps Download for New Released Microsoft 70-689 Exam! 100% Exam Success Guaranteed OR Full Money Back Instantly!

http://www.braindump2go.com/70-689.html