getcertified4sure.com

Today Big Q: microsoft 70-680?




Testking provides your examinees with the totally free downloadable 70-680 exam questions. You can have a quiz to check out the questions and answers quality associated with ourMicrosoft Microsoft training materials before a person purchase it. It is also helpful in your case to seek out your own Microsoft exam weakness, then you should operate harder on this in your afterwards study. All of the Microsoft certification study items can be purchased at Testking website. It is possible to download them pertaining to free as outlined by your personal requires.

2021 Aug mcsa 70-680:

Q361. - (Topic 3) 

Your company uses Windows Deployment Services (WDS) to deploy Windows 7. 

You create a new image of Windows 7. 

You need to ensure that you can deploy the image by using WDS. 

What should you do? 

A. From the Windows Deployment Services snap-in, add a new install image. 

B. From the Windows Deployment Services snap-in, add a new boot image. 

C. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot. 

D. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images. 

Answer: A 

Explanation: 

Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image. Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice. 


Q362. - (Topic 3) 

You have a computer that runs Windows 7. 

You have an application control policy on the computer. 

You discover that the policy is not enforced on the computer. 

You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.) 


You need to enforce the application control policy on the computer. 

What should you do? 

A. Set the Application Identity service Startup Type to Automatic and start the service. 

B. Set the Application Information service Startup Type to Automatic and start the service. 

C. Set the Application Management service Startup Type to Automatic and start the service. 

D. Set the Application Experience service Startup Type to Automatic and start the service. 

Answer: A 

Explanation: 

Application Identity service AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies 


Q363. - (Topic 4) 

You have a computer that runs Windows 7. 

You mark a folder as Always available offline. 

You need to verify that an offline copy of the folder has been created on the computer. 

What should you do? 

A. Open Sync Center and review the status. 

B. Open Action Center and review any messages or issues. 

C. Open Windows Mobile Device Center and review the status. 

D. Open Network and Sharing Center and review the status for the local area connection. 

Answer: A 

Explanation: 

What is Sync Center?Sync Center allows you to check the results of your recent sync activity if you've set up your computer to sync files with a network server. This allows you to access copies of your network files even when your computer isn't connected to the network. Sync Center can tell you if the files synced successfully or if there are any sync errors or warnings. NoteSync Center is designed to help you sync with files in network locations. If you want to sync a mobile device with your computer, such as a mobile phone or portable music player, Windows gives you several other options. You can install the sync software that some manufacturers include with their device, or you can use the new Device Stage feature in this version of Windows if your device supports this feature. For more information, see Sync music, pictures, contacts, and calendars with a mobile device. 


Q364. - (Topic 2) 

A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named 

Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. (Click the Exhibit button.) 


The permissions for Group1 are shown in the Group1 Permissions exhibit. (Click the Exhibit button.) 


You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do? 

A. On Folder1, assign the Full control permission to User1. 

B. On Folder1, remove the Deny - Write permission for Group1. 

C. Share Folder1. Assign User1 the Read and Change share permission. 

D. Share Folder1. Assign Group1 the Read and Change share permission. 

Answer: B 


Q365. HOTSPOT - (Topic 5) 

All sales employees use portable computers that have Windows 7 installed. All help desk employees use desktop computers that have Windows 7 installed. 

You need to ensure that the sales employees are able to request a remote support from a help desk employee when they are in the office. 

You also need to ensure that sales employees are prevented from receiving remote support during their travel. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 


Answer: 



70-680 study guide

Improve practice test microsoft 70-680:

Q366. - (Topic 2) 

A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help. 

What action can you take? 

A. Restore the file from the previous night's backup. 

B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin. 

C. Restore the file from an older backup. 

D. Ask the user to open his Recycle Bin. 

Answer: D 


Q367. - (Topic 4) 

You use a client computer named accounting that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as printer1. 

An accounting user group is a member of the local Remote Desktop Users group on the computer. Only the Accounting Users group has access to printer1. A user named User1 is a member of the accounting users. 

You need to configure the computer to meet the following requirements: 

. Prevent User1 from establishing Remote Desktop sessions to the Accounting computer. . Allow other members of the Accounting Users to connect to the accounting computer by using remote desktop. . Ensure that User1 can access printer1. 

What should you do? 

A. Remove the Accounting Users group from the Remote Desktop Users group. 

B. Remove User1 from the Accounting Users group. 

C. Assign the Deny access to this computer from the network user right to User1 

D. Assign the Deny log on through Remote Desktop Services user right to User1. 

Answer: D 

Explanation: 

D is the only method that can achieve this without affecting other groups. 

A and B could be equally valid by adding an additional step (adding individual users to resources). 


Q368. - (Topic 1) 

Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two. 

A. File Settings and Transfer Wizard 

B. USMT 

C. Windows Easy Transfer 

D. Robocopy.exe 

Answer: B,C 


Q369. - (Topic 5) 

You manage several client computers in an organization. 

You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization. 

What should you do? 

A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting. 

B. Configure an AppLocker Windows Installer rule. 

C. Configure the User Account Control (UAC) settings on all client computers to always notify. 

D. Create a custom GPO to configure a software restriction policy. 

Answer: A 


Q370. - (Topic 3) 

You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data. 

The Users group has Full control permission to the folder. 

You need to configure security on the folder to meet the following requirements: 

Allow users to create files 

Allow users to delete files that they create 

Prevent users from deleting files created by other users 

What should you do? 

A. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission. 

B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission. 

C. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions. 

D. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read & execute NTFS permission. 

Answer: B 

Explanation: 

The Creator Owner GroupThe person who created the file or directory is a member of this group. This group is used by Windows NT to automatically grant access permissions to the creator of a file or directory. 

File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & Execute Folders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and foldersFiles: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file