getcertified4sure.com

The Secret of mcts 70 680




Master the 70 680 exam TS:Windows 7,Configuring content and be ready for exam day success quickly with this Ucertify exam 70 680 exam prep. We guarantee it!We make it a reality and give you real mcts 70 680 questions in our Microsoft 70 680 practice test braindumps.Latest 100% VALID Microsoft mcts 70 680 Exam Questions Dumps at below page. You can use our Microsoft 70 680 practice test braindumps and pass your exam.

Q311. - (Topic 2) 

You have a computer that runs windows 7. 

You have an application installation package named app1.msi. 

You need to perform a customized installation of app1.msi. 

What should you do? 

A. Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst. 

B. Create a transform file named app1.mst and then run Msinfo.exe /I app1.msi /t. 

C. Create a transform file named app1.msp and then run Msiexec.exe /I app1.msi /app1. 

D. Create a transform file named app1.msp and then run Msinfo32.exe /I app1.mst /. 

Answer:

Explanation: 

Windows Installer Transform Files A Windows Installer transform (.mst) file provides configuration settings for a customized installation. A transform file contains information about components, features, setup properties, and changes that you can use to customize your installation. 

MsiexecProvides the means to install, modify, and perform operations on Windows Installer from the command line. To install or configure a product Syntax msiexec /i {package|ProductCode} /i: Installs or configures a product. /t : Applies transform to advertised package.NOT Msinfo32 Displays a comprehensive view of your hardware, system components, and software environment. 


Q312. - (Topic 2) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page. 

User1 fails to access the Web page and receives an error message stating that the page does not have a rating. 

You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating. 

Which settings should you modify? 

A. Content Advisor 

B. InPrivate Filtering 

C. Parental Controls 

D. Restricted Sites 

Answer:

Explanation: 

Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you've adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children's web use. To change settings, you'll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use. To allow unrated sites By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below. 

9. Click to open Internet Explorer. 

10. Click the Tools button, and then click Internet Options. 

11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. 

12. In the Supervisor Password Required dialog box, type your password, and then click OK. 

13. In the Content Advisor dialog box, click the General tab. 

14. Under User options 


Q313. - (Topic 1) 

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. 

You need to ensure that your user account can decrypt all EFS files on the computer. 

What should you do? 

A. From Credential Manager, add a Windows credential. 

B. From Credential Manager, add a certificate-based credential. 

C. From the local computer policy, add a data recovery agent. 

D. From the local computer policy, modify the Restore files and directories setting. 

Answer:

Explanation: 

EFS Recovery Recovery Agents are certificates that allow the restoration of EFS encrypted files. When a recovery agent has been specified using local policies, all EFS encrypted files can be recovered using the recovery agent private key. You should specify a recovery agent before you allow users to encrypt files on a client running Windows 7. You can recover all files that users encrypt after the creation of a recovery agent using the recovery agent's private key. You are not able to decrypt files that were encrypted before a recovery agent certificate was specified. You create an EFS recovery agent by performing the following steps: 

1. Log on to the client running Windows 7 using the first account created, which is the default administrator account. 

2. Open a command prompt and issue the command Cipher.exe /r:recoveryagent 

3. This creates two files: Recoveryagent.cer and Recoveryagent.pfx. Cipher.exe prompts you to specify a password when creating Recoveryagent.pfx. 

4. Open the Local Group Policy Editor and navigate to the \Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System node. Right-click this node and then click Add Data Recovery Agent. Specify the location of Recoveryagent.cer to specify this certificate as the recovery agent. 

5. To recover files, use the certificates console to import Recoveryagent.pfx. This is the recovery agent's private key. Keep it safe because it can be used to open any encrypted file on the client running Windows 7. 


Q314. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. 

You need to verify that the folder is not encrypted with the Encrypting File System (EFS). 

What should you use to accomplish this goal? 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the icacls command 

E. the Group Policy management console 

F. share permissions 

G. the netsh command 

H. the Services management console 

I. the folder Properties window 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx 


Q315. DRAG DROP - (Topic 4) 

A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer. 

You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user's files and settings. 

Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q316. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 


Q317. - (Topic 2) 

You have two portable computers named Computer1 and Computer2 that run Windows 7. 

You configure Computer1 to connect to a wireless network named Network1. 

You need to configure Computer2 to connect to Network1 by using the same settings as Computer1. 

What should you do on Computer1? 

A. At the command prompt, run Wecutil.exe -es -gr. 

B. At the command prompt, run Winrs.exe -environment. 

C. From Windows Firewall with Advanced Security, export the policy. 

D. From the wireless network properties of Network1, copy the network profile to a USB flash drive. 

Answer:

Explanation: 

The Copy this network profile to a USB flash drive link launches the Copy Network Settings wizard, which writes the wireless network profile settings to a USB flash drive. You can then use this flash drive to automate the wireless network profile configuration of other computers. To save your wireless network settings to a USB flash drive, insert a USB flash drive into the computer, and then follow these steps: 

1. Click to open Network and Sharing Center. 

2. In the left pane, click Manage wireless networks. 

3. Right-click the network, click Properties, and then click Copy this network profile to a USB flash drive. 

4. Select the USB device, and then click Next. 

5. Follow the instructions in the wizard, and then click Close. 


Q318. - (Topic 4) 

You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at 15:00. 

You need to prevent backups from automatically running when the computer is running on the battery. 

What should you do? 

A. From Backup and Restore, click Change settings. 

B. From Task Scheduler, modify the Automatic Backup task. 

C. From Power Options, modify the settings of the current power plan. 

D. From the local computer policy, modify the power management settings. 

Answer:

Explanation: To set power management options for a scheduled task 

-Open Task Scheduler. 

-Right-click the task for which you want to set power management options, and then click Properties. 

-On the Settings tab, under Power Management, do one or more of the following: 

-To conserve the battery power of your computer, select the Don't start the task if the computer is running on batteries check box. 

-To stop the task if the computer starts running on battery power, select the Stop the task if battery mode begins check box. 

-To wake your computer from hibernation or standby to run a task, select the Wake the computer to run this task check box. 

Task Scheduler 

With Scheduled Tasks, you can schedule any script, program, or document to run at a time that is most convenient for you. Scheduled Tasks starts every time that you start Windows and runs in the background, and it starts each task that you schedule at the time that you specify when you create the task. 


Q319. - (Topic 3) 

You deploy a custom image to a computer and discover that the Telnet Client feature is disabled. 

You need to ensure that the Telnet Client feature is enabled when you deploy the image. 

You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Enable the Telnet Client feature on the computer. Generalize the computer and capture the image. 

B. Create an unattended file that enables Telnet Client. Generalize the computer and specify the unattended file. Capture the image. 

C. Mount the image. Run Ocsetup.exe TelnetClient. Commit the changes and unmount the image. 

D. Mount the image. Run Dism.exe and specify /image and /enable-feature:TelnetClient switches. Commit the changes and unmount the image. 

Answer:

Explanation: 

NOTE: "when you deploy the image." Implies for future installations, not the current one. 

Therefore the imagefile must be updated. 

Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. 

Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions: 

-Prepare a Windows PE image. 

-Enable or disable Windows features within an image. 

-Upgrade a Windows image to a different edition. 

-Add, remove, and enumerate packages. 

-Add, remove, and enumerate drivers. 

-Apply changes based on the offline servicing section of an unattended answer file. 

-Configure international settings. 

-Implement powerful logging features. 

-Service operating systems such as Windows Vista with SP1 and Windows Server 2008. 

-Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

-Service all platforms (32-bit, 64-bit, and Itanium). 

-Use existing Package Manager scripts. 


Q320. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Disable Internet Connection Sharing. 

B. From Internet Options, select Delete browsing history on exit. 

C. Start the Microsoft Network Access Protection service. 

D. From the Safety drop-down menu, configure InPrivate Filtering. 

Answer: