It is impossible to pass Microsoft mcts 70 680 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft 70 680 practice test practice questions. You will get a surprising result by our Abreast of the times TS:Windows 7,Configuring practice guides.
Q91. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to the computer.
You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives.
What should you do?
A. From the local Group Policy, modify an application control policy.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From Device Manager, modify the settings of all removable devices.
D. From the local Group Policy, modify a removable storage access policy.
Answer: D
Q92. - (Topic 1)
You have a standalone computer that runs Windows 7. Multiple users share the computer.
You need to ensure that you can read the content of all encrypted files on the computer.
What should you do?
A. Run the Certificates Enrollment wizard and then run Certutil.exe -importpfx.
B. Run the Certificates Enrollment wizard and then run Certutil.exe -installcert.
C. Run Cipher.exe /r and then add a data recovery agent from the local security policy.
D. Run Cipher.exe /rekey and then import a security template from the local security policy.
Answer: C
Explanation:
Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
Q93. - (Topic 1)
You have a computer that runs Windows 7. The computer has System Protection enabled.
You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted.
What should you do?
A. Run Disk Cleanup for Programs and features.
B. Run Disk Cleanup for System Restore and Shadow Copies.
C. From the System Protection Restore settings, select Turn off System Restore.
D. From the System Protection Restore settings, select Only restore previous versions of files.
Answer: B
Explanation:
Shadow info: Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
Q94. - (Topic 4)
You need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. Open Device Manager.
B. Open Reliability Monitor.
C. Create a User Defined Data Collector Set.
D. Create a new Event Trace Sessions Data Collector Set.
Answer: B
Explanation:
Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.
The Reliability Monitor is intended for advanced computer users, such as software developers and network administrators.
Click to open Action Center.
Click Maintenance. Then, under Check for solutions to problem reports, click View reliability history.
In Reliability Monitor, you can:
Click any event on the graph to view its details.
Click Days or Weeks to view the stability index over a specific period of time.
Click items in the Action column to view more information about each event.
Click View all problem reports to view only the problems that have occurred on your
computer. This view doesn't include the other computer events that show up in Reliability
Monitor, such as events about software installation.
Q95. - (Topic 3)
You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment.
You complete the following actions:
Create an export by using Windows Easy Transfer
Create a system image by using Backup and Restore
Install the User State Migration Tool (USMT) and run Scanstate
The disk on the computer fails. You replace the disk.
You need to restore the environment to the previous state.
What should you do?
A. Install Windows 7, install USMT, and then run Loadstate.
B. Install Windows 7 and then import the Windows Easy Transfer package.
C. Start the computer from a Windows Recovery Environment (Windows RE) disk and then run Bcdboot.exe.
D. Start the computer from a Windows Recovery Environment (Windows RE) disk and then restore the system image.
Answer: D
Explanation:
Restoring from a System Image Backup
A System Image restore rewrites the entire contents of a system volume. Therefore, you restore from a System Image backup by booting from the Windows 7 Installation DVD-ROM and loading System Recovery tools or by pressing F8 during the boot process. Restoring from a System Image backup enables you to quickly get a computer running after you replace a failed hard disk, or if the operating system installation has been corrupted (for example, by malware that cannot be removed except 0 by wiping the disk). It is sometimes known as complete recovery or complete PC Restore. This procedure assumes that the System Recovery Options (otherwise known as the Windows Recovery Environment, or Windows RE) files are present on the DVD-ROM. If not, you can boot from the installation DVD-ROM and press F8 during the boot to access the Advanced Boot Options, as described in the next section of this lesson. To restore a System Image backup, perform the following steps:
1. Ensure the backup medium is connected to your computer.2. Insert the Windows 7 DVD-ROM. Ensure that the computer BIOS is configured to boot from the DVD-ROM.3. Restart your computer. When prompted to boot from DVD-ROM, press any key.4. Windows 7 Setup loads. When prompted, select your regional preferences and then click Next.5. Click Repair Your Computer.6. In the System Recovery Options dialog box, click Restore Your Computer Using System Image. If thebackup was saved to a DVD-ROM, insert the DVD-ROM now. Click Next. The Windows System Image Restore Wizard starts.7. On the Select A System Image Backup page, the most recent backup is automatically selected. If this is the backup you want to restore, click Next. Otherwise, click Select A System Image, click Next, and then select the desired backup.8. On the Choose Additional Restore Options page, select the Format And Repartition Disks check box if you want to reformat the disk and overwrite all data, or if the disk is not formatted. If you do not want to overwrite all the data on your current disk, do not select this check box. Click Next.9. Click Finish. When prompted, click Yes to confirm. Windows System Image Restore reads the data from the backup and overwrites existing files. You can restore to a different-sized hard disk, provided that the hard disk is large enough to store the backup. After the restore is complete, the computer restarts using the restored system volume.
Q96. - (Topic 6)
You have a computer that runs Windows 7 Enterprise. The operating system is installed on drive C.
You have customized the Windows environment and prepared it to generate deployment source media. You attach a USB flash drive as drive D to the computer.
You need to create a Windows image file that has the operating system partition.
What should you do?
A. Run imagex.exe /capture d: c:\image.wim.
B. Run imagex.exe /capture c: d:\image.wim.
C. From Backup and Restore, create a system image and save it to drive D.
D. Run xcopy.exe c: d: /p /c.
Answer: C
Q97. - (Topic 1)
You manage a computer that runs Windows 7.
You are tasked to identify which applications were installed during the last week.
What Windows component would you use to find this information? Choose two.
A. Check the Windows System Change Log in the Control Panel.
B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel.
C. The informational events should be reviewed from Reliability Monitor.
D. Check the Windows System Diagnostics Report under the Performance Monitor MMC.
Answer: B,C
Q98. - (Topic 2)
You have a computer that runs Windows Vista.
You need to identify whether the computer can be upgraded to Windows 7.
Which tool should you use?
A. Windows Anytime Upgrade for Windows 7
B. Windows Anytime Upgrade for Windows Vista
C. Windows 7 Upgrade Advisor
D. Windows Vista Upgrade Advisor
Answer: C
Explanation:
Windows 7 Upgrade Advisor Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft's\ Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista. Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7. NOT Windows Anytime Upgrade A similar compatability report is generated during the upgrade process, but the version created by the Windows 7 Upgrade Advisor is more likely to be up to date.NOT VistaQuestion specifies upgrading to Windows 7 from Windows Vista, not upgrading to Windows Vista.
Q99. - (Topic 2)
You install an application named app1.exe on a computer
After the installation the computer becomes unresponsive.
You restart the computer and attempt to uninstall App1.exe. The uninstallation of App1.exe fails.
You need to restore the computer to its previous functional state. You must achieve the goal by using the minimum amount of administration.
What should you do?
A. From Recovery, restore a system restore point.
B. From the Previous Versions tab of App1.exe, click Restore button.
C. Start the computer, press F8 and then use the Last Known Good Configuration.
D. Create a system repair disc and then start the computer from the system repair disc.
Answer: A
Explanation:
If you install an application that causes your computer to become unstable, you should first attempt to uninstall the application. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore.
Windows 7 creates system restore points on a regular schedule and prior to events such as the installation of applications and drivers. A restore point contains information about registry settings and other system information. Windows 7 generates restore points automatically before implementing significant system changes. You can manually create restore points and restore a computer system to a selected restore point. If you install an application or driver that causes your computer to become unstable, you should first attempt to uninstall the application or roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore.
Q100. - (Topic 2)
A user reports that he is unable to start his computer. He provides the following information:
. The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
. The user cannot locate his BitLocker recovery key.
You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort.
What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 7 installation media and select Repair your computer.
C. Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK.
D. Start the computer from the Windows 7 installation media and select Install now.
Answer: D
Explanation:
No recovery key = no recovery. Time to install.
Any other option defeats the whole point of encrypting it.
Encrypted volumes are locked when the encryption key is not available. When the operating system volume is locked, you can boot only to recovery mode. In recovery mode, you can enter the BitLocker password or you can attach the USB device that has the recovery key stored and restart the computer. Once you enter the recovery password or key, you can boot your computer normally.
The following events trigger recovery mode:
* The boot environment changes. This could include one of the boot files being modified.
* TPM is disabled or cleared.
* An attempt is made to boot without the TPM, PIN, or USB key being provided.
* You attach a BitLocker-encrypted operating system volume to another computer.