You support computers that run Windows 8. You are designing a remote access server (RAS). The firewall accepts incoming TCP connections only to ports 80 and 443. You want to connect to the RAS server from a laptop. You need to create a virtual private network (VPN) connection to the RAS server. Which VPN tunneling protocol should you use?
You administer a company network that includes a wireless network infrastructure and computers that run Windows 8 Enterprise. You are planning to add a guest wireless network. You need to collect information about nearby wireless networks, including their encryption methods. Which command should you include in the batch file?
A. Get-WmiObject win32_networkadapterconfiguration -Filter ‘ipenabled = “true”‘
B. PowerShell commandlet Get-Host
C. PowerShell commandlet Get-Netadapter with parameter -Wireless
D. netstat -a
E. netsh wlan show hostednetwork
F. netsh wlan show networks
You are a systems administrator of a small branch office. Computers in the office are joined to a Windows 8 HomeGroup. The HomeGroup includes one shared printer and several shared folders. You join a new computer to the HomeGroup and try to access the HomeGroup shared folders. You discover that the shared folders are unavailable, and you receive an error message that indicates the password is incorrect. You need to reconfigure the new computer in order to access the HomeGroup resources. What should you do?
A. Adjust the time settings on the new computer to match the time settings of the HomeGroup computers.
B. Reset your account password to match the HomeGroup password.
C. Disjoin all HomeGroup members and re-create the HomeGroup.
D. Change NTFS security permission on the shared folders.
Grant Everyone account Read & Execute permission.
Drag and Drop Questions
You have a computer that runs Windows 8. You have a 1-terabyte external hard drive. You purchase a second 1-terabyte external hard drive. You need to create a fault-tolerant volume that includes both external hard drives. You also need to ensure that additional external hard drives can be added to the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
To create a storage space, you’ll have to connect two or more additional drives to your computer you can’t use your system drive for this. The drives can be either internal or external drives. You can open the Storage Spaces configuration window from the Control Panel or by bringing up the Start screen with the Windows key, typing “Storage Spaces,” clicking the Settings category and selecting the Storage Spaces shortcut.
Select the drives you want to use for the storage space and click the “Create pool” button to continue. You’ll lose any files that are already on the drive ?copy any important files off the drives before pooling them. You can add additional drives later. The resiliency type controls how Windows handles your data. There are four options:
* None: Windows will store only a single copy of your . You’ll lose the data if one of your drives fails, but no space will be used on backups.
* Two-way mirror: Windows will store two copies of your data. If one of your drives fails, you won’t lose your data. This requires at least two drives.
* Three-way mirror: Windows will store three copies of your data. If one or two of your drives fails, you won’t lose your data. This requires at least three drives.
* Parity: Windows stores parity information with the data, protecting you from a single drive failure. Parity uses drive space more efficiently than mirroring, but file access times are slower. Parity is ideal for drives with large, infrequently updated files, such as video files. Reference: How to Use Windows 8s Storage Spaces to Mirror & Combine Drives
You administer computers that run Windows 8 Pro and are members of an Active Directory domain. The computers are encrypted with BitLocker and are configured to store BitLocker encryption passwords in Active Directory. A user reports that he has forgotten the BitLocker encryption password for volume E on his computer. You need to provide the user a BitLocker recovery key to unlock the protected volume. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Ask the user for his computer name.
B. Ask the user to run the manage-bde -unlock E: -pw command.
C. Ask the user for his logon name.
D. Ask the user for a recovery key ID for the protected volume.
You administer laptops that run Windows 8 Enterprise and are members of an Active Directory domain. Users travel frequently and access domain resources from inside client networks or from their home network. You want to manage the laptops when they are connected to the company network from the external networks. You need to ensure that the laptops can be managed and maintained while users are not logged on to the computers. Which of the following should you recommend?
A. Remote Assistance
B. Windows Remote Management (WinRM)
D. Remote Desktop
Drag and Drop Questions
You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members of the Active Directory domain named contoso.com. Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible from the Contoso network. The website requires SSL and mutual authentication. You need to configure the computers to allow contoso.com domain users to access the website without any warning prompts. You also need to use the fewest certificates possible. Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
* Fabrikam.com provided the resources. contoso.com be the trusted root authorities store
* No untrusted certificates
* Not allow access to local computer account (just to user account)
* user account access through client (user) certificate issued by Fabrikam
You support computers that run Windows 8 Pro and are members of an Active Directory domain. Several desktop computers are located in a subnet that is protected by a firewall. The firewall allows incoming TCP connections only to ports 80 and 443. You want to manage disk volumes on the desktop computers from your computer, which is located outside the protected subnet. You need to configure the network to support the required remote administration access. What should you do?
A. Enable Remote Desktop on the desktop computers.
B. Run the winrm quickconfig command on your computer.
C. Install Remote Server Administration Tools (RSAT) on your computer.
D. Run the winrm quickconfig command on the desktop computers.
Drag and Drop Questions
You administer a computer that runs Windows 8 Enterprise and is a member of an Active Directory domain. You create a folder named C:\Reports and assign NTFS permissions as shown in Exhibit 1. (Click the Exhibit button.)
You want to provide access to the shared folder only for the time that User1 is a member of the domain security group named Project. You need to assign the required permissions. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Share Folders From `Users Profile’ Locations & Local Drives If you want to quickly share a folder residing in local drives or User Profile folders, open Properties dialog from right-click context menu, and then head over to Sharing tab. From Network File and Folder Sharing section, click Share to open File Sharing dialog. Now, select Everyone from drop-down menu, and click Add.
This will add Everyone group in File Sharing list, and allow you to change folder access permission. Using Read pull-down menu, you can give read and write permissions to users, and remove Everyonegroup from the File Sharing list.
Once done, click Share to share the folder on the network. It will open a separate dialog, allowing you to email and copy the shared folder link.
Now, you can access the shared folder from any PC connected on the network.
You support desktop computers and tablets that run Windows 8 Enterprise. All of the computers are able to connect to your company network from the Internet by using DirectAccess. Your company wants to deploy a new application to the tablets. The deployment solution must meet the following requirements:
– The application is not accessible if a user is working offline.
– The application is stored on an internal solid-state drive (SSD) on the tablets.
– The application is isolated from other applications.
– The application uses the least amount of disk space.
You need to deploy the new application to the tablets. What should you do?
A. Deploy the application as an Application Virtualization (App-V) package.
Install the App-V 4.6 client on the tablets.
B. Deploy the application as a published application on the Remote Desktop server.
Create a Remote Desktop connection on the tablets.
C. Install the application on a local drive on the tablets.
D. Install the application in a Windows To Go workspace.
E. Install Hyper-V on tablets. Install the application on a virtual machine.
F. Publish the application to Windows Store.
G. Install the application within a separate Windows 8 installation in a virtual hard disk (VHD) file.
Configure the tablets with dual boot.
H. Install the application within a separate Windows 8 installation in a VHDX file.
Configure tablets with dual boot.
If you want to pass Microsoft 70-689 successfully, do not missing to read latest lead2pass Microsoft 70-689 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.