getcertified4sure.com

How to win with 70 680 practice test




It is impossible to pass Microsoft exam 70 680 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Microsoft 70 680 practice test practice questions. You will get a surprising result by our Regenerate TS:Windows 7,Configuring practice guides.

Q201. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1. 

A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1. A user named User1 is a member of HRUsers. 

You need to configure the computer to meet the following requirements: 

Allow User1 to print to Printer1 Prevent User1 from establishing Remote Desktop sessions to Computer1 Allow other members of HRUsers to connect to Computer1 by using Remote Desktop 

What should you do? 

A. Remove User1 from the HRUsers group. 

B. Remove HRUsers from the Remote Desktop Users group. 

C. Assign User1 the Deny log on through Remote Desktop Services user right. 

D. Assign User1 the Deny access to this computer from the network user right. Assign HRUsers the Allow log on locally user right. 

Answer:


Q202. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to back up data files for all users. 

C. Use the Backup and Restore tool to create a system image on a network location. 

D. Create a system repair disk. 

Answer:


Q203. - (Topic 2) 

Your network contains a public computer that runs Windows 7. Multiple users log on to the computer by using a local user account named User1. 

Users report that they can log on to some secure Web sites by using credentials that were saved by other users. 

You need to prevent forms-based credentials from being saved on the computer. 

What should you do? 

A. Remove all generic credentials from Windows Vault. 

B. Remove all Windows credentials from Windows Vault. 

C. Modify the Windows Internet Explorer certificates settings. 

D. Modify the Windows Internet Explorer AutoComplete settings. 

Answer:

Explanation: 

AutoComplete settings AutoComplete is a feature in Internet Explorer that remembers the information you have typed into the Address bar, web forms, or password fields, and which automatically fills in that information if you start to type the same thing again later. This saves you from having to type the same information over and over. 


Q204. - (Topic 6) 

You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain. 

You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely. 

You need to run a command on each Windows 7 computer so that you can configure the service. 

Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. ) 

A. Mstsc /v:computername configure 

B. Enable-PSRemoting -force 

C. Psexec Wcomputername -enable 

D. Winrm quickconfig 

Answer: B,D 

Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force 

D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service. 

* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows. 

Incorrect: Not C: 

* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. 

* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session] 

][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments] 


Q205. - (Topic 6) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Run the cscript Get-BitLockerRecoverylnfo.vbs script on the portable computers. 

B. Select the Turn on BitLocker backup to Active Directory option in local policy on the portable computers. 

C. Run the cscript List-ACEs.vbs script on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.Idf -c script on a domain controller. 

Answer:


Q206. HOTSPOT - (Topic 4) 

A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. 

A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type. 

You need to ensure that users can connect to the database. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 

Answer: 


Q207. - (Topic 1) 

You have a stand-alone computer that runs Windows 7. 

You open Windows Update as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can manually change the Windows Update settings on the computer. 

What should you do? 

A. Log on to Windows 7 as member of the Administrators group. 

B. From the local Group Policy, modify the Windows Update settings. 

C. Right-click Windows Update and select Run as administrator. 

D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe. 

Answer:

Explanation: 

Configuring Automatic Updates by using local Group Policy 

1. Click Start, and then click Run. 

2. Type gpedit.msc, and then click OK. 

3. Expand Computer Configuration. 

4. Right-click Administrative Templates, and then click Add/Remove Templates. 

5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open. 

6. Click Close. 

7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update. 


Q208. - (Topic 2) 

You are troubleshooting instability problems on a computer running Windows 7 Ultimate and suspect that they might be related to hardware faults in RAM. 

You access the System Recovery options. 

Which option is most likely to help you diagnose the problem? 

A. Windows Memory Diagnostic 

B. Startup Repair 

C. System Restore 

D. System Image Recovery 

Answer:


Q209. - (Topic 2) 

You install an application named app1.exe on a computer 

After the installation the computer becomes unresponsive. 

You restart the computer and attempt to uninstall App1.exe. The uninstallation of App1.exe fails. 

You need to restore the computer to its previous functional state. You must achieve the goal by using the minimum amount of administration. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of App1.exe, click Restore button. 

C. Start the computer, press F8 and then use the Last Known Good Configuration. 

D. Create a system repair disc and then start the computer from the system repair disc. 

Answer:

Explanation: 

If you install an application that causes your computer to become unstable, you should first attempt to uninstall the application. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 

Windows 7 creates system restore points on a regular schedule and prior to events such as the installation of applications and drivers. A restore point contains information about registry settings and other system information. Windows 7 generates restore points automatically before implementing significant system changes. You can manually create restore points and restore a computer system to a selected restore point. If you install an application or driver that causes your computer to become unstable, you should first attempt to uninstall the application or roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore. 


Q210. - (Topic 4) 

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do? 

A. From the Trusted Platform Module (TPM) snap-in, initialize TPM. 

B. From Control Panel, modify the BitLocker Drive Encryption settings. 

C. From a local Group Policy, modify the BitLocker Drive Encryption settings. 

D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings 

Answer:

Explanation: 

How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker 

When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.