getcertified4sure.com

Top Microsoft 70-680 bundle Choices




All the Microsoft 70-680 practice questions which in turn with precise and verified answers are produced and updated by our advanced professionals in the discipline of world wide web. Taking the Microsoft 70-680 simulated test you will get a high mark which in turn guarantee your own success. Our own Microsoft Microsoft 70-680 braindumps have wonderful value and high top quality which assure you the passing score, or you will get your own purchasing charges back. Whilst if you dont want to the refund, we are able to send a person another Microsoft 70-680 dumps regarding free. We all hope you get over the Microsoft certification exam smoothly.

2021 Mar 70-680 download

Q331. - (Topic 1) 

You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? Choose two. 

A. The Windows SIM tool in Windows AIK 

B. Microsoft Notepad 

C. The Deployment Workbench MDT tool 

D. Sysprep.exe 

Answer: A,B 


Q332. - (Topic 5) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

B. Attach Windows 7 Ultimate media as an ISO image into Windows 7 Home Premium. 

C. Start Windows 7 Home Premium. Create and mount a new Windows Imaging Format (WIM) file with Windows 7 Ultimate files. 

D. Install Virtual PC into Windows 7 Home Premium. 

Answer:

Explanation: The Virtual Hard Disk (VHD) format is a publicly-available image format specification that allows encapsulation of the hard disk into an individual file for use by the operating system as a virtual disk in all the same ways physical hard disks are used. These virtual disks are capable of hosting native file systems (NTFS, FAT, exFAT, and UDFS) while supporting standard disk and file operations. VHD API support allows management of the virtual disks. Virtual disks created with the VHD API can function as boot disks. 


Q333. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface. 

You need to prevent the computer from using NetBIOS applications. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q334. - (Topic 4) 

You have a computer that runs Windows 7. The computer is configured to automatically download and install updates. 

You install Microsoft Office 2007. 

You need to ensure that service packs for Office are automatically installed. 

What should you do? 

A. From Windows Update, select Restore hidden updates. 

B. From Windows Update, select Get updates for other Microsoft products. 

C. Create a folder named Updates in C:\Program Files\Microsoft Office. Install the Office Update Inventory Tool into the Updates folder. 

D. Download and install the Office 2007 administrative template and disable the Block updates from the Office Update Site from applying policy. 

Answer:

Explanation: 

Use Windows Update to Check for Updates to other Microsoft Products By default, Windows Update can download and install updates for Windows 7 and features that are part of the operating system (such as Internet Explorer). You can also merge the functionality of Microsoft Update—a service for managing updates to Microsoft Office and several other Microsoft products—into Windows Update so that you no longer need to visit Office Online to get updates.If you do not already have Windows Update integrated with Microsoft Update, you will see the message "Get updates for other Microsoft products" on the Windows Update home page. To enable checking for other products, click the Find Out More option shown beside this message. This will take you to the Microsoft Update site for some quick installation steps. You only need to do this once. Thereafter, the Windows Update home page will indicate that you receive updates "For Windows and other products from Microsoft Update." 


Far out 70-680 exam prep:

Q335. - (Topic 1) 

You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. 

You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. 

You must achieve this goal by using the least amount of administrative effort. What should you do? 

A. From Software Restriction Policies, create a path rule. 

B. From Software Restriction Policies, create a hash rule. 

C. From Application Control Policies, create the default rules. 

D. From Application Control Policies, create an executable rule. 

Answer:

Explanation: 

Executable Rules Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules. The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \Program files\Application\App.exe to Unrestricted and one that sets the folder C:\Program files\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\Program files\Application\*.exe. Wildcard rules are less specific than rules that use a file's full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application C:\Apps\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint. 


Q336. - (Topic 2) 

Your network consists of a single Active Directory domain named contoso.com. 

You have a server named Server1 that runs a custom network application. 

Server1 has the following IP addresses: 

. 192.168.15.10 

. 192.168.15.11 

You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. 

What should you do from the computer? 

A. Edit the hosts file 

B. Edit the lmhosts file 

C. Run Ipconfig.exe /flushdns 

D. Run Netsh interface ipv4 reset 

Answer:

Explanation: 

Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file. 

Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet. 

-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations. 

-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface. 

-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups 

-LMHOSTS file, such as the ability to support routed domain logon validation. 

-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations. 

-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC). 

Other info http://support.microsoft.com/kb/105997 


Q337. HOTSPOT - (Topic 6) 

You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed. 

Your manager wants you to upgrade all computers to Windows 7. 

You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista. 

In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. ) 

Answer: 


Q338. - (Topic 6) 

Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies. 

You need to reserve more space for previous versions of files. 

What should you do? 

A. From System Properties, System Protection, expand the Max usage to 20 GB. 

B. From System Properties, System Protection, turn off system protection. 

C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB. 

D. From System Properties, System Protection, set it to only restore previous versions of files. 

Answer:

Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure