Having a Microsoft Microsoft certification is actually necessary for those who wish to look for the job inside IT discipline. Its the demanding job for you to prepare the Microsoft 70-680 certification exam. Youd better attend the Microsoft 70-680 online coaching course. Even so, with so many resources offering 70-680 research materials, it could be difficult to select the the best Microsoft Microsoft to suit your needs. Examcollection is a premier resource for your Microsoft 70-680 exam.
Q261. - (Topic 3)
You have a computer that runs Windows 7. The computer contains a folder named C:\data.
You use Advanced Sharing to share C:\data by using the default share permissions.
When a user tries to access the share over the network, he gets an "Access is Denied" error message.
You need to ensure that the user can access the share.
What should you do?
A. Allow file and printer sharing through Windows Firewall.
B. Change the network location from a Public network to a Home or Work network.
C. From the Security settings of the folder, assign the user the Read NTFS permission.
D. From the Advanced Sharing settings of the folder, assign the user the Read share permission.
Answer: C
Explanation:
Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.
Q262. - (Topic 2)
You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. (Click the Exhibit button.)
You need to extend volume C.
What should you do first?
A. Back up and delete volume D.
B. Convert disk 0 to a dynamic disk.
C. Remove the crash dump from volume C.
D. Move the paging file from volume C to volume E.
Answer: A
Explanation:
Extend a Basic Volume You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic.
Q263. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1.
You need to ensure that User1 and User2 can log on to Computer2.
What should you do on Computer2?
A. Enable all user accounts
B. Modify the default password policy
C. Modify the Allow log on locally user right
D. Add User1 and User2 to the local Administrators group
Answer: A
Explanation:
LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey"
(local account create) /lac:[Password] Specifies that if a user account is a local (non-domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default.
Q264. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed.
The client computers have a third-party firewall application installed.
You configure BranchCache on all computers to run in Distributed Cache mode.
You need to ensure that the client computers can access all cached files.
What should you do?
A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
B. Check permissions.
C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443
D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
F. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
G. Run the netsh branchcache set service mode=DISTRIBUTED command
H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option.
I. Create a Group policy that sets Hash Publication for Branchcache as disabled.
Answer: A
Explanation:
Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic.
You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode.
You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache - Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache - Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.
You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically.
Q265. - (Topic 3)
You work as a desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. You are responsible for maintaining Abc.com's Windows 7 workstations.
You want to configure all Windows 7 workstations to produce a new Security ID (SID) as well as a Welcome screen when the workstation is booted.
What should you do?
A. You should consider running Msconfig.exe /oobe /generalize startup on all Windows 7 workstations.
B. You should consider running Sysprep.exe /audit /generalize on all Windows 7 workstations.
C. You should consider running bootcfg.exe on all Windows 7 workstations.
D. You should consider running Sysprep.exe /oobe /generalize on all Windows 7 workstations.
Answer: D
Q266. - (Topic 5)
You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing.
You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer.
You need to achieve the following goals:
. Prevent members of the Marketing group from modifying the print jobs of other users.
. Ensure that members of the Marketing group can modify the print jobs that they submit.
What should you do?
A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group.
B. From the printer's properties, assign the Print permission to the Marketing group.
C. From the printer's properties, assign the Manage Documents permission to the Marketing group.
D. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group.
Answer: B
Q267. - (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1.
You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service.
You discover that no events are being collected.
You need to ensure that events are forwarded from Client1 to Server1.
What should you do?
A. on Client1, create an outbound Rule to allow port 5986 for the Domain connection type.
B. on Client1, create an inbound Rule to allow port 5986 for the Public connection type.
C. on Server1, create a Windows Event Collector firewall exception for the Domain connection type.
D. on Client1, create a Windows Remote Management firewall exception for the Domain connection type.
Answer: D
Q268. - (Topic 6)
You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers.
Management wants to decrease VPN costs by implementing DirectAccess for remote network access.
They assign you to evaluate the current network infrastructure, which includes the following elements:
Active Directory
IPv6 network and applications
Server for DirectAccess service
You need to ensure that all critical infrastructure components are present.
What should you add to the infrastructure?
A. Windows Internet Name Service (WINS) server
B. Public key infrastructure
C. NAT-PT devices
D. Windows Server 2012
Answer: B
Explanation: DirectAccess With Windows Server 2008 R2 requires:
* Public key infrastructure (PKI) to issue computer certificates.
* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet.
* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet.
* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients
* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2.
Note: DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet. DirectAccess was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients.
Q269. - (Topic 1)
You have a computer that runs Windows 7.
Your network contains a VPN server that runs Windows Server 2008.
You need to authenticate to the VPN server by using a smart card.
Which authentication setting should you choose?
A. CHAP
B. EAP
C. MS-CHAP v2
D. PAP
Answer: B
Explanation:
VPN Server Software Requirements VPN server software requirements for smart card access are relatively straightforward. The remote access servers must run Windows 2000 Server or later, have Routing and Remote Access enabled, and must support Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). EAP-TLS is a mutual authentication mechanism developed for use in conjunction with security devices, such as smart cards and hardware tokens. EAP-TLS supports Point-to-Point Protocol (PPP) and VPN connections, and enables exchange of shared secret keys for MPPE, in addition to Ipsec. The main benefits of EAP-TLS are its resistance to brute-force attacks and its support for mutual authentication. With mutual authentication, both client and server must prove their identities to each other. If either client or server does not send a certificate to validate its identity, the connection terminates.Microsoft Windows Server. 2003 supports EAP-TLS for dial-up and VPN connections, which enables the use of smart cards for remote users. For more information about EAP-TLS, see the Extensible Authentication Protocol (EAP) topic at www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/auth_eap. mspx. For more information about EAP certificate requirements, see the Microsoft Knowledge Base article "Certificate Requirements when you use EAP-TLS or PEAP with EAP-TLS" at http://support.microsoft.com/default.aspx? scid=814394.
Q270. - (Topic 3)
You have a computer that runs Windows 7.
A user installs a third-party media player on the computer.
You discover that all media files automatically open by using the third-party media player.
You need to ensure that all media files open automatically by using Windows Media Player.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Select a media file. Right-click the file and select open with.
B. Select a media file. Right-click the file and select Restore previous versions.
C. From Control Panel, modify the Set your default programs settings.
D. From Control Panel, modify the Set program access and computer defaults settings.
Answer: C