Are you an IT hunter with out a Microsoft Microsoft certification. The reason why do need this certification. The actual answer is easy. You should make yourself a lot more competitive in the job market. Hunt the satisfied job is a hard work in present day fierce competitive world. Carry a Microsoft 70-680 certificate is actually an advantage over other candidates. Acquiring the Microsoft Microsoft certificate can easily lay a solid foundation to suit your needs career life.
Q181. - (Topic 2)
You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer?
A. No. You can undo a system restore only if you initiate it from the System Recovery tools.
B. No. You can undo a system restore only if you carry it out after booting normally.
C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore.
D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced).
Answer: D
Q182. - (Topic 1)
Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.)
In the branch office, you deploy a new computer named Computer1 that runs Windows 7.
You need to assign an IP address to Computer1.
Which IP address should you use?
A. 192.168.2.30
B. 192.168.2.40
C. 192.168.2.63
D. 192.168.2.65
Answer: B
Explanation:
Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224
Q183. - (Topic 4)
A Remote Assistance session is established with a user's computer that runs Windows 7 Enterprise.
You need to verify that a local file is encrypted with the Encrypting File System (EFS).
What should you do to accomplish this goal?
A. the netsh command
B. the folder Properties window
C. Device Manager
D. share permissions
E. the Services management console
F. the Group Policy management console
G. the icacls command
H. the User Account Control Settings Control Panel window
I. Local Users and Groups
Answer: B
Explanation: Right-click the file or folder Select Properties Click the Advanced button under the Attributes section If Check the box next to "Encrypt contents to secure data" is checked, then the file is encrypted using EFS.
Q184. HOTSPOT - (Topic 6)
A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails.
Email 1
From: Company CIO
Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7.
Email 2
From: System Administrator
Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files.
Email 3
From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support
the inference as stated? (This question is worth three points. )
Answer:
Q185. - (Topic 3)
You need to create a VPN connection.
What should you do?
A. From Windows Explorer, right-click Computer and then click Map network drive.
B. From Windows Explorer, right-click Computer and then click Add a network location.
C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network.
D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace.
Answer: D
Explanation:
Virtual Private Networks When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available.
Q186. - (Topic 3)
You install Windows 7 on a new computer.
Every time you start the computer, you receive a STOP error message.
You suspect that the RAM on the computer has a problem.
You need verify the RAM on the computer.
What should you do first?
A. Start the computer, press F8, and then select Repair Your Computer.
B. Start the computer, press F8, and then select Last Known Good Configuration.
C. From a computer that runs Windows 7, copy the %systemroot%\system32\recover.exe to a bootable USB disk. Start the computer from the USB disk.
D. From a computer that runs Windows 7, copy the %systemroot%\system32\repair-bde.exe to a bootable USB disk. Start the computer from the USB disk.
Answer: A
Explanation:
Using Recovery Tools If Windows RE is included in your installation DVD-ROM, you can boot from the Windows 7 installation media, select Repair Your Computer, and then select the option to use recovery tools to access the System Recovery Options. However, you
can use the method described previously (pressing F8) whether the Windows RE files are present on your DVD-ROM or not and whether you boot from your installation DVD-ROM or from hard disk.
Then use the following System Recovery Option:
Windows Memory Diagnostic Analyzes the computer memory (RAM) for hardware problems.
Q187. - (Topic 4)
You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do?
A. From the Trusted Platform Module (TPM) snap-in, initialize TPM.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From a local Group Policy, modify the BitLocker Drive Encryption settings.
D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings
Answer: C
Explanation:
How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.
Q188. - (Topic 1)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
User1 must be allowed to delete all files in Folder1
Members of Group1 must be able to create files in Folder1
All other members of Group1 must be prevented from deleting files they did not create in Folder1
All users must be prevented from modifying the permissions on Folder1
What should you do?
A. Assign Group1 the Write permission. Assign User1 the Modify permission.
B. Assign Group1 the Modify permission. Assign User1 the Write permission.
C. Deny Group1 the Write permission. Assign User1 the Modify permission.
D. Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A
Explanation:
File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
Q189. - (Topic 3)
You have a computer that runs Windows 7.
You enable Advanced Audit Policy Configuration in the Local Computer Policy and discover that the policy is not applied.
You need to ensure that Advanced Audit Policy Configuration is applied on the computer.
What should you do?
A. Restart the computer.
B. Run Gpupdate /force.
C. Enable the Security Settings policy option.
D. Run Secedit /refreshpolicy machine_policy.
Answer: B
Q190. - (Topic 5)
All client computers in your company network have Windows 7 Professional installed. The computers are configured with automatic scheduled Microsoft updates installation.
You receive a support call indicating that after the recently installed update, one of the business applications is unable to start on the computers.
You need to remove the most recent Microsoft update from the computers.
What should you do first?
A. From the Programs and Features, open the Installed Updates window.
B. From the Services console, open the Windows Update service.
C. From the Event Viewer, open the System log.
D. From the Task Scheduler, view the WindowsBackup node.
Answer: C