getcertified4sure.com

Tips for 70 680 exam




Our pass rate is high to 98.9% and the similarity percentage between our microsoft 70 680 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft mcts 70 680 exam in just one try? I am currently studying for the Microsoft exam 70 680 exam. Latest Microsoft microsoft 70 680 Test exam practice questions and answers, Try Microsoft mcts 70 680 Brain Dumps First.

Q121. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that Windows does not display notifications when programs try to install software or make changes to the computer, or if users make changes to Windows settings. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. the leads command 

B. the netsh command 

C. share permissions 

D. Device Manager 

E. Local Users and Groups 

F. the folder Properties window 

G. the Services management console 

H. the Group Policy management console 

I. the User Account Control Settings Control Panel window 

Answer: H,I 


Q122. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. 

From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. 

Which command should you run? 

A. Start disk.exe /d \\computer2 

B. Tscon disk.exe /DEST:computer2 

C. Winrm e disk.exe Cr:computer2 

D. Winrs r:computer2 disk.exe 

Answer:

Explanation: 

WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig. 

The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. 


Q123. - (Topic 3) 

You need to modify the contents of an image that is contained in a Windows image (WIM) file. 

What should you do first? 

A. Run Diskpart /s. 

B. Run Peimg.exe /import. 

C. Create an empty folder on a NTFS partition. 

D. Create and attach a virtual hard disk (VHD). 

Answer:


Q124. - (Topic 1) 

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. 

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. 

A file server named Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Minimize network traffic between the main office and the branch office 

. Ensure that Computer1 can only access resources in Share1 while it is connected to the network. 

What should you do? 

A. On Computer1, enable offline files. 

B. On Computer1, enable transparent caching. 

C. On Server1, configure DirectAccess. 

D. On Server1, configure Share1 to be available offline. 

Answer:

Explanation: 

Transparent Caching When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline. 


Q125. - (Topic 3) 

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer. 

You need to prevent the computer from displaying the username of the last user who logged on. 

What should you do? 

A. From Control Panel, modify the User Profiles settings. 

B. From Control Panel, modify the Personalization settings. 

C. From the local computer policy, add a policy template. 

D. From the local computer policy, modify the local security policy. 

Answer:

Explanation: 

How to Prevent the Last Logged-On User Name from Being Displayed 

1. Click Start and type secpol.msc in the search box. 

2. Press Enter. 

3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options. 

4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name. 

5. Double click this security option and click Enabled. 

6. Click OK. 


Q126. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers arm members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server 1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the Domain connection type. 

C. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type. 

D. On Client1, create a Windows Remote Management firewall exception for the Public connection type. 

Answer:


Q127. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Start the Microsoft Network Access Protection service. 

B. From the Safety drop-down menu, open an InPrivate Browsing session. 

C. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

D. From Internet Options, modify the security settings for the Internet zone. 

Answer:


Q128. HOTSPOT - (Topic 6) 

You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed. 

You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements: 

. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office. 

. Engineer employees' remote support is prevented when they are working from home. 

What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) 

Answer: 


Q129. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You use Remote Desktop to connect from Computer1 to Computer2. 

You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. 

What should you do on Computer1? 

A. From the Personalization options, change the theme. 

B. From the System properties, modify the Remote settings. 

C. From the Remote Desktop Connection options, modify the Performance setting. 

D. From the Remote Desktop Connection options, modify the Display configuration settings. 

Answer:

Explanation: 

Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users. 


Q130. DRAG DROP - (Topic 6) 

Your organization needs to perform a Windows Vista to Windows 7 migration for a department with 150 computers. 

You want to use User State Migration Tool (USMT) to automate the migration. 

You need to move user data and custom settings from the source computers to the destination computers by using USMT with minimal downtime or impact to the end users. The transfer must include files in several custom directories located in the root directory of the boot volume. 

Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer: