Q101. You administer client computers that run Windows 8 Enterprise deployed by using Windows Deployment Services (WDS). Your company recently purchased 25 new tablets that run Windows 8 Pro. 

For all 25 new tablets, you want to replace the existing Windows 8 Pro installation with Windows 8 Enterprise. 

You need to deploy the Windows 8 Enterprise image to all 25 tablets simultaneously by using the existing WDS infrastructure. 

What should you do? 

A. Start the tablets from the Windows To Go workspace. 

B. Start the tablets from a USB flash drive with a customized Windows Preinstallation Environment (WinPE). 

C. Start the tablets normally. Map the Windows Image (WIM) file from a WDS network share. 

D. Start the tablets from a customized Windows Recovery Environment (WinRE). 

Answer:


Q102. You have 100 client Windows 8.1 computers. Users are NOT configured as local administrators. 

You need to prevent the users from running applications that they downloaded from the Internet, unless the applications are signed by a trusted publisher. 

What should you configure in the Security settings from the Action Center? 

A. Virus protection 

B. User Account Control 

C. Windows SmartScreen settings 

D. Network Access Protection 

Answer:


Q103. You support laptops that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) are deployed on your network on a server named SERVER1. 

Company policy requires that laptops with MBAM client installed prompt users to enable BitLocker within 2 hours of being started. 

You need to make changes to the Configure MBAM Services Group Policy settings. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Set Enter status reporting frequency (in minutes) to 120. 

B. Set Enter client checking status frequency (in minutes) to 120. 

C. Set Select Bitlocker Recovery Information to store to Recovery password and key package. 

D. Set MBAM Status reporting endpoint to SERVER1 

E. Set Select Bitlocker Recovery Information to store to Recovery password only. 

F. Set MBAM Recovery and Hardware service endpoint to SERVER1. 

Answer: A,C 


Q104. You are a systems administrator for Contoso, Ltd. 

You disabled picture passwords by using a Group Policy object (GPO) named Picture Password Disable. 

Management wants to use picture passwords. You disable and remove the GPO that disables picture passwords. 

One user's picture password does not function properly on the user's tablet. The tablet is wirelessly connected to the network. You connect to the tablet and view the screen, which is shown in the following exhibit. 

You need to ensure that the tablet is able to use picture passwords. What should you do? 

A. Log off of the tablet and then log back on. 

B. Run the gpupdate/force command from an elevated command prompt. 

C. Run the gpupdate /target:user command from an elevated command prompt. 

D. Connect the tablet to a wired connection, and then run the gpresult /F command. 

Answer:


Q105. DRAG DROP 

Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not have any operating system installed. 

You have been asked to deploy Windows 8 on these laptops. You have installed and configured Windows 8 on a reference laptop. 

You need to create an image and deploy it to the 25 new laptops. 

Which four actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q106. HOTSPOT  

You have several client computers that run Windows 7. The computers have identical hardware and software. 

The system properties of one of the computers are configured as shown in the following exhibit. (Click the Exhibit button.) 

To answer, complete each statement according to the information presented in the exhibit. 

Each correct selection is worth one point. 

Answer: 


Q107. HOTSPOT  

You support computers that run Windows 8 Pro. 

You plug a legacy hardware adapter into a computer. You open Device Manager and 

notice that the legacy hardware adapter is not listed. 

You need to install the legacy hardware adapter. 

To which node should you add the legacy hardware adapter? (To answer, select the 

appropriate object in the answer area.) 

Answer: 


Q108. HOTSPOT  

Your company has a main office and two branch offices named Branch1 and Branch2. The main office contains a file server named Server1 that has BranchCache enabled. Branch1 contains a server named Server2 that is configured as a hosted cache server. 

All client computers run Windows 8 Enterprise. All of the computers are joined to an Active Directory domain. 

The BranchCache settings of all the computers are configured as shown in the following exhibit. (Click the Exhibit button.) 

In the table below, identify the effective setting for the client computers in each branch office. Make one selection in each column. Each correct selection is worth one point. 

Answer: 


Q109. HOTSPOT  

Your company has several Windows RT 8.1 devices. The devices connect to Exchange Online in Microsoft Office 365 and to Windows Intune for device management. 

The security policies of Office 365 and Windows Intune are configured as shown in the following table. 

You need to identify the effective settings on the Windows RT devices. 

What should you identify? (To answer, select the appropriate effective configuration for each setting in the answer area.) 

Answer: 


Q110. You have a Windows 8.1 Pro desktop computer and a Windows RT 8.1 mobile device. 

You sign in to the computer and the device by using the same Microsoft account. 

You discover that the settings are not being synchronized between the Windows 8.1 

computer and the Windows RT 8.1 device, 

You need to ensure that the settings are synchronized. 

What should you do first? 

A. Enable the Trusted Hosts Group Policy setting. 

B. Enable the Configure Default consent Group Policy setting. 

C. From the PC settings page, click Trust this PC. 

D. From the PC settings page, modify the Privacy settings. 

Answer: