Advertisement
jmacc

Operating and Managing a Secure Windows 8 Environment-4

Dec 31st, 2012
679
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.49 KB | None | 0 0
  1. Operating and Managing a Secure Windows 8 Environment--Troubleshooting Resources, Tips and Tricks
  2.  
  3. On a client computer that runs Windows 8, you need to track all of the network connections that Windows Firewall drops.
  4. What should you do?
  5.  
  6. ---no--From Event Viewer, enable ConnectionSecurityVerbose logs.
  7.  
  8. ---From Windows Firewall with Advanced Security, modify the Logging settings of each profile.
  9.  
  10. From Monitoring in Windows Firewall with Advanced Security, click Firewall.
  11.  
  12. --no--From Monitoring in Windows Firewall with Advanced Security, click Connection Security Rules.
  13. -------------------------------------------------------------------------
  14. You need to identify the location of the primary log file listing the errors that occur during the specialize phase of Windows 8 Setup.
  15. Which location should you identify?
  16.  
  17. ----%WinDir%\Panther
  18. --------------------------------------------------------------------------
  19. You migrate the user settings from a client computer that runs Windows Vista to a client computer that runs Windows 8 by using the User State Migration Tool (USMT).
  20. You need to verify whether the catalog of the compressed migration store is corrupted.
  21. Which tool should you use?
  22.  
  23. ---Usmtutil
  24.  
  25. --------------------------------------------------------------------------
  26. You have domain member computers that run Windows 8. You successfully collect application compatibility data from the computers by using the Microsoft Application Compatibility Toolkit (ACT).
  27. You discover that workgroup computers that run Windows 8 fail to upload data to the ACT Log Processing Service share. The data collector receives "Access Denied" error messages.
  28. You need to ensure that the workgroup computers can copy collected data to the ACT Log Processing Service share.
  29. What should you do?
  30.  
  31. ----Assign the Anonymous group permissions to the ACT Log Processing Service share.
  32.  
  33. -----------------------------------------------------------------------------
  34. You use the Volume Activation Management Tool (VAMT) to manage the licensing of client computers that run Windows 8.
  35. You discover that a computer named Client1 reports its status as Notification and Non-Genuine.
  36. You need to ensure that Client1 reports its status as Licensed and Genuine.
  37. What should you do? (Each correct answer presents part of the solution. Choose two.)
  38.  
  39. ---From Volume Activation Management Tool, install a product key and activate Client1.
  40.  
  41. ---From Client1, connect to the Windows Genuine Advantage (WGA) website.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement