getcertified4sure.com

Secrets to 70 680 pdf




Q81. HOTSPOT - (Topic 4) 

A company is upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image. 

The menu on the title bar of the application is not displayed properly, although other graphical elements are displayed correctly. 

You need to ensure that the application's menu is displayed correctly on client computers that run Windows 7. 

Which option should you choose to achieve this goal? (To answer, select the appropriate check box in the dialog box.) 

Answer: 


Q82. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. 

You need to secure a virtual private network (VPN) connection on the client computers so that two-factor authentication is used. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 

Answer: 


Q83. - (Topic 1) 

You want to create a 20-GB native VHD called Systemvhd in a folder called Windows 7 on an external U hard disk with the drive designation G:. Which command do you use? 

A. create vdisk file=g:\windows7\systemvhd maximum=20000 

B. create vdisk file=g:\windows7\systemvhd.vhd maximum=20000 

C. create vdisk file=g:\windows7\systemvhd.vhd maximum=20 

D. create vdisk file=g:\windows7\systemvhd maximum=20 

Answer:


Q84. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You need to ensure that Computer2 has exactly the same firewall rules as Computer1. 

What should you do on Computer1? 

A. Run Winrm.exe quickconfig. 

B. From Windows Firewall with Advanced Security, select Export Policy. 

C. From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List. 

D. Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List. 

Answer:

Explanation: 

Importing and Exporting Firewall ConfigurationMost organizations that use clients running Windows 7 apply firewall rules through Group Policy. In the event that you need to support a number of stand-alone clients running Windows 7, you can replicate complex firewall configurations using the WFAS Import Policy and Export Policy options. Importing and exporting policy also allows you to save the current firewall configuration state before you make changes to it. Exported policy files use the .wfw extension. Exported policies use a binary format, not Extensible Markup Language (XML) format like many other Windows 7 configuration files. You can also export and import firewall policies in the same .wfw format using the netsh advfirewall export or netsh advfirewall import commands. 


Q85. - (Topic 1) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You need to ensure that you can remotely execute commands on Computer2 from Computer1. 

What should you do? 

A. Run Winrm quickconfig on Computer1 

B. Run Winrm quickconfig on Computer2 

C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1 

D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2 

Answer:

Explanation: 

Windows Remote Management Service The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. Executing WinRM quickconfig does the following: 

-Starts the WinRM service 

-Configures the WinRM service startup type to delayed automatic start 

-Configures the LocalAccountTokenFilterPolicy to grant administrative rights remotely to local users 

-Configures the WinRM listener on http://* to accept WS-Man requests 

-Configures the WinRM firewall exception 


Q86. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. The branch office with the client computers has a slow network connection to the office with the file server. 

Users complain of poor performance when connecting to the file server from their client computers. 

You need to verify that the client computers are configured to be BranchCache clients. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Device Manager 

B. Local Users and Groups 

C. share permissions 

D. the folder Properties window 

E. the netsh command 

F. the icacls command 

G. the Services management console 

H. the Group Policy management console 

I. the User Account Control Settings Control Panel window 

Answer: E,H 

Explanation: 

To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode. 

To create a GPO, enable BranchCache, and select the cache mode Click Start, point to Administrative Tools, and click Group Policy Management Console. 

Client configuration using netsh 

When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command. 


Q87. HOTSPOT - (Topic 5) 

A company has client computers that run Windows 7. 

You need to secure a virtual private network (VPN) connection on the client computers. The remote access server must verify the identity of the client computers without requiring user credentials. 

Which authentication protocol should you use? (To answer, select the appropriate setting or settings in the work area.) 

Answer: 


Q88. - (Topic 2) 

You have a computer that runs Windows 7. The computer is in a workgroup. 

You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. From Credential Manager, select Back up vault. 

B. From User Accounts, select Create a password reset disk. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer: B,C 

Explanation: 

Password reset disks It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user's password. In the process, the following information was lost: E-mail that was encrypted with the user's public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate 

1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts. 

2. In the left pane, click Manage your file encryption certificates. 

3. In the Encrypting File System wizard, click Next. 

4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate 

you want to back up. 

5. Click Back up the certificate and key now. 

6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive. 

7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password. 

8. Select the I'll update my encrypted files later check box, and then click Next. 


Q89. - (Topic 6) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the NAP Client Configuration console, configure the user interface settings. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

C. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:


Q90. - (Topic 6) 

You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. 

You need to be able to restore the missing Windows boot files on any of the desktops when the boot files become corrupted. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a System Restore point on alt Windows 7 Enterprise 32-bit desktops. 

B. Run the recdisc.exe command on a Windows 7 Enterprise 64-bit desktop. 

C. Restart all desktops. Select the Last Known Good Configuration (Advanced) option from the Advanced Boot Options menu. 

D. Create a System Restore point on all Windows 7 Enterprise 64-bit desktops. 

E. Run the resdis.exe command on a Windows 7 Enterprise 32-bit desktop. 

F. Restart Windows 7 64-bit desktops. Select the Disable Driver Signature Enforcement option from the Advanced Boot Options Menu. 

Answer: A,D