getcertified4sure.com

What tells you about exam 70-680




Actualtests contains all the necessary Microsoft Microsoft training materials which you need to make complete preparation for the true exam. We have earned any high reputation compared to additional competitors in the exact same market. Actualtestss IT professional experts write and also revise our Microsoft Microsoft 70-680 exam braindumps periodically as a way to keep speed with the newest Microsoft 70-680 exam questions and answers.

2021 Aug windows 7 configuration exam 70-680 knowledge assessment answers:

Q321. - (Topic 2) 

You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer? 

A. No. You can undo a system restore only if you initiate it from the System Recovery tools. 

B. No. You can undo a system restore only if you carry it out after booting normally. 

C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore. 

D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced). 

Answer: D 


Q322. - (Topic 1) 

Which of the following Windows 7 Editions allows you to join an Active Directory domain? Choose three. 

A. Windows Home Edition 

B. Windows Professional Edition 

C. Windows Ultimate Edition 

D. Windows Enterprise Edition 

Answer: B,C,D 


Q323. - (Topic 1) 

Which of the following operating systems support an offline migration using USMT? Choose three. 

A. Windows 2000 Professional 

B. Windows XP Professional 

C. Windows Vista 

D. Windows 7 

Answer: B,C,D 


Q324. - (Topic 3) 

You have a custom image of Windows 7. 

You discover that the boot configuration data store in the custom image is corrupted. 

You need to create a new configuration data store within the custom image. 

What should you do? 

A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. 

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. 

C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. 

D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog. 

Answer: B 

Explanation: 

ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set. 


Q325. - (Topic 3) 

You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE). 

You need to ensure that Windows PE supports the Windows Scripting Host (WSH). 

Which tool should you use? 

A. Bcdedit.exe 

B. Dism.exe 

C. Imagex.exe 

D. Oscdimg.exe 

Answer: B 

Explanation: 

DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: 

-Prepare a Windows PE image.- Enable or disable Windows features within an image.-Upgrade a Windows image to a different edition.- Add, remove, and enumerate packages.-Add, remove, and enumerate drivers.- Apply changes based on the offline servicing section of an unattended answer file.- Configure international settings.- Implement powerful logging features.- Service operating systems such as Windows Vista with SP1 and Windows Server 2008.- Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.- Service all platforms (32-bit, 64-bit, and Itanium).- Use existing Package Manager scripts. 

DISM Command-Line Options To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.NOT BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.NOT 

OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. 


70-680 free practice questions

Avant-garde windows 7 exam 70-680:

Q326. - (Topic 4) 

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server. 

The external firewall has TCP port 80 and TCP port 443 open for remote access connections. 

You have a home computer that runs Windows 7. 

You need to establish secure remote access connection from the home computer to the remote access server. 

Which type of connection should you configure? 

A. IPSEC 

B. L2TP 

C. PPTP 

D. SSTP 

Answer: D 

Explanation: 

Secure Socket Tunneling Protocol Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking. 


Q327. - (Topic 1) 

Which of the following tools can you use to determine if the applications installed on your computer running Windows Vista are known to have problems with Windows 7? 

A. Windows 7 Upgrade Advisor 

B. Sysprep 

C. USMT 

D. Windows PE 

Answer: A 

Explanation: 

Windows 7 Upgrade Advisor Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft's Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista. 

Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7. 


Q328. - (Topic 2) 

You have 15 computers that run Windows 7. 

You need to implement a monitoring solution that meets the following requirements: 

. Sends an e-mail notification when an application error is logged in the event log . Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 . Minimizes the administrative effort required to monitor applications 

What should you do? 

A. On all the computers, configure a custom view. Configure a custom task for the application error events. 

B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events. 

C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log. 

D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log. 

Answer: D 

Explanation: 

Event ForwardingEvent forwarding enables you to transfer events that match specific criteria to an administrative (or collector) computer. This enables you to manage events centrally. A single event log on the collector computer holds important events from computers anywhere in your organization. You do not need to connect to the local event logs on individual computers. SubscriptionsIn a source-initiated subscription (sometimes termed a source computer–initiated subscription), the computer on which an event is generated (the source computer) sends the event to the collector computer. You would use a source-initiated subscription when you have a large number of source computers and you configure these computers through Group Policy. 


Q329. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. 

You need to ensure that users can only access removable devices that have been previously installed on the computer. 

What should you modify in the Local Group Policy? 

A. Enable the Prevent redirection of USB devices setting. 

B. Enable the Prevent installation of removable devices setting. 

C. Disable the WPD Devices: Deny read access setting. 

D. Disable the Allow administrators to override Device Installation Restriction policies setting. 

Answer: B 

Explanation: 

Prevent installation of removable devices This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it is connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update device drivers for removable devices as allowed or prevented by other policy settings. NOT Prevent redirection of USB devicesThis policy setting prevents redirection of USB devices. If you enable this setting, an alternate driver for USB devices cannot be loaded. If you disable or do not configure this setting, an alternate driver for USB devices can be loaded. 


Q330. - (Topic 2) 

You have a virtual hard disk (VHD) file. 

You need to view the files in the VHD. The solution must prevent users that log on to What should you do? 

A. From Disk Management, Attach VHD as read only. 

B. From Disk Management, Convert the VHD to GPT disk. 

C. From Windows Explorer, modify the permissions of the VHD file. 

D. From Windows Explorer, modify the read-only attribute of the VHD file. 

Answer: C