Q21. You administer Windows 7 client computers in your company network. The computers are members of an Active Directory Domain Services (AD DS) domain and have 16-bit applications installed.
You plan to upgrade all of the computers from Windows 7 to Windows 8.1.
You need to ensure that the 16-bit applications will continue to run on Windows 8.1.
What are two version of Windows 8.1 that you could use to achieve this goal? (Each correct answer presents a complete of the solution. Choose two.)
A. Windows 8.1 Pro (64-bit)
B. Windows 8.1 Enterprise (64-bit)
C. Windows 8.1 Pro (32-bit)
D. Windows RT
E. Windows 8.1 Enterprise (32-bit)
Answer: CE
Q22. A company has an Active Directory Domain Services domain named contoso.com. The domain contains two sites that are named SiteA and SiteB. The company uses Windows
8.1 Pro laptop computers. The computer account objects are located in an Organizational Unit (OU) named Laptops.
The company plans to deploy a wireless network infrastructure.
You need to preconfigure all laptop computers with the wireless network access information by using a Group Policy Object (GPO).
What should you do?
A. Create and link a GPO to a group containing all laptop computers. Edit the GPO and configure a Wireless Network Policy.
B. Create and link a GPO to the Laptops OU. Edit the GPO and configure a Wireless Network Policy.
C. Create and link a GPO to a SiteA. Edit the GPO and configure a Wireless Network Policy.
D. Create and link a GPO to a SiteB. Edit the GPO and configure a Wireless Network Policy,
Answer: B
Q23. You are configuring a computer that will be used in a kiosk in a public area. You install a new internal hard drive.
You need to protect the computer from starting an unauthorized operating system.
What should you do?
A. Ensure that the computer BIOS supports Unified Extensible Firmware Interface (UEFI) and is enabled.
Install Windows 8.1 Pro 64-bit using UEFI and install it on the internal hard drive.
B. Install Windows 8.1 Pro 64-bit on the internal hard drive.
Enable BitLocker on the internal hard disk.
C. Partition the internal hard drive as MBR disk. Install Windows 8.1 Enterprise 64-bit.
D. Partition the internal hard drive as GPT disk. Install Windows 8.1 Pro 64-bit.
Answer: A
Q24. A company has 10 client computers that run Windows 8.1. You are responsible for technical support. You purchase a support tool from the Windows Store while logged in with your Microsoft account.
You install the support tool on several client computers.
Three months later, you attempt to install the support tool on another client computer. The installation fails.
You need to ensure that you can install the support tool on the client computer.
What should you do?
A. Log in with your Microsoft account and remove a computer from the Windows Store device list.
B. On the computer on which you want to install the tool, synchronize the Windows Store application licenses.
C. Disassociate your Microsoft account from the computer on which you want to install the tool. Then reassociate your Microsoft account with the computer.
D. Reset your Microsoft account password.
Answer: A
Q25. A computer runs Windows 8.1. You install an application by running an .msi file.
You need to apply a patch to the application.
Which command should you run?
A. dism /Online /add-package:C:\MyPatch.msp
B. dism /get-AppPatches /get-PackageInfo:C:\MyPatch.msp
C. msiexec /x "C:\MyPatch.msp"
D. msiexec/p "C:\MyPatch.msp"
Answer: D
Q26. A company has a client computer that runs Windows 8.1 with secure boot enabled. You install a third-party adapter with an Option ROM in the computer.
When you start the computer, it starts in the Windows Recovery Environment (Windows RE).
You need to ensure that the computer starts normally.
What should you do?
A. Install a Trusted Platform Module (TPM) chip.
B. Start the computer in Safe Mode. Then update the adapter drivers.
C. Replace the third-party adapter with an adapter that is signed by a trusted Certificate Authority (CA).
D. Create a self-signed certificate. Associate the certificate with the third-party adapter.
Answer: C
Q27. A company has client computers that run Windows 8.1.
The company implements the following security requirements:
· All client computers must use two-factor authentication.
· At least one authentication method must include more than four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)
A. PIN
B. Biometric authentication
C. Picture Password
D. Microsoft Account
Answer: BD
Q28. A company has Windows 8.1 client computers.
A user stores files in multiple locations.
You need to determine which of the locations will be included in File History.
Which three of the following file locations are included in File History? (Each correct answer presents part of the solution. Choose three.)
A. %appdata%
B. Public Documents and Public Pictures
C. My Documents and My Pictures
D. Contacts, Desktop, and Favorites
E. C:\Program Files
F. All user profile folders
Answer: BCD
Q29. A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Client computers use Window BitLocker Drive Encryption with a Trusted Platform Module (TPM) chip.
You need to create a Group Policy object (GPO) that will secure the TPM owner information.
Which policy setting should you configure?
A. Enable the Turn on TPM backup to Active Directory Domain Services policy setting.
B. Enable the Configure the level of TPM usage authorization information available to the registry policy setting.
C. Set the Configure the level of TPM owner authorization information available to operating system policy setting to Full.
D. Enable the Configure TPM platform validation profile policy setting.
Answer: A
Q30. You administer an installation of Windows 8.1 that runs as a virtual machine. The virtual machine has one 60-GB fixed size virtual hard disk with a single partition assigned as Volume C.
The virtual machine runs out of disk space. You increase the size of the virtual hard disk file to 200 GB to support an application demand for increased storage on Volume C.
You discover that Volume C is still 60 GB in File Explorer of the virtual machine.
You need to ensure that Volume C is configured to use 200 GB.
What should you do?
A. Configure the Virtual Disk type from fixed size to dynamic disk.
B. From Disk Management of the virtual hard disk, run the Extend the volume action task.
C. From Disk Management of the host computer, extend the Volume C.
D. Create a new storage space of Simple (no resiliency) type.
Answer: B