It is impossible to pass Microsoft 70-680 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70-680 practice questions. You will get a surprising result by our Improved TS:Windows 7,Configuring practice guides.
Q291. - (Topic 3)
You have a computer that runs Windows 7. The computer is a member of a domain.
You share D:\data as Data. You assign Everyone Full control share permissions to the folder. No other share permissions are assigned to the folder.
From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: "Destination Folder Access Denied".
You need to ensure that you can create files in the Data share by using the User1 account.
What should you do?
A. Create a local user named User1.
B. Add User1 to the local Power Users group.
C. Assign User1 Write NTFS permission on the D:\data folder.
D. Assign User1 Full control share permissions to the Data share.
Answer: C
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share permissions do not affect users who log on locally, or log on using Remote Desktop. To set permissions for users who log on locally or using Remote Desktop, use the options on the Security tab instead of the Share Permissions tab. This sets permissions at the NTFS file system level. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder. For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally. Permissions The Read permission allows a user or group to access a file or folder but does not allow modification or deletion. The Change permission includes the read permission but also allows you to add files, delete files, and modify files in the shared folder. This permission is equivalent to the Read/Write permission in the basic File Sharing dialog box. The Full Control permission includes all the rights conferred by the Change and Read permissions. It also allows the user assigned that permission to modify the permissions of other users. Full Control is equivalent to the basic sharing Owner permission, though unlike basic sharing, where there can only be one user assigned the Owner permission, you can assign the Full Control permission to users and groups. NTFS permissionsYou can configure the local NTFS permissions for a shared folder or volume using Share and Storage Management in the following ways: New shared resources. In the Provision a Shared Folder Wizard, before you select a network sharing protocol, you can change the NTFS permissions for the folder or volume you will be sharing. These NTFS permissions will apply both locally and when accessing the resource over the network. To change the NTFS permissions, on the NTFS Permissions page, select Yes, change NTFS permissions, and then click Edit Permissions. Existing shared resources. You can change the NTFS permissions of a shared folder or volume listed on the Shares tab. To change the NTFS permissions, select the folder or volume, in the Actions pane click Properties, and on the Permissions tab, click NTFS Permissions.
Q292. - (Topic 4)
You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share.
You need to identify whether you are working on an offline version of a file.
What should you do?
A. From Sync Center, click View sync partnerships.
B. From Action Center, click View archived messages.
C. From Windows Explorer, select the file and then view the toolbar.
D. From Windows Mobile Device Center, click the Connection settings.
Answer: C
Explanation:
To find out whether you're working offline: Offline files turn on automatically if you lose your network connection. A copy of your file is copied to your computer, and once your network connection is re-established, the two copies will be synchronized. To find out if you're working offline, do the following.
1. Open the network folder that contains the file you are working on.
2. Check the Details pane at the bottom of the window for the status. If the status is offline, you are working with a copy of the file on your computer. If the status in online, you are working with the file on the network.
Q293. - (Topic 2)
You have a computer that runs windows 7.
You log on to the computer by using a user account that is a member of Administrator Group.
From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad.
You attempt to save the file and receive the save as dialog box.
You need to ensure that you can save changes to c:\windows\system32\drivers\
What should you do?
A. Stop the windows search service
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer.
Answer: C
Explanation:
Windows 7 does not allow applications to write data to these secure locations.
User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when
the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC
Q294. - (Topic 2)
You have a computer named Computer1 that runs Windows 7.
Computer1 uses an NTFS-formatted USB drive that has ReadyBoost enabled.
You need to modify the amount of space that ReadyBoost reserves on the USB drive.
What should you do?
A. Open Computer and modify the properties of the USB drive.
B. Open Performance Information and Tools and run disk cleanup.
C. Open Devices and Printers and modify the properties of the USB drive.
D. Open Device Manager and modify the properties of the USB device.
Answer: A
Explanation:
ReadyBoostWindows 7 supports Windows ReadyBoost. This feature uses external USB flash drives as a hard disk cache to improve disk read performance. Supported external storage types include USB thumb drives, SD cards, and CF cards. Since ReadyBoost will not provide a performance gain when the primary disk is an SSD, Windows 7 disables ReadyBoost when reading from an SSD drive. External storage must meet the following requirements:
-Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space.The 4-GB limit of Windows Vista has been removed.
-At least a 2.5 MB/sec throughput for 4-KB random reads
-At least a 1.75 MB/sec throughput for 1-MB random writes
Q295. - (Topic 1)
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?
A. PhysiRAM
B. Aero Glass
C. DirectAccess
D. ReadyBoost
Answer: D
Q296. - (Topic 4)
A company has a new deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You need to capture an image of a Windows 7 reference computer.
Which two actions should you perform on the server before performing actions on the reference computer? (Each correct answer presents a complete solution. Choose two.)
A. Run the Dism command with the /Mount-Wim option.
B. Create a capture image in WDS.
C. Run the BCDEdit command.
D. Run the Dism command with the /Add-Driver option.
E. Run the imageX command with the /Mount parameter.
F. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
G. Add a boot image in WDS.
H. Run the Start/w ocsetupcommand.
I. Run the PEImg /Prep command.
J. Run the DiskPart command and the Attach command option.
K. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
L. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True,
M. Run the Dism command with the /Add-Package option.
N. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False.
Answer: B,G
Explanation:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx MDT relies on boot images created in WDS, WAIK is a collection of tools that you use to help automate deployment. To capture an image created on a reference computer you need to add a boot.wim files to WDS, then using the boot.wim, create a capture wim file (usually called capture.wim). This allows you to capture a a reference computer.
Q297. - (Topic 1)
You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three.
A. Run setup.exe from the DVD to start the Windows 7 installation.
B. Use the autorun feature on the DVD to start the installation.
C. Perform a full installation of Windows 7.
D. Perform and upgrade of Windows 7 keeping all the Windows XP settings.
Answer: A,B,C
Q298. - (Topic 2)
You have 15 computers that run Windows 7.
You need to implement a monitoring solution that meets the following requirements:
. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications
What should you do?
A. On all the computers, configure a custom view. Configure a custom task for the application error events.
B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events.
C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log.
D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log.
Answer: D
Explanation:
Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy.
Q299. - (Topic 2)
You have a computer that runs Windows Vista.
You install Windows 7 on a new partition on the computer.
You need to ensure that the computer always starts Windows Vista by default.
What should you do?
A. Run Bcdedit.exe and specify the /default parameter.
B. Run Bcdedit.exe and specify the /bootems parameter.
C. Create a boot.ini file in the root of the Windows 7 partition.
D. Create a boot.ini file in the root of the Windows Vista partition.
Answer: A
Explanation:
The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses
Q300. - (Topic 6)
You have an answer file named Unattend.xml for a Windows 7 automated installation.
You need to perform an unattended installation of Windows 7 by using the answer file.
What should you do?
A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD.
D. Name the answer file as autounattend.ini and save it to a floppy disk. Start the computer from the Windows 7 DVD.
Answer: C
Explanation: Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure:
1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM.
2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called
Autounattend.xml.
3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer.
4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart.