We provide real 70 680 exam exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 680 practice test Exam quickly & easily. The 70 680 practice test PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 680 exam dumps pdf and vce product and material, you can easily pass the 70 680 practice test exam.
Q321. - (Topic 1)
Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7.
You add a new computer named Computer1 to the subnet.
You discover that Computer1 has an IP address of 169.254.34.12.
You cannot connect to other computers on the network. Other computers on the network can connect to each other.
You need to ensure that you can connect to all computers on the network. What should you do?
A. Turn off Windows Firewall.
B. Run Ipconfig.exe /renew.
C. Configure a static TCP/IP address.
D. Run Netsh.exe interface ipv4 install.
Answer: C
Explanation:
[Need better justification] Configuring static IP addresses When you assign a static IP address, you need to tell the computer the IP address you want to use, the subnet mask for this IP address, and, if necessary, the default gateway to use for internetwork communications. An IP address is a numeric identifier for a computer. Ip addressing schemes vary according to how your network is configured, but they're normally assigned based on a particular network segment.
Q322. - (Topic 4)
You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do?
A. From the Trusted Platform Module (TPM) snap-in, initialize TPM.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From a local Group Policy, modify the BitLocker Drive Encryption settings.
D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings
Answer: C
Explanation:
How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.
Q323. - (Topic 3)
You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer.
You need to prevent the computer from displaying the username of the last user who logged on.
What should you do?
A. From Control Panel, modify the User Profiles settings.
B. From Control Panel, modify the Personalization settings.
C. From the local computer policy, add a policy template.
D. From the local computer policy, modify the local security policy.
Answer: D
Explanation:
How to Prevent the Last Logged-On User Name from Being Displayed
1. Click Start and type secpol.msc in the search box.
2. Press Enter.
3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options.
4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name.
5. Double click this security option and click Enabled.
6. Click OK.
Q324. - (Topic 2)
Kim Akers has an administrator account on a computer running Windows 7 Enterprise.
Don Hall has a standard account on the same computer. Both users have Microsoft Office Word and Microsoft Office Excel files saved in their Documents library. Don stores Microsoft Office PowerPoint presentations in a subfolder of his Documents library named Presentations. He also stores digital photographs in his Pictures library.
Don has created a folder called Secret in his Documents library and has encrypted the folder and its contents. He stores confidential files in that folder.
When Don last logged on, he deleted some personal files but did not empty his Recycle Bin.
Kim is logged on to the computer. She has plugged in a USB flash memory device that holds personal files but has not yet copied any of these files to the computer. She has never formatted the flash memory device.
The computer is configured to let Windows decide what files and folders to back up.
Kim opens the Backup And Restore console but does not change any settings. She clicks Backup Now.
Which files are backed up? (Choose all that apply.)
A. The Word and Excel files in Don's Documents library
B. The Word and Excel files in Kim's Documents library
C. The PowerPoint files in Don's Presentation folder
D. The digital photographs in Don's Pictures library
E. The files in Don's Secret folder
F. The files in Don's Recycle Bin
G. The files on Kim's USB flash memory device
Answer: A,B,C,D
Q325. - (Topic 3)
A user named User1 uses a shared computer that runs Windows 7.
User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials.
You need to ensure that User1 can use the USB device without requiring administrative credentials.
What should you do first?
A. Add User1 to the Power Users group.
B. Run Pnputil.exe and specify the - i- a parameters.
C. Run Driverquery.exe and specify the /SI parameter.
D. Copy the driver files to the C:\windows\system32 folder.
Answer: B
Explanation:
When a driver is staged, it is placed in the device driver store and non-administrators can install the device, provided they have permission to install devices in the appropriate device setup class. Pnputil.exe is a command line utility that you can use to manage the driver store. You can use Pnputil to add driver packages, remove driver packages, and list driver packages that are in the store. -i Specifies to install the identified INF file. Cannot be used in conjunction with the -f parameter.
Example pnputil.exe -i -a a:\usbcam\USBCAM.INF Adds and installs the specified driver
Q326. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that Windows does not display notifications when programs try to install software or make changes to the computer, or if users make changes to Windows settings.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the leads command
B. the netsh command
C. share permissions
D. Device Manager
E. Local Users and Groups
F. the folder Properties window
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel window
Answer: H,I
Q327. - (Topic 3)
You need to modify the contents of an image that is contained in a Windows image (WIM) file.
What should you do first?
A. Run Diskpart /s.
B. Run Peimg.exe /import.
C. Create an empty folder on a NTFS partition.
D. Create and attach a virtual hard disk (VHD).
Answer: C
Q328. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q329. - (Topic 3)
You need to reduce the amount of space currently being used to store system restore points.
What should you do?
A. Run Disk Cleanup.
B. Run Msconfig.exe.
C. Configure disk quotas.
D. Configure Windows Backup.
Answer: A
Explanation:
Shadow info:
Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
NOT Disk Quota:Does not directly affect size of System Restore Points.
Q330. - (Topic 3)
You have a computer that runs Windows 7.
You open Windows Internet Explorer and access a Web site as shown in the exhibit. (Click the Exhibit button.)
You click the Suggested Sites button, but the suggestions fail to display.
You need to obtain suggested sites.
What should you do?
A. From the Page menu, enable Caret Browsing.
B. From the Safety menu, disable the SmartScreen Filter.
C. From the Start menu, open a new Internet Explorer window.
D. From the Microsoft Corporation Web site, refresh the Suggested Sites Web Slice.
Answer: C
Explanation: Opening a new Internet Explorer window will not open with InPrivate enabled. InPrivate is turned onInPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. You must enable InPrivate
Filtering manually each time you start a new browsing session.