Exam Code: 70-680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-680 Exam.
Q311. - (Topic 2)
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
IP address: 10.1.1.193
Subnet mask: 25S.255.0.0
Default gateway: 10.1.1.194
. Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet.
What should you do?
A. Delete the default gateway address.
B. Delete the preferred DNS server IP address
C. Configure the subnet mask to use 255.255.255.0
D. Configure the subnet mask to use 255.255.255.192
Answer: A
Explanation:
Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.
Q312. HOTSPOT - (Topic 4)
A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher.
You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs.
You have selected one of Fabrikam's applications as a reference.
Which property should you choose? (To answer, select the appropriate setting or settings in the work area.)
Answer:
Q313. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.
All sales user in the office must download a daily updated 5-GB file that is stored on a file server located in a remote office.
You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server.
You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.
F. Check permisions.
G. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.
Answer: E
Explanation:
Original wording: You configure the client computers to run BranchCache in 'Distributed Host Mode'. Changed to 'Distributed Cache mode".
Q314. DRAG DROP - (Topic 6)
A company has an Active Directory forest which is shown in the following graphic.
The company's client computers run Windows 7. You deploy BitLocker Drive Encryption on all the client computers.
You need to configure BitLocker Drive Encryption to back up recovery information to Active Directory for BitLocker protected drives and the Trusted Platform Module (TPM).
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q315. - (Topic 1)
Which of the following is used to control when the security pop-up notifications are used?
A. Security Control Manager
B. User Account Control
C. User Access Control Panel
D. Notification Control Settings Manager
Answer: B
Q316. - (Topic 6)
You manage a network device by using a web interface.
You perform all critical Windows updates so that the computer now runs Internet Explorer 10. After performing these updates, the layout of the network device web page displays incorrectly.
Other web pages display correctly.
You need to resolve this issue.
What should you do?
A. Clear Internet Explorer's browsing history.
B. Enable Compatibly Mode for the network device web page.
C. Set the local Intranet security zone to Low.
D. Add the network device web page to the trusted sites zone.
Answer: D
Q317. - (Topic 4)
You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can create a striped volume on the computer.
What should you do?
A. Add an additional hard disk.
B. Convert all disks to dynamic disks.
C. Install a digitally-signed disk driver.
D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.
Answer: B
Explanation:
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost.
You can create striped volumes only on dynamic disks. Striped volumes cannot be extended.
You can create a striped volume onto a maximum of 32 dynamic disks.
Backup Operator or Administrator is the minimum membership required to complete the actions below.
Creating a striped volume
Using the Windows interface
Using a command line
To create a striped volume using the Windows interface
In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume….
Follow the instructions on your screen.
To create a striped volume using a command line
Open a command prompt and type diskpart.
At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume.
At the DISKPART prompt, type create volume stripe [size=<size>]
[disk=<disknumber>[,[<seconddisknumber>,
…]].
Q318. - (Topic 5)
Your company network contains 20 client computers that run Windows 7 Enterprise. The network does not have a DNS server and is using IPv6 only.
Users are complaining they are unable to see others' computers on the network.
You notice that the settings of the network are configured as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that users can see all computers on the network in Windows Explorer.
What should you do on each computer?
A. Turn on Public folder sharing.
B. From a command prompt, run the net view command.
C. Turn on Network discovery.
D. Run Windows Network Diagnostics.
E. From a command prompt, run the net config command
Answer: C
Q319. - (Topic 2)
You have a computer that runs Windows 7.
You need to identify which applications were installed during the last week.
What should you do?
A. From Reliability Monitor, review the informational events.
B. From System Information, review the Software Environment.
C. From Performance Monitor, review the System Diagnostics Report.
D. From Performance Monitor, run the System Performance Data Collector Set.
Answer: A
Explanation:
Reliability Monitor tracks a computer's stability. It can also tell you when events that could affect stability (such as the installation of a software application) occurred and whether any restarts were required after these events. Action Center monitors your computer and reports problems with security, maintenance, and related settings. The Windows Experience Index indicates the suitability of your current computer hardware for running resource intensive applications.
Q320. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that only signed and validated executable files are run with elevated privileges.
What should you use to achieve this goal?
A. the folder properties window
B. the icacls command
C. Device Manager
D. share permissions
E. the Group Policy management console
F. Local Users and Groups
G. the netsh command
H. the Services management console
I. the User Account Control Settings Controal Panel window
Answer: E
Explanation:
http://www.mcmcse.com/microsoft/guides/70-680/configure_uac.shtml Accessed through secpol.msc too