Exam 74-344 Managing Programs and Projects with Project Server 2013

Published: April 5, 2013
Languages: English, Portuguese (Brazil), Spanish
Audiences: Partners
Technology: Microsoft Project Server 2013
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Create enterprise projects and portfolios (25–30%)
Define strategic alignment
Define business drivers, create multiple driver prioritizations, analyze consistency ratio, rate projects against business drivers, determine primary cost constraints, determine resource constraints
Optimize portfolios
Set project dependencies, create a portfolio analysis, review and modify prioritizations in an analysis, force projects in and out of analysis, determine hired resources, compare and run simulations for project portfolio selection, add additional constraints
Create a new enterprise project
Create a project by choosing a specific project type and going through a workflow, create a Microsoft SharePoint task list project, create SharePoint item lists for ideation and requests, use workflow approvals, import projects through Project Professional, create and manage project schedules using Project Web App, save and check in projects
Create a program with master projects and sub-projects
Insert sub-projects, create cross-project task dependencies, create a temporary master project, calculate sub-project summary fields, display a master project in Project Web App

Preparation resources
Project portfolio management solutions guide (white paper)
Aligning projects with strategic drivers (Project Server 2013)
Create a sample Project Web App workflow

Plan enterprise projects and resources (25–30%)
Manage resources and teams
Edit resources with Project Web App, edit resources with Project Professional, create team resources, create team assignments, add a team task to a task page or timesheet, map resource roles (portfolio analysis)
Build a resource plan
Build a team for a resource plan, build a resource plan for a project, set resource utilization, use committed versus proposed assignments
Build a project team
Build a Project Team through Project Professional, build a Project Team through Project Web App, replace generic resources, work with proposed assignments, import a team resource plan
Resolve resource over-allocations across projects
Use leveling tools; use Team Planner, Task usage, and Resource Center availability views; evaluate how SharePoint task list projects impact availability
Baseline enterprise projects
Set a protected baseline, set a baseline from Project Web App, set a baseline from Project Professional, clear a baseline, copy a baseline

Preparation resources
Plan for performance and capacity in Project Server 2013
Plan user access in Project Server 2013
Plan for Project Server 2013 deployment

Track and collaborate on an enterprise project (25–30%)
Select a tracking method
Use percent complete, hours per period, actual work remaining, freeform, done, and not done fields
Manage task assignments
Publish assignments, select a status manager, select an assignment owner, set the published values for individual tasks
Update tasks and timesheets
Submit and recall timesheets, insert and remove tasks, reassign tasks, update Task Status from SharePoint My Tasks, submit updates from My Tasks
Approve tasks and timesheets
Accept task updates from tasks or timesheets, view impact of updates on a project, reject updates, approve and reject timesheets, manage delegations
Update a project schedule
Reschedule uncompleted work, update cost resources, publish schedule changes, utilize task update history, update schedules with protected user updates, close tasks for updates

Preparation resources
Task mode settings (Project Server 2013 settings)
Add SharePoint task list data to Project Server 2013
Timesheet and statusing

Manage configurable enterprise objects (20–25%)
Customize Project Web App views and reports
Create a portfolio report using Microsoft Excel, create dashboards, copy and edit views, set default views, rename field names, group, filter, and sort views
Manage and extend Project Online and Project Server
Create and manage enterprise project templates, define enterprise custom fields, define Project Server workflows, define enterprise global objects, extend with Office Store apps, add social elements
Manage risks, issues, and deliverables
Add risks and issues, add documents, add deliverables, set a dependency on a deliverable, synchronize deliverables with projects, link related items
Customize a project site
Add Document Library, add Lists, add Calendar, add Folders, modify site layout, create program (master-sub) structure using sub-sites

Preparation resources
Configure reporting for Project Web App (Project Server 2013)
Enterprise custom fields and lookup tables in Project Web App
Managing issues, risks, and documents in Project Web App


QUESTION 1
Your organization is performing a Portfolio Analysis in Project Server 2013.
You want to create a consolidated Portfolio Analysis optimization based on Cost and Resource data, which will be part of the project information in Project Server 2013.
You plan to provide different simulations to your organization by using those parameters and returning the best prioritization.
This organization has two different unit directors, who have the final decision on the consolidated Portfolio Analysis results.
You need to provide the ability for your unit directors to modify the final portfolio selection.
Which element should you use?

A. Resource Requirements
B. Project/Proposal Priority
C. Field Cost Constraint
D. Project Original Start
E. Field Force In/Out

Answer: E


QUESTION 2
You are a project manager in an organization that uses Project Server 2013. All project managers have permission to edit all projects.
You edit a project in Project Web App (PWA), make changes, publish the project, and close your browser.
A project manager calls you to report they are unable to open your project for edit in PWA.
You need to resolve this issue. What should you do?

A. Advise the project manager to open the project in Project Professional 2013.
B. Open Project Professional 2013 and use the Clean Up Cache button.
C. Open the Project Center in PWA and use the Check in My Projects button.
D. Open the Project Center in PWA and use the Project Permissions button.

Answer: C


QUESTION 3
Your organization is a multinational corporation that uses Project Online to plan and control the projects in different business units. Each business unit has its own portfolio of projects but can participate in strategic projects.
The Research and Development (R&D) department has been struggling to gather and materialize the new ideas. The Project Management Office (PMO) has the necessary templates and Enterprise Project Types (EPTs) to start a formal process for any new product and to adhere to the general guidelines. However, the R&D group does not want to register all of their ideas since many are related to improvements and few of them could be materialized into projects.
You need to generate a solution that allows R&D to gather their ideas and facilitate the materialization into Enterprise Projects.
What should you do?

A. Create a new EPT for the SharePoint Task List and name it R&D New Idea.
B. Within the same site collection of Project Web App (PWA), create a Custom SharePoint Item List for ideation and requests with custom fields that easily match with Project custom fields when using the Add SharePoint Sites command in Project Center.
C. Create a new EPT for Enterprise Projects and name it R&D New Idea.
D. Within the same site collection of Project Web App (PWA), create a custom list for ideation and match list columns with Project custom fields when using the Create Projects command in the SharePoint Item List.

Answer: D


QUESTION 4
Your organization uses Project Online for project portfolio selection. The business drivers and priorities are set, as are the main constraints to identify the efficient frontier.
The company has been collecting business cases for new proposals in which many projects may solve the same business need. For example, the selection for a Customer Relationship Management system has six different proposals, whereas only one is necessary to fulfill the business need.
You need to guarantee that the analysis will produce the most viable proposal in terms of cost and resources and that no repetitive efforts exist in the portfolio selection.
What should you do?

A. Create a mutual exclusion dependency among all these projects.
B. Create a mutual inclusion dependency among all these projects.
C. Exclude these projects from the Portfolio Analysis to prevent a deviation from the main goal.
D. Exclude the related projects from the portfolio after the cost analysis with the Force in/out option.

Answer: A


QUESTION 5
You are a program manager for an organization that uses Project Server 2013.
You are responsible for implementing a data warehouse that compiles relational data from many business areas. Your project managers need to be able to manage the implementation for a business area as separate projects, while still recognizing the dependencies at a program level.
You need to maintain ownership and authority of key program dates at the program level.
What should you do?

A. Create one project file for all project managers that includes the program-level tasks and each sub-project’s tasks. Require each area project manager to share the file, and add their dependencies within their own tasks.
B. Create and publish a master project file with general durations for each business area sub-project, and have the area project manager reconcile the dates in their own project manually each week.
C. Have the project managers create, save, and publish sub-projects for each area. Then insert them into a program-level project, define dependencies, and save and publish the
program-level project to the server.
D. Create a master project and insert your projects, but never publish the file on the server.

Answer: C

Click here to view complete Q&A of 74-344 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 74-344 Training at certkingdom.com

Exam 74-343 Managing Projects with Microsoft Project

Published: April 5, 2013
Languages: English, Portuguese (Brazil), Spanish
Audiences: Partners
Technology: Microsoft Project
Credit toward certification: MCP, Microsoft Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of May 2016, this exam covers the latest version of Microsoft Project.

Initialize a project (15–20%)
Create a new project
Create a template from a completed project, create a project from an existing template, existing project, SharePoint task list, or Excel workbook
Create and maintain calendars
Set working or non-working hours and days for calendars, set a base calendar, resource calendar, and hours per day, apply calendars to project, task, and resource levels
Create custom fields
Create basic formulas, graphical indicator criteria, lookup tables, and task and resource custom fields
Customize option settings
Set default task types, manual versus auto-scheduling, project options, calendar options, customized ribbon, and quick access toolbar

Preparation resources
Create a new project from another project or template
Change working days for the project calendar
Available fields reference

Create a task-based schedule (20–25%)
Set up project information
Define project start date, apply calendars and current date, enter project properties, display the project summary task on a new project
Create and modify a project task structure
Create and modify summary tasks and subtasks, rearrange tasks, create milestones, create manually scheduled tasks, outline, set tasks as active or inactive
Build a logical schedule model
Set date constraints, deadlines, dependencies, links, duration equations, effort-driven tasks, and formulas, choose a task type
Create a user-controlled schedule
Enter duration, set or change the task mode (manual or auto), display warnings and suggestions, use estimated durations and user-controlled summary tasks
Manage multiple projects
Create a shared resource pool, connect to a resource pool, create links between projects, resolve conflicts between linked projects, work with master projects and sub-projects, summarize data in master projects

Preparation resources
Set the start date or finish date for your project
Create subtasks and summary tasks
Link projects to create a master project

Manage resources and assignments (20–25%)
Enter and edit resource information
Enter and edit max units, resource types, resource rate table, cost per use, availability, resource group, generic resources, and cost resources
Create and edit resource assignments
Use task forms, assign multiple resources, assign resources to tasks using units that represent part-time work, edit assignments
Manage resource allocation
View task and resource usage, view availability across multiple projects, change assignment information, level, replace resources
Manage resource allocations by using Team Planner
Display current resource allocations and assignments, manage unassigned tasks, resolve resource conflicts, level resource over-allocations, substitute resources
Model project costs
Enter and assign resource-based costs (work, material, cost), cost per use, fixed costs, accrual method, apply a resource rate table

Preparation resources
Enter costs for resources
Assign people to work on tasks
Enter rate-based costs for people and materials

Track and analyze a project (20–25%)
Set and maintain baselines
Use multiple baselines, baseline an entire project, baseline selected tasks, update a baseline
Update actual progress
Update percentage completion, actual or remaining duration, actual work, remaining work, status date, current date, actual start and actual finish, use actual work and usage views, reschedule uncompleted work, cancel an unneeded task
Compare progress against a baseline
Use date variance, work variance, cost variance, and task slippage, show variance of the current plan against baseline (tracking Gantt), select a view to display variance
Resolve potential schedule problems
Display warnings, suggestions, and task drivers by using Task Inspector and Task Path, identify resource over-allocations
Display critical path information
View the critical path in single or master projects, view total slack, display progress against baseline or deadlines

Preparation resources
Set and save a baseline
Overview: Track your time and task progress
Show the critical path of your project

Communicate project information (15–20%)
Apply and customize views
Use auto-filter, apply views, group, filter, highlight, create and manage tables, sort, customize views, share a view with Organizer
Share data with other applications
Import data from Excel, export data to Excel, attach documents or link hyperlinks to supporting information, copy and paste timeline and reports to other Office Web Apps, create and generate visual reports in Excel and Visio, export a timeline view to email
Configure and display reports and dashboards
Report progress status, save to PDF or XPS, display Gantt information, schedule, or timeline, display data based on date range, create built-in dashboards and reports, change and customize built-in dashboards and reports, copy pictures, work with cumulative fields
Connect and share data with SharePoint
Sync to SharePoint, share plans and get updates through SharePoint, share project plans through SharePoint (bi-directional sync of tasks, progress, and timeline elements), collect actual progress from a team through SharePoint
Extend Project
Acquire Apps from the Office Store, save files in OneDrive for Business, acquire templates from Office.com, automate frequent tasks with Visual Basic for Applications (VBA)

Preparation resources
Export your project to Microsoft Excel
Add SharePoint task list data to Project Server 2013

QUESTION 1
Your organization uses Project Professional 2013 and records actual hours worked on the project.
You manage a small e-commerce website implementation project. One of your testers asks for assistance in completing a critical task, and you find two additional testing resources that can assist with executing the critical test cases.
The total estimated work for the effort-driven task is 100 hours. The original testing resource, Resource1, completes 25 hours of work on the task.
You need to add Resource2 and Resource3 to the task and split the remaining hours across all three resources now working on the task.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Open the Task Form and format it to show Work Details. Enter 25 hours of actual work for Resource1. Then save the changes.
B. Open the Task Form and format it to show Work Details. Enter 75 hours of remaining work for the assigned resource. Then save the changes.
C. Assign Resource2 and Resource3 to the task. Then save the changes.
D. Open the Task Form and format it to show Work Details. Enter 33.33 hours of work for each resource. Then save the changes.

Answer: A,C


QUESTION 2
You are managing a project using Project Professional 2013.
Your project schedule is showing task overallocation indicators in the Gantt chart view. You navigate to the Team Planner view to investigate more details regarding the over allocations.
You discover that the BA1 resource is overallocated and you need to see all assignments with details for BA1 to understand their current workload before making any assignment changes.
What should you do?

A. Click the BA1 resource and scroll to the end of the project.
B. Click View, check Details, select Resource Form then click on the BA1 resource.
C. Click View, check Details, select Task Form then click on the BA1 resource.
D. Right-click the BA1 resource and select Information.

Answer: B


QUESTION 3
You are a project manager who uses Project Standard 2013.
You are creating a preliminary project schedule and are estimating the number of resources required prior to finalizing the schedule. You do not have named resources to complete the tasks, but you know the resource roles that are necessary. One of the roles needed is architect.
You need to estimate how many architect hours are required to complete the work.
What should you do?

A. Add a Material Resource named architect.
B. Add a Budget Resource named architect.
C. Add a Work Resource named architect,
D. Add a Cost Resource named architect.

Answer: C

Click here to view complete Q&A of 74-343 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 74-343 Training at certkingdom.com

Exam 70-980 Recertification for MCSE: Server Infrastructure

Published: September 12, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: MCP, MCSE

This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan and deploy a server infrastructure
Plan and deploy Virtual Machine Manager services
Design Virtual Machine Manager service templates, define operating system profiles, configure hardware and capability profiles, manage services, configure image and template libraries, manage logical networks
Plan and implement file and storage services
Planning considerations, including iSCSI SANs, Fibre Channel SANs, Virtual Fibre Channel, storage spaces, storage pools, and data deduplication; configure the iSCSI Target server; configure the Internet Storage Name server (iSNS); configure Network File System (NFS); install Device Specific Modules (DSMs)

Design and implement network infrastructure services
Design a name resolution solution strategy
Design considerations, including secure name resolution, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, migration to application partitions, IPv6, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation
Design and manage an IP address management solution
Design considerations, including IP address management technologies, such as IPAM, Group Policy based, and manual provisioning, and distributed versus centralized placement; configure role-based access control; configure IPAM auditing; migrate IPs; manage and monitor multiple DHCP and DNS servers; configure data collection for IPAM

Design and implement network access services
Design a VPN solution
Design considerations, including certificate deployment, firewall configuration, client/site to site, bandwidth, protocol implications, and VPN deployment configurations using Connection Manager Administration Kit (CMAK)
Design a DirectAccess solution
Design considerations, including topology, migration from Forefront UAG, DirectAccess deployment, and enterprise certificates
Design a Web Application Proxy solution
Design considerations, including planning for applications, authentication, and authorization, Workplace Join, devices, multifactor authentication, multifactor access control, single sign-on (SSO), certificates, and planning access for internal and external clients
Implement a scalable remote access solution
Configure site-to-site VPN, configure packet filters, implement packet tracing, implement multi-site Remote Access, configure Remote Access clustered with Network Load Balancing (NLB), configure DirectAccess
Design and implement a network protection solution
Design considerations, including Network Access Protection (NAP) enforcement methods for DHCP, IPSec, VPN, and 802.1x, capacity, placement of servers, firewall, Network Policy Server (NPS), and remediation network, configure NAP enforcement for IPsec and 802.1x, monitor for compliance

Design and implement an Active Directory infrastructure (logical)
Design a Group Policy strategy
Design considerations, including inheritance blocking, enforced policies, loopback processing, security, and WMI filtering, site-linked Group Policy Objects (GPOs), slow-link processing, group strategies, organizational unit (OU) hierarchy, and Advanced Group Policy Management (AGPM)

Design and implement an Active Directory infrastructure (physical)
Design a domain controller strategy
Design considerations, including global catalog, operations master roles, Read-Only Domain Controllers (RODCs), partial attribute set, and domain controller cloning
Design and implement a branch office infrastructure
Design considerations, including RODC, Universal Group Membership Caching (UGMC), global catalog, DNS, DHCP, and BranchCache; implement confidential attributes; delegate administration; modify filtered attributes set; configure password replication policy; configure hash publication

Manage and maintain a server infrastructure
Design a monitoring strategy
Design considerations, including monitoring servers using Audit Collection Services (ACS), performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring Active Directory
Implement automated remediation
Create an Update Baseline in Virtual Machine Manager; implement a Desired Configuration Management (DCM) Baseline; implement Virtual Machine Manager integration with Operations Manager; configure Virtual Machine Manager to move a virtual machine (VM) dynamically, based on policy; integrate System Center 2012 for automatic remediation into your existing enterprise infrastructure

Plan and implement failover clustering

Plan and implement failover clustering
Plan for multi-node and multi-site clustering; design considerations, including redundant networks, network priority settings, resource failover and failback, heartbeat and DNS settings, Quorum configuration, and storage placement and replication
Plan and implement highly available network services
Plan for and configure NLB; design considerations, including fault-tolerant networking, multicast versus unicast configuration, state management, and automated deployment of NLB using Virtual Machine Manager service templates
Plan and implement highly available storage solutions
Plan for and configure storage spaces and storage pools; design highly available, multi-replica DFS namespaces; plan for and configure multi-path I/O, including Server Core; configure highly available iSCSI Target and iSNS Server
Plan and implement highly available roles
Plan for a highly available Dynamic Host Configuration Protocol (DHCP) Server, Hyper-V clustering, Continuously Available File Shares, and a DFS Namespace Server; plan for and implement highly available applications, services, and scripts using Generic Application, Generic Script, and Generic Service clustering roles
Plan and implement a business continuity and disaster recovery solution
Plan a backup and recovery strategy; planning considerations, including Active Directory domain and forest recovery, Hyper-V replica, domain controller restore and cloning, and Active Directory object and container restore using authoritative restore and Recycle Bin

Plan and implement a server virtualization infrastructure
Plan and implement virtualization hosts
Plan for and implement delegation of virtualization environment (hosts, services, and VMs), including self-service capabilities; plan and implement multi-host libraries, including equivalent objects; plan for and implement host resource optimization; integrate third-party virtualization platforms
Plan and implement virtual machines
Plan for and implement highly available VMs; plan for and implement guest resource optimization, including shared VHDx; configure placement rules; create Virtual Machine Manager templates
Plan and implement virtualization networking
Plan for and configure Virtual Machine Manager logical networks, including virtual switch extensions and logical switches; plan for and configure IP address and MAC address settings across multiple Hyper-V hosts, including network virtualization; plan for and configure virtual network optimization; plan and implement Windows Server Gateway; plan and implement VLANs and pVLANs; plan and implement virtual machine networks; plan and implement converged networks
Plan and implement virtualization storage
Plan for and configure Hyper-V host clustered storage; plan for and configure Hyper-V virtual machine storage, including virtual Fibre Channel, iSCSI, and shared VHDx; plan for storage optimization; plan and implement storage using SMB 3.0 file shares
Plan and implement virtual machine movement
Plan for and configure live and storage migration between Hyper-V hosts; plan for and manage P2V and V2V; plan and implement virtual machine migration between clouds
Manage and maintain a server virtualization infrastructure
Manage dynamic optimization and resource optimization, integrate Operations Manager with System Center Virtual Machine Manager and System Center Service Manager, update virtual machine images in libraries, plan for and implement backup and recovery of virtualization infrastructure by using System Center Data Protection Manager (DPM)

Design and implement identity and access solutions
Design and implement a federated identity solution
Plan for and implement claims-based authentication, including planning and implementing Relying Party Trusts; plan for and configure Claims Provider and Relying Party Trust claim rules; plan for and configure attribute stores, including Active Directory Lightweight Directory Services (AD LDS); plan for and manage Active Directory Federation Services (AD FS) certificates; plan for and implement Identity Integration with cloud services; integrate Web Application Proxy with AD FS
Design and implement Active Directory Rights Management Services (AD RMS)
Plan for highly available AD RMS deployment, plan for AD RMS client deployment, manage Trusted User Domains, manage Trusted Publishing Domains, manage Federated Identity support, upgrade or migrate AD RMS, decommission AD RMS

QUESTION 1
You implement and authorize the new DHCP servers. You import the server configurations and the scope configurations from PA1 and AM1.
You need to ensure that clients can obtain DHCP address assignments after you shut down PA1 and AM1. The solution must meet the technical requirements.
What should you do?

A. Run the Get-DhcpServerv4Lease cmdlet and the Remove-DhcpServerv4Lease cmdlet. Run the Windows Server Migration Tools.
B. Run the Get-DhcpServerv4Lease cmdlet and the Add-DhcpServerv4Lease cmdlet. Activate the scopes.
C. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet. Run the Windows Server Migration Tools.
D. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet Activate the scopes.

Answer: B


QUESTION 2
You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation?

A. Microsoft Baseline Security Analyzer (MBSA)
B. Microsoft Desktop Optimization Pack (MDOP)
C. Microsoft System Center 2012 Operations Manager
D. Microsoft System Center 2012 Data Protection Manager (DPM)

Answer: B

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg
Microsoft Desktop Optimization Pack
Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution.
What is the Microsoft Desktop Optimization Pack?
The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services.
MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. https:://technet.microsoft.com/en-us/library/cc507880.aspx


QUESTION 3
You are planning the decommissioning of research.contoso.com.
You need to ensure that an administrator named Admin5 in the research department can manage the user accounts that are migrated to contoso.com. The solution must minimize the number of permissions assigned to Admin5.
What should you do before you migrate the user accounts?

A. Run the New-Object cmdlet, and then run the Add-ADPrincipalGroupMembershipcmdlet.
B. Create a new organizational unit (OU), and then add Admin5 to the Account Operators group.
C. Create a new organizational unit (OU), and then run the Delegation of Control Wizard.
D. Run the New-Object cmdlet, and then run the Add-ADCentralAccessPolicyMembercmdlet.

Answer: C

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg
http://technet.microsoft.com/en-us/library/dd145344.aspx


QUESTION 4
You need to recommend changes to the DNS environment that support the implementation of the sales.contoso.com domain. The solution must ensure that the users in all of the
domains can resolve both Internet names and the names of the servers in all of the internal domains.
What should you recommend?

A. On the DNS servers in contoso.com, configure a reverse lookup zone. On the DNS servers in sales.contoso.com, configure a conditional forwarder to contoso.com.
B. On the DNS servers in contoso.com, add a conditional forwarder to the sales.contoso.com zone. On the DNS servers in sales.contoso.com, add a forwarder to the DNS servers of the company’s ISP.
C. On the DNS servers in contoso.com, create a zone delegation in the contoso.com zone. On the DNS servers in sales.contoso.com, add a forwarder to the contoso.com DNS servers.
D. On the DNS servers in contoso.com, configure a conditional forwarder to sales.contoso.com. On the DNS servers in sales.contoso.com, configure a reverse zone.

Answer: C

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg


QUESTION 5
You are evaluating the implementation of data deduplication on the planned Windows Server 2012 file servers.
The planned servers will have the identical disk configurations as the current servers.
You need to identify which volumes can be enabled for data deduplication.
Which volumes should you identify? (Each correct answer presents part of the solution. Choose all that apply.)

A. C
B. D
C. E
D. The CSV
E. DATA

Answer: C,E

Click here to view complete Q&A of 70-980 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-980 Training at certkingdom.com

Exam 70-981 Recertification for MCSE: Private Cloud

Published: August 13, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configure data center process automation
Implement workflows
Implement SCO Runbook automation; automate remediation of incidents, including resolution of System Center Virtual Machine‒based incidents; design and build end-to-end automation, incorporating System Center 2012 technologies; implement change control and problem resolution workflows
Implement service offerings
Add a new service offering to the service catalog, create a custom workflow using the Service Manager console, reference Orchestrator workflows in Service Manager, implement self-service provisioning of virtual machines

Deploy resource monitoring
Deploy end-to-end monitoring
Deploy agents, discover and deploy network device monitoring, import and configure management packs, deploy and configure monitoring of a heterogeneous virtualization infrastructure
Configure end-to-end monitoring
Configure overrides, create synthetic transactions, configure Outside-In monitoring, configure application performance monitoring (APM), create distributed application models, integrate the monitoring infrastructure with Global Service Monitor (GSM)
Create monitoring reports and dashboards
Implement service-level tracking; implement reports, including chargeback reports and System Center Manager data warehouse reports; implement dashboards

Configure and maintain service management
Implement service level management
Define service level objectives (SLOs) and service level agreements (SLAs); implement SLA management and escalation; maintain SLAs, including planning for future growth; analyze SLAs (reporting)
Manage problems and incidents
Customize problem management, link incidents to problems, and resolve problems; raise, assign, and resolve incidents; perform root cause analysis/diagnosis; integrate problem and incident resolution with change management; create and manage a knowledge base
Manage cloud resources
Deploy new applications to private and public clouds; deploy virtual machine (VM)/service (applications, SQL, roles), deploy multi-tier applications by using service templates, manage applications in private and public clouds, manage VM hardware (CPUs, dynamic memory), manage self service

Configure the fabric
Configure the storage fabric
Classification and pools, providers, arrays, file server cluster, storage pools, file shares
Configure the network fabric
Logical networks; VM networks; IP/MAC resource pools; VIP templates; load balancing; logical switches; network isolation, including network virtualization with Windows Server Gateway; private VLANs and VLANs
Configure and manage the deployment and update servers
Integrate a Windows Server Update Services (WSUS) server into the Virtual Machine Manager fabric; configure and manage a library server; integrate Windows Deployment Services (WDS)/PXE into the Virtual Machine Manager fabric, including virtualization host deployment using Windows Deployment Services (WDS)
Configure clouds and virtualization hosts
Clouds and host groups, configure and deploy virtualization hosts

Configure System Center integration
Configure private cloud integration
Configure Operations Manager connectors; Orchestrator integration packs; Service Manager connectors; SharePoint integration; configure IP Address Management (IPAM) server integration, configure AppController
Configure integration of private and public clouds
Configure Service Provider Framework (SPF), configure Windows Azure Pack for Windows Server

QUESTION 1
You need to implement a solution to meet the IM requirements for the help desk users.
What should you do?

A. Install Unified Communications Managed API 3.0 Runtime on LON-SM1.
B. Install the Lync 2010 client on LON-SM1.
C. Create a Service Manager workflow.
D. Create an IM channel.

Answer: B

Explanation:
Ref: https:://technet.microsoft.com/en-us/library/hh495482.aspx


QUESTION 2
You need to implement the alert notifications. The solution must meet the technical requirements. A Lync Server administrator enables an account named ADATUM\IMUser for Unified Communications. What should you do next?

A. Configure ADATUM\IMUser as a Run As Account. Install the Lync Management Pack. Create a notification subscriber and an IM channel.
B. Create a mailbox for the ADATUM\IMUser account Install the Exchange Server Management Pack. Create a notification subscriber and an SMTP channel.
C. Create a mailbox for the ADATUM\IMUser account. Install Microsoft Visual C++ 2008 Runtime. Create a notification subscriber and an SMTP channel.
D. Configure ADATUM\IMUser as a Run As Account. Install Unified Communications
Managed API 3.0 Runtime. Create a notification subscriber and an IM channel.

Answer: D


QUESTION 3
You need to recommend a solution to remediate the Exchange Server 2010 service failures. The solution must meet the technical requirements.
What should you include in the recommendation?

A. Create a service request workflow that triggers a dependent activity.
B. Create an incident event workflow that triggers a dependent activity.
C. Create an incident event workflow that triggers a runbook activity.
D. Create a service request workflow that triggers a runbook activity.

Answer: C


QUESTION 4
You need to recommend a solution to meet the monitoring requirements for App2.
What should you include in the recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. An aggregate rollup monitor
B. A distributed application
C. A dependency rollup monitor
D. Service monitors

Answer: B


QUESTION 5
You need to recommend a solution to ensure that the sales department managers can create instances of App1 in Cloud1.
What should you include in the recommendation?

A. A subscription in App Controller and a task in Service Manager
B. A dashboard in Operations Manager and a distributed application
C. A task in Operations Manager and a distributed application
D. A service offering in Service Manager and a runbook in Orchestrator

Answer: D

Click here to view complete Q&A of 70-981 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-981 Training at certkingdom.com

Exam 70-692 Upgrading Your Windows XP Skills to MCSA Windows 8

Published: November 3, 2014
Languages: English
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Exam 70-687
Install and upgrade to Windows 8.1 (25–30%)
Install Windows 8.1
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards, and Secure Boot
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming, and mandatory

Preparation resources
Install, deploy, and migrate to Windows 8
Windows 8 and Windows 8.1 upgrade paths
Getting started with the User State Migration Tool (USMT)

Configure hardware and applications (25–30%)
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage

Preparation resources
Try it out: Sideload Windows Store Apps
Client Hyper-V

Configure remote access and mobility (20–25%)
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure Wi-Fi Direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage

Preparation resources

Deploy Windows To Go in your organization
Understanding Wi-Fi Direct in Windows 8
BitLocker Group Policy settings

Configure system and data recovery options (20–25%)
Configure system recovery
Configure a recovery drive, configure system restore, perform a refresh or recycle, perform a driver rollback, configure restore points

Preparation resources
Deploy Push-Button Reset features
Windows 8 Jump Start module 6: Recovery and security

Exam 70-688
Support operating system and application installation (30-35%)

Support operating system installation
Support Windows To Go; manage boot settings, including native virtual hard drive (VHD) and multiboot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE)
Support desktop apps
Desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database; desktop application co-existence using Hyper-V, RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); deploy desktop apps by using Microsoft Intune
Support Windows Store and cloud apps
Install and manage software by using Office 365 and Windows Store apps; sideload apps by using Microsoft Intune; sideload apps into online and offline images; deep link apps by using Microsoft Intune; integrate Microsoft account, including personalization settings and Trusted PC

Preparation resources
Deployment considerations for Windows To Go
ACT deployment options
Microsoft Office 365 management and deployment

Support resource access (30-35%)
Support data storage
Distributed File System (DFS) client, including caching settings; storage spaces, including capacity and fault tolerance; optimizing data access by using BranchCache; OneDrive

Preparation resources
Deploy BranchCache

Support Windows clients and devices (30-35%)
Support mobile devices
Support mobile device policies, including security policies, remote access, and remote wipe; support mobile access and data synchronization, including Work Folders and Sync Center; support broadband connectivity, including broadband tethering and metered networks; support Mobile Device Management by using Microsoft Intune, including Windows RT, Windows Phone 8.1, iOS, and Android
Support client compliance
Manage updates by using Windows Update and Microsoft Intune, including non-Microsoft updates; manage client security by using Windows Defender, Microsoft Intune Endpoint Protection, or Microsoft System Center 2012 Endpoint Protection; manage Internet Explorer 11 security; support Group Policy application, including Resultant Set of Policy (RSoP), policy processing, and Group Policy caching
Manage clients by using Microsoft Intune
Manage user and computer groups, configure monitoring and alerts, manage policies, manage remote computers

Preparation resources
Enabling mobile device management with Windows Intune
How to: Set up and use File History on Windows 8
Manage software with Windows Intune


QUESTION 1
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)

A. Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder.
B. Use the Microsoft Deployment Toolkit.
C. Use the Windows 8.1 online upgrade tool.
D. Use Group Policy to assign the Windows 8 installation file to the client computers.

Answer: A,B


QUESTION 2
You manage computers that run Windows 8.1.
You plan to install a desktop app named MarketingApp on one of the client computers.
You need to display a progress bar to the user while installing the app.
Which command should you run?

A. msiexec /i marketingapp.msi /qn
B. msiexec /x marketingapp.msi /qb
C. msiexec /x marketingapp.msi /qn
D. msiexec /i marketingapp.msi /qb

Answer: B


QUESTION 3
You plan to purchase new Windows 8.1 tablets for your company network.
You need to ensure that tablet users are able to use the Windows 8.1 Snap feature.
Which hardware specifications should you meet in choosing tablets?

A. Monitor that supports at least five simultaneous touches
B. Monitor and video adapter that support a minimum screen resolution of 1024 x 768
C. Monitor and video adapter that support a minimum screen resolution of 1366 x 768
D. Monitor that supports at least three simultaneous touches

Answer: D


QUESTION 4
You support Windows 8.1 Enterprise computers that are members of a workgroup.
Users are able to download and install any app from Windows Store.
You need to ensure that only approved apps can be installed from Windows Store.
What should you do?

A. Configure a Software Restriction Policy Certificate rule.
B. Configure an AppLocker Publisher rule.
C. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option.
D. Configure an AppLocker Packaged app rule.

Answer: D

Click here to view complete Q&A of 70-692 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-692 Training at certkingdom.com

 

Exam 70-688 Supporting Windows 8.1

Published: January 18, 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of January 2014, this exam includes content covering Windows 8.1.

Support operating system and application installation (30–35%)
Support operating system installation
Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multiboot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE)
Support desktop apps
Desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database; desktop application co-existence using Hyper-V, RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); deploy desktop apps by using Windows Intune
Support Windows Store and cloud apps
Install and manage software by using Office 365 and Windows Store apps; sideload apps by using Windows Intune; sideload apps into online and offline images; deep link apps by using Windows Intune; integrate Microsoft account, including personalization settings and Trusted PC

Preparation resources
Deployment considerations for Windows To Go
ACT deployment options
Windows upgrade and migration considerations

Support resource access (30–35%)
Support network connectivity
IPv4 and IPv6, including transition technologies; names resolution, including Peer Name Resolution Protocol (PNRP) and Domain Name System Security Extensions (DNSSECs); wireless networks and connections; network security, including Windows Firewall and IP security
Support remote access
Virtual private network (VPN), including Connection Manager Administration Kit (CMAK); Remote Desktop Protocol (RDP), including Remote Desktop Services Gateway access; DirectAccess; remote administration; Network Access Protection (NAP)
Support authentication and authorization
Multi-factor authentication, including certificates, virtual smart cards, picture passwords, and biometrics; workgroup versus domain, homegroup, computer and user authentication, including secure channel, account policies, credential caching, and Credential Manager; local account versus Microsoft account; Workplace Join
Support data storage
Distributed File System (DFS) client, including caching settings; storage spaces, including capacity and fault tolerance; optimizing data access by using BranchCache; OneDrive
Support data security
Permissions, including share, NTFS, and Dynamic Access Control (DAC); Encrypting File System (EFS), including Data Recovery Agent; access to removable media; BitLocker and BitLocker To Go, including Data Recovery Agent and Microsoft BitLocker Administration and Monitoring (MBAM)

Preparation resources
Windows authentication overview
Choosing a BranchCache design

Support Windows clients and devices (35–40%)
Support operating system and hardware
Resolve hardware and device issues, including STOP errors and Reliability Monitor; optimize performance by using Windows Performance Toolkit (WPT), including Xperf.exe, Xbootmgr.exe, XperfView.exe, and Windows Performance Recorder (WPR); monitor performance by using Data Collector Sets, Task Manager, and Resource Monitor; monitor and manage printers, including NFC Tap-to-Pair and printer sharing; remediate startup issues by using the Diagnostics and Recovery Toolkit (DaRT)
Support mobile devices
Support mobile device policies, including security policies, remote access, and remote wipe; support mobile access and data synchronization, including Work Folders and Sync Center; support broadband connectivity, including broadband tethering and metered networks; support Mobile Device Management by using Windows Intune, including Windows RT, Windows Phone 8, iOS, and Android
Support client compliance
Manage updates by using Windows Update and Windows Intune, including non-Microsoft updates; manage client security by using Windows Defender, Windows Intune Endpoint Protection, or Microsoft System Center 2012 Endpoint Protection; manage Internet Explorer 11 security; support Group Policy application, including Resultant Set of Policy (RSoP), policy processing, and Group Policy caching
Manage clients by using Windows Intune
Manage user and computer groups; configure monitoring and alerts; manage policies; manage remote computers

Preparation resources
Microsoft Virtual Academy: Endpoint protection in System Center 2012 SP1
Repair and recovery


QUESTION 1
You administer Windows 8.1 Pro tablets that are members of an Active Directory domain. Your company policy allows users to download and install only certain few Windows Store apps.
You have created a new AppLocker Packaged Apps policy to help enforce the company policy.
You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company.
What should you do?

A. Open PowerShell and run the Get-AppLockerPoIicy -Effective cmdlet to retrieve the AppLocker effective policy.
B. Open Group Policy Management console and run the Group Policy Modeling Wizard.
C. Open Group Policy Management console and run the Group Policy Results Wizard.
D. Open Group Policy Management console and enforce the new AppLocker policy in Audit Only mode.

Answer: D


QUESTION 2
You have client computers that run Windows 8 Pro.
You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort.
What should you include in the recommendation?

A. File History
B. the Program and Features Control Panel item
C. Windows 7 File Recovery
D. System Restore points

Answer: D


QUESTION 3
You administer Windows 8.1 Enterprise laptops. All of the computers are members of an Active Directory domain.
When traveling, users access the corporate network by using a virtual private network (VPN).
You need to implement two-factor authentication.
Which of the following should you use?

A. EAP-TLS
B. MS-CHAP v2
C. 802.1X
D. RADIUS
E. PPTP
F. L2TP/IPSEC
G. IPSEC/IKEv2
H. SSTP

Answer: D


QUESTION 4
You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account.
You discover new applications on the Start screen of the computers.
You need to restrict access to Windows Store for local user accounts on the computers.
What should you do?

A. From Local Computer Policy, navigate to App Package Deployment and disable All Trusted Apps to Install.
B. From Local Computer Policy, select Store and enable Turn off the Store application.
C. From Local Computer Policy, select Store and disable Turn off Automatic Downloads for
Updates.
D. From Local Computer Policy, select Store and disable Allow Store to install apps on Windows To Go workspaces.

Answer: B


QUESTION 5
You manage client computers that run Windows 8 and are part of a workgroup.
These computers are configured to use Microsoft Update. Updates are downloaded every day at 10:00 and installed automatically.
Users report that their computers sometimes reboot without any interaction.
You need to prevent unplanned automatic reboots of the computers.
What should you do?

A. Enable the Reschedule Automatic Updates scheduled installations policy setting.
B. Disable the Re-prompt for restart with scheduled installations policy setting.
C. Enable the Automatic Updates detection frequency policy setting.
D. Enable the No auto-restart with logged on users for scheduled automatic updates installations policy setting.

Answer: D

 

Click here to view complete Q&A of 70-688 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-688 Training at certkingdom.com

Exam 70-687 Configuring Windows 8.1

Published: September 17, 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of January 2014, this exam includes content covering Windows 8.1.

Install and upgrade to Windows 8.1 (10–15%)
Evaluate hardware readiness and compatibility
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards, and Secure Boot
Install Windows 8.1
Install as Windows To Go, migrate from previous versions of Windows to Windows 8.1, upgrade from Windows 7 or Windows 8 to Windows 8.1, install to VHD, install additional Windows features, configure Windows for additional languages
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming, and mandatory

Preparation resources
Utility spotlight: Are you compatible with Windows 8?
Install, deploy, and migrate to Windows 8
Windows 8 upgrade paths

Configure hardware and applications (10–15%)
Configure devices and device drivers
Install, update, disable, and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Control access to local hardware and applications
Configure application restrictions, including Software Restriction Policies and AppLocker; manage installation of and access to removable devices; configure Assigned Access
Configure Internet Explorer 11 and Internet Explorer for the desktop
Configure compatibility view; configure Internet Explorer 11 settings, including add-ons, downloads, security, and privacy
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage

Preparation resources
Device drivers and deployment
Managing client access to the Windows Store

Configure network connectivity (15–20%)
Configure IP settings
Configure name resolution, connect to a network, configure network locations
Configure networking settings
Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing
Configure and maintain network security
Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery
Configure remote management
Choose the appropriate remote management tools; configure remote management settings; modify settings remotely by using MMCs or Windows PowerShell; configure Remote Assistance, including Easy Connect

Preparation resources
Managing the new wireless network (IEEE 802.11) policies settings
Windows Firewall with advanced security and IPsec
Deploy remote server administration tools

Configure access to resources (10–15%)
Configure shared resources
Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, set up and configure OneDrive
Configure file and folder access
Encrypt files and folders by using Encrypting File System (EFS), configure NTFS permissions, configure disk quotas, configure file access auditing
Configure authentication and authorization
Configure user rights, manage credentials, manage certificates, configure biometrics, configure picture password, configure PIN, set up and configure Microsoft account, configure virtual smart cards, configure authentication in workgroups or domains, configure User Account Control (UAC) behavior

Preparation resources
Microsoft Virtual Academy: Windows 8 security insights: Module 7—SmartScreen filtering
Windows authentication overview

Configure remote access and mobility (10–15%)
Configure remote connections
Configure remote authentication, configure Remote Desktop settings, configure virtual private network (VPN) connections and authentication, enable VPN reconnect, configure broadband tethering
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure WiFi direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage

Preparation resources
Windows 8 VPN get connected
Deploy Windows To Go in your organization
BitLocker Group Policy settings

Monitor and maintain Windows clients (10–15%)
Configure and manage updates
Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps
Manage local storage
Manage disk volumes and file systems, manage storage spaces
Monitor system performance
Configure and analyze event logs, configure event subscriptions, configure Task Manager, monitor system resources, optimize networking performance, configure indexing options

Preparation resources
Windows Update PowerShell module
Windows Performance Monitor
Windows 8: Task Manager retuned

Configure system and data recovery options (10–15%)

Configure system recovery
Configure a recovery drive, configure system restore, perform a driver rollback, perform a refresh or recycle, configure restore points
Configure file recovery
Restore previous versions of files and folders, configure file history, recover files from OneDrive

Preparation resources
Repair and recovery
How to: Set up and use file history on Windows 8
Windows 8 Jump Start Module 6: Recovery and security

QUESTION 1
A company has 100 client computers that run Windows 8.1.
You need to assign static IPv6 addresses to the client computers.
Which Windows Powershellcmdlet should you run?

A. Set-NetTCPSetting
B. Set-NetIPInterface
C. Set-NetlPv6Protocol
D. set-NetIPAddress

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/hh826151.aspx
Set-NetIPAddress
The Set-NetIPAddress cmdlet modifies IP address configuration properties of an existing IP address.
To create an IPv4 address or IPv6 address, use the New-NetIPAddress cmdlet.


QUESTION 2
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
Portable client computers no longer connect to the corporate wireless network.
You need to ensure that when the corporate wireless network is available, the computers always connect to it automatically.
Which two actions would achieve the goal? (Each correct answer presents a complete solution. Choose two.)

A. Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the organizational unit that contains the computers.
B. Configure the corporate wireless network as an unmetered network.
C. Configure the corporate wireless network as a preferred network.
D. Manually connect to the corporate wireless network and select the option to connect automatically to that network.

Answer: C,D
Explanation:

Answer:
Configure the corporate wireless network as a preferred network.
Manually connect to the corporate wireless network and select the option to connect
automatically to that network.
http://blogs.technet.com/b/canitpro/archive/2014/03/05/windows-8-1-tips-manage-wireless-
network-profiles.aspx
Windows 8.1 tips: Managing Wireless Network Profiles
And finally, if you wanted to change the preferred order for your machine to connect to
specific wireless network, you could move a network up in the priority list by using the
command: set profileorder name=goose interface=”Wi-Fi” priority=1


http://www.eightforums.com/tutorials/20152-wireless-networks-priority-change-windows-8-
a.html
How to Change Connection Priority of Wireless Networks in Windows 8 and 8.1
Windows usually connects to networks in this priority order:
? Ethernet
? WiFi (wireless)
? Mobile broadband
When you connect to a new WiFi network, it’s added to the list, and Windows will connect to that network while it’s in range. If you connect to another WiFi network while in range of the first network, Windows will prefer the second network over the first one.
Mobile broadband networks are treated differently. If you manually connect to a mobile
broadband network when there is a WiFi network in range, the mobile broadband network is preferred just for that session. The next time you’re in range of both networks, the WiFi network is preferred. This is because mobile broadband networks typically are metered.
If you want to force your PC to prefer a mobile broadband network over WiFi, tap or click the WiFi network in the list of networks, and then click Disconnect. Windows won’t automatically connect to that WiFi network.


QUESTION 3
A company has client computers that run Windows 8.1. The corporate network is configured for IPv4 and IPv6.
You need to disable Media Sensing for IPv6 on the client computers without affecting IPv4 communications.
What should you do on each client computer?

A. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
B. Run the Disable-NetAdapter Windows PowerShell cmdlet.
C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
D. Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.

Answer: C
Explanation: https:://technet.microsoft.com/en-us/library/hh826144.aspx Set-NetIPv6Protocol
Set-NetIPv6Protocol -DhcpMediaSense<DhcpMediaSense>
Specifies a value for Media Sense. The cmdlet modifies the value for this setting.
Media Sense provides a mechanism for the network adapter to notify the protocol stack of media connect and disconnect events. These events trigger the DHCP client to take an action, such as attempting to renew a DHCP lease or removing routes that are related to a disconnected network. When Media Sense is enabled, the network parameters on the laptop of a roaming user are automatically and transparently updated without requiring a restart when the user moves from one location to another. The acceptable values for this parameter are:
— Enabled
— Disabled
The default value is Enabled.
Further information: Disable-NetAdapterBinding
The Disable-NetAdapterBinding cmdlet disables a binding to a network adapter. Running this cmdlet causes loss of network connectivity depending on the binding that is disabled. Note: Disabling some adapter bindings can automatically enable other network adapter bindings.
Disable-NetAdapter
The Disable-NetAdapter cmdlet disables a network adapter. A network adapter must be enabled to connect to a network. This cmdlet causes loss of network connectivity of the specified network adapter. Note: Do not disable the network adapter being used to manage a remote computer. By default the user will be prompted to confirm the network adapter should be disabled
Set-NetlPv4Protocol
Is not a valid cmdlet.


QUESTION 4 DRAG DROP
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
? Ensure that COMPUTER2 can run remote commands on COMPUTER1.
? Test the solution by successfully running a command from COMPUTER2 that
executes on COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.
Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)


Answer:


QUESTION 5
A company has 100 client computers that run Windows 8.1. The client computers are members of a workgroup.
A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall settings.
Which Windows PowerShell cmdlet should you run on each client computer?

A. New-NetFirewallRule
B. Set-NetFirewallSetting
C. Set-NetFirewallRule
D. Set-NetFirewallProfile
E. New-NetIPSecMainModeRule

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/jj554908.aspx
New-NetFirewallRule
The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.
Further information: Set-NetFirewallSetting
The Set-NetFirewallSetting cmdlet configures properties that apply to the firewall and IPsec settings, regardless of which network profile is currently in use. This cmdlet allows the administrator to specify global firewall behavior.
Set-NetFirewallRule
The Set-NetFirewallRule cmdlet modifies existing firewall rule properties.
Set-NetFirewallProfile
The Set-NetFirewallProfile cmdlet configures options for the profiles, including domain, public, and private, that are global, or associated with the input rules.
New-NetIPSecMainModeRule
The New-NetIPsecMainModeRule cmdlet creates an IPsec main mode rule.
A main mode rule contains a set of local and remote end points to determine the peers to which it applies. When an application on the local computer attempts to communicate with one of these specified remote hosts, the computer attempts to establish a security association (SA) with the remote server.

 

Click here to view complete Q&A of 70-687 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-687 Training at certkingdom.com

Exam 70-686 Windows 7, Enterprise Desktop Administrator

Published: November 20, 2009
Languages: English
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist, MCITP

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Planning and managing a client life cycle strategy (16%)
Plan and manage client licensing and activation

Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualization licensing considerations; making recommendations for licensing strategy and compliance

Plan and manage software updates

Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance

Plan and manage a physical hardware and virtualization strategy

Analyzing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64 bit

Preparation resources
Licensing and volume activation
Application management and preparing for a Windows 7 deployment
Microsoft desktop virtualization strategy and product offerings

Designing a standard image (17%)

Design an image creation strategy

Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localization

Design a custom image

Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customized image

Define an image update strategy

Performance optimization; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing

Preparation resources
Choosing an image strategy and building Windows 7 system images
Phase 3: Preparing and customizing your Windows image
Phase 5: Managing and servicing your Windows image

Designing client configurations (17%)
Design standard system settings

Choosing methods, including logon scripts, startup scripts, and Group Policy; designing profiles; designing error reporting; designing audit policy

Define client security standards

Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage

Define Windows Internet Explorer settings

Defining security zones; cache location; branding; in-private mode; restricting or allowing plug-ins; add-ons; privacy policy; browser protected mode

Preparation resources
Local Group Policy editor
Windows Firewall with Advanced Security design guide
Change Internet Explorer security settings

Designing a Windows 7 client deployment (15%)

Analyze the environment and choose appropriate deployment methods

Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure

Design a lite-touch deployment strategy

Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism

Design a zero-touch deployment strategy

Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images

Design a user state migration strategy

Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration

Preparation resources
Choose the right Microsoft deployment tool
Lite-Touch, High-Volume Deployment
Zero-Touch, High-Volume Deployment

Designing application packages for deployment (17%)
Design a delivery or deployment strategy

Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualized, Remote Desktop Services, Group Policy, or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards

Manage application compatibility

Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim, or VDI; auditing incompatible software

Preparation resources
Choosing a deployment strategy
Application compatibility
Application compatibility for Windows 7: Unlocking the power of Application Shims

Identifying and resolving deployment and client configuration issues (19%)

Identify and resolve Internet Explorer issues

Security zones; Web applications; advanced settings; Group Policy restrictions; certificates

Identify and resolve Group Policy issues

Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance

Identify and resolve networking issues

Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall

Identify and resolve authentication and authorization issues

User rights; distinguishing between client-based and server-based issues; time synchronization (Kerberos)

Preparation resources
Troubleshooting
Windows Firewall with Advanced Security troubleshooting guide: Diagnostics and tools
Windows 7: Troubleshooting and support


QUESTION 1
You are planning to upgrade Internet Explorer. You have the following requirements:
* Create a report that identifies which computers are successfully upgraded.
* Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements. What should you do?

A. Use Windows Server Update Services (WSUS).
B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.
C. Use Microsoft System Center Configuration Manager.
D. Use Microsoft System Center Essentials.

Answer: A


QUESTION 2
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server
2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the
deployment of a custom application. You have the following requirements:
* The application must be available to only users who need it.
* Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements. Which deployment
method should you use?

A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy

Answer: C


QUESTION 3
Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client
computers that run Windows XP. Nine hundred of the computers are on the local area network.
One hundred computers are portable computers that connect to the main office only once every
few months. You are planning to deploy Windows 7. You need to generate a report of the software
that is installed on all client computers. You need this information as soon as possible. What should
you use?

A. Microsoft System Center Data Protection Manager
B. Microsoft Desktop Optimization Pack
C. Microsoft System Center Essentials
D. Microsoft System Center Operations Manager

Answer: B


QUESTION 4
Your network has client computers that run Windows Vista. You are planning to deploy Windows
7. You need to detect and analyze the compatibility of an application that requires elevated
privileges. What should you do?

A. Use the Standard User Analyzer (SUA) Wizard.
B. Run a virtual version of the Setup Analysis Tool (SAT).
C. Use the Standard User Analyzer (SUA) tool.
D. Run a stand-alone version of the Setup Analysis Tool (SAT).

Answer: C


QUESTION 5
Your company’s network has client computers that run Windows 7. Multiple users share the
computers in the shipping department. These computers reside in the Shipping Computers
organizational unit (OU). The company wants to deploy a new application. The application is not
packaged. You have the following requirements:
* Deploy the application to all computers in the shipping department.
* Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements. Which two actions
should you include in the process? (Each correct answer presents part of the solution. Choose two.)

A. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer
Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping
Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department users, and assign the package to the collection.

Answer: A,B

Click here to view complete Q&A of 70-686 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-686 Training at certkingdom.com

Exam 70-685 Windows 7, Enterprise Desktop Support Technician

Published: November 27, 2009
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Identifying cause of and resolving desktop application issues (20-25%)
Solve software installation escalations
Installation permissions; local administrator requirement; licensing restrictions; digital signing
Solve software failure escalations
Checking the logs; checking whether the application runs in Safe mode; running the application in a previous version of Windows; repairing the installation; checking recently added programs; restoring or reimaging the system

Preparation resources
Help with Windows 7 compatibility problems
Five steps to Windows 7 application readiness
Performance monitoring getting started guide

Identifying cause of and resolving networking issues (20-25%)
Solve enterprise logon issues
Hardware vs. network; password expiration; trust relationships with machine accounts; determining logon context; logon hours compliance
Solve enterprise network connectivity issues
Determining scope of issue; determining whether it’s a PC or a network connectivity issue; TCP/IP; hardware and cabling; proxies; default gateway
Solve enterprise names resolution issues
Checking which DNS is assigned; flushing the DNS cache; nslookup to DNS server; checking the DHCP scopes
Solve enterprise network printer issues
Hardware failure; server issues; printer failure; network issues; driver issues

Preparation resources
Windows 7: Troubleshooting connections
Open the printer troubleshooter

Managing and maintaining systems that run Windows 7 client (20-25%)
Identify and/or resolve performance issues
Analyzing system and application logs; analyzing started services; setting power management; checking hard drive space; optimizing virtual memory
Solve hardware failure issues
Identifying bad sectors; diagnosing memory issues; recommending replacement hardware; updating the BIOS; determining which component is broken

Preparation resources
Check a drive for errors
Learn best practices for optimizing the virtual memory configuration
Run diagnostics to check your system for memory problems

Supporting mobile users (15-20%)
Solve enterprise wireless connectivity issues
Signal strength; encryption types; encryption keys; wireless profiles; mobile devices
Solve enterprise remote access issues
VPN client not connecting; IPv6 support; access and authentication to network resources

Preparation resources
Wired and wireless network problems
Troubleshoot Remote Desktop problems
Why am I having problems with my VPN connection?

Identifying cause of and resolving security issues (15-20%)
Solve Windows Internet Explorer security issues
Adding trusted sites; advanced settings; installing plug-ins; identifying group policy restrictions; certificates
Solve enterprise issues due to malicious software
Analyzing services; analyzing programs; analyzing processes; analyzing browser helper add-ons; user account control
Solve enterprise storage security issues
Requirements for installing; recovering encryption keys; key management
Solve enterprise software update issues
Identifying software update level; checking whether client is receiving regularly scheduled updates; identifying incompatibility of update with other applications

Preparation resources
Change Internet Explorer 9 security settings
Troubleshoot problems with installing updates
Security monitoring and attack detection planning guide


QUESTION 1
The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1.
Users in the Marketing OU report that they can run FinanceApp1.
You need to ensure that only users in the Finance OU can run FinanceApp1.
What should you do?

A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A

Explanation:
Chapter 10 p 467- 468
Understanding the difference between SRP and AppLocker
You might want to deploy application control policies onto Windows operating systems earlier than Windows
Server2008R2 or Windows7. You can use AppLocker policies only on the supported editions of Windows
Server2008R2 and Windows7, but you can use SRP on supported editions of Windows beginning with
Windows Server2003 and WindowsXP. https:://technet.microsoft.com/en-us/library/ee460955(WS.10).aspx https:://technet.microsoft.com/en-us/library/dd548340(WS.10).aspx


QUESTION 2
Users in the ERPApp1 pilot project report intermittent application issues.
You need to consolidate all application events for the users in a central location.
What should you do?

A. Configure event subscriptions.
B. Configure the Advanced Audit Policy Configuration settings.
C. Create a custom view in Event Viewer.
D. Create a user-defined Data Collector Set.

Answer: A


QUESTION 3
The help desk reports that users in the Marketing OU print draft documents, e-mails, and
other miscellaneous documents on Printer2.
You need to recommend a solution so that marketing users print documents to Printer1 by default.
What should you do?

A. Enable printer pooling.
B. Configure Group Policy Preferences.
C. Modify the priorities of the shared printers.
D. Modify the permissions of the shared printers.

Answer: B


QUESTION 4
The Office1 network link is brought offline for emergency maintenance.
Users in Office2 and Office3 report that they cannot connect to the wireless network.
You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails.
What should you recommend?

A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured

Answer: B


QUESTION 5
The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?

A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.

Answer: A

Explanation:
https:://magalan.co.uk/install_software_via_group_policy.html

 


Click here to view complete Q&A of 70-685 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-685 Training at certkingdom.com

 

70-680 Exam Windows 7, Configuring

Published: April 1, 2009
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil), Russian, Spanish, Turkish
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Installing, upgrading, and migrating to Windows 7 (10–15%)
Perform a clean installation
Identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
Upgrade to Windows 7 from previous versions of Windows
Upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
Migrate user profiles
Migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load

Preparation resources
Upgrade and migration
Utility spotlight: Windows 7 installation simplified
Deployment and user profiles

Deploying Windows 7 (10–15%)
Capture a system image
Preparing system for capture; creating a WIM file; automated capture; manual capture
Prepare a system image for deployment
Inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
Deploy a system image
Automated deployment methods; manually deploying a customized image
Configure a VHD
Creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing

Preparation resources
Deploy Windows 7
Choosing an image strategy and building Windows 7 system images
Phase 4: Deploying your Windows image

Configuring hardware and applications (10–15%)
Configure devices
Updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
Configure application compatibility
Setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
Configure application restrictions
Setting software restriction policies; setting application control policies; setting through group policy or local security policy
Configure Internet Explorer
Configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure websites

Preparation resources
Configuring device properties
Application compatibility
Configuring Internet Explorer 8

Configuring network connectivity (10–15%)
Configure IPv4 network settings
Connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
Configure IPv6 network settings
Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
Configure networking settings
Adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
Configure Windows Firewall
Configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
Configure remote management
Remote management methods; configuring remote management tools; executing PowerShell commands

Preparation resources
Windows 7 and network connectivity
Configure network connections
Remote management of Windows 7 with Windows PowerShell

Configuring access to resources (10–15%)
Configure shared resources
Folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
Configure file and folder access
Encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
Configure user account control (UAC)
Configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
Configure authentication and authorization
Resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
Configure BranchCache
Distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management

Preparation resources
Accessing local and network resources in Windows 7
Authorization and access control technologies
Deploying BranchCache with remote access technologies

Configuring mobile computing (10–15%)
Configure BitLocker and BitLocker To Go
Configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
Configure DirectAccess
Configuring client side; configuring authentication; network infrastructure requirements
Configure mobility options
Configuring offline file policies; transparent caching; creating and migrating power policy
Configure remote connections
Establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps

Preparation resources
Windows 7 BitLocker: Configuration and deployment
DirectAccess Configuration, tips, tricks, and best practices
Configuring VPN remote access connections to use NAP based quarantine

Monitoring and maintaining systems that run Windows 7 (10–15%)
Configure updates to Windows 7
Configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
Manage disks
Managing disk volumes; managing file system fragmentation; RAID; removable device policies
Monitor systems
Configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
Configure performance settings
Configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power

Preparation resources
Manage disks
Windows performance monitor
Configure power plans

Configuring backup and recovery options (10–15%)
Configure backup
Creating a system recovery disk; backing up files, folders, or full system; scheduling backups
Configure system recovery options
Configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
Configure file recovery options
Configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles

Preparation resources
Create and use backups using the Backup and Restore Center
Restore system files and settings
System restore

QUESTION
01
You have a dual boot PC running both Vista and Windows 7 on partitions on the computer.
Which file would you edit to force the PC to book Vista by default?

A. boot.ini
B. ntfsboot.cfg
C. bcdedit.exe
D. system.cfg

Answer: C


QUESTION 02
Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next
reboot?

A. Copy and paste a Microsoft Word icon to the Taskbar.
B. Right click on the Microsoft Word icon and choose, “Staple to Superbar”.
C. Right click on the Microsoft Word icon and choose, “Pin this programm to taskbar”.
D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, “Pin
this program to taskbar”.

Answer: D


QUESTION 03
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is
used to remotely manage Computer2. From Computer1, you need to verify that the Windows
Remote Management (WinRM) service started on Computer2. What should you do?

A. At the command prompt, run Winrs -r:computer2 query.
B. At the command prompt, run Winrm id -remote:computer2.
C. From Windows Powershell, run Get -PSSession Computer2.
D. From Windows Powershell, run Get -PSSessionConfiguration Computer2.

Answer: A


QUESTION 04
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1
attempts to access a Web page. User1 fails to access the Web page and receives an error message
stating that the page does not have a rating. You need to configure Internet Explorer to allow User1
to access Web pages that do not have a rating. Which settings should you modify?

A. Content Advisor
B. InPrivate Filtering
C. Parental Controls
D. Restricted Sites

Answer: A


QUESTION 05
You are installing a 64-bit edition of Windows 7. During the installation, you receive an error
message when you attempt to add mass storage driver. You need to complete the installation of
Windows 7. You start the computer from the Windows 7 installation media. What should you do
next?

A. From the Install Windows dialog box, click RESCAN.
B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED).
C. From the Advanced Boot options menu, select SAFE MODE.
D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT.

Answer: B


QUESTION 06
You have a computer that runs windows 7. You need to configure the monitor on the computer to
turn off after 30 minutes of inactive. What should you do?

A. From personalization, change the theme.
B. From display, change display settings.
C. From action center, change the Action Center settings.
D. From power options, change the current power plan settings.

Answer: D


QUESTION 07
You have a computer that runs windows 7. The windows experience index displays the subscores
in the following:
* Component Subscore
* Processor 6.9
* Memory (RAM) 5.3
* Graphics 3.2
* Gaming graphics 4.1
* Primary hard disk 4.5
You need to increase the Windows Experience Index base score. What should you do?

A. Add more RAM.
B. Add a second hard disk.
C. Upgrade the video adapter.
D. Upgrade to a faster processor.

Answer: C


QUESTION 08
You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must
prevent users that log on to your computer from modifying files in the VHD. What should you do?

A. From Disk Management, attach the VHD as read-only.
B. From Disk Management, convert the VHD to a GPT disk.
C. From Windows Explorer, modify the permissions of the VHD file.
D. From Windows Explorer, modify the read-only attribute of the VHD file.

Answer: A


QUESTION 09
Your computer running Windows 7 Enterprise has two internal hard disks. System protection is
configured by default on the C: drive, which holds the operating system and installed applications.
The D: drive is a 500 GB hard disk formatted with the NTFS filing system, and you use it to store
your personal files. You want to store previous versions going back several months and therefore
intend to reserve 200 GB of this disk for system protection. You are not using either of your internal
disks for backup; instead, you store your backups on a 1 TB external USB hard disk. How do you
configure system protection on your D: drive? (Choose all that apply; each answer forms a part of
the complete solution.)

A. Select Restore System Settings And Previous Versions Of Files.
B. Select Only Restore Previous Versions Of Files.
C. Set the Max Usage slider control to 40 percent.
D. Set the Max Usage slider control to 4 percent.

Answer: BC


QUESTION 10
An employee who works from home telephones your help desk. A virus attack has deleted his
computer’s single internal hard disk. He carried out a System Image backup on his computer three
months ago and automatically backs up his personal files every night. He uses an external USB hard
drive formatted with the NTFS file system to hold his backups. All his personal files are in his
Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.)

A. Carry out a System Image restore.
B. Carry out a system restore.
C. Use Restore Previous Versions to restore his Documents library from a shadow copy.
D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.

Answer: AD

Click here to view complete Q&A of 70-680 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-680 Training at certkingdom.com