For anybody who is trying to find a new techie work, a new Microsoft have been just a little press further more in the collection of appliers that are possibly not certified. Then again, numerous business employers usually requires Microsoft 70-680 entitled to apply for work, accomplish work research and you will definitely visit a number of work opportunities that could be obtainable for software that you may possibly struggle to make application for now. Exclusively since they call for that level of cla for qualifications that would turn out to be no worries that you realize!
Q221. - (Topic 5)
You administer a computer that has Windows 7 Enterprise installed.
The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots.
You need to view a list of all installed device drivers that contain information about the digital signature of the device driver.
Which should you do?
A. Run the driverquery.exe /SI command.
B. Open the System Protection configuration for drive C.
C. Open Device Manager, show hidden devices, and sort all devices by type.
D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file.
Answer: A
Q222. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User01 uses Encrypting File System (EFS) to encrypt a file. User01 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. So what action should you perform to make sure of this?
A. User02 should be instructed to log on to the computer and take ownership of the file.
B. User02 should be instructed to log on to the computer and encrypt a file.
C. User1 should be instructed to export his certificate to a certificate (.cer) file.
D. User01 should be instructed to move the file to a shared folder on the computer.
Answer: B
Q223. - (Topic 4)
You need to uninstall a Windows update from a computer that runs Windows 7.
Which Control Panel item should you use?
A. Administrative Tools
B. Programs and Features
C. Sync Center
D. Troubleshooting
Answer: B
Q224. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You use Remote Desktop to connect from Computer1 to Computer2.
You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2.
What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.
Answer: C
Explanation:
Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users.
Q225. - (Topic 1)
You have a computer that runs Windows 7.
The IPv6 address of the computer is configured automatically.
You need to identify the IPV6 address of the computer.
What should you do?
A. At the command prompt, run Netstat.
B. At the command prompt run Net config.
C. From the network connection status, click Details.
D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.
Answer: C
Explanation: You can view a list of all the connection interfaces (wired and wireless) on a computer by opening Network And Sharing Center and clicking Change Adapter Settings. You can right-click any network connection and select Status. If you click Details on the Local Area Connection Status dialog box, you access the Network Connection Details information box. You can configure wireless connection behavior by clicking Change Adapter Settings in Network And Sharing Center, right-clicking your wireless adapter, and clicking Status. Clicking Details on the Status dialog box displays the adapter configuration.
Q226. - (Topic 1)
You have a computer that runs Windows 7.
Your network contains a DHCP server that runs Windows Server 2008 R2.
The server is configured as a Network Access Protection (NAP) enforcement point.
You need to configure the computer as a NAP client.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Services, set the Netlogon service Startup Type to Automatic.
B. From Services, set the Network Access Protection Agent service Startup Type to Automatic.
C. From the NAP Client Configuration console, configure the user interface settings.
D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.
Answer: B,D
Explanation:
Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface
1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK.
2. Click Enforcement Clients.
3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent
The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer.
Q227. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface.
You need to prevent the computer from using NetBIOS applications.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q228. - (Topic 2)
You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD.
What should you do?
A. From Disk Management, attach the VHD as read-only.
B. From Disk Management, convert the VHD to a GPT disk.
C. From Windows Explorer, modify the permissions of the VHD file.
D. From Windows Explorer, modify the read-only attribute of the VHD file.
Answer: A
Q229. - (Topic 5)
You administer a computer that has Windows 7 and Internet Explorer 8 installed. A user has installed a third-party toolbar in Internet Explorer 8.
You need to permanently remove the toolbar.
What should you do?
A. From Programs and Features in the Control Panel, uninstall the toolbar.
B. From an elevated command prompt, run °/osystemdrive°/o\Program Files\Internet Explorer\iecleanup.exe.
C. From Internet Explorer, launch Manage Add-ons and disable the toolbar.
D. Start Internet Explorer in an InPrivate Browsing session.
Answer: A
Q230. - (Topic 3)
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit). You share a printer named Printer1 on Computer1.
You need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer Properties?
A. Install a new driver.
B. Enable bidirectional support.
C. Modify the Additional Drivers settings.
D. Assign the Manage this printer permission to the Domain Users group.
Answer: C
Explanation:
If you are going to be sharing a printer with computers running previous versions of Microsoft Windows, you can add the drivers for the printer using Additional Drivers. When you add additional drivers, other computers on the network that do not have the printer drivers installed are able to download them from the computer that is sharing the printer.