getcertified4sure.com

What to do with 70 680 pdf




It is impossible to pass Microsoft 70 680 practice test exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft exam 70 680 practice questions. You will get a surprising result by our Up to date TS:Windows 7,Configuring practice guides.

Q51. - (Topic 2) 

You have a computer that runs windows 7. 

You have an application installation package named app1.msi. 

You need to perform a customized installation of app1.msi. 

What should you do? 

A. Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst. 

B. Create a transform file named app1.mst and then run Msinfo.exe /I app1.msi /t. 

C. Create a transform file named app1.msp and then run Msiexec.exe /I app1.msi /app1. 

D. Create a transform file named app1.msp and then run Msinfo32.exe /I app1.mst /. 

Answer:

Explanation: 

Windows Installer Transform Files A Windows Installer transform (.mst) file provides configuration settings for a customized installation. A transform file contains information about components, features, setup properties, and changes that you can use to customize your installation. 

MsiexecProvides the means to install, modify, and perform operations on Windows Installer from the command line. To install or configure a product Syntax msiexec /i {package|ProductCode} /i: Installs or configures a product. /t : Applies transform to advertised package.NOT Msinfo32 Displays a comprehensive view of your hardware, system components, and software environment. 


Q52. - (Topic 5) 

You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing. 

You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer. 

You need to achieve the following goals: 

. Prevent members of the Marketing group from modifying the print jobs of other users. 

. Ensure that members of the Marketing group can modify the print jobs that they submit. 

What should you do? 

A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group. 

B. From the printer's properties, assign the Print permission to the Marketing group. 

C. From the printer's properties, assign the Manage Documents permission to the Marketing group. 

D. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group. 

Answer:


Q53. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Enterprise installed. 

You install two new hard disk drives and verify that the disks have been detected by Disk Management. 

You need to configure the two new disks as a software fault-tolerant disk array. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q54. - (Topic 2) 

You have a computer that runs Windows 7. 

You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can configure permissions on the file. 

What should you do? 

A. From Folder Options, modify the View settings. 

B. Move the file to a disk that has the NTFS file system. 

C. Open Windows Explorer by using elevated privileges. 

D. Hold the SHIFT key, right-click the file, and click Properties. 

Answer:

Explanation: 

Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object. 


Q55. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q56. - (Topic 4) 

You plan to deploy Windows 7 images. 

You need to ensure that you can deploy images using the WindowsPreinstallation Environment (Windows PE). 

What would you add to the Window PE Image? 

A. ImageX 

B. Usmtutils.exe 

C. Mighost.exe 

D. Loadstate.exe 

Answer:


Q57. - (Topic 3) 

You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE). 

You need to ensure that Windows PE supports the Windows Scripting Host (WSH). 

Which tool should you use? 

A. Bcdedit.exe 

B. Dism.exe 

C. Imagex.exe 

D. Oscdimg.exe 

Answer:

Explanation: 

DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: 

-Prepare a Windows PE image.- Enable or disable Windows features within an image.-Upgrade a Windows image to a different edition.- Add, remove, and enumerate packages.-Add, remove, and enumerate drivers.- Apply changes based on the offline servicing section of an unattended answer file.- Configure international settings.- Implement powerful logging features.- Service operating systems such as Windows Vista with SP1 and Windows Server 2008.- Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.- Service all platforms (32-bit, 64-bit, and Itanium).- Use existing Package Manager scripts. 

DISM Command-Line Options To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.NOT BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack.NOT 

OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. 


Q58. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to prevent users from installing a specific removable drive on the computer. 

You connect the removable drive to the computer. 

What should you do before you create a Group Policy? 

A. From Device Manager, identify the device class GUID. 

B. From Device Manager, identify the device location information. 

C. From System Information, identify the device INF file. 

D. From System Information, identify the device driver file name. 

Answer:

Explanation: 

The device class GUID is used to identify the device. Prevent Windows 7 from installing or updating device drivers whose device setup class GUIDs you specify. This policy overrides any other policy that permits update or installation. 


Q59. - (Topic 1) 

Which of the following is true of Windows 7? 

A. MailCentral is included as the new default mail client with Windows 7. 

B. Outlook Express is included with Windows 7. 

C. Microsoft Outlook is included with Windows 7. 

D. There is no preinstalled mail client included with Windows 7. 

Answer:


Q60. - (Topic 2) 

You have recently installed Windows 7 Ultimate on a laptop computer, installed applications such as Office, and downloaded and installed all outstanding updates. The computer has two internal hard disks, both formatted with the NTFS file system. You also have an external USB hard disk that you have plugged into the laptop. You used the convert fs/ntfs command to convert the external hard drive to the NTFS file system. You have an 8-GB USB flash memory device and the laptop contains a DVD-ROM writer. In your workplace, you can plug in to the corporate network and connect to a network share on a file server running Windows Server 2008 R2. 

On what devices can you create a full System Image backup of the laptop's system volume? (Choose all that apply.) 

A. The second internal hard disk 

B. The external hard disk 

C. The USB flash drive 

D. Multiple DVD-ROMs 

E. The network share 

Answer: A,B,E