getcertified4sure.com

Get Smart with 70 680 exam




Ucertify exam 70 680 Questions are updated and all 70 680 practice test answers are verified by experts. Once you have completely prepared with our exam 70 680 exam prep kits you will be ready for the real 70 680 pdf exam without a problem. We have Renewal Microsoft 70 680 practice test dumps study guide. PASSED 70 680 exam First attempt! Here What I Did.

Q11. - (Topic 1) 

Federated Search connectors are installed using what method? 

A. Purchase the Federated Search Installation Tool Pack online and buying individual search connectors from websites. 

B. Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install. 

C. Go to Microsoft's website. Only vendors who have signed up with the Microsoft Federated Search Tool Writers Guild can participate. 

D. Go to Amazon.com and download the Shared Resource Kit for Federated Searches. 

Answer:


Q12. - (Topic 6) 

A company has Windows 7 Enterprise computers that use BitLocker drive encryption on operating system drives. 

You need to configure multi-factor authentication before client computers are booted into Windows. 

On each client computer, what should you do? 

A. Require the use of a startup key. 

B. Implement fingerprint authentication. 

C. Implement a Dynamic Password Policy. 

D. Implement a Dynamic Access Control policy. 

E. Configure a TPM PIN. 

Answer:

Explanation: BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2, you can use additional forms of authentication with the TPM protection. BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN) or inserts a USB device (such as a flash drive) that contains a BitLocker startup key, or both the PIN and the USB device can be required. These additional security measures provide multifactor authentication and help ensure that the computer will not start or resume from hibernation until the correct authentication method is presented. 


Q13. - (Topic 2) 

You have a computer that runs Windows 7. 

You manually create a system restore point. 

You need to restore a copy of a file stored on a drive C from two days ago. 

You must act with minimum administrative effort. 

What should you do? 

A. From recovery, select System Restore. 

B. From Backup and restore, select Rrestore my files. 

C. From the command prompt, run Wbadmin get items. 

D. From the properties of the file, select Previous Versions. 

Answer:

Explanation: 

How do I view or restore previous versions of a file and folder? Right-click the file or folder, and then click Restore previous versions. You'll see a list of available previous versions of the file or folder. The list will include files saved on a backup (if you're using Windows Backup to back up your files) as well as restore points. To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. For more information about libraries, see Include folders in a library. 

The Previous Versions tab, showing some previous versions of files 

NOT System Restore: System Restore restores system files and settings and does not affect any of your documents, pictures, or other personal data. 

NOT Backup and Restore: System restore point was created, no backup meantioned.NOT Wbadmin: The Backup And Restore console does not provide a graphical tool for scheduling System Image backups. You need to create a System Image backup manually from the Backup And Restore console whenever you have made significant changes to a computer's configuration. Take care that if you restore a System Image backup and boot from it, or if you make the VHD bootable for failover protection, your computer could be vulnerable unless the System Image includes security updates. Although you cannot use Backup And Restore to schedule System Image backups, you can use the Wbadmin command-line utility to perform this function. For example, to initiate a System Image backup of the C: drive to the H: drive, you run the following command from an elevated command prompt: wbadmin start backup –backuptarget:h: -include:c: -quiet 


Q14. - (Topic 2) 

Your network consists of a single Active Directory forest. 

You have 50 portable computers and 50 desktop computers. All computers have 32-bit hardware. 

You plan to deploy Windows 7 and 10 corporate applications to the computers by using a custom image. 

You need to prepare for the deployment by using the minimum amount of administrative effort. 

What should you do first? 

A. On one computer, install Windows 7 and the corporate applications. 

B. On one portable computer and one desktop computer, install Windows 7 and the corporate applications. 

C. On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit. 

D. On a server, install the Windows Automated Installation Kit (AIK) and run Windows System Image Manager (Windows SIM). 

Answer:

Explanation: 

To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize 

/shutdown. 

Sysprep prepares the image for capture by cleaning up various user-specific and computerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged. 


Q15. - (Topic 4) 

A company has a server running Windows Server2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. 

You need to remove a virtual hard disk boot option from the Windows startup menu on a client computer. 

What should you do? 

A. Run the Start /w ocsetup command. 

B. Run thePEImg/Prep command. 

C. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

D. Run the ImageX command with the /Mount parameter. 

E. Run the DiskPart command and the Attach command option. 

F. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. 

G. Run the Dism command with the /Mount-Wimoption. 

H. Run the Dism command with the /Add-Driver option. 

I. Run the BCDEdit/delete command. 

J. Add a boot image and create a capture image in WDS. 

K. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. 

L. Run the Dism command with the /Add-Package option. 

M. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. 

Answer:


Q16. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a system repair disk. 

Answer:


Q17. - (Topic 1) 

You have a computer that runs Windows 7. 

A printer is installed on the computer. 

You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer. 

You need to ensure that members of the Sales group can modify all the print jobs that they submit. 

You must prevent Sales group members from modifying the print jobs of other users. 

What should you do? 

A. From the printer's properties, assign the Print permission to the Sales group. 

B. From the printer's properties, assign the Manage Documents permission to the Sales group. 

C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group. 

D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group. 

Answer:

Explanation: 

The available permissions are: 

-Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer. 

-Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer. 

-Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue. 


Q18. - (Topic 3) 

You have a computer that runs Windows 7. The computer contains a folder named C:\data. 

You use Advanced Sharing to share C:\data by using the default share permissions. 

When a user tries to access the share over the network, he gets an "Access is Denied" error message. 

You need to ensure that the user can access the share. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location from a Public network to a Home or Work network. 

C. From the Security settings of the folder, assign the user the Read NTFS permission. 

D. From the Advanced Sharing settings of the folder, assign the user the Read share permission. 

Answer:

Explanation: 

Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container. 


Q19. - (Topic 2) 

To establish a DirectAccess connection to the network, what is the first requirement? 

A. Install a certificate 

B. Create a VPN connection 

C. A static IPv4 address 

D. A static IPv6 address 

Answer:


Q20. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You use a computer that runs Windows 7. 

Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform? 

A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy. 

B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in. 

C. The BitLocker Drive Encryption settings should be modified from Control Panel. 

D. The BitLocker Drive Encryption settings should be modified from a local Group Policy. 

Answer: