It is impossible to pass Microsoft 70 680 practice test exam without any help in the short term. Come to Ucertify soon and find the most advanced, correct and guaranteed Microsoft exam 70 680 practice questions. You will get a surprising result by our Up to the immediate present TS:Windows 7,Configuring practice guides.
Q271. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1.
You need to ensure that User1 and User2 can log on to Computer2.
What should you do on Computer2?
A. Enable all user accounts
B. Modify the default password policy
C. Modify the Allow log on locally user right
D. Add User1 and User2 to the local Administrators group
Answer: A
Explanation:
LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey"
(local account create) /lac:[Password] Specifies that if a user account is a local (non-domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default.
Q272. HOTSPOT - (Topic 6)
You work with Windows 7 computers.
Your company has a policy of not allowing software to be upgraded without proper authorization from the managers.
You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.)
Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. )
Any upgrades or change to the WinWord.exe will result in the program not operating.
When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.)
Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. )
Answer:
Q273. HOTSPOT - (Topic 6)
A company has Windows 7 computers that that use Internet Explorer 10 with InPrivate Browsing and InPrivate Filtering.
In the table below, identify the functionality of each InPrivate mode. (Make only one selection in each column. This question is worth two points. )
Answer:
Q274. HOTSPOT - (Topic 6)
A manufacturing company has Windows Vista and Windows XP computers.
You are responsible for upgrading all computers to Windows 7.
You test the Windows 7 installation on a Windows Vista computer. Early in the installation process, you are prompted to choose the "Upgrade" option or the "Custom (Advanced)" installation option.
You need to determine which installation option is appropriate for the different computers in your company.
In the table below, identify the characteristics of the Upgrade and Custom installation options. (Make only one selection in each column. This question is worth two points. )
Answer:
Q275. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. From Internet Options, modify the security settings for the Internet zone.
B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting.
C. From Internet Options, select Delete browsing history on exit.
D. From Internet Options, on the Advanced tab, clear Enable DOM Storage.
Answer: C
Q276. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management.
From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2.
Which command should you run?
A. Start disk.exe /d \\computer2
B. Tscon disk.exe /DEST:computer2
C. Winrm e disk.exe Cr:computer2
D. Winrs r:computer2 disk.exe
Answer: D
Explanation:
WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig.
The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.
Q277. - (Topic 2)
You have a computer that runs windows 7.
You log on to the computer by using a user account that is a member of Administrator Group.
From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad.
You attempt to save the file and receive the save as dialog box.
You need to ensure that you can save changes to c:\windows\system32\drivers\
What should you do?
A. Stop the windows search service
B. Remove the inherited permissions from the file.
C. Start Windows Notepad by using elevated privileges.
D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer.
Answer: C
Explanation:
Windows 7 does not allow applications to write data to these secure locations.
User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when
the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC
Q278. - (Topic 4)
A company has a new deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You need to capture an image of a Windows 7 reference computer.
Which two actions should you perform on the server before performing actions on the reference computer? (Each correct answer presents a complete solution. Choose two.)
A. Run the Dism command with the /Mount-Wim option.
B. Create a capture image in WDS.
C. Run the BCDEdit command.
D. Run the Dism command with the /Add-Driver option.
E. Run the imageX command with the /Mount parameter.
F. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
G. Add a boot image in WDS.
H. Run the Start/w ocsetupcommand.
I. Run the PEImg /Prep command.
J. Run the DiskPart command and the Attach command option.
K. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
L. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True,
M. Run the Dism command with the /Add-Package option.
N. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False.
Answer: B,G
Explanation:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx MDT relies on boot images created in WDS, WAIK is a collection of tools that you use to help automate deployment. To capture an image created on a reference computer you need to add a boot.wim files to WDS, then using the boot.wim, create a capture wim file (usually called capture.wim). This allows you to capture a a reference computer.
Q279. - (Topic 3)
You need to ensure that when you insert a blank DVD into the DVD drive, Windows Explorer opens automatically and enables you to select files to burn to DVD.
What should you do?
A. From Default Programs, modify the AutoPlay settings.
B. From Default Programs, modify the default program settings.
C. From Device Manager, modify the properties of the DVD drive.
D. From System Configuration Utility, modify the Startup settings.
Answer: A
Q280. - (Topic 2)
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1.
You need to configure Computer2 to connect to Network1 by using the same settings as Computer1.
What should you do on Computer1?
A. At the command prompt, run Wecutil.exe -es -gr.
B. At the command prompt, run Winrs.exe -environment.
C. From Windows Firewall with Advanced Security, export the policy.
D. From the wireless network properties of Network1, copy the network profile to a USB flash drive.
Answer: D
Explanation:
The Copy this network profile to a USB flash drive link launches the Copy Network Settings wizard, which writes the wireless network profile settings to a USB flash drive. You can then use this flash drive to automate the wireless network profile configuration of other computers. To save your wireless network settings to a USB flash drive, insert a USB flash drive into the computer, and then follow these steps:
1. Click to open Network and Sharing Center.
2. In the left pane, click Manage wireless networks.
3. Right-click the network, click Properties, and then click Copy this network profile to a USB flash drive.
4. Select the USB device, and then click Next.
5. Follow the instructions in the wizard, and then click Close.