070-687 試験問題を無料オンラインアクセス
試験コード: | 070-687 |
試験名称: | Configuring Windows 8 |
認定資格: | Microsoft |
無料問題数: | 266 |
更新日: | 2025-10-11 |
A company has Windows 8.1 client computers.
Users frequently run a custom web application that modifies the system registry. Each time the application starts, the user is prompted for administrative approval.
You need to ensure that users can run the custom application and not be prompted for administrator approval.
What should you do?
A company has client computers that run Windows 8.1.
The company implements the following security requirements:
- All client computers must use two-factor authentication. - At least one authentication method must include exactly four characters or gestures.
You need to choose authentication methods that comply with the security requirements.
Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)
You administer Windows 8.1 Pro computers in your company network. A server named Server1 runs Windows Server 2012. Server1 allows incoming VPN and Remote Desktop connections.
A remote user requires access to files on Server1.
You need to prevent the user from downloading any files from Server1 to his local computer.
Your solution must ensure that the user can read the files on Server1.
What should you do?
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
You need to configure 20 portable computers so that they sleep after 20 minutes when running on battery power. You must accomplish this goal by using the least amount of administrative effort.
Which two actions should you perform? (Each correct answer presents part of the complete solution. Choose two.)
You administer Windows 8.1 client computers in your company network. A computer that is used by non-administrator users has a directory named C:\Folder1.
A shared collection of Microsoft Excel files is stored in the C:\Folder directory, with non-administrator users being granted modify permissions to the directory.
You discover that some files have been incorrectly modified by a user.
You need to determine which user made changes to the directory's folder's files.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)