You need to recommend a feature to minimize the number of temporary Internet files and cookies retained on client computers that run Windows 8. The solution must ensure that temporary Internet files and cookies from the websites in Favorites are retained. Which feature should you recommend? --no--Enhanced Protected Mode InPrivate Browsing SmartScreen Filter -----Delete Browsing History ------------------------------------------------------------------------- You need to recommend a solution to protect the entire contents of the system drive on a client computer that run Windows 8. The solution must ensure that any offline attempts to tamper with the hardware on the computer will prevent the computer from starting. What should you include in the recommendations? ------BitLocker Drive Encryption (BitLocker) with a Trusted Platform Module (TPM) -------------------------------------------------------------------------- Your network contains an Active Directory domain. The domain contains servers that run Windows Server 2008 R2. You need to identify which access control and authorization features are available on client computers that run Windows 8 Enterprise. Which features should you identify? (Choose all that apply.) Kerberos tickets with compound identity ----an enhanced access control list (ACL) editor ---conditional expressions ---user claims ----device claims ----------------------------------------------------------------------------- You need to identify which rule type is supported by software restriction policies but not supported by AppLocker. Which rule should you identify? -----Internet zone --------------------------------------------------------------------------- Your network contains 40 client computers that run Windows 8 Pro. Multiple Activation Key (MAK) volume license keys will be used on the computers. You need to recommend a solution to activate all of the computers without requiring that the computers connect to the Internet. The solution must require the minimum amount of administrative effort. What should you include in the recommendation? Active Directory-Based Activation ---no--the Key Management Service (KMS) ----the Volume Activation Management Tool (VAMT) ---no-MAK independent activation --------------------------------------------------------------------------- You have a client computer that runs Windows 8. You configure the computer to participate in the Windows Customer Experience Improvement Program (CEIP). You need to monitor the events generated by CEIP. Which event log should you monitor? -----Application