It is impossible to pass Microsoft 70 680 practice test exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70 680 pdf practice questions. You will get a surprising result by our Improved TS:Windows 7,Configuring practice guides.
Q211. - (Topic 3)
You have a computer that runs Windows 7.
The Encrypting File System (EFS) key is compromised.
You need to create a new EFS key.
Which command should you run?
A. Certutil -getkey
B. Cipher.exe /k
C. Icacls.exe /r
D. Syskey.exe
Answer: B
Explanation:
Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.
Q212. - (Topic 2)
You have recently installed Windows 7 Ultimate on a laptop computer, installed applications such as Office, and downloaded and installed all outstanding updates. The computer has two internal hard disks, both formatted with the NTFS file system. You also have an external USB hard disk that you have plugged into the laptop. You used the convert fs/ntfs command to convert the external hard drive to the NTFS file system. You have an 8-GB USB flash memory device and the laptop contains a DVD-ROM writer. In your workplace, you can plug in to the corporate network and connect to a network share on a file server running Windows Server 2008 R2.
On what devices can you create a full System Image backup of the laptop's system volume? (Choose all that apply.)
A. The second internal hard disk
B. The external hard disk
C. The USB flash drive
D. Multiple DVD-ROMs
E. The network share
Answer: A,B,E
Q213. - (Topic 3)
Your network contains computers that run Windows 7 and Windows Vista. All computers are members of the same domain. You have a computer named Computer1 that runs Windows 7.
You need to ensure that users can remotely log on to Computer1 from any computer on the network.
What should you do on Computer1?
A. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Power Users group.
B. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Administrators group.
C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box. Add the Domain Computers group to the Remote Desktop Users group.
D. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box. Add the Domain Users group to the Remote Desktop Users group.
Answer: D
Q214. HOTSPOT - (Topic 4)
You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life.
The computer remains running when the portable computer is closed.
You need to change a setting so that when you close the portable computer, it enters sleep mode.
Which setting should you change? (To answer, select the appropriate setting in the work area.)
Answer:
Q215. - (Topic 5)
You administer a desktop computer that has the following hardware specifications:
. Dual-core 2.5 GHz processor
. 1 GB RAM
. 25 GB unpartitioned disk space
. Onboard graphics that has WDDM 1.0
You install a customized Windows 7 Enterprise 64-btt image on the computer by using unpartitioned disk space. The computer operates unacceptably slow.
You need to improve the performance of the computer.
What should you do?
A. Install a video card that has 128 MB of video RAM.
B. Perform the initial Windows Experience Index run.
C. Upgrade the processor.
D. Install another 1 GB of RAM.
Answer: D
Explanation: http://windows.microsoft.com/en-us/windows7/products/system-requirements Should have 2GB RAM as a minimum.
Q216. - (Topic 1)
Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.
From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.
You need to ensure that you can recover all EFS encrypted files from Computer2.
What should you do?
A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
Answer: B
Explanation:
You can import the recovery agent to another computer running Windows 7 if you want to recover files encrypted on the first computer. You can also recover files on another computer running Windows 7 if you have exported the EFS keys from the original computer and imported them on the new computer. You can use the Certificates console to import and export EFS keys.
NOT Secedit.exe:
You can use both the Local Group Policy Editor and the Local Security Policy console to import and export security-related Group Policy settings. You can use this import and export functionality to apply the same security settings to stand-alone computers that are not part of a domain environment. Exported security files are written in Security Template .inf format. As well as using Local Group Policy Editor and the Local Security Policy console to import policies that are stored in .inf format, you can apply them using the Secedit.exe command-line utility.
NOT Cipher.exe /removeuser /adduser. NOT DigitalLocker.
Q217. - (Topic 1)
You have a computer that runs Windows 7.
You need to prevent Internet Explorer from saving any data during a browsing session.
What should you do?
A. Disable the BranchCache service.
B. Modify the InPrivate Blocking list.
C. Open an InPrivate Browsing session.
D. Modify the security settings for the Internet zone.
Answer: C
Explanation:
InPrivate Mode consists of two technologies: InPrivate Filtering and InPrivate Browsing.
Both InPrivate Filtering and InPrivate Browsing are privacy technologies that restrict the amount of information available about a user's browsing session. InPrivate Browsing restricts what data is recorded by the browser, and InPrivate Filtering is used to restrict what information about a browsing session can be tracked by external third parties.
Q218. - (Topic 1)
If you have a router in the network your connected to and the Default Gateway is set to
192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network?
A. 192.168.1.1
B. 192.168.1.300
C. 192.168.1.30
D. 192.168.2.10
Answer: C
Q219. - (Topic 4)
You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share.
You need to identify whether you are working on an offline version of a file.
What should you do?
A. From Sync Center, click View sync partnerships.
B. From Action Center, click View archived messages.
C. From Windows Explorer, select the file and then view the toolbar.
D. From Windows Mobile Device Center, click the Connection settings.
Answer: C
Explanation:
To find out whether you're working offline: Offline files turn on automatically if you lose your network connection. A copy of your file is copied to your computer, and once your network connection is re-established, the two copies will be synchronized. To find out if you're working offline, do the following.
1. Open the network folder that contains the file you are working on.
2. Check the Details pane at the bottom of the window for the status. If the status is offline, you are working with a copy of the file on your computer. If the status in online, you are working with the file on the network.
Q220. - (Topic 1)
You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer.
You need to ensure that you can enable BitLocker to go on the USB disk.
What should you do?
A. Enable Encrypting File System (EFS).
B. Upgrade the computer to Windows 7 Enterprise.
C. Initialize the Trusted Platform Module (TPM) hardware.
D. Obtain a client certificate from an enterprise certification authority (CA).
Answer: B
Explanation:
Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate EditionsThe Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft's volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.