Operating and Managing a Secure Windows 8 Environment-1


SUBMITTED BY: Guest

DATE: Nov. 19, 2013, 3:17 a.m.

FORMAT: Text only

SIZE: 2.8 kB

HITS: 659

  1. You need to recommend a feature to minimize the number of temporary Internet files and cookies retained on client computers that run Windows 8. The solution must ensure that temporary Internet files and cookies from the websites in Favorites are retained.
  2. Which feature should you recommend?
  3. --no--Enhanced Protected Mode
  4. InPrivate Browsing
  5. SmartScreen Filter
  6. -----Delete Browsing History
  7. -------------------------------------------------------------------------
  8. You need to recommend a solution to protect the entire contents of the system drive on a client computer that run Windows 8. The solution must ensure that any offline attempts to tamper with the hardware on the computer will prevent the computer from starting.
  9. What should you include in the recommendations?
  10. ------BitLocker Drive Encryption (BitLocker) with a Trusted Platform Module (TPM)
  11. --------------------------------------------------------------------------
  12. Your network contains an Active Directory domain. The domain contains servers that run Windows Server 2008 R2.
  13. You need to identify which access control and authorization features are available on client computers that run Windows 8 Enterprise.
  14. Which features should you identify? (Choose all that apply.)
  15. Kerberos tickets with compound identity
  16. ----an enhanced access control list (ACL) editor
  17. ---conditional expressions
  18. ---user claims
  19. ----device claims
  20. -----------------------------------------------------------------------------
  21. You need to identify which rule type is supported by software restriction policies but not supported by AppLocker.
  22. Which rule should you identify?
  23. -----Internet zone
  24. ---------------------------------------------------------------------------
  25. Your network contains 40 client computers that run Windows 8 Pro.
  26. Multiple Activation Key (MAK) volume license keys will be used on the computers.
  27. You need to recommend a solution to activate all of the computers without requiring that the computers connect to the Internet. The solution must require the minimum amount of administrative effort.
  28. What should you include in the recommendation?
  29. Active Directory-Based Activation
  30. ---no--the Key Management Service (KMS)
  31. ----the Volume Activation Management Tool (VAMT)
  32. ---no-MAK independent activation
  33. ---------------------------------------------------------------------------
  34. You have a client computer that runs Windows 8.
  35. You configure the computer to participate in the Windows Customer Experience Improvement Program (CEIP).
  36. You need to monitor the events generated by CEIP.
  37. Which event log should you monitor?
  38. -----Application

comments powered by Disqus