getcertified4sure.com

Foolproof 70 680 practice test tips




Act now and download your Microsoft 70 680 practice test test today! Do not waste time for the worthless Microsoft 70 680 exam tutorials. Download Up to the minute Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft 70 680 pdf with a classic professional.

Q311. HOTSPOT - (Topic 6) 

You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed. 

You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements: 

. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office. 

. Engineer employees' remote support is prevented when they are working from home. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 

Answer: 


Q312. - (Topic 2) 

Your network consists of a single Active Directory domain named contoso.com. 

You have a server named Server1 that runs a custom network application. 

Server1 has the following IP addresses: 

. 192.168.15.10 

. 192.168.15.11 

You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. 

What should you do from the computer? 

A. Edit the hosts file 

B. Edit the lmhosts file 

C. Run Ipconfig.exe /flushdns 

D. Run Netsh interface ipv4 reset 

Answer:

Explanation: 

Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file. 

Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet. 

-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations. 

-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface. 

-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups 

-LMHOSTS file, such as the ability to support routed domain logon validation. 

-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations. 

-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC). 

Other info http://support.microsoft.com/kb/105997 


Q313. - (Topic 2) 

You have a computer that runs Windows Vista. 

You install Windows 7 on a new partition on the computer. 

You need to ensure that the computer always starts Windows Vista by default. 

What should you do? 

A. Run Bcdedit.exe and specify the /default parameter. 

B. Run Bcdedit.exe and specify the /bootems parameter. 

C. Create a boot.ini file in the root of the Windows 7 partition. 

D. Create a boot.ini file in the root of the Windows Vista partition. 

Answer:

Explanation: 

The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses 


Q314. - (Topic 4) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

. Include the CPU, Memory, Disk and Graphics subsystems. 

. Rate the subsystems and find out the lowest-rated component. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:


Q315. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. 

Computer1 and Server1 have IPv4 and IPv6 installed. 

You need to identify whether you can connect to Server1 by using IPv6. 

What should you do? 

A. Run Ping Server1 -6. 

B. Run Ping Server1- n 6. 

C. Run Net view \\Server1. 

D. Open \\server1 from the Run dialog box. 

Answer:

Explanation: 

Ping The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization's network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name—for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically. -6 Force using IPv6. 


Q316. - (Topic 1) 

Your network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. 

At the branch office, a computer named Computer1 is experiencing performance issues. 

You need to temporarily prevent all computers from retrieving cached content from Computer1. 

What should you do on Computer1? 

A. At the command prompt, run Netsh branchcache flush. 

B. At the command prompt, run Netsh branchcache dump. 

C. Modify the Configure BranchCache for network files Group Policy setting. 

D. Modify the Set percentage of disk space used for client computer cache Group Policy setting. 

Answer:

Explanation: 

Flush 

Deletes the contents of the local BranchCache cache. 


Q317. HOTSPOT - (Topic 5) 

A company is in the process of upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image. 

When users move the application window, the application is displayed improperly. 

You need to ensure that the application is displayed properly by disabling the Aero theme. 

Which setting should you choose? (To answer, select the appropriate check box in the dialog box.) 

Answer: 


Q318. HOTSPOT - (Topic 4) 

You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2-Enterprise Security. 

The company's security policy requires multifactor authentication for the portable computers. 

You need to manually configure each portable computer to meet the following requirements: 

. Users must provide multifactor authentication. 

. The Server certificate held on the portable computers must mach the certificate held on the server. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 

Answer: 


Q319. - (Topic 3) 

You have a custom image of Windows 7. You plan to deploy the image to computers that are not connected to the corporate network. You need to ensure that a custom application is automatically installed after the image is deployed. What should you do? 

A. From Microsoft Deployment Toolkit (MDT), create a custom task sequence and run the New Media Wizard. 

B. From Windows System Image Manager (Windows SIM), open the image and add the applications to Pass 1 windowsPE. 

C. Create a Group Policy object (GPO) and add a new software installation package. 

D. Run Dism.exe and specify the /mount-WIM parameter. Add the application installation files to the image. Modify the winrm.cmd file. 

Answer:


Q320. - (Topic 1) 

You have a computer that runs Windows 7. 

Your network contains a DHCP server that runs Windows Server 2008 R2. 

The server is configured as a Network Access Protection (NAP) enforcement point. 

You need to configure the computer as a NAP client. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. From Services, set the Netlogon service Startup Type to Automatic. 

B. From Services, set the Network Access Protection Agent service Startup Type to Automatic. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client. 

Answer: B,D 

Explanation: 

Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface 

1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK. 

2. Click Enforcement Clients. 

3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent 

The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer.