Microsoft Official Exam Center Latest Added Questions and Answers For 70-680 Exam Free Download from Braindump2go!

Vendor: Microsoft
Exam Code: 70-680
Exam Name: TS: Windows 7, Configuring

120[2][2]

QUESTION 366
Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.)
In the branch office, you deploy a new computer named Computer1 that runs Windows 7.
You need to assign an IP address to Computer1.
Which IP address should you use?

wps5B5D.tmp[6]_thumb

A.    192.168.2.30
B.    192.168.2.40
C.    192.168.2.63
D.    192.168.2.65

Answer: B
Explanation:

Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224

wpsF250.tmp_thumb

QUESTION 367
You have a computer that runs Windows Vista.
You install Windows 7 on a new partition on the computer.
You need to ensure that the computer always starts Windows Vista by default.
What should you do?

A.    Create a boot.ini file in the root of the Windows 7 partition.
B.    Create a boot.ini file in the root of the Windows Vista partition.
C.    Run Bcdedit.exe and specify the /default parameter.
D.    Run Bcdedit.exe and specify the /bootems parameter.

Answer: C

QUESTION 368
You have a computer that runs Windows Vista. The computer contains a custom application.
You need to export the user state and the settings of the custom application.
What should you do?

A.    Run Loadstate.exe and specify the /config parameter.
B.    Run Scanstate.exe and specify the /genconfig parameter.
C.    Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter.
D.    Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

Answer: D
Explanation:
MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screensaver settings, taskbar settings, and wallpaper settings.(Include) /i:[Path\]FileName Specifies an .xml file that contains rules that define what user, application or system state to migrate. You can specify this option multiple times to include all of your .xml files (MigApp.xml, MigUser.xml and any custom .xml files that you create). Path can be either a relative or full path. If you do not specify the Path variable, then FileName must be located in the current directory.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.

QUESTION 369
You have a computer that runs Windows 7. Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?

A.    Start the Problem Steps Recorder.
B.    From Event Viewer, modify the properties of the Security log.
C.    From the local Group Policy, configure the Audit object access setting.
D.    From the local Group Policy, configure the Audit directory service Access setting.

Answer: C
Explanation:
Audit object access
Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.

QUESTION 370
You have a computer that runs Windows 7. The computer has two volumes named volume C and volume D. You create a document on volume D.
You manually create a restore point and modify the document.
You view the properties of the document as shown in the exhibit. (Click the Exhibit button.)

wps7861.tmp_thumb

You need to ensure that you can restore the current version of the document if the document is modified. What should you do first?

A.    Run Disk Cleanup on volume D.
B.    Enable auditing on the document.
C.    Turn on System Protection for volume D.
D.    Start the Volume Shadow Copy Service (VSS).

Answer: C
Explanation:
System Protection
System protection regularly creates and saves information about your computer’s system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson.

QUESTION 371
You start a computer by using Windows Preinstallation Environment (Windows PE).
You need to dynamically load a network adapter device driver in Windows PE.
What should you do?

A.    Run Peimg.exe and specify the device driver path.
B.    Run Drvload.exe and specify the device driver path.
C.    Run Winpeshl.exe and specify a custom Winpeshl.ini file.
D.    Run Wpeutil.exe and specify the InitializeNetwork command.

Answer: B
Explanation:
Drvload
The Drvload tool adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs. To add a driver to an offline Windows PE image, use the peimg tool.NOT WinpeshlWinpeshl.ini controls whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. To load a customized shell, create a file named Winpeshl.ini and place it in %SYSTEMROOT% \System32 of your customized Windows PE image. The .ini file must have the following section and entry.NOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network.

QUESTION 372
Your network contains a wireless access point.
You have a computer that runs Windows 7.
The computer connects to the wireless access point.
You disable Service Set Identifier (SSID) broadcasts on the wireless access point.
You discover that you are now unable to connect to the wireless access point from the Windows 7 computer.
You need to ensure that the computer can
connect to the wireless access point. What should you do?

A.    From Credential Manager, modify the generic credentials.
B.    From Credential Manager, modify the Windows credentials.
C.    From Network and Sharing Center, turn on Network discovery.
D.    From Network and Sharing Center, modify the wireless network connection settings.

Answer: D
Explanation:
Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax:
netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault.
You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.

QUESTION 373
You have a computer that runs Windows 7.
You need to prevent users from copying unencrypted files to removable drives.
What should you do?

A.    From a local Group Policy, modify the Trusted Platform Module (TPM) settings.
B.    From the Trusted Platform Module (TPM) snap-in, initialize TPM.
C.    From Control Panel, modify the BitLocker Drive Encryption settings.
D.    From a local Group Policy, modify the BitLocker Drive Encryption settings.

Answer: D
Explanation:
How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are:
Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.

QUESTION 374
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office.
You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)

wpsB1C9.tmp_thumb

You need to ensure that other
computers in the branch office can access the cached content on your computer.
What should you do?

A.    Turn on Internet Information Services (IIS).
B.    Configure the computer as a hosted cache client.
C.    Configure the BranchCache service to start automatically.
D.    Modify the Windows Firewall with Advanced Security rules.

Answer: D
Explanation:
Distributed Cache Mode
Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. You must select Allow the connection for the BranchCache client to be able to send traffic on this port.

QUESTION 375
You have a computer named Computer1 that runs Windows 7.
You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network.
What should you do?

A.    From Windows Firewall with Advanced Security, create a new rule.
B.    From the local Group Policy, modify the application control policies.
C.    From Windows Firewall, modify the Allowed Programs and Features list.
D.    From Network and Sharing Center, modify the Advanced Sharing settings.

Answer: A
Explanation:
Creating WFAS Rules
The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, shown in Figure 7-7, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.

QUESTION 376
You have a computer that runs Windows 7. A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users.
What should you do?

A.    From the printer’s properties, assign the Print permission to the Sales group.
B.    From the printer’s properties, assign the Manage Documents permission to the Sales group.
C.    From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D.    From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.

Answer: A
Explanation:
The available permissions are:
– Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
– Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
– Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.

QUESTION 377
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?

A.    From Credential Manager, modify the Windows credentials.
B.    From Authorization Manager, modify the Authorization Manager options.
C.    Run Del and specify the /p parameter.
D.    Run Runas and specify the /noprofile parameter.

Answer: A
Explanation:
Credential Manager
Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self- signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.

wpsE22D.tmp_thumb

QUESTION 378
You have a computer that runs Windows 7. The computer is joined to a domain.
You need to ensure that only approved USB drives can be used on the computer.
Which two policy settings should you configure?
(Each correct answer presents a part of the solution. Choose two.)

A.    Enable Prevent installation of removable devices.
B.    Enable Prevent installation of devices not described by other policy settings.
C.    Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the
approved USB drives.

D.    Enable Allow installation of devices that match any of these device IDs and enter the device ID for the
approved USB drives.

Answer: BD

QUESTION 379
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1.
You need to configure Computer2 to connect to Network1 by using the same settings as Computer1.
What should you do on Computer1?

A.    At the command prompt, run Wecutil.exe -es -gr.
B.    At the command prompt, run Winrs.exe -environment.
C.    From Windows Firewall with Advanced Security, export the policy.
D.    From the wireless network properties of Network1, copy the network profile to a USB flash drive.

Answer: D
Explanation:
The Copy this network profile to a USB flash drive link launches the Copy Network Settings wizard, which writes the wireless network profile settings to a USB flash drive.
You can then use this flash drive to automate the wireless network profile configuration of other computers. To save your wireless network settings to a USB flash drive, insert a USB flash drive into the computer, and then follow these steps:
1. Click to open Network and Sharing Center.
2. In the left pane, click Manage wireless networks.
3. Right-click the network, click Properties, and then click Copy this network profile to a USB flash drive.
4. Select the USB device, and then click Next.
5. Follow the instructions in the wizard, and then click Close.

wps1464.tmp_thumb

QUESTION 380
You are preparing a custom Windows 7 image for deployment.
You need to install a third-party network interface card (NIC) driver in the image.
What should you do?

A.    Run Pkgmgr.exe and specify the /ip parameter.
B.    Run Dism.exe and specify the /add-driver parameter.
C.    Create a new answer file by using Windows System Image Manager (Windows SIM).
Run Pkgmgr.exe and specify the /n parameter.

D.    Create a new answer file by using Windows System Image Manager (Windows SIM).
Run Dism.exe and specify the /apply-unattend parameter.

Answer: B
Explanation:
Dism
Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment.
You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool.
You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing.
You can use DISM to perform the following actions:
– Prepare a Windows PE image.
– Enable or disable Windows features within an image.
– Upgrade a Windows image to a different edition.
– Add, remove, and enumerate packages.
– Add, remove, and enumerate drivers.
– Apply changes based on the offline servicing section of an unattended answer file.
– Configure international settings.
– Implement powerful logging features.
– Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
– Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
– Service all platforms (32-bit, 64-bit, and Itanium).
– Use existing Package Manager scripts.


Guaranteed 100% Microsoft 70-680 Exam Pass OR Full Money Back! Braindump2go Provides you the latest 70-680 Dumps PDF & VCE for Instant Download!

120[2][2]

http://www.braindump2go.com/70-680.html