Proper study guides for Improve Microsoft TS:Windows 7,Configuring certified begins with Microsoft 70-680 preparation products which designed to deliver the Refined 70-680 questions by making you pass the 70-680 test at your first time. Try the free 70-680 demo right now.
Q121. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. Disable Internet Connection Sharing.
B. From Internet Options, select Delete browsing history on exit.
C. Start the Microsoft Network Access Protection service.
D. From the Safety drop-down menu, configure InPrivate Filtering.
Answer: B
Q122. - (Topic 6)
You work as the desktop support technician at Abc.com.
The Abc.com network consists of a single Active Directory domain named Abc.com.
All client computers on the Abc.com network run Windows Vista Business.
You have been instructed to upgrade a client computer named GB680 to Microsoft Windows 7 Professional.
GB680 has the following specifications:
Drive C (system drive) with 12 GB of free space
Drive D (data drive) with 40 GB of free space
Four memory slots with two occupied by 512 MB memory sticks
One 2.0 GHz 32-bit processor
You need to ensure that Windows 7 Professional can be installed on GB680.
What should you do?
A. Install Windows 7 on Drive D.
B. Create more free space on Drive C.
C. Upgrade the memory.
D. Upgrade the processor.
Answer: B
Q123. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q124. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
A user has saved files in a C:\Users\ folder that coworkers must be able to read and edit.
However, when coworkers try to edit those files, they get an "Access Denied" error.
You need to configure new NTFS permissions for the user's C:\Users\ folder to ensure that the coworkers have access to write to that folder.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. share permissions
B. the folder Properties window
C. the User Account Control Settings Control Panel window
D. the Group Policy management console
E. the Services management console
F. Local Users and Groups
G. the netsh command
H. Device Manager
I. the icacls command
Answer: B,I
Q125. - (Topic 6)
You have an answer file named Unattend.xml for a Windows 7 automated installation. You need to perform an unattended installation of Windows 7 by using the answer file. What should you do?
A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD.
D. Name the answer file as unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
Answer: C
Q126. - (Topic 3)
Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. (Click the Exhibit button.)
Other users on the network receive an IPv6 address for ISATAP.
You need to ensure that your computer receives an IPv6 address for ISATAP.
What should you do?
A. Run Ipconfig /renew6.
B. Run Ipconfig /setclassid6.
C. Start the Net.TCP Port Sharing service.
D. Start the Internet Protocol Helper (IP Helper) service.
Answer: D
Explanation: Internet Protocol Helper (IP Helper) service Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IPHTTPS. If this service is stopped, the computer will not have the enhanced connectivity benefits that these technologies offer. Internet Protocol Helper (IP Helper) assists network administration of the local computer by enabling applications to retrieve information about the network configuration of the local computer, and to modify that configuration. IP Helper also provides notification mechanisms to ensure that an application is notified when certain aspects of the local computer network configuration change.
Q127. - (Topic 1)
A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
User1 must be allowed to delete all files in Folder1
Members of Group1 must be able to create files in Folder1
All other members of Group1 must be prevented from deleting files they did not create in Folder1
All users must be prevented from modifying the permissions on Folder1
What should you do?
A. Assign Group1 the Write permission. Assign User1 the Modify permission.
B. Assign Group1 the Modify permission. Assign User1 the Write permission.
C. Deny Group1 the Write permission. Assign User1 the Modify permission.
D. Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A
Explanation:
File and Folder Permissions ReadFolders: Permits viewing and listing of files and subfoldersFiles: Permits viewing or accessing of the file's contentsWriteFolders: Permits adding of files and subfoldersFiles: Permits writing to a fileRead & ExecuteFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by files and folders Files: Permits viewing and accessing of the file's contents as well as executing of the fileList Folder ContentsFolders: Permits viewing and listing of files and subfolders as well as executing of files; inherited by folders onlyFiles: N/AModifyFolders: Permits reading and writing of files and subfolders; allows deletion of the folderFiles: Permits reading and writing of the file; allows deletion of the fileFull ControlFolders: Permits reading, writing, changing, and deleting of files and subfoldersFiles: Permits reading, writing, changing and deleting of the file
Q128. - (Topic 4)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Send notifications to an administrator for predefined thresholds.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: I
Q129. - (Topic 5)
Your company network includes client computers that have Windows 7 installed. All client computers have NetBIOS disabled.
You need to view the status of all TCP/UDP ports.
Which command should you run?
A. nbtstat -n
B. ipconfig /all
C. netstat -an
D. ipconfig /displaydns
Answer: C
Q130. - (Topic 1)
Which of the following is used to control when the security pop-up notifications are used?
A. Security Control Manager
B. User Account Control
C. User Access Control Panel
D. Notification Control Settings Manager
Answer: B