[Free] 2018(June) Ensurepass Microsoft 70-689 Dumps with VCE and PDF 81-90

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 70-689
100% Free Download! 100% Pass Guaranteed!

Upgrading Your Skills to MCSA Windows 8.1

Question No: 81

You have a computer that runs Windows 8.1. You install a custom application by using an

.msi file that is located in your Documents library.

The computer begins to experience performance issues. You decide to reinstall the custom application. When you run the .msi file, you receive an error message about a corrupted file.

You need to ensure that you can reinstall the application. What should you do?

  1. Run the replace command, specify the application#39;s .msi file as the source, and then specify the application#39;s original installation directory as the destination.

  2. Run the msiexec /f command and specify the application#39;s .msi file.

  3. Use File History to revert the application#39;s .msi file to a previous version.

  4. Run the reset /f command and specify the application#39;s .msi file.

Answer: C Explanation:

msiexec /f ..but the msi file is located in the Documents library… easier to use File History??

Question No: 82 HOTSPOT

You have 10 Windows 8.1 Pro client computers. The Storage Spaces settings of the computers are configured as shown in the following exhibit. (Click the Exhibit button.)

Ensurepass 2018 PDF and VCE

To answer, complete each statement according to the information presented in the exhibit. Each correct selection is worth one point.

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Question No: 83

You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory.

A user reports that he has forgotten the BitLocker encryption password for volume E on his computer.

You need to provide the user a BitLocker recovery key to unlock the protected volume.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Ask the user to run the manage-bde -unlock E: -pw command.

  2. Ask the user for a recovery key ID for the protected volume.

  3. Ask the user for his computer name.

  4. Ask the user for his logon name.

Answer: C,D Explanation:

You can use the name of the user’s computer to locate the recovery password in AD DS. If the user doesnot know the name of the computer, ask the user to read the first word of the Drive Label in the BitLocker Drive Encryption Password Entryuser interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.

Verify the user’s identity

You should verify that the person that is asking for the recovery password is truly the authorized user of that computer. Another option is to verify that the computer with the name the user provided belongs to the user.


Question No: 84

You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker.

You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files.

You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained.

What should you do?

  1. Restore computer from the latest restore point.

  2. Select Reset your PC.

  3. Modify setting in Change default settings for media or devices.

  4. Delete the HKEY_CLASSES_ROOT\exefile\shell\open\command registry key.

Answer: A

Question No: 85

You are an administrator for a large company that has an Active Directory domain. Your company has tablets that run Windows RT.

Users report that their tablets get locked after one minute of inactivity. They also report that when they change the Personalization setting to 15 minutes, it resets back to 1 minute.

You need to ensure that the lockout time for inactivity is set to 15 minutes. What should you do?

  1. Modify ActiveSync configuration.

  2. Log on to the tablets as a local administrator and run the PowerShell cmdlet Set- ScreenSaverTimeout -Seconds 900.

  3. Log on to the tablets as a local administrator and configure the Screensaver wait time and logon options.

  4. Modify Group Policy.

  5. Configure the local system policy Do not display the lock screen setting to Enabled.

Answer: A Explanation:

Because it is Windows RT, option ‘C’ is the most logical answer as ActiveSync would beused to manage the device.

Run ActiveSync cmdlet -MaxInactivityTimeDeviceLock: ****15 min or other time here****** It keeps changing because the activesync is overriding the personalization settings.

Therefore, if you change the activesync to 15 min, it will override the inactivity lockout time to 15min. You can set a local group policy but chances are the activesync will override that also. There may be registry setting you can change but that isn’t an option to choose. SO it’s modify activesync config

Question No: 86 DRAG DROP

A computer currently runs a 64-bit version of Windows 7 Enterprise.

You need to deploy a 64-bit version of Windows 8 Pro to the computer. The new deployment must not affect the Windows 7 installation on the computer.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Select and Place:

Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


Ensurepass 2018 PDF and VCE


http://lifehacker.com/5840387/how-to-dual boot-windows-7-and-windows-8-side-by-side

Question No: 87

You administer desktop computers on your company network.

You want to deploy a WIM file of Windows 8 Enterprise to 15 desktop computers that have a third-party iSCSI adapter installed. The hardware vendor provided a device driver to support this adapter.

You need to update the image to ensure that the device driver is installed when you deploy the image.

What should you do?

  1. Download and run the imagex.exe tool and specify the /remount parameter.

  2. Run the dism.exe tool and specify the /append-image parameter.

  3. Download and run the drvload.exe tool and specify the path to the driver .inf file.

  4. Run the dism.exe tool and specify the /add-driver parameter.

Answer: D Explanation:

The driver servicing commands can be used on an offline image to add and remove drivers

based on the INF file, and on a running operating system (online) toenumerate drivers. http://technet.microsoft.com/en-us/library/dd799258(v=ws.10).aspx

Question No: 88

You install Windows 8 on a desktop computer. You create a system image and then install third-party desktop apps and create personal data. You disable the creation of restore points. The computer is not running optimally. You need to remove the third-party applications and preserve files that are stored in your Documents folder. You start the computer from a system repair disk.

Which troubleshooting option should you use?

  1. Refresh your PC without affecting your files

  2. System Restore

  3. Remove everything and install Windows

  4. System Image Recovery

Answer: A Explanation:

Basically the Refresh feature allows you to refresh your Windows 8 installation back to a vanilla, brand new install while preserving all your personal files. Windows 8 also includes a Reset feature which is similar however resetting your install deletes all personal files so don#39;t select this unless you want a full system wipe.

This is what happens:

Your files and personalization settings won’t change. Your PC settings will be changed back to their defaults. Metro-style apps from the Windows store will be retained.


Question No: 89

You support laptops that run Windows 8 Pro and are part of a workgroup.

An employee is unable to start Windows Mobility Center on his laptop.

You need to make it possible for the employee to use Windows Mobility Center on the laptop.

What should you do?

  1. Use Add features to Windows 8 to add Windows Mobility Center.

  2. Use Turn Windows features on or off in Programs and Features to enable Windows Mobility Center.

  3. Use Programs and Features to repair the installation of Windows Mobility Center.

  4. Use Local Group Policy Editor to set Turn off Windows Mobility Center to Not Configured.

Answer: D Explanation:

Original answer ‘A’ however, I reviewed in lab and could not find Windows Mobility Center within Windows Features options.

User Configuration gt; Administrative Templates gt; Windows Components and Windows Mobility Center If you Enable the Turn off Windows Mobility Center setting, the user is unable to invoke Windows Mobility Center. The Windows Mobility Center UI is removed from all shell entry points and the .exe file does not launch it.

If you do not configure this policy setting, Windows Mobility Center is on by default. http://www.sevenforums.com/tutorials/88151-windows-mobility-center-enable-disable.html

Question No: 90

Your company has a main office and a branch office. All servers are located in the main office. The branch office contains 20 client computers that are the members of a workgroup.

You need to configure the client computers to use BranchCache. The solution must minimize the amount of traffic between the offices.

Which Windows PowerShell cmdlet should you run?

  1. Enable-BCLocal

  2. Enable-BCHostedClient

  3. Enable-BCHostedServer

  4. Enable-BCDistributed

Answer: D Explanation: Not sure.

Enable-BCLocal: Sets up this client as a standalone BranchCache client; that is it will look in its own local cache for content which matches the hashes indicated by the server.

Enable-BCDistributed: Sets up this client to broadcast out to the local network looking for other potential Distributed BranchCache clients.

Enable-BCHostedClient: Sets up this client to look at a particular static server nominated to host the

BranchCache cache. Required. Configures the BranchCache service to operate in one of the following modes. DISABLED disables the BranchCache service. LOCAL uses caching on the local computer only. DISTRIBUTED enables distributed cache mode, allowing authorized client computers in branch offices to download and republish content.

HOSTEDSERVER configures the local computer as a hosted cache server. HOSTEDCLIENT configures the local computer as a hosted cache client.

While you can use a local cache, the real benefits come from distributed and hosted mode, where the browsing actions of a single employee can benefit the whole office. For instance if Employee A and Employee B are sitting in the same office and both browse to the same site then most of the content for Employee B will be retrieved direct from Employee A’s laptop rather than re-downloading from the server. That’s really powerful particularly where there are bandwidth constraints in the office and common sites that are used by all employees. But it requires that the web server serving the content participates in the Branchcache protocol by installing the BranchCache feature.w

100% Ensurepass Free Download!
Download Free Demo:70-689 Demo PDF
100% Ensurepass Free Guaranteed!
70-689 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No
Tagged , , , , , , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *