getcertified4sure.com

A Complete Guide to 70 680 pdf




It is impossible to pass Microsoft 70 680 exam exam without any help in the short term. Come to Exambible soon and find the most advanced, correct and guaranteed Microsoft microsoft 70 680 practice questions. You will get a surprising result by our Rebirth TS:Windows 7,Configuring practice guides.

Q11. DRAG DROP - (Topic 5) 

You administer portable computers that have Windows 7 Professional installed. All computers have wireless network interface cards (Wi-Fi). You plug a new wireless wide area network (WWAN) device to your computer. The WWAN device that connects to a 3G network provides Internet access. 

Other portable computers equipped only with Wi-Fi cannot access Internet resources. 

You need to configure Internet access for the portable computers by using a wireless ad-hoc network configured on your computer. 

What should you do? (To answer, drag the appropriate target computer or computers to the correct configuration step or steps in the answer area. An answer choice can be used once, more than once, or not at all.) 

Answer: 


Q12. - (Topic 3) 

You have a computer that runs Windows 7. 

A user installs a third-party media player on the computer. 

You discover that all media files automatically open by using the third-party media player. 

You need to ensure that all media files open automatically by using Windows Media Player. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Select a media file. Right-click the file and select open with. 

B. Select a media file. Right-click the file and select Restore previous versions. 

C. From Control Panel, modify the Set your default programs settings. 

D. From Control Panel, modify the Set program access and computer defaults settings. 

Answer:


Q13. - (Topic 3) 

You have a computer that runs Windows 7. 

Your network has a SSTP VPN server that uses a self-signed certificate. 

When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate". 

You need to prevent the error message from appearing when you connect to the VPN server. 

What should you do? 

A. From the properties of the VPN connection, modify the dialing options. 

B. From the properties of the VPN connection, modify the data encryption settings. 

C. From Certificate Manager, import the servers certificate into the Personal store. 

D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store. 

Answer:

Explanation: 

Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file. 

4. Right-click the certificate store you want to import, and click Install PFX on the context menu. 

5. The Certificate Import Wizard launches. Click Next. 

6. 

In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse. 

7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next. 

8. On the next page, select where you'd like to store the certificate. Click Next. 

9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system. 


Q14. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder. 

What should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. the icacls command 

B. the User Account Control Settings Control Panel window 

C. share permissions 

D. Local Users and Groups 

E. the folder Properties window 

F. the Services management console 

G. the netsh command 

H. Device Manager 

I. the Group Policy management console 

Answer: A,E 


Q15. - (Topic 1) 

Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.) 

In the branch office, you deploy a new computer named Computer1 that runs Windows 7. 

You need to assign an IP address to Computer1. 

Which IP address should you use? 

A. 192.168.2.30 

B. 192.168.2.40 

C. 192.168.2.63 

D. 192.168.2.65 

Answer:

Explanation: 

Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224 


Q16. - (Topic 1) 

You have a computer that runs Windows 7. The computer has two volumes named volume 

C and volume D. 

You create a document on volume D. 

You manually create a restore point and modify the document. 

You view the properties of the document as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can restore the current version of the document if the document is modified. 

What should you do first? 

A. Run Disk Cleanup on volume D. 

B. Enable auditing on the document. 

C. Turn on System Protection for volume D. 

D. Start the Volume Shadow Copy Service (VSS). 

Answer:

Explanation: 

System Protection System protection regularly creates and saves information about your computer's system files and settings. It also saves previous versions of files that you have modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. Restore points are also created automatically every seven days if no other restore points were created in the previous seven days. You can create restore points manually at any time. System protection is automatically on for the drive that holds the operating system and can be enabled only for drives that are formatted using the NTFS file system. It enables you to use system restore and to restore files to previous versions. You will configure system protection, create a restore point, and perform a system restore in the practice later in this lesson. 


Q17. - (Topic 6) 

You have a computer that runs a 32-bit version of Windows 7 Home Premium. The computer has a single partition on a single hard disk drive. 

You want to test a 64-bit version of Windows 7 Ultimate. You configure the computer for a dual boot with previously installed Windows 7 Home Premium. 

You need to configure the computer to support the dual boot. 

What should you do? 

A. Start Windows 7 Home Premium. Add a new entry to the boot menu. 

B. Start Windows 7 Home Premium. Create a Virtual Hard Disk (VHD) file to start Windows 7 Ultimate. 

C. Reinstall Windows 7 Home Premium 32 bit as a 64-bit version. 

D. Start Windows 7 Home Premium. Create and mount a new Windows Imaging Format (WIM) file with Windows 7 Ultimate files. 

Answer:


Q18. - (Topic 3) 

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer. 

You need to prevent the computer from displaying the username of the last user who logged on. 

What should you do? 

A. From Control Panel, modify the User Profiles settings. 

B. From Control Panel, modify the Personalization settings. 

C. From the local computer policy, add a policy template. 

D. From the local computer policy, modify the local security policy. 

Answer:

Explanation: 

How to Prevent the Last Logged-On User Name from Being Displayed 

1. Click Start and type secpol.msc in the search box. 

2. Press Enter. 

3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options. 

4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name. 

5. Double click this security option and click Enabled. 

6. Click OK. 


Q19. - (Topic 3) 

Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) 

Other users on the network receive an IPv6 address for ISATAP. 

You need to ensure that your computer receives an IPv6 address for ISATAP. 

What should you do? 

A. Run Ipconfig /renew6. 

B. Run Ipconfig /setclassid6. 

C. Start the Net.TCP Port Sharing service. 

D. Start the Internet Protocol Helper (IP Helper) service. 

Answer:

Explanation: Internet Protocol Helper (IP Helper) service Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IPHTTPS. If this service is stopped, the computer will not have the enhanced connectivity benefits that these technologies offer. Internet Protocol Helper (IP Helper) assists network administration of the local computer by enabling applications to retrieve information about the network configuration of the local computer, and to modify that configuration. IP Helper also provides notification mechanisms to ensure that an application is notified when certain aspects of the local computer network configuration change. 


Q20. - (Topic 1) 

Your company has an internal Web site that requires HTTPS. The Web site's certificate is self-signed. You have a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to the Web site and receive the following warning message. "There is a problem with this website's security certificate." 

You need to prevent the warning message from appearing when you access the Web site. What should you do? 

A. From Internet Explorer, enable InPrivate Browsing. 

B. From Internet Explorer, add the Web site to the Trusted sites zone. 

C. From Certificate Manager, import the Web sites certificate into your Personal store. 

D. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store. 

Answer:

Explanation: 

Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file. 

6. Right-click the certificate store you want to import, and click Install PFX on the context menu. 

7. The Certificate Import Wizard launches. Click Next. 

8. In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse. 

9. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next. 

10. On the next page, select where you'd like to store the certificate. Click Next. 

11. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.