Act now and download your Microsoft microsoft 70 680 test today! Do not waste time for the worthless Microsoft microsoft 70 680 tutorials. Download Leading Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft 70 680 exam with a classic professional.
Q251. - (Topic 2)
A user telephones your help desk. Her Favorites list is corrupt and she is having problems accessing the Web sites she visits regularly. All the computers in your organization are backed up every night with a file and folder backup that uses default settings. A restore point was created on all the company's client computers 24 hours ago because a new device driver was installed. You performed a System Image backup on all the computers in your organization three weeks ago. The user is not computer-literate and you need to fix the problem for her.
What is the most efficient way to do so?
A. Perform a system restore.
B. Perform a System Image restore.
C. Use the Restore Files Wizard to restore the Favorites folder in the user's backed-up profile.
D. Access the History tab under Favorites on the user's browser. Browse to recently visited sites and add them to Favorites.
Answer: C
Q252. - (Topic 3)
You need to create a virtual hard disk (VHD) file that will be used to deploy Windows 7. The solution must minimize the performance impact caused by using a VHD.
Which type of VHD should you create?
A. differencing disk
B. dynamically expanding disk
C. fixed-size disk
D. snapshot
Answer: C
Explanation: Typically, you place the VHD on a second internal or external hard disk (although this is not essential). You then specify the VHD size and format settings. Microsoft recommends the default Fixed Size setting, but you can select Dynamic Expanding if you do not want to allocate the disk space. Fixed Size gives better performance and is more suitable in a production environment.
Q253. - (Topic 4)
You have a computer that runs Windows 7.
You need to identify the disk, memory, CPU, and network resources that an application is currently using.
Which tool should you use?
A. Component Services
B. Performance Information and Tools
C. Reliability Monitor
D. Resource Monitor
Answer: D
Explanation:
Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. Resource Monitor includes five tabs: Overview, CPU, Memory, Disk, and Network. The Overview tab, displays basic system resource usage information. The other tabs display information about each specific resource. If you have filtered results on one tab, only resources used by the selected processes or services are displayed on the other tabs. Filtered results are denoted by an orange bar below the title bar of each table.
Q254. - (Topic 3)
You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime.
What should you do?
A. From Backup and Restore, click Restore all users files.
B. From the properties of drive D, restore all previous versions.
C. Open System Restore and apply the latest restore point.
D. Start the computer from a system repair disc and restore a system image.
Answer: A
Q255. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page.
User1 fails to access the Web page and receives an error message stating that the page does not have a rating.
You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating.
Which settings should you modify?
A. Content Advisor
B. InPrivate Filtering
C. Parental Controls
D. Restricted Sites
Answer: A
Explanation:
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options
Q256. - (Topic 1)
You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1.
You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player.
You must achieve this goal by using the least amount of administrative effort. What should you do?
A. From Software Restriction Policies, create a path rule.
B. From Software Restriction Policies, create a hash rule.
C. From Application Control Policies, create the default rules.
D. From Application Control Policies, create an executable rule.
Answer: D
Explanation:
Executable Rules Executable rules apply to files that have .exe and .com file extensions. AppLocker policies are primarily about executable files, and it is likely that the majority of the AppLocker policies that you work with in your organizational environment will involve executable rules. The default executable rules are path rules that allow everyone to execute all applications in the Program Files folder and the Windows folder. The default rules also allow members of the administrators group to execute applications in any location on the computer. It is necessary to use the default executable rules, or rules that mirror their functionality, because Windows does not function properly unless certain applications, covered by these default rules, are allowed to execute. When you create a rule, the scope of the rule is set to Everyone, even though there is not a local group named Everyone. If you choose to modify the rule, you can select a specific security group or user account. NOT Default rulesDefault rules are a set of rules that can be created automatically and which allow access to default Windows and program files. Default rules are necessary because AppLocker has a built-in fallback block rule that restricts the execution of any application that is not subject to an Allow rule. This means that when you enable AppLocker, you cannot execute any application, script, or installer that does not fall under an Allow rule. There are different default rules for each rule type. The default rules for each rule type are general and can be tailored by administrators specifically for their environments. For example, the default executable rules are path rules. Security-minded administrators might replace the default rules with publisher or hash rules because these are more secure.NOT Path RulesPath rules, allow you to specify a file, folder, or registry key as the target of a Software Restriction Policy. The more specific a path rule is, the higher its precedence. For example, if you have a path rule that sets the file C: \Program files\Application\App.exe to Unrestricted and one that sets the folder C:\Program files\Application to Disallowed, the more specific rule takes precedence and the application can execute. Wildcards can be used in path rules, so it is possible to have a path rule that specifies C:\Program files\Application\*.exe. Wildcard rules are less specific than rules that use a file's full path. The drawback of path rules is that they rely on files and folders remaining in place. For example, if you created a path rule to block the application C:\Apps\Filesharing.exe, an attacker could execute the same application by moving it to another directory or renaming it something other than Filesharing.exe. Path rules work only when the file and folder permissions of the underlying operating system do not allow files to be moved and renamed.NOT Hash RulesHash rules, work through the generation of a digital fingerprint that identifies a file based on its binary characteristics. This means that a file that you create a hash rule for will be identifiable regardless of the name assigned to it or the location from which you access it. Hash rules work on any file and do not require the file to have a digital signature. The drawback of hash rules is that you need to create them on a per-file basis. You cannot create hash rules automatically for Software Restriction Policies; you must generate each rule manually. You must also modify hash rules each time that you apply a software update to an application that is the subject of a hash rule. Software updates modify the binary properties of the file, which means that the modified file does not match the original digital fingerprint.
Q257. - (Topic 3)
You have a computer that contains a DVD drive and a single 350-GB hard disk drive. You attempt to install Windows 7 on the computer by using the DVD installation media and receive the following error message: "Reboot and Select proper Boot device or Insert Boot Media in selected Boot device."
You need to ensure that you can install Windows 7 on the computer by using the DVD installation media.
What should you do?
A. From the BIOS, modify the startup order.
B. From the BIOS, enable Pre-Boot Execution Environment (PXE).
C. Create an answer file named oobe.xml and place the file on the hard disk drive.
D. Create an answer file named autounattend.xml and place the file on the hard disk drive.
Answer: A
Explanation: To install Windows 7 from a DVD-ROM, boot from the DVD-ROM drive and follow the prompts. You may need to configure the computer's BIOS to support booting from DVD-ROM. If a computer does not have a DVD-ROM drive attached, you can still install from DVD-ROM—you just need to acquire a USB DVD-ROM drive. In this case, it will be necessary to configure the computer's BIOS to boot from the USB device.
Q258. - (Topic 3)
You download a Windows PowerShell snap-in.
You need to ensure that the snap-in is automatically imported when you open a new PowerShell session.
What should you do?
A. Modify the PowerShell execution policy.
B. Create a new PowerShell manifest file. Update the PowerShell shortcut and specify the file option.
C. Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option.
D. Create a new PowerShell formatting and type file. Copy the file to the %SystemRoot%\system32 \WindowsPowerShell\v1.0 folder.
Answer: C
Explanation:
PSConsoleFile Loads the specified Windows PowerShell console file. To create a console file, use the Export-Console cmdlet in Windows PowerShell.
Export-Console The Export-Console cmdlet exports the names of the Windows PowerShell snap-ins in the current session to a Windows PowerShell console file (.psc1). You can use this cmdlet to save the snap-ins for use in future sessions. To add the snap-ins in the .psc1 console file to a session, start Windows PowerShell (Powershell.exe) at the command line by using Cmd.exe or another Windows PowerShell session, and then use the PSConsoleFile parameter of Powershell.exe to specify the console file.
Q259. - (Topic 2)
An employee who works from home telephones your help desk. A virus attack has deleted his computer's single internal hard disk. He carried out a System Image backup on his computer three months ago and automatically backs up his personal files every night. He uses an external USB hard drive formatted with the NTFS file system to hold his backups.
All his personal files are in his Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.)
A. Carry out a System Image restore.
B. Carry out a system restore.
C. Use Restore Previous Versions to restore his Documents library from a shadow copy.
D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.
Answer: A,D
Q260. - (Topic 5)
You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive.
You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium.
You need to configure the computer to support the dual boot.
What should you do?
A. Reinstall Windows 7 Home Premium 32 bit as a 64-bit version.
B. Start Windows 7 Home Premium. Create and mount a new Windows Imaging Format (WIM) file with Windows 7 Ultimate files.
C. Shrink the existing partition and create a new partition to start Windows 7 Ultimate.
D. Install Virtual PC into Windows 7 Home Premium.
Answer: C
Explanation: Easily Shrink a Volume on a Windows 7 Disk The Windows 7 Disk Management tool provides a simple interface for managing partitions and volumes. There is an easy way to shrink a volume to free up space so you can create a new partition on your disk.