we provide 100% Correct Microsoft mcts 70 680 exam cost which are the best for clearing mcts 70 680 test, and to get certified by Microsoft TS:Windows 7,Configuring. The exam 70 680 Questions & Answers covers all the knowledge points of the real mcts 70 680 exam. Crack your Microsoft mcts 70 680 Exam with latest dumps, guaranteed!
Q141. - (Topic 1)
You have a computer named Computer1 that runs Windows 7.
You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network.
What should you do?
A. From Windows Firewall with Advanced Security, create a new rule.
B. From the local Group Policy, modify the application control policies.
C. From Windows Firewall, modify the Allowed Programs and Features list.
D. From Network and Sharing Center, modify the Advanced Sharing settings.
Answer: A
Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, shown in Figure 7-7, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q142. - (Topic 5)
A computer that runs Windows 7 becomes infected with malware.
You scan the computer, remove all detected malware components, and restart the computer.
When you attempt to connect to a financial institution's Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site.
You need to prevent the computer from being redirected to the potential phishing site.
What should you do?
A. Configure the SmartScreen Filter.
B. Run Ipconfig /flushdns.
C. Configure InPrivate Browsing.
D. Modify the hosts file.
Answer: D
Q143. - (Topic 5)
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7.
You want to deploy a Windows image (WIM) file to other computers in the domain.
You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file.
What should you do before you capture the image?
A. Run Defrag.exe.
B. Run Oscdimg.exe.
C. Start the computer by using the Windows Preinstallation Environment (WinPE) ram disk.
D. Run Diskpart.exe.
Answer: B
Explanation: Oscdimg is a command-line tool that you can use to create an image (.iso)
file of a customized 32-bit or 64-bit version of Windows Preinstallation Environment (Windows.PE). You can then burn the .iso file to a CD or DVD. Oscdimg supports ISO.9660, Joliet, and Universal Disk Format (UDF) file systems. Note: … You just created your Windows PE Boot Flash Drive. Now you need to capture a generalized image for deployment. If you would like to burn WindowsPE to a CD instead of a USB thumb drive. The following command will copy all of the files necessary to create a WindowsPE boot disc into an ISO image file. Then you can burn the image file to a CD to create a bootable WindowsPE CD. In the command below the ISO image file that you will want to burn is winpex86.iso Oscdimg -n -bC:\winpe_x86\Etfsboot.com C:\winpe_x86\ISO C:\winpe_x86\winpex86.iso Now burn the ISO image file winpex86.iso to a CD as a bootable image disc and you are finished!
Q144. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
Explanation:
Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.
Q145. - (Topic 2)
You have a computer that runs Windows 7. The computer is joined to a domain.
You need to ensure that only approved USB drives can be used on the computer.
Which two policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. Enable Prevent installation of removable devices.
B. Enable Prevent installation of devices not described by other policy settings.
C. Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
Answer: B,D
Q146. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. From Authorization Manager, modify the Authorization Manager options.
B. Run the cipher.exe /adduser /user:administrator command.
C. From User Accounts, select Manage your file encryption certificates.
D. From Credential Manager, select Back up vault.
Answer: C
Explanation: Make sure you have a backup of the appropriate encryption certificates
Q147. - (Topic 6)
You are a network administrator for a global company that has Windows Server 2008 R2 servers and Windows 7 Enterprise computers.
Management wants to decrease VPN costs by implementing DirectAccess for remote network access.
They assign you to evaluate the current network infrastructure, which includes the following elements:
Active Directory
IPv6 network and applications
Server for DirectAccess service
You need to ensure that all critical infrastructure components are present.
What should you add to the infrastructure?
A. Windows Internet Name Service (WINS) server
B. Public key infrastructure
C. NAT-PT devices
D. Windows Server 2012
Answer: B
Explanation: DirectAccess With Windows Server 2008 R2 requires:
* Public key infrastructure (PKI) to issue computer certificates.
* One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one that is connected directly to the Internet, and a second that is connected to the intranet.
* On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that is connected to the Internet.
* DirectAccess clients running Windows 7 or Windows 8 "Enterprise" edition clients
* At least one domain controller and Domain Name System (DNS) server running Windows Server 2008 SP2 or Windows Server 2008 R2.
Note: DirectAccess, also known as Unified Remote Access, is a VPN-like technology that provides intranet connectivity to client computers when they are connected to the Internet. Unlike many traditional VPN connections, which must be initiated and terminated by explicit user action, DirectAccess connections are designed to connect automatically as soon as the computer connects to the Internet. DirectAccess was introduced in Windows Server 2008 R2, providing this service to Windows 7 and Windows 8 "Enterprise" edition clients.
Q148. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
The stored password needs to be deleted.
What action should you perform?
A. The Windows credentials should be modified from Credential Manager.
B. The Authorization Manager options should be modified from Authorization Manager.
C. Del should be run and the /p parameter should be specified.
D. Runas should be run and the /noprofile parameter should be specified.
Answer: A
Q149. - (Topic 5)
You use a portable computer that has Windows 7 SP1 Ultimate installed.
You update the driver for the computer's video card and the computer becomes unresponsive.
You need to be able to roll back the video card driver.
What should you do?
A. Restart the computer in safe mode.
B. Start the computer, press F8, and then select Repair Your Computer.
C. Boot the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image.
D. Start the computer, press F8, and then select Debugging Mode.
Answer: A
Q150. - (Topic 3)
You have a computer that runs Windows 7. The computer contains a folder named C:\data.
You use Advanced Sharing to share C:\data by using the default share permissions.
When a user tries to access the share over the network, he gets an "Access is Denied" error message.
You need to ensure that the user can access the share.
What should you do?
A. Allow file and printer sharing through Windows Firewall.
B. Change the network location from a Public network to a Home or Work network.
C. From the Security settings of the folder, assign the user the Read NTFS permission.
D. From the Advanced Sharing settings of the folder, assign the user the Read share permission.
Answer: C
Explanation:
Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.