getcertified4sure.com

Ultimate Guide: 70 680 pdf




We provide real microsoft 70 680 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Microsoft 70 680 practice test Exam quickly & easily. The microsoft 70 680 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Microsoft 70 680 practice test dumps pdf and vce product and material, you can easily pass the mcts 70 680 exam.

Q231. - (Topic 4) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Select the Turn on BitLocker backup to Active Directory option in Group Policy linked to the portable computers. 

B. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers. 

C. Run the manage-bde -on C: -RecoveryPassword command on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller. 

Answer:


Q232. - (Topic 4) 

You administer desktop computers that have Windows XP professional SP3 64-bit installed. The computers have the Volume Shadow Copy Service (VSS) enabled on all drives. 

You want to migrate existing user profiles to Windows 7 by using the User State Migration Tool (USMT) 4.0. 

You also plan to migrate files from the user profiles even if the files are locked by applications. 

You need to capture user profiles and all locked files. 

What should you do on the Windows XP computers? 

A. Stop the VSS before running ScanState.exe 

B. Stop the VSS before running LoadState.exe 

C. Run ScanState /vsc/ 

D. Run ScanState /hardlink 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/magazine/dd443646.aspx 


Q233. HOTSPOT - (Topic 4) 

A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type. You need to ensure that users can connect to the database. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 

Answer: 


Q234. - (Topic 1) 

Your network contains 100 computers that run Windows XP. 

You need to identify which applications installed on all of the computers can run on 

Windows 7. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you install? 

A. Microsoft Application Compatibility Toolkit (ACT) 

B. Microsoft Assessment and Planning (MAP) Toolkit 

C. Microsoft Deployment Toolkit (MDT) 

D. Windows Automated Installation Kit (AIK) 

Answer:

Explanation: 

The Microsoft. Application Compatibility Toolkit (ACT) 5.6 enables software developers, independent software vendors (ISVs), and IT professionals who work in a corporate environment to determine, before deployment within the organization, whether their applications are compatible with a new version of the Windows. operating system. ACT also enables such individuals to determine how an update to the new version will affect their applications. 

You can use the ACT features to: 

-Verify your application's, device's, and computer's compatibility with a new version of the Windows operating system, including determining your risk assessment. 

-Verify a Windows update's compatibility, including determining your risk assessment. 

-Become involved in the ACT Community, including sharing your application assessment with other ACT users. 

-Test your applications for issues related to User Account Control (UAC) by using the Standard User Analyzer (SUA) tool. 

-Test your Web applications and Web sites for compatibility with new releases and security updates to Internet Explorer., by using the Internet Explorer Compatibility Test Tool. 


Q235. - (Topic 2) 

You have a computer named Computer1 that runs Windows 7. Computer1 is a member of an Active Directory domain. Remote Desktop is enabled on the computer. 

You share a folder on Computer1. 

You need to configure Computer1 to meet the following requirements: 

Allow computers in the local subnet to access the shared folder 

Prevent computers in remote subnets from accessing the shared folder 

Allow all computers to connect to Computer1 by using Remote Desktop 

What should you do? 

A. Modify the subnet mask. 

B. Modify the Public folder sharing settings. 

C. Disable network discovery on all computers located in remote subnets. 

D. Modify the properties of the File and Printer Sharing firewall exceptions. 

Answer:

Explanation: 

Network ProfilesNetwork profiles are important because you can use them to apply different collections of firewall rules based on which network profile is active. A significant difference between Windows Vista and Windows 7 is that in Windows 7, profiles apply on a per-network interface basis. This means that if you have one network adapter connected to the Internet and another connected to your office LAN, different sets of rules apply for each connection. The firewall in Windows Vista chooses the most restrictive network profile when a computer has connections to different network types and applies the most restrictive set of rules to all interfaces.Allowing Programs Through Windows FirewallWindows Firewall allows you to configure exceptions based on programs. This differs from Windows Vista where Windows Firewall would allow you to configure exceptions based on port address. You can still create rules based on port address; you just have to do it using WFAS, covered later in this lesson. You can also allow specific Windows 7 features, such as Windows Virtual PC, through Windows Firewall. Feature rules become available when you enable the feature using the Programs And Features item in Control Panel. To add a rule for a feature or program, click Allow A Program Or Feature Through Windows Firewall item in the Windows Firewall section of Control Panel. The figure shows a list of currently installed features and any programs for which rules have been created as well as the profiles for which rules concerning those programs and features are enabled.File and Printer Sharing This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC) 


Q236. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8. 

A user reports that Computer1 has a number of Internet Explorer configuration issues that cause instability when browsing the Internet. 

You need to configure Internet Explorer to use all default settings. 

What should you do from Internet Options? 

A. From the Advanced tab, click Reset. 

B. From the Programs tab, click Set programs. 

C. From the Advanced tab, click Restore advanced settings. 

D. From the Security tab, click Reset all zones to default level. 

Answer:

Explanation: 

Reset Internet Explorer settings By resetting Internet Explorer settings, you return Internet Explorer to the state it was in when it was first installed on your computer. This is useful for troubleshooting problems that might be caused by settings that were changed after installation. When you delete personal settings, some webpages that rely on previously stored cookies, form data, passwords, or previously installed browser add-ons might not work correctly. Resetting Internet Explorer to its default settings does not delete your favorites, feeds, Web Slices, and a few other personalized settings. See the table below for a complete list of all settings and information about whether they are reset or maintained. Resetting Internet Explorer's settings is not reversible. After a reset, all previous settings are lost and cannot be recovered. Rather than resetting everything, you might want to reset specific settings or delete your webpage history. For more information, see the links at the bottom of this topic. 

To reset Internet Explorer settings 

1. Close any Internet Explorer or Windows Explorer windows that are currently open. 

2. Click to open Internet Explorer. 

3. Click the Tools button, and then click Internet Options. 

4. Click the Advanced tab, and then click Reset. 

5. Select the Delete personal settings check box if you would like to remove browsing history, search providers, Accelerators, home pages, and InPrivate Filtering data. 

6. In the Reset Internet Explorer Settings dialog box, click Reset. 

7. When Internet Explorer finishes restoring the settings, click Close, and then click OK. 

8. Close Internet Explorer. 

Your changes will take effect the next time you open Internet Explorer. 


Q237. - (Topic 5) 

You have 100 computers that run Windows XP. Each computer has the following features: 

Contains a single hard disk drive. 

Contains a single partition. 

Supports USB devices during startup. 

You are planning a clean installation of Windows 7 Ultimate. 

You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition. 

What should you do? 

A. Verify that the computers have a Trusted Platform Module (TPM) version 1.2 security devices. 

B. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bcdedit.exe to create a new empty boot configuration data store. 

C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the partition by using manage bde.exe. 

D. Start the computer from Windows 7 media. Delete the existing partition and install Windows 7 Ultimate on the unpartitioned space. 

Answer:


Q238. HOTSPOT - (Topic 6) 

You are the network administrator at a scientific research firm. You have a network of Windows Server 2008 R2 servers and Windows 7 Enterprise computers in a domain configuration. 

Management needs to support a new, remote laboratory that is connected by a very slow network link. The primary work of the five scientists is to carry out experiments by following documentation that is stored on the corporate network. The only equipment at the remote site includes five computers and network connectivity devices. 

You receive the following three email messages: 

Message 1 

All, 

Due to business constraints, we are unable to support the purchase of a server at the new remote location to service such a small number of users. The minimum number of users to support a server purchase is 10. 

Bart Cushing 

Purchasing Department 

Message 2 

Dear all, 

The new lab is up and running. By far the biggest problem is the exceptionally slow speed downloading the experiment descriptions from corporate headquarters. Is there a way to fix 

the problem? Thanks! Dana Wright 

Remote Lab Manager 

Message 3 

To all employees of A Datum Corp: 

This is a friendly reminder that corporate security policy prohibits users from creating file 

shares computers. 

Thank you for your attention to this matter 

Gwen Francis 

You need to determine if BranchCache can support the environment. 

Consider each of the following statements. Does the information in the three messages support the interference as stated? Each correct selection is worth one point. 

Answer: 


Q239. - (Topic 4) 

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy. 

A user indicates that he is unable to connect to a remote FTP server. 

You need to view the status of TCP/UDP ports at the user's computer. 

Which command should you run? 

A. netstat -o 

B. netstat -a 

C. ipconfig /all 

D. netstat –an 

Answer:


Q240. - (Topic 2) 

Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot? 

A. Copy and paste a Microsoft Word icon to the Taskbar. 

B. Right click on the Microsoft Word icon and choose, "Staple to Superbar". 

C. Right click on the Microsoft Word icon and choose, "Pin this programm to taskbar". 

D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar". 

Answer: