Testking has services hotline for you for you to consult us in the event you have just about any question. Our objective is always to make our customers satisfied along with successful. All of us are so proud of the pass rate that we promise youll get the Microsoft 70-680 certification without having any difficulty. Or perhaps you can get 100% cash back with the paying fees.
Q251. - (Topic 3)
You have a computer that runs Windows 7.
You need to capture the operating system and all the computer configurations to a Windows image (WIM) file.
What should you do before you capture the image?
A. Run Oscdimg.exe.
B. Run Windows System Image Manager (Windows SIM).
C. Open a command prompt that has elevated privileges.
D. Start the computer by using Windows Preinstallation Environment (Windows PE).
Answer: D
Explanation:
Windows PE To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment
(Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. Once you have successfully booted into the Windows PE environment, you can connect to the network share and begin the installation by running Setup.exe.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems.
Q252. - (Topic 2)
You have two portable computers named Computer1 and Computer2 that run Windows 7.
You configure Computer1 to connect to a wireless network named Network1.
You need to configure Computer2 to connect to Network1 by using the same settings as Computer1.
What should you do on Computer1?
A. At the command prompt, run Wecutil.exe -es -gr.
B. At the command prompt, run Winrs.exe -environment.
C. From Windows Firewall with Advanced Security, export the policy.
D. From the wireless network properties of Network1, copy the network profile to a USB flash drive.
Answer: D
Explanation:
The Copy this network profile to a USB flash drive link launches the Copy Network Settings wizard, which writes the wireless network profile settings to a USB flash drive. You can then use this flash drive to automate the wireless network profile configuration of other computers. To save your wireless network settings to a USB flash drive, insert a USB flash drive into the computer, and then follow these steps:
1. Click to open Network and Sharing Center.
2. In the left pane, click Manage wireless networks.
3. Right-click the network, click Properties, and then click Copy this network profile to a USB flash drive.
4. Select the USB device, and then click Next.
5. Follow the instructions in the wizard, and then click Close.
Q253. DRAG DROP - (Topic 6)
You have a Windows XP computer.
You need to migrate to Windows 7 and determine that all third-party applications installed on the computer continue to operate with the new operating system.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q254. - (Topic 6)
A company has Windows 7 Enterprise computers that use BitLocker drive encryption on operating system drives.
You need to configure multi-factor authentication before client computers are booted into Windows.
On each client computer, what should you do?
A. Require the use of a startup key.
B. Implement fingerprint authentication.
C. Implement a Dynamic Password Policy.
D. Implement a Dynamic Access Control policy.
E. Configure a TPM PIN.
Answer: E
Explanation: BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2, you can use additional forms of authentication with the TPM protection. BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN) or inserts a USB device (such as a flash drive) that contains a BitLocker startup key, or both the PIN and the USB device can be required. These additional security measures provide multifactor authentication and help ensure that the computer will not start or resume from hibernation until the correct authentication method is presented.
Q255. - (Topic 1)
You have a computer that runs Windows 7.
A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users.
What should you do?
A. From the printer's properties, assign the Print permission to the Sales group.
B. From the printer's properties, assign the Manage Documents permission to the Sales group.
C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
Answer: A
Explanation:
The available permissions are:
-Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
-Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
-Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.
Q256. DRAG DROP - (Topic 6)
You have a computer that runs WindowsXP. The computer has one partition. You install Windows 7 on the computer.
You need to migrate a user profile from the Windows XP installation to Windows 7 installation.
What should you do first? (To answer, drag the appropriate command from the list of command to the correct location or locations in the work area.)
Answer:
Q257. - (Topic 4)
A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. The branch office with the client computers has a slow network connection to the office with the file server.
Users complain of poor performance when connecting to the file server from their client computers.
You need to verify that the client computers are configured to be BranchCache clients.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Device Manager
B. Local Users and Groups
C. share permissions
D. the folder Properties window
E. the netsh command
F. the icacls command
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel window
Answer: E,H
Explanation:
To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode.
To create a GPO, enable BranchCache, and select the cache mode Click Start, point to Administrative Tools, and click Group Policy Management Console.
Client configuration using netsh
When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command.
Q258. - (Topic 4)
A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.
You are preparing to capture an image of a Windows 7 client computer.
You need to ensure that the captured image is generic and does not contain the device drivers from the client computer.
What should you do?
A. use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
B. Run the Start /w ocsetup command.
C. Run the PEImg /Prep command.
D. Run the Dism command with the /Mount-Wimoption.
E. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
F. Run the Dism command with the /Add-Driver option.
G. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
H. Run the BCDEdit/delete command.
I. Run the ImageX command with the /Mount parameter.
J. Run the Dism command with the /Add-Package option.
K. Add a boot image and create a capture image in WDS.
L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
M. Run the DiskPart command and the Attach command option.
Answer: L
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the Sysprep command with the /generalize option by specifying the PersistAllDeviceInstalls setting in the Microsoft-Windows-PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm). http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx
Q259. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Create an Easy Transfer file on a network location.
B. Use the Backup and Restore tool to back up data files for all users.
C. Use the Backup and Restore tool to create a system image on a network location.
D. Create a system repair disk.
Answer: A
Q260. - (Topic 1)
You have a computer that runs Windows 7.
You need to view the processes that currently generate network activity.
What should you do?
A. Open Resource Monitor and click the Network tab.
B. Open Windows Task Manager and click the Networking tab.
C. Open Event Viewer and examine the NetworkProfile Operational log.
D. Open Performance Monitor and add all the counters for network interface.
Answer: A
Explanation:
Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. To identify the network address that a process is connected to, click the Network tab and then click the title bar of TCP Connections to expand the table. Locate the process whose network connection you want to identify. You can then determine the Remote Address and Remote Port columns to see which network address and port the process is connected to.