아무런 노력을 하지 않고 승진이나 연봉인상을 꿈꾸고 있는 분이라면 이 글을 검색해낼수 없었을것입니다. 승진이나 연봉인상을 꿈꾸면 승진과 연봉인상을 시켜주는 회사에 능력을 과시해야 합니다. IT인증시험은 국제적으로 승인해주는 자격증을 취득하는 시험입니다. Pass4Test의 Microsoft 070-688 (Managing and Maintaining Windows 8)덤프의 도움으로 Microsoft 070-688 (Managing and Maintaining Windows 8)시험을 패스하여 자격증을 취득하면 승진이나 연봉인상의 꿈이 이루어집니다. 결코 꿈은 이루어질것입니다.
NO.1 You administer computers that run Windows 8 Pro. You have secured the
computers by using
BitLocker. You have distributed a new application to the
computers. Users report that file
associations for
ZIP archives is broken
and users are unable to open ZIP files. You need to design a solution
that
recovers
file association. You also need to ensure that BitLocker
encryption settings are maintained.
What should you do?
A. Delete the
HKEY_CLASSES_ROOT\exefile\shell\open\command registry key.
B. Restore
computer from the latest restore point.
C. Modify setting in Change default
settings for media or devices.
D. Select Reset your PC.
Answer:
B
NO.2 You are a systems administrator for your company. The company has
employees who work
remotely
by using a virtual private network (VPN)
connection from their computers, which run Windows 8
Pro.
These employees
use an application to access the company intranet database servers. The
company
recently decided to distribute the latest version of the application
through using a public cloud.
Some
users report that every time they try
to download the application by using Internet Explorer, they
receive
a
warning message that indicates the application could harm their computer.
You need to recommend
a
solution that prevents this warning message from
appearing, without compromising the security
protection
of the
computers.
What should you do?
A. Publish the application through an
intranet web site.
B. Publish the application to Windows Store.
C.
Digitally sign the application by using a trusted certificate, and then update
the default App
Package
Deployment policy on all computers.
D. Obtain a
public certificate for the web server, and then configure the web site to use
SSL.
E. Change the default Applications Control Policies on the client
computers.
F. Change the default Software Restriction Policies on the client
computers.
G. Instruct employees to disable the SmartScreen Filter from
within the Internet Explorer settings.
H. Publish the application through a
public file transfer protocol (FTP) site.
Answer: B OR C
NO.3 [DRAG
And DROP]
You have a computer that runs Windows 8. You have a 1-terabyte
external hard drive. You purchase
a
second 1-terabyte external hard drive.
You need to create a fault-tolerant volume that includes both
external hard
drives. You also need to ensure that additional external hard drives can be
added to
the
volume.
Which three actions should you perform in
sequence? (To answer, move the appropriate actions
from the
list of
actions to the answer area and arrange them in the correct order.)
A. From
Control Panel, use Storage Spaces to create a new pool. Set Resiliency Type to
two-way
mirror.
B. From Control Panel, use Storage Spaces to create a new
pool. Set Resiliency Type to parity.
C. From Disk Management, create a new
volume on the second USB drive. Format the new volume.
D. Back up the
existing data on your old USB drive.
E. Schedule a backup job to
automatically copy your data to the second USB drive.
F. From Disk Manager,
create a mirror between the two USB drives.
G. Restore your data to the new
pool from back-up.
Answer: E,A,G
NO.4 You administer laptop and
desktop computers that run Windows 8 Pro. Your company
uses
Active
Directory Domain Services (AD DS) and Active Directory
Certificate Services (AD CS). Your company
decides that access to the company
network for all users must be controlled by two-factor
authentication.
You
need to configure the computers to meet this requirement.
What should you
do?
A. Enable the Password must meet complexity requirements policy setting.
Instruct users to log on
by
using the domain\username format for their
username and their strong password.
B. Install smart card readers on all
computers. Issue smart cards to all users.
C. Issue photo identification to
all users. Instruct all users to set up and use PIN Logon.
D. Create an
Internet Protocol security (IPsec) policy that requires the use of Kerberos
to
authenticate all
traffic. Apply the IPsec policy to the
domain.
Answer: B
NO.5 At work, you use a desktop computer that runs
Windows 8 Pro. At home, you use a laptop
that runs
Windows 8. You use the
same Microsoft account to log on to both computers. You want to use
the
same
settings for both computers. You need to ensure that all computer
settings, including stored
passwords,
are synced between the
computers.
What should you do.?
A. Add both computers to the same
workgroup.
B. Join both computers to the same HomeGroup.
C. Enable the
Guest account on both computers.
D. Designate both computers as trusted
PCs.
Answer: D