getcertified4sure.com

How to pass 70 680 exam in May 2021




Q281. - (Topic 1) 

You have a reference computer that runs Windows 7. 

You plan to create an image of the computer and then deploy the image to 100 computers. 

You need to prepare the reference computer for imaging. 

What should you do before you create the image? 

A. Run Package Manager. 

B. Run the System Preparation tool. 

C. Install the User State Migration Tool. 

D. Install Windows Automated Installation Kit. 

Answer:

Explanation: 

Sysprep Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows. XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged. 


Q282. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. From the Safety drop-down menu, open an InPrivate Browsing session. 

B. Start the Microsoft Network Access Protection service. 

C. From the Local Group Policy, enable the InPrivate Filtering Threshold setting. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:


Q283. - (Topic 2) 

You work as the Desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. 

The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com. You need to create a Windows 7 image that includes the Office 2007 

Microsoft Installer Package (MSI) package for the installation. 

What should you do? 

A. You should consider installing the MSI package by using the update command with the /slipstream switch. 

B. You should consider installing the MSI package by using the Msiexec command with the /package /uninstall switches. 

C. You should consider installing the MSI package by using the Msiexec command with the /package switch. 

D. You should consider installing the MSI package by using the Install command with the /package switch. 

Answer:


Q284. - (Topic 6) 

You have a Windows 7 computer in a workgroup. Multiple users with different local user accounts share the computer. 

You need to restrict the rights so that only Administrators can download and install Windows Updates. 

What should you do? 

A. Set the Allow all users to install updates option on this computer to Unchecked. 

B. Configure Windows Updates to download updates but let you choose to install them. 

C. Turn off Automatic Updates. 

D. Remove all local users from the Administrators security group. 

Answer:

Explanation: Ref: http://windows.microsoft.com/en-us/windows/updates-faq#1TC=windows-7 


Q285. - (Topic 1) 

Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point. 

You disable Service Set Identifier (SSID) broadcasts on the wireless access point. 

You discover that you are now unable to connect to the wireless access point from the Windows 7 computer. 

You need to ensure that the computer can connect to the wireless access point. 

What should you do? 

A. From Credential Manager, modify the generic credentials. 

B. From Credential Manager, modify the Windows credentials. 

C. From Network and Sharing Center, turn on Network discovery. 

D. From Network and Sharing Center, modify the wireless network connection settings. 

Answer:

Explanation: 

Wireless Network Connection settingsTo connect to a wireless network that does not broadcast its SSID, you need to know details such as the network name and security type. In Network And Sharing Center, you click Set Up A Connection Or Network, click Manually Connect To A Wireless Network, and click Next. You are prompted for the network name and security type and (if appropriate) encryption type and security key. Alternatively, you can open an elevated command prompt and enter a command with the following syntax: netsh wlan connect name=<profile_name> ssid-<network_ssid> [interface=<interface_name>] (Since the computer has previously been connected, just modify the settings.)NOT Network DiscoveryNetwork Discovery allows the client running Windows 7 to locate other computers and devices on the network. It also makes the client visible to other computers on the network. Disabling Network Discovery does not turn off other forms of sharing.NOT Credential ManagerCredential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 


Q286. - (Topic 4) 

Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed. 

All sales user in the office must download a daily updated 5-GB file that is stored on a file server located in a remote office. 

You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server. 

You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers. 

What should you do? 

A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command 

B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. 

C. Create a Group Policy that sets Hash Publication for BranchCache as disabled. 

D. Run the netsh branchcache set service mode=DISTRIBUTED command. 

E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. 

F. Check permisions. 

G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. 

H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. 

I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. 

Answer:

Explanation: 

Original wording: You configure the client computers to run BranchCache in 'Distributed Host Mode'. Changed to 'Distributed Cache mode". 


Q287. - (Topic 4) 

You need to uninstall a Windows update from a computer that runs Windows 7. 

Which Control Panel item should you use? 

A. Administrative Tools 

B. Programs and Features 

C. Sync Center 

D. Troubleshooting 

Answer:


Q288. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

. The Disk Management console (Click the Exhibit button.) 

. The System Properties window (Click the Exhibit button.) 

. The System protection for Local Disk C window (Click the Exhibit button.) 

You share your Documents library over a network. 

You discover that one of the files in the library was replaced with a previous version and 

then renamed. 

You need to restore the most recent version of the original file. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt, 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt, 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer:

Explanation: Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. 


Q289. - (Topic 3) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:\folder1. 

You need to identify all of the encrypted files in C:\folder1. 

Which command should you run? 

A. Cipher C:\folder1 

B. Dir C:\folder1 /OE 

C. Fsutil C:\folder1 

D. Wfs C:\folder1 

Answer:

Explanation: 

CipherDisplays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. 


Q290. - (Topic 1) 

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

The solution must also reduce the amount of bandwidth used between the two offices. 

What should you do? 

A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:

Explanation: 

Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista. and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack.