we provide Guaranteed Microsoft microsoft 70 680 free exam questions which are the best for clearing 70 680 practice test test, and to get certified by Microsoft TS:Windows 7,Configuring. The 70 680 practice test Questions & Answers covers all the knowledge points of the real mcts 70 680 exam. Crack your Microsoft 70 680 pdf Exam with latest dumps, guaranteed!
Q181. DRAG DROP - (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server 1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain.
You want to automatically collect events from Client1 to Server1. Bandwidth delivery optimization will not be used along with the subscription.
You need to configure the required collector-initiated subscription.
What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.)
Answer:
Q182. - (Topic 3)
You have a computer that runs Windows 7.
You have an application control policy on the computer.
You discover that the policy is not enforced on the computer.
You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.)
You need to enforce the application control policy on the computer.
What should you do?
A. Set the Application Identity service Startup Type to Automatic and start the service.
B. Set the Application Information service Startup Type to Automatic and start the service.
C. Set the Application Management service Startup Type to Automatic and start the service.
D. Set the Application Experience service Startup Type to Automatic and start the service.
Answer: A
Explanation:
Application Identity service AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies
Q183. - (Topic 2)
You have 20 client computers. The computers run Windows XP. They are joined in a domain.
You plan to perform a clean installation of Windows 7 on the computers.
You need to transfer all users documents and settings. You must exclude music and video files.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do first?
A. Create a config.xml file. Configure a logon script for the Windows XP computers to launch Loadstate.exe
B. Modify the migapp.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
C. Modify the miguser.xml file. Configure a logon script for the Windows XP computers to launch Migwiz.exe
D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computers to launch Scanstate.exe
Answer: D
Explanation:
MigDocs.xmlThis file contains information on the location of user documents. NOT Config.xmlThis file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xml This file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.
Q184. - (Topic 2)
You have a computer that runs Windows 7.
The computer is configured to use an intranet Microsoft update service location.
You need to view the name of the intranet service location.
What should you do?
A. At a command prompt, run Wusa.exe.
B. Open Event Viewer and examine the Application log.
C. Open Windows Update and click View update history.
D. Review the contents of the C:\windows\windowsupdate.log file.
Answer: D
Explanation:
WindowsUpdate.log Provides information about when the Windows Update Agent connects to the WSUS server and retrieves the software updates for compliance assessment and whether there are updates to the agent components.
Q185. - (Topic 1)
Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com.
Your network is configured to use only IPv6.
You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com.
Which type of record should you request?
A. A
B. AAAA
C. HINFO
D. NAPTR
Answer: B
Explanation:
The resolution of host names to IPv6 addresses is accomplished through DNS (apart from link-local addresses that are not stored by DNS and resolve automatically). The procedure is the same as for IPv4 address resolution with the computer name and IPv6 address pair being stored in a AAAA (quad-A) DNS resource record, which is equivalent to an A or host record for IPv4. Reverse DNS lookup that returns a computer name for an IPv6 address is implemented by a pointer (PTR) DNS resource record that is referred to the IPv6 reverse lookup zone (or tree) ipv6.arpa, which is the equivalent of the in-addr.arpa reverse lookup zone in Ipv4. AAAAAn AAAA (quad-A) resource record resolves a host name to an IPv6 address.AAn A (address) resource record resolves a host name to an IPv4 address.HINFOHost information (HINFO) resource record. Specifies the type of CPU and operating system in the cpu_type and os_type fields, respectively, for the host DNS domain name in the owner field. Well-known CPU and operating system types that are most often used are noted in RFC 1700. This information can be used by application protocols such as FTP, which use special procedures when communicating with computers of a known CPU and operating system type. NAPTR The NAPTR represents a Naming Authority Pointer. NAPTR records map between sets of URNs, URLs and plain domain names and suggest to clients what protocol should be used to talk to the mapped resource. Each NAPTR record contains a service name, a set of flags, a regexp rule, an order value, a preference and a replacement. Multiple records can be chained together in a cascade to rewrite URIs in fairly sophisticated, but deterministic
ways. These cascading rules have been standardized in RFC2915 and RFC3403.
Q186. - (Topic 4)
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server.
The external firewall has TCP port 80 and TCP port 443 open for remote access connections.
You have a home computer that runs Windows 7.
You need to establish secure remote access connection from the home computer to the remote access server.
Which type of connection should you configure?
A. IPSEC
B. L2TP
C. PPTP
D. SSTP
Answer: D
Explanation:
Secure Socket Tunneling Protocol Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.
Q187. - (Topic 6)
You administer client computers that have Windows 7 Professional SP1 64-bit installed. All desktops are members of a single Active Directory domain.
You plan to install a driver manufactured by an unknown provider.
You need to prepare the client computers for the driver installation.
What should you do?
A. Disable the Code signing for device drivers Domain Group Policy setting.
B. Add each user to the Domain Administrators group.
C. Run the SigVerif.exe command.
D. Enable the Code signing for device drivers Domain Group Policy setting.
Answer: A
Q188. - (Topic 3)
You administer 80 computers that run Windows 7. The computers have static IP addresses.
You need to change the static IP addresses on all the computers by using a startup script.
Which command should you include in the startup script?
A. Ipconfig.exe
B. Nbtstat.exe
C. Netstat.exe
D. Netsh.exe
Answer: D
Explanation:
Netsh.exe Netsh.exe is a tool an administrator can use to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. A helper is a Dynamic Link Library (.dll) file that extends the functionality of the Netsh.exe tool by providing configuration, monitoring, and support for one or more services, utilities, or protocols. The helper may also be used to extend other helpers. You can use the Netsh.exe tool to perform the following tasks:
-Configure interfaces.
-Configure routing protocols.
-Configure filters.
-Configure routes.
-Configure remote access behavior for Windows-based remote access routers that are running the Routing and Remote Access Server (RRAS) Service.
-Display the configuration of a currently running router on any computer.
-Use the scripting feature to run a collection of commands in batch mode against a specified router.
The syntax for the Netsh.exe tool is: netsh [-r router name] [-a AliasFile] [-c Context] [Command | -f ScriptFile] To display a list of subcontexts and commands that can be used in a context, type the context name followed by a space and a ? at the netsh> command prompt. For example, to display a list of subcontext and commands that can be used in the /routing context, type routing ? at the netsh> command prompt, and then press ENTER.
Q189. - (Topic 2)
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain.
Windows Remote Management (WinRM) is enabled on both computers.
You need to remotely create additional disk volumes on Computer1 from Computer2.
What should you do?
A. On Computer2, run Winrs and then run Diskpart.
B. On Computer2, run Winrs and then run Diskmgmt.msc.
C. On Computer1, install the Telnet Client and then run Diskpart from Computer2.
D. On Computer1, install the Telnet Client and then use Disk Management from Computer2.
Answer: A
Explanation:
Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.
Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.
Q190. - (Topic 1)
In Windows 7 you can control when users such as kids can login to Windows 7.
Which of the following best describes where to configure this option?
A. You cannot choose this feature unless you are connected to a domain.
B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions.
C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings.
D. Go to the Homegroup settings and choose Offline Time Settings.
Answer: B