Advertisement
jmacc

Operating and Managing a Secure Windows 8 Environment-2

Dec 28th, 2012
439
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.05 KB | None | 0 0
  1. Implementing Security and Control Measures
  2.  
  3. You plan to deploy Windows 8 by using Microsoft Deployment Toolkit (MDT) 2012. Windows 8 will be installed on encrypted hard disk drives.
  4. What should you include in the MDT 2012 Windows Preinstallation Environment (Windows PE) boot image?
  5.  
  6. ------the Enhanced Storage feature pack
  7.  
  8. ------------------------------------------------------------------------------------------------------------------------------------------
  9. You install a Windows Store app named App1 on a client computer that runs Windows 8.
  10. You need to ensure that App1 can only connect to another client computer by using Near-Field Communication (NFC).
  11. What should you configure?
  12.  
  13. -----Windows Firewall with Advanced Security
  14.  
  15. -----------------------------------------------------------------------------------------------------------------------------------
  16. You need to identify which component is required to support virtual smart cards on client computers that run Windows 8.
  17. Which component should you identify?
  18.  
  19. ------a Trusted Platform Module (TPM)
  20.  
  21. ----------------------------------------------------------------------------------------------------------------------------------------
  22. You have a client computer that runs Windows 8.
  23. You use Credential Locker to store a password for a secure website.
  24. You suspect that your password for the website has been compromised.
  25. You need to change your password for the website.
  26. What should you do to change your password?
  27.  
  28. -----Launch Internet Explorer and connect to the secure website.
  29.  
  30. ----------------------------------------------------------------------------------------------------------------------------------------
  31. Your network contains two client computers. The computers are configured as shown in the following table.
  32. Computer name Operating system Internet connectivity
  33. Client1 Windows 8 Enterprise Yes
  34. Client2 Windows 8 Enterprise No
  35. You need to ensure that users who log on to Client2 can list up-to-date help topics for all locally installed Windows PowerShell modules.
  36. Which two PowerShell cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)
  37.  
  38. ---Update-Help
  39.  
  40. ---Save-Help
  41.  
  42. ---------------------------------------------------------------------------------------------------------------------------------------
  43. Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.
  44. You are evaluating whether to deploy Windows 8.
  45. You need to identify which security feature requires a server that runs Windows Server 2012.
  46. Which security feature should you identify?
  47.  
  48. ----BitLocker Network Unlock
  49.  
  50. -----------------------------------------------------------------------------------------------------------------------------------------
  51. You need to identify the operating system or systems to which you can apply AppLocker rules.
  52. What should you identify? (Choose all that apply.)
  53.  
  54. ---Windows 8
  55.  
  56. Windows 8 Pro
  57.  
  58. Windows 8 Enterprise
  59.  
  60. ---Windows 7 Enterprise
  61.  
  62. ---Windows Vista Enterprise
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement