getcertified4sure.com

Point Checklist: mcts 70 680




It is more faster and easier to pass the Microsoft 70 680 exam exam by using Precise Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Improve exam 70 680 Exam and find the same core area 70 680 practice test questions with professionally verified answers, then PASS your exam with a high score now.

Q31. - (Topic 2) 

You have a computer that runs windows 7. 

You configure the computer to automatically install all updates. 

You need to verify whether a specific update is installed. 

What should you do? 

A. In event viewer, examine the application log. 

B. In windows update, examine the update history. 

C. At the command prompt, run Wusa.exe and specify the /kb parameter. 

D. At the command prompt, run Verifier.exe and specify the /query parameter. 

Answer:


Q32. DRAG DROP - (Topic 5) 

You deploy Windows 7 on client computers by using a default Windows 7 DVD. 

You discover that the client computers use the most recently released critical updates. 

You download the updates' package files from the Microsoft site to your desktop. 

You need to prepare a new installation DVD that includes the updates. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q33. - (Topic 1) 

If you have a router in the network your connected to and the Default Gateway is set to 

192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network? 

A. 192.168.1.1 

B. 192.168.1.300 

C. 192.168.1.30 

D. 192.168.2.10 

Answer:


Q34. - (Topic 5) 

You install Windows 7 on a new computer. 

Every time you start the computer, you receive a "STOP" error message. 

You suspect that the RAM on the computer has a problem. 

You need verify the RAM on the computer. 

What should you do first? 

A. Start the computer, press F8, and select Repair Your Computer. 

B. Start the computer, press F8, and then select Debugging Mode. 

C. Start the computer by using Windows PE and then run the bootsect.exe /all command 

D. Start the computer by using Windows PE and then run the bcdedit /bootsequence command 

Answer:


Q35. - (Topic 4) 

You administer client computers that have Windows 7 Enterprise installed. 

A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876. 

You need to connect to the server from a client computer by using Remote Desktop. 

What should you do? 

A. From the General tab of your Remote Desktop connection, type 10.10.4.56 port: 10876 in the Computer field. 

B. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option. 

C. From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field. 

D. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876. 

Answer:


Q36. - (Topic 3) 

Your network contains a Network Policy and Access Services server named Server1. 

All certificates in the organization are issued by an enterprise certification authority (CA) named Server2. 

You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP. 

You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider." 

You need to ensure that you can successfully establish the VPN connection to Server1. 

What should you do on Computer1? 

A. Import the root certificate to the user's Trusted Publishers store. 

B. Import the root certificate to the computer's Trusted Root Certification Authorities store. 

C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store. 

D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store. 

Answer:

Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA. 


Q37. - (Topic 1) 

You start a computer by using Windows Preinstallation Environment (Windows PE). 

You need to dynamically load a network adapter device driver in Windows PE. 

What should you do? 

A. Run Peimg.exe and specify the device driver path. 

B. Run Drvload.exe and specify the device driver path. 

C. Run Winpeshl.exe and specify a custom Winpeshl.ini file. 

D. Run Wpeutil.exe and specify the InitializeNetwork command. 

Answer:

Explanation: 

Drvload The Drvload tool adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs. To add a driver to an offline Windows PE image, use the peimg tool.NOT WinpeshlWinpeshl.ini controls whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. To load a customized shell, create a file named Winpeshl.ini and place it in %SYSTEMROOT% \System32 of your customized Windows PE image. The .ini file must have the following section and entry.NOT WpeutilThe Windows PE utility (Wpeutil) is a command-line tool that enables you to run various commands in a Windows PE session. For example, you can shut down or restart Windows PE, enable or disable a firewall, set language settings, and initialize a network. 


Q38. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You are in charge of a computer that runs Windows Vista. You have Windows 7 installed on a new partition on the computer. You have to make sure that the computer always starts Windows Vista by default. So what action should you perform to make sure of this? 

A. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file should be created in the root of the Windows 7 partition. 

B. In order to make sure that the computer always starts Windows Vista by default, a boot.ini file should be created in the root of the Windows Vista partition. 

C. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe should be run and the /default parameter should be specified. 

D. In order to make sure that the computer always starts Windows Vista by default, Bcdedit.exe should be run and the /bootems parameter should be specified. 

Answer:


Q39. - (Topic 2) 

Your network contains a public computer that runs Windows 7. Multiple users log on to the computer by using a local user account named User1. 

Users report that they can log on to some secure Web sites by using credentials that were saved by other users. 

You need to prevent forms-based credentials from being saved on the computer. 

What should you do? 

A. Remove all generic credentials from Windows Vault. 

B. Remove all Windows credentials from Windows Vault. 

C. Modify the Windows Internet Explorer certificates settings. 

D. Modify the Windows Internet Explorer AutoComplete settings. 

Answer:

Explanation: 

AutoComplete settings AutoComplete is a feature in Internet Explorer that remembers the information you have typed into the Address bar, web forms, or password fields, and which automatically fills in that information if you start to type the same thing again later. This saves you from having to type the same information over and over. 


Q40. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. 

What should you use to accomplish this goal? 

A. the User Account Control Settings Control Panel window 

B. the Services management console 

C. Device Manager 

D. Local Users and Groups 

E. the icacls command 

F. the Group Policy management console 

G. the folder Properties window 

H. share permissions 

I. the netsh command 

Answer:

Explanation: 

Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory. 

Follow these steps to change UAC settings: Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes.