getcertified4sure.com

Surprising 70 680 practice test




Proper study guides for Rebirth Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70 680 practice test preparation products which designed to deliver the Accurate 70 680 practice test questions by making you pass the exam 70 680 test at your first time. Try the free 70 680 pdf demo right now.

Q1. - (Topic 5) 

A network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

What should you do? 

A. At the main office, configure the servers to use Distributed File System Replication (DFSR). 

B. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:


Q2. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to modify the file extensions that are associated to Internet Explorer. 

What should you do? 

A. From Internet Explorer, click Tools and then click Manage Add-ons. 

B. From Control Panel, open Default Programs and then click Set Associations. 

C. From the local Group Policy, expand Computer Configuration and then click Software Settings. 

D. From Window Explorer, right-click %programfiles%\Internet Explorer\iexplore.exe and then click Properties. 

Answer:


Q3. - (Topic 6) 

You plan to install Windows 7 on a new notebook computer. 

The computer will be used by users who speak English, French, and German. 

You need to select an edition of Windows 7 that enables the users to switch between different graphical user interface (GUI) languages. The solution must minimize costs. 

Which edition should you choose? 

A. Window 7 Home Premium 

B. Windows 7 Professional 

C. Windows 7 Starter 

D. Windows 7 Ultimate 

Answer:


Q4. - (Topic 4) 

A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) on a Windows 7 client computer. 

You capture an image of the client computer. 

A new driver is released for the network card that is installed in the client computer. 

You need to update the image with the new driver for the network card. 

What should you do first? 

A. Add a boot image in WDS. 

B. Create a capture image in WDS. 

C. Run the BCDEdit command. 

D. Run the PEImg /Prepcommand. 

E. Run the Start /w ocsetup command. 

F. Run the Dism command with the/Add-Driver option, 

G. Run the Dism command with the /Mount-Wim option. 

H. Run the Dism command with the /Add-Package option. 

I. Run the ImageX command with the /Mountparameter. 

J. Run the DiskPart command and the Attach command option. 

K. Use Sysprep with an answer file and set the PersistAMDeviceInstalls option in the answer file to True. 

L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. 

M. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

N. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. 

Answer:


Q5. - (Topic 2) 

Your computer running Windows 7 Enterprise has two internal hard disks. 

System protection is configured by default on the C: drive, which holds the operating system and installed applications. 

The D: drive is a 500-GB hard disk formatted with the NTFS filing system, and you use it to store your personal files. 

You want to store previous versions going back several months and therefore intend to reserve 200 GB of this disk for system protection. 

You are not using either of your internal disks for backup; instead, you store your backups on a 1-TB external USB hard disk. 

How do you configure system protection on your D: drive? (Choose all that apply; each answer forms part of the complete solution.) 

A. Select Restore System Settings And Previous Versions Of Files 

B. Select Only Restore Previous Versions Of Files 

C. Set the Max Usage slider control to 40 percent 

D. Set the Max Usage slider control to 4 percent 

Answer: B,C 


Q6. - (Topic 2) 

You have a computer that runs windows 7. 

You log on to the computer by using a user account that is a member of Administrator Group. 

From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. 

You attempt to save the file and receive the save as dialog box. 

You need to ensure that you can save changes to c:\windows\system32\drivers\ 

What should you do? 

A. Stop the windows search service 

B. Remove the inherited permissions from the file. 

C. Start Windows Notepad by using elevated privileges. 

D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer. 

Answer:

Explanation: 

Windows 7 does not allow applications to write data to these secure locations. 

User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when 

the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC 


Q7. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q8. - (Topic 1) 

You have a computer that runs Windows 7. You create a HomeGroup. You need to secure the HomeGroup to meet the following requirements: 

. Allow access to the HomeGroup when you are connected to private networks 

. Block access to the HomeGroup when you are connected to public networks 

What should you do? 

A. From Network and Sharing Center, modify the advanced sharing settings. 

B. From the HomeGroup settings in Control Panel, modify the advanced sharing settings. 

C. Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks. 

D. Configure the File and Printer Sharing exception in Windows Firewall to include Home or work (private) networks and block Public networks. 

Answer:

Explanation: 

Windows Firewall does not allow you to create firewall rules for specific network locations on the basis of port address. Windows Firewall does not allow you to create rules that differentiate between the home and work network locations. You can only create rules that differentiate on the basis of home and work or public network locations. 

HomeGroup Connections This option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile. 


Q9. - (Topic 6) 

A user in your company wants to upgrade a Windows Vista Business computer to Windows 

7. 

You need to upgrade the computer to the minimum Windows 7 edition that meets the following requirements: 

BitLockerTo Go 

DirectAccess 

Which Windows 7 edition should you choose? 

A. Windows 7 Home Premium 

B. Windows 7 Professional 

C. Windows 7 Home Basic 

D. Windows 7 Ultimate 

Answer:


Q10. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You analyze the performance of the computer and discover that one of the processes uses an average of 90 percent of the CPU cores. 

You need to decrease the usage of the CPU cores by the process. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer: