getcertified4sure.com

pass mark for 70-680 (91 to 100)




It is more faster and easier to pass the Microsoft 70-680 exam by using Realistic Microsoft TS:Windows 7,Configuring questuins and answers. Immediate access to the Most up-to-date 70-680 Exam and find the same core area 70-680 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Sep cbt nuggets 70-680 download:

Q91. - (Topic 3) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. 

You open Internet Explorer and access a Web site. The Web site displays a page that has misaligned text and graphic image. You verify that the Web page displays correctly in previous versions of Internet Explorer. You need to view the Web page correctly. 

What should you do? 

A. Modify the text size. 

B. Enable Caret Browsing. 

C. Enable Compatibility View. 

D. Disable the SmartScreen Filter. 

Answer: C 

Explanation: 

Internet Explorer Compatibility View Internet Explorer Compatibility View allows sites designed for previous versions of Internet Explorer to display correctly for users of Internet Explorer 8. You can enable Compatibility View for a page by clicking the broken page icon at the end of the address bar. You can configure Compatibility View settings through the Compatibility View Settings dialog box. You can access this dialog box by clicking Compatibility View Settings on the Tools menu of Internet Explorer. 


Q92. - (Topic 1) 

You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. 

You need to create a policy that allows only applications that have been digitally signed by the company to run. 

What should you create? 

A. an AppLocker executable rule 

B. an AppLocker Windows Installer rule 

C. a software restriction policy and a certificate rule 

D. a software restriction policy and a hash rule 

Answer: A 


Q93. - (Topic 2) 

You have 20 client computers. The computers run Windows XP. The computers are joined to a domain. 

You plan to perform installation of Windows 7 on the computers. 

You need to transfer all users' documents and settings. You must exclude music and video files. 

You need to use the minimum amount of administration effort. 

What should you do first? 

A. Create a config.xml file. Configure a logon script for windows XP computers to launch Windows 7 installations. 

B. Modify the migapp.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

C. Modify the miguser.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

Answer: D 


Q94. HOTSPOT - (Topic 4) 

A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. 

A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type. 

You need to ensure that users can connect to the database. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 



Answer: 



Q95. - (Topic 1) 

You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. 

You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. 

You have a workgroup which contains five computers. Windows 7 is run by the computers. A computer named C01 has video and audio files. 

You have to share C01s video and audio files on the network. 

What should you do? (Choose more than one) 

A. Connect a removable drive and enable BitLocker To Go. 

B. A HomeGroup should be created. 

C. The files should be moved to a Media Library. 

D. All BranchCache rules should be enabled in Windows Firewall. 

Answer: B,C 


70-680 actual test

Regenerate mcts exam 70-680:

Q96. - (Topic 6) 

Your organization uses Windows 7 computers. 

You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources. 

You need to verify that the firewall on the computer is configured to allow pings. 

What should you do? 

A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled. 

B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled. 

C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled. 

D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled. 

Answer: C 

Explanation: Ref: http://technet.microsoft.com/en-us/library/cc732509(v=WS.10).aspx 


Q97. - (Topic 1) 

You have a computer that runs Windows 7. 

Multiple users log on to your computer. 

You enable auditing on a folder stored on your computer. 

You need to ensure that each access to the folder is logged. 

What should you do? 

A. Start the Problem Steps Recorder. 

B. From Event Viewer, modify the properties of the Security log. 

C. From the local Group Policy, configure the Audit object access setting. 

D. From the local Group Policy, configure the Audit directory service Access setting. 

Answer: C 

Explanation: 

Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure. 


Q98. DRAG DROP - (Topic 6) 

You capture a Windows Image (.wim) file from a reference computer. 

You place the image file into a shared folder. 

You need to deploy the image to a computer without an operating system. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 


Answer: 



Q99. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer: B 

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 


Q100. DRAG DROP - (Topic 4) 

You support desktop computers that have Windows 7 Enterprise installed. All computers are configured with system protection on drive C and with a backup task that runs daily at midnight. 

One of the users reports that in the morning she has installed a new version of a browser. After the installation, a follower that has favorite shortcuts was replaced with new content. 

You need to restore the most recent version of the folder that contains the user data. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order). 


Answer: