getcertified4sure.com

Surprising 70 680 practice test




Act now and download your Microsoft mcts 70 680 test today! Do not waste time for the worthless Microsoft microsoft 70 680 tutorials. Download Up to the immediate present Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft mcts 70 680 with a classic professional.

Q51. - (Topic 5) 

Your company network includes desktop computers that have Windows XP Professional SP1 64-bit installed. 

The company has purchased new portable computers that have Windows 7 Professional 32-bit installed. 

You need to be able to migrate user profiles from the desktop computers to the portable computers. 

What should you do? 

A. Run scanstate /nocompress on the desktop computers. 

B. Stop the User Profile Service on the desktop computers. 

C. Add each desktop user to the local Administrators on the desktop computers. 

D. Replace all versions of Windows 7 with 64-bit. 

Answer:


Q52. - (Topic 2) 

You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. You encounter that windows is unable to install the necessary device drivers for the mobile device. 

You need to ensure that you can synchronize file to the mobile device. 

What should you do? 

A. From Windows Mobility Center, click Sync settings. 

B. From Sync Center, click set up new sync partnerships. 

C. From Device Manager, click scan for hardware changes. 

D. From Devices and Printers, right-click the device and click troubleshoot. 

Answer:

Explanation: 

You cannot sync without the drivers installed. It says unable to install, assuming that it could find the device if it was able to reach attempting to install point. Therefore Troubleshoot. 


Q53. - (Topic 1) 

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can access Web pages on both the Internet and the intranet. 

What should you do? 

A. From the Files menu, click Work Offline. 

B. From the Safety menu, click InPrivate Filtering. 

C. From the Security tab, add the intranet Web site to the Trusted sites zone. 

D. From the Safety menu, click InPrivate Browsing. 

Answer:

Explanation: 

Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation. 

(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default. 


Q54. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. 

You need to ensure that only signed and validated executable files are run with elevated privileges. 

What should you use to achieve this goal? 

A. the folder properties window 

B. the icacls command 

C. Device Manager 

D. share permissions 

E. the Group Policy management console 

F. Local Users and Groups 

G. the netsh command 

H. the Services management console 

I. the User Account Control Settings Controal Panel window 

Answer:

Explanation: 

http://www.mcmcse.com/microsoft/guides/70-680/configure_uac.shtml Accessed through secpol.msc too 


Q55. - (Topic 3) 

Your network contains a Network Policy and Access Services server named Server1. 

All certificates in the organization are issued by an enterprise certification authority (CA) named Server2. 

You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP. 

You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider." 

You need to ensure that you can successfully establish the VPN connection to Server1. 

What should you do on Computer1? 

A. Import the root certificate to the user's Trusted Publishers store. 

B. Import the root certificate to the computer's Trusted Root Certification Authorities store. 

C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store. 

D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store. 

Answer:

Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA. 


Q56. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. From Internet Options, modify the security settings for the Internet zone. 

B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting. 

C. From Internet Options, select Delete browsing history on exit. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:


Q57. HOTSPOT - (Topic 6) 

You work with Windows 7 computers. 

Your company has a policy of not allowing software to be upgraded without proper authorization from the managers. 

You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.) 

Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. ) 

Any upgrades or change to the WinWord.exe will result in the program not operating. 

When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.) 

Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. ) 

Answer: 


Q58. - (Topic 2) 

You have a computer named Computer1 that runs Windows 7. 

Computer1 uses an NTFS-formatted USB drive that has ReadyBoost enabled. 

You need to modify the amount of space that ReadyBoost reserves on the USB drive. 

What should you do? 

A. Open Computer and modify the properties of the USB drive. 

B. Open Performance Information and Tools and run disk cleanup. 

C. Open Devices and Printers and modify the properties of the USB drive. 

D. Open Device Manager and modify the properties of the USB device. 

Answer:

Explanation: 

ReadyBoostWindows 7 supports Windows ReadyBoost. This feature uses external USB flash drives as a hard disk cache to improve disk read performance. Supported external storage types include USB thumb drives, SD cards, and CF cards. Since ReadyBoost will not provide a performance gain when the primary disk is an SSD, Windows 7 disables ReadyBoost when reading from an SSD drive. External storage must meet the following requirements: 

-Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space.The 4-GB limit of Windows Vista has been removed. 

-At least a 2.5 MB/sec throughput for 4-KB random reads 

-At least a 1.75 MB/sec throughput for 1-MB random writes 


Q59. - (Topic 2) 

You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table. 

You need to test the connection to the IPv6 address from Computer1 to Computer2. 

Which command should you run? 

A. Ping -6 fe80::44df:1b68%12 

B. Ping -6 fe80::44df:1b68%10 

C. Ping -R fe80::44df:1b68%12 

D. Ping -R fe80::44df:1b68%10 

Answer:

Explanation: 

1073 40112 

If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping fe80::39cd:4c93%10. 

The % character followed by a number after each IPv6 address is the interface ID. 

If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address. 

Ping -6 

Force using IPv6. 


Q60. - (Topic 6) 

You have a Windows 7 Professional computer that is a member of an Active Directory domain. The domain group policy redirects documents to save to the network-attached storage device mapped to the F: drive. 

You want to implement a disaster recovery solution that restores only the local drives to a previous state. You attach an external drive to the computer locally and assign it to the X: drive. 

You need to configure the solution to perform the backup on a weekly basis. 

What should you do? 

A. Configure a Windows Backup to include a system image file to back up to the X: drive. Run the X: drive weekly. 

B. Create a batch file that runs the command "ntbackup backup systemstate /J "SystemStateBackup" /F "X: \Backup. bkf". Configure a Scheduled Task to run the command weekly. 

C. Create a batch file that runs the command "wbadmin start backup -backuptarget:x: -included: -quiet". Configure a Scheduled Task to run the command weekly. 

D. Configure a Windows Backup to include a system image file and select the F: drive to back up to the X: drive. Run the F: drive weekly. 

Answer: