getcertified4sure.com

Today Big Q: 70 680 pdf?




we provide Virtual Microsoft microsoft 70 680 exam answers which are the best for clearing 70 680 practice test test, and to get certified by Microsoft TS:Windows 7,Configuring. The microsoft 70 680 Questions & Answers covers all the knowledge points of the real 70 680 exam exam. Crack your Microsoft 70 680 exam Exam with latest dumps, guaranteed!

Q161. - (Topic 2) 

You have a computer that runs windows 7. 

The computer is configured as shown in the following table. 

You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1. 

You need to provide 40 GB of free space for the application. 

What should you do? 

A. Create a shortcut. 

B. Create hard link. 

C. Create a mount point. 

D. Change the quota settings. 

Answer:

Explanation: 

Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points. 


Q162. DRAG DROP - (Topic 6) 

You work for Contoso. Ltd. as part of a Windows 7 deployment team. 

You create a new Windows Preinstallation Environment image. The image file is located at N:\images\winpe_x86 and is named WinPE.wim. An unsigned driver is located at 

N:\Drivers\Driverl.inf. 

You need to include the driver in the WinPE.wim image. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q163. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

. The Disk Management console (Click the Exhibit button.) 

. The System Properties window (Click the Exhibit button.) 

. The System protection for Local Disk C window (Click the Exhibit button.) 

You share your Documents library over a network. 

You discover that one of the files in the library was replaced with a previous version and 

then renamed. 

You need to restore the most recent version of the original file. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt, 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt, 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer:

Explanation: Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. 


Q164. - (Topic 6) 

You are a network administrator for Southbridge Video, a company that records and 

processes videos. Your network consists of Windows 7 computers and Windows Server 2008 R2 servers. 

Management secures a contract to provide closed captioning a large number of videos. They open a new, remote location with a slow network link and hire temporary staff to perform the work. The videos that the users need to view are on a file share on the corporate network. Users may have to view the video files multiple times to complete their work. 

You need to ensure that the slow network link is used as efficiently as possible. 

What should you do? 

A. Enable transparent caching. 

B. Enable folder redirection. 

C. Use DirectAccess to connect to the share. 

D. Configure the client machines to use offline file synchronization. 

Answer:


Q165. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to confirm that all device drivers installed on the computer are digitally signed. 

What should you do? 

A. At a command prompt, run Verify. 

B. At a command prompt, run Sigverif.exe. 

C. From Device Manager, click Scan for hardware changes. 

D. From Device Manager, select the Devices by connection view. 

Answer:

Explanation: 

Checking Digital Signatures with the File Signature Verification Tool The Dxdiag tool identifies problems with DirectX hardware and tells you whether that hardware has passed the WHQL testing regimen and has been signed digitally. However, it does not test the device drivers that are not associated with DirectX devices. To scan your computer and identify any unsigned drivers, you should use the File Signature Verification (Sigverif) tool. 


Q166. - (Topic 6) 

Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies. 

You need to reserve more space for previous versions of files. 

What should you do? 

A. From System Properties, System Protection, expand the Max usage to 20 GB. 

B. From System Properties, System Protection, turn off system protection. 

C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB. 

D. From System Properties, System Protection, set it to only restore previous versions of files. 

Answer:

Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure 


Q167. - (Topic 1) 

You manage a computer that runs Windows 7. 

You are tasked to identify which applications were installed during the last week. 

What Windows component would you use to find this information? Choose two. 

A. Check the Windows System Change Log in the Control Panel. 

B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel. 

C. The informational events should be reviewed from Reliability Monitor. 

D. Check the Windows System Diagnostics Report under the Performance Monitor MMC. 

Answer: B,C 


Q168. - (Topic 1) 

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre-shared key is not configured on the wireless access point. 

You need to connect a computer that runs Windows 7 to the wireless access point. 

Which security setting should you select for the wireless connection? 

A. 802.1x 

B. WPA-Personal 

C. WPA2-Enterprise 

D. WPA2-Personal 

Answer:

Explanation: 

WPA and WPA2 indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. WPA2 enhances WPA, which in turn addresses weaknesses in the previous system, WEP. WPA was intended as an intermediate measure to take the place of WEP while an IEEE 802.11i standard was prepared. 802.1X provides port-based authentication, which involves communications between a supplicant (a client computer), an authenticator (a wired Ethernet switch or WAP), and an authentication server (typically a Remote Authentication Dial In User Service, or RADIUS, server). WPA2-Enterprise WPA-Enterprise and WPA2-Enterprise authenticate through the Extensible Authentication Protocol (EAP) and require computer security certificates rather than PSKs. The following EAP types are included in the certification program: 

-EAP-TLS 

-EAP-TTLS/MSCHAPv2 

-PEAPv0/EAP-MSCHAPv2 

-PEAPv1/EAP-GTC 

-EAP-SIM 

If you want to use AES and to use computer certificates rather than a PSK, you would choose WPA2- Enterprise.WPA2-PersonalIf you have a small network that is not in a domain and cannot access a CA server, but you install a modernWAP that supports AES, you would use WPA2-Personal (with a PSK).WPA-Personal If you have a small network that is not in a domain and cannot access a CA server and your WAP does not support AES, you would use WPA-Personal.802.1x If you have a RADIUS server on your network to act as an authentication server and you want the highest possible level of security, you would choose 802.1X. 


Q169. - (Topic 2) 

You have 20 client computers. The computers run Windows XP. The computers are joined to a domain. 

You plan to perform installation of Windows 7 on the computers. 

You need to transfer all users' documents and settings. You must exclude music and video files. 

You need to use the minimum amount of administration effort. 

What should you do first? 

A. Create a config.xml file. Configure a logon script for windows XP computers to launch Windows 7 installations. 

B. Modify the migapp.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

C. Modify the miguser.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

Answer:


Q170. - (Topic 5) 

Your company Research department includes client computers that have Windows 7 and Windows Vista installed on separate partitions in a dual-boot configuration. The computers boot into Windows 7 by default or users can choose to boot into Windows Vista during startup. 

The company management has decided that the Windows Vista partition must be deleted from all the computers. 

You need to ensure that the staff of the Research department are not prompted to select a boot option during startup and that Windows 7 is chosen automatically. 

What should you do? 

A. In Windows Vista, from an elevated command prompt, run bcdedit /delete {current}. 

B. Select the Selective startup option button by using msconfig.exe. 

C. In Windows Vista, from an elevated command prompt, run bcdedit /delete {default}. 

D. In Windows 7, from an elevated command prompt, run bcdedit /delete {default}. 

Answer: