getcertified4sure.com

Renew 70-680 test Guide




Examcollection have the most accurate along with authentic Microsoft Microsoft practice questions that with 100% proper answers. Our certified subject matter specialists are focused to researching along with creating your Microsoft Microsoft exam dumps which contain your latest contents within accordance with the 70-680 exam syllabus. We hope you will reach your goals in Microsoft Microsoft 70-680 exam with our Microsoft Microsoft practice questions and answers. Several candidates have got good results after acquiring our Microsoft items. We tend to be proud of the high passing ratio. However, in the event you unluckily fail the Microsoft certification exam, many of us will give an individual a Entire REFUND of your purchasing fee or perhaps send an individual another very same value item for free.

2021 Mar 70-680 test preparation

Q1. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q2. - (Topic 6) 

You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain. 

You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely. 

You need to run a command on each Windows 7 computer so that you can configure the service. 

Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. ) 

A. Mstsc /v:computername configure 

B. Enable-PSRemoting -force 

C. Psexec Wcomputername -enable 

D. Winrm quickconfig 

Answer: B,D 

Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force 

D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service. 

* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows. 

Incorrect: Not C: 

* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. 

* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session] 

][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments] 


Q3. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 


Q4. DRAG DROP - (Topic 6) 

Your organization has a Windows Server 2008 R2 server and Windows 7 Professional computers. 

Two groups require access to new applications. Each group uses a different application. You are adding 100 new computers to each group. 

You need to configure Windows Firewall to allow each group to access its application. 

Which four steps should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: 


Q5. - (Topic 4) 

You plan to deploy Windows 7 images. 

You need to ensure that you can deploy images using the WindowsPreinstallation Environment (Windows PE). 

What would you add to the Window PE Image? 

A. ImageX 

B. Usmtutils.exe 

C. Mighost.exe 

D. Loadstate.exe 

Answer:


Up to date 70-680 test questions:

Q6. - (Topic 4) 

Your company network includes portable computers that have Windows 7 Ultimate and Windows 7 Professional installed. 

You want to standardize all portable computers to Windows 7 Professional for Key Manager Server (KMS) licensing purposes. 

You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers. 

What should you do? 

A. Launch Windows Update 

B. Perform a clean installation over the existing system partitions. 

C. Perform a clean installation on non-system partitions. 

D. Supply the Windows 7 Professional KMS key. 

E. Launch Windows Anytime Upgrade. 

Answer:

Explanation: 

Think that this is right don't think it can be done 


Q7. - (Topic 3) 

You have a custom image of Windows 7. 

You discover that the boot configuration data store in the custom image is corrupted. 

You need to create a new configuration data store within the custom image. 

What should you do? 

A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. 

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. 

C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. 

D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog. 

Answer:

Explanation: 

ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set. 


Q8. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. 

You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:


Q9. - (Topic 5) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

B. Start Windows 7 Home Premium. Add a new entry to the boot menu. 

C. Attach Windows 7 Ultimate media as an ISO image into Windows 7 Home Premium. 

D. Install Virtual PC into Windows 7 Home Premium. 

Answer:


Q10. - (Topic 4) 

Your company network has a single-domain Active Directory forest. The forest functionality level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows Bitlocker Encryption (BitLocker) on the portable computers that have Window 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk on volumes with BitLocker? 

A. Run the cscript Add-TPMSelfWriteACE.vbs script on the portable computers 

B. Run the cscript List-ACEs.vbs script on the portable computers. 

C. Run the cscript Get-TPMOwnerInfo.vbs script on the client computers. 

D. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

Answer: