getcertified4sure.com

how to use 70 680 practice test




Cause all that matters here is passing the Microsoft mcts 70 680 exam. Cause all that you need is a high score of 70 680 pdf TS:Windows 7,Configuring exam. The only one thing you need to do is downloading Ucertify 70 680 exam exam study guides now. We will not let you down with our money-back guarantee.

Q61. - (Topic 1) 

You have a computer that runs Windows 7. 

Multiple users log on to the computer. 

You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. 

What should you do? 

A. From the local Group Policy, modify an application control policy. 

B. From Control Panel, modify the BitLocker Drive Encryption settings. 

C. From Device Manager, modify the settings of all removable devices. 

D. From the local Group Policy, modify a removable storage access policy. 

Answer:


Q62. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to configure system image backups to meet the following requirements: 

. Automatically create a system image every day without user intervention 

. Retain multiple copies of the system image 

Which type of backup destination should you use? 

A. External hard disk drive 

B. Network location 

C. USB flash drive 

D. Writeable DVD 

Answer:

Explanation: Explanation/Reference: Backup And Restore in Windows 7 supports backing up data files to CD-ROM, DVD-ROM, hard disk (including VHD files), or a network location. You can use Backup And Restore to write a System Image backup to an internal hard disk drive, an external hard disk drive (if formatted with the NTFS file system) and a network location. You cannot use Backup And Restore to write a System Image backup to a USB flash drive, a writable DVD, or a tape drive. You need to schedule client computers that store important data for automatic backup. After you first configure automatic file backup using the Backup And Restore console, Windows 7 regularly backs up your files. The first time a backup is performed, a full backup is done, including all important user documents. Subsequent backups are incremental, backing up only changed files. Older backups are discarded if the disk begins to run out of space.Scheduling Backups with the Backup And Restore Console Windows 7 Backup uses shadow copies to take a snapshot of your files, allowing the backup to completely back up files even if they are open. Backups are configured and scheduled by using the Backup And Restore console under System And Security in Control Panel. You can select the following types of backup destination: An external hard drive External hard drives are more expensive to purchase than internal hard drives, although you need to balance this against the cost of fitting the internal drive. They can be removed and stored in a secure location. However, they are typically slower than internal hard drives and tend to be less reliable, mainly because they are by default formatted using FAT rather than NTFS. You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. Because it is easily removable, it is more likely that an external hard drive will be missing when a scheduled backup is required. 

Network locationIf your computer is short of disk space, you can back it up to a network location on another computer or network storage. Note that this is not the same as the situation in a production environment, where users' Documents libraries are stored on a file server and an administrator backs up the file server. You can save your backups on a network location only on computers running Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise, and you need to provide credentials so that Windows Backup can access the network. Bear in mind that you can save your backups on a network location only on computers running Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise.USB flash drivesFlash drive memory is considerably less expensive and flash drive devices support much more memory than they did three or even two years ago. Nevertheless, they typically support a lot less memory than hard drives and quickly fill up if you needed to keep copies of older backups. You cannot save System Image backups to flash memory. A flash drive must be able to hold more than 1 GB if you want to save a backup on it. Flash drives can be stored offsite and are small and easy to carry. They are also easy to lose. 


Q63. - (Topic 2) 

You have two portable computers that run Windows 7. The computers are not connected to a network. 

The computers are configured as shown in the following table. 

You need to transfer a 1-gigabit file from Computer1 to Computer2. What should you do first? 

A. On Computer1, create a wireless ad hoc network. 

B. On Computer2, configure the Bluetooth File Transfer Wizard to send files. 

C. On Computer2, create a network profile to connect to a network named Homegroup. 

D. On Computer1, configure the computer to be a member of a workgroup named Homegroup. 

Answer:

Explanation: Wireless Ad Hoc network You can set up a temporary wireless network, or ad hoc network, between two or more computers running Windows 7 (or between computers running Windows 7 and Windows Vista) provided they are all within 30 feet (9 meters) of each other. A WAP is not required to set up an ad hoc network. This enables users to share folders and other resources without needing to connect to an organizational network. On the first computer on the network, you open Network And Sharing Center and click Set Up A New Connection Or Network. You then choose the option Set Up A Wireless Ad Hoc (Computer To Computer) Network. You give the network a name and (if you want) set up a security key so that users joining the network need to supply a password. For WEP, this can be 5 case-sensitive characters, 13 case-sensitive characters, 10 hexadecimal caseinsensitive characters, or 26 hexadecimal case-insensitive characters, depending on security considerations. (If you choose WPA-2 Personal, you can insist on a 64-character password, but by the time everyone has typed it in correctly, the meeting would probably be over.)BluetoothWindows supports Bluetooth version 1.1 and later versions. Windows does not support Bluetooth version 1.0 because that specification lacks several critical updates that Windows requires to support Bluetooth wireless technology well. 


Q64. - (Topic 1) 

In which of the following scenarios must you perform a migration rather than an upgrade? Choose three. 

A. Windows XP Professional (x64) to Windows 7 Professional (x64) 

B. Windows Vista Business (x86) to Windows 7 Professional (x64) 

C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64) 

D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86) 

Answer: A,B,D 


Q65. - (Topic 1) 

Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7. 

You add a new computer named Computer1 to the subnet. 

You discover that Computer1 has an IP address of 169.254.34.12. 

You cannot connect to other computers on the network. Other computers on the network can connect to each other. 

You need to ensure that you can connect to all computers on the network. What should you do? 

A. Turn off Windows Firewall. 

B. Run Ipconfig.exe /renew. 

C. Configure a static TCP/IP address. 

D. Run Netsh.exe interface ipv4 install. 

Answer:

Explanation: 

[Need better justification] Configuring static IP addresses When you assign a static IP address, you need to tell the computer the IP address you want to use, the subnet mask for this IP address, and, if necessary, the default gateway to use for internetwork communications. An IP address is a numeric identifier for a computer. Ip addressing schemes vary according to how your network is configured, but they're normally assigned based on a particular network segment. 


Q66. - (Topic 3) 

You need to prevent a custom application from connecting to the Internet. 

What should you do? 

A. From Windows Firewall, add a program. 

B. From Windows Defender, modify the Allowed items list. 

C. From Windows Firewall with Advanced Security, create an inbound rule. 

D. From Windows Firewall with Advanced Security, create an outbound rule. 

Answer:

Explanation: 

Outbound Rule Outbound rules allow you to block and allow traffic that originates on the computer from traveling out to the network.Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.QUESTION NO: 290 You have a computer that runs Windows 7. The network contains a monitoring server named Server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1. 

What should you do? 

A. From Windows Firewall with Advanced Security, create a predefined rule. 

B. From Windows Firewall with Advanced Security, create a custom rule. 

C. From Network and Sharing Center, modify the network location settings. 

D. From Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 


Q67. - (Topic 2) 

You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD. 

What should you do? 

A. From Disk Management, attach the VHD as read-only. 

B. From Disk Management, convert the VHD to a GPT disk. 

C. From Windows Explorer, modify the permissions of the VHD file. 

D. From Windows Explorer, modify the read-only attribute of the VHD file. 

Answer:


Q68. - (Topic 2) 

You have a computer that runs Windows 7. 

You need to identify which hardware is required to create a system repair disc. 

What hardware should you indentify? 

A. CD/DVD burner. 

B. Floppy disk. 

C. Tape drive. 

D. USB disk. 

Answer:


Q69. DRAG DROP - (Topic 6) 

A company has client computers that run Windows Vista. 

You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista. 

Which actions should you perform in sequence? 

(To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer: 


Q70. - (Topic 1) 

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. 

Your network is configured to use only IPv6. 

You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. 

Which type of record should you request? 

A. A 

B. AAAA 

C. HINFO 

D. NAPTR 

Answer:

Explanation: 

The resolution of host names to IPv6 addresses is accomplished through DNS (apart from link-local addresses that are not stored by DNS and resolve automatically). The procedure is the same as for IPv4 address resolution with the computer name and IPv6 address pair being stored in a AAAA (quad-A) DNS resource record, which is equivalent to an A or host record for IPv4. Reverse DNS lookup that returns a computer name for an IPv6 address is implemented by a pointer (PTR) DNS resource record that is referred to the IPv6 reverse lookup zone (or tree) ipv6.arpa, which is the equivalent of the in-addr.arpa reverse lookup zone in Ipv4. AAAAAn AAAA (quad-A) resource record resolves a host name to an IPv6 address.AAn A (address) resource record resolves a host name to an IPv4 address.HINFOHost information (HINFO) resource record. Specifies the type of CPU and operating system in the cpu_type and os_type fields, respectively, for the host DNS domain name in the owner field. Well-known CPU and operating system types that are most often used are noted in RFC 1700. This information can be used by application protocols such as FTP, which use special procedures when communicating with computers of a known CPU and operating system type. NAPTR The NAPTR represents a Naming Authority Pointer. NAPTR records map between sets of URNs, URLs and plain domain names and suggest to clients what protocol should be used to talk to the mapped resource. Each NAPTR record contains a service name, a set of flags, a regexp rule, an order value, a preference and a replacement. Multiple records can be chained together in a cascade to rewrite URIs in fairly sophisticated, but deterministic 

ways. These cascading rules have been standardized in RFC2915 and RFC3403.