It is impossible to pass Microsoft 70-680 exam without any help in the short term. Come to Actualtests soon and find the most advanced, correct and guaranteed Microsoft 70-680 practice questions. You will get a surprising result by our Improve TS:Windows 7,Configuring practice guides.
Q201. - (Topic 6)
You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain.
You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely.
You need to run a command on each Windows 7 computer so that you can configure the service.
Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. )
A. Mstsc /v:computername configure
B. Enable-PSRemoting -force
C. Psexec Wcomputername -enable
D. Winrm quickconfig
Answer: B,D
Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force
D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows.
Incorrect: Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.
* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]
Q202. - (Topic 3)
You have two computers named Computer1 and Computer2.
You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files.
You need to ensure that you can open the Excel files by using Excel on Computer2.
What should you do?
A. Install Office.
B. Disable User Account Control (UAC).
C. Modify the default program settings.
D. Run Loadstate.exe /i:migapp.xml.
Answer: A
Explanation:
The applications are required to be installed in order to use the migrated data. In this case Microsoft Office is required to open Excel files.
LoadStateLoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey"
Q203. - (Topic 3)
You have a computer that runs Windows 7 Professional.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Run Windows Update.
B. Run Windows Anytime Upgrade.
C. From the Windows 7 installation media, run Setup.exe.
D. From the Windows 7 installation media, run Migwiz.exe.
Answer: B
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small
businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q204. - (Topic 3)
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.
You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2.
You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort.
Which file should you modify?
A. config.xml
B. migapp.xml
C. migdocs.xml
D. miguser.xml
Answer: A
Explanation:
Config.xml This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.
Q205. - (Topic 6)
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7.
You want to deploy a Windows image (WIM) file to other computers in the domain.
You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file.
What should you do before you capture the image?
A. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk.
B. Run ScanState.exe.
C. Run Defrag.exe.
D. Run Diskpart.exe.
Answer: B
Explanation: You use ScanState to save user state data. By default, this program places user state data into the data store location as defined by the three migration .xml files.
Q206. - (Topic 2)
You have a workgroup that contains five computers. The computers run Windows 7.
A computer named Computer1 has video and audio files.
You need to share Computer1's video and audio files on the network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a HomeGroup.
B. Move the files to a Media Library.
C. Enable all BranchCache rules in Windows Firewall.
D. Connect a removable drive and enable BitLocker To Go.
Answer: A,B
Explanation:
HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.Media Library SharingBefore you turn on Media Library Sharing for a shared folder, you should know that Media Library Sharing bypasses any type of user-account access that you set for the shared folder. For example, let's say that you turn on Media Library Sharing for the Photos shared folder, and you set the Photos shared folder to No Access for a user account named Bobby. Bobby can still stream any digital media from the Photos shared folder to any supported digital media player or DMR. If you have digital media that you do not want to stream in this manner, store the files in a folder that does not have Media Library Sharing turned on. If you turn on Media Library Sharing for a shared folder, any supported digital media player or DMR that can access your home network can also access your digital media in that shared folder. For example, if you have a wireless network and you have not secured it, anybody within range of your wireless network can potentially access your digital media in that folder. Before you turn on Media Library Sharing, make sure that you secure your wireless network. For more information, see the documentation for your wireless access point.
Q207. - (Topic 2)
You install a local printer on a computer. You share the printer.
You need to ensure that only members of a local group named Group1 can print documents on the printer.
Which settings should you modify on the printer?
A. Printing preferences
B. Priority
C. Security
D. Share
Answer: C
Explanation:
Restricting printer access to selected users by using security groups If you need to restrict the access of certain shared printers to a certain group of network users, do the following:
-Create a security group and then add members to the security group. - Assign printer access permissions.
To create a security group and add member to the group
1. Open the Windows SBS Console.2. On the navigation bar, click the Users and Groups tab, and then click Groups.3. In the task pane, click Add a new group. The Add a New Group Wizard appears. In the Add a New Group Wizard, do the following:1. On the Add a new group page, for Group type, select Security group.2. On the Select groups members for <groupname> page, from the Users and groups list, add the network users who you want to include for the restricted printer access.3. Follow the instructions to complete the wizard. To assign printer access permissions1. Open the Windows SBS Console.2. On the navigation bar, click the Network tab, and then click Devices.3. From the list of printers displayed in the Printers section, click the printer that you want to view the properties for. Then in the task pane, click Printer Properties.4. In the Printer Properties dialog box, click the Security tab, and then remove all entries in the Groups or user names list box except Administrators and Creator Owner.5. To grant access to the printer, click Add, and then enter the names of the group or users that you want to grant access to this printer.
Q208. - (Topic 2)
You have a computer that runs Windows 7. You attempt to add files to %programfiles%\app1 and receive a prompt to elevate your privileges. You need to ensure that you can add files to %programfiles%\app1 without receiving a prompt for elevated privileges. The solution must prevent harmful applications from making unwanted changed to the system. What should you do?
A. Enable the built-in administrator account.
B. Modify the User Account Control (UAC) settings.
C. Add your user account to the local Power Users group.
D. Modify the permissions of the %programfiles%\app1 folder.
Answer: D
Explanation: In order to secure a computer and its resources, you must consider the rights that users will have. You can secure a computer or multiple computers by granting users or groups specific user rights. You can help secure an object, such as a file or folder, by assigning permissions to allow users or groups to perform specific actions on that object.
Q209. - (Topic 4)
You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a system image of a Windows 7 Enterprise 64-bit desktop
B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Drive Signature Enforcement option from the Advanced Boot options menu.
D. Enable system protection on the recovery partition on 64-bit desktops.
E. Create system repair disk on a Windows 7 Enterprise 32-bit desktop.
F. Create a system image of a Windows 7 Enterprise 32-bit desktop.
G. Enable system protection on the recovery partition on 32-bit desktops.
Answer: B,E
Explanation:
http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc
Q210. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You use a computer that runs Windows 7.
Now your company assigns a task to you. You are asked to prevent users from copying unencrypted files to removable drives. What action should you perform?
A. The Trusted Platform Module (TPM) settings should be modified from a local Group Policy.
B. TPM should be initialized from the Trusted Platform Module (TPM) snap-in.
C. The BitLocker Drive Encryption settings should be modified from Control Panel.
D. The BitLocker Drive Encryption settings should be modified from a local Group Policy.
Answer: D