Vivid of 70-680 torrent materials and guidance for Microsoft certification for consumer, Real Success Guaranteed with Updated 70-680 pdf dumps vce Materials. 100% PASS TS:Windows 7,Configuring exam Today!
Q191. - (Topic 2)
A user reports that he is unable to start his computer. He provides the following information:
. The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
. The user cannot locate his BitLocker recovery key.
You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort.
What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 7 installation media and select Repair your computer.
C. Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK.
D. Start the computer from the Windows 7 installation media and select Install now.
Answer: D
Explanation:
No recovery key = no recovery. Time to install.
Any other option defeats the whole point of encrypting it.
Encrypted volumes are locked when the encryption key is not available. When the operating system volume is locked, you can boot only to recovery mode. In recovery mode, you can enter the BitLocker password or you can attach the USB device that has the recovery key stored and restart the computer. Once you enter the recovery password or key, you can boot your computer normally.
The following events trigger recovery mode:
* The boot environment changes. This could include one of the boot files being modified.
* TPM is disabled or cleared.
* An attempt is made to boot without the TPM, PIN, or USB key being provided.
* You attach a BitLocker-encrypted operating system volume to another computer.
Q192. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1.
A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1. A user named User1 is a member of HRUsers.
You need to configure the computer to meet the following requirements:
Allow User1 to print to Printer1 Prevent User1 from establishing Remote Desktop sessions to Computer1 Allow other members of HRUsers to connect to Computer1 by using Remote Desktop
What should you do?
A. Remove User1 from the HRUsers group.
B. Remove HRUsers from the Remote Desktop Users group.
C. Assign User1 the Deny log on through Remote Desktop Services user right.
D. Assign User1 the Deny access to this computer from the network user right. Assign HRUsers the Allow log on locally user right.
Answer: C
Q193. - (Topic 6)
A user has a new 3TB External USB hard disk. The user plugs it into a Windows 7 desktop and sets it up, but it only shows 2TB of space. Additionally, disk management shows 2TB of space on the disk.
You need to make the full 3TB of space usable to the user.
What should you do?
A. Reformat the disk as an MBR disk.
B. Reformat the disk as a GPT disk.
C. Create a second partition and set it up to use the missing 1TB.
D. Convert the disk to a dynamic disk and expand the partition to 3TB.
Answer: C
Explanation: Ref: http://technet.microsoft.com/en-us/library/dd183729(v=WS.10).aspx
Q194. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that Windows does not display notifications when programs try to install software or make changes to the computer, or if users make changes to Windows settings.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the leads command
B. the netsh command
C. share permissions
D. Device Manager
E. Local Users and Groups
F. the folder Properties window
G. the Services management console
H. the Group Policy management console
I. the User Account Control Settings Control Panel window
Answer: H,I
Q195. - (Topic 1)
You have two computers named Computer1 and Computer2 that run Windows 7.
You need to ensure that you can remotely execute commands on Computer2 from Computer1.
What should you do?
A. Run Winrm quickconfig on Computer1
B. Run Winrm quickconfig on Computer2
C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2
Answer: B
Explanation:
Windows Remote Management Service The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. Executing WinRM quickconfig does the following:
-Starts the WinRM service
-Configures the WinRM service startup type to delayed automatic start
-Configures the LocalAccountTokenFilterPolicy to grant administrative rights remotely to local users
-Configures the WinRM listener on http://* to accept WS-Man requests
-Configures the WinRM firewall exception
Q196. - (Topic 2)
You have a computer that runs Windows 7.
You need to identify how much disk space is occupied by previous versions.
What should you do?
A. At a command prompt, run Diskpart.
B. At a command prompt, run Vaultcmd.
C. From System, view the System Protection settings.
D. From the properties of drive C, view the previous versions settings.
Answer: C
Explanation:
NOT Diskpart:
Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.NOT Vaultcmd:Creates, displays and deletes stored credentials.NOT Properties of drive C:Allows you to view contents, but does not show size.
Q197. - (Topic 3)
You have a computer that runs Windows 7. The computer is a member of a domain.
You share D:\data as Data. You assign Everyone Full control share permissions to the folder. No other share permissions are assigned to the folder.
From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: "Destination Folder Access Denied".
You need to ensure that you can create files in the Data share by using the User1 account.
What should you do?
A. Create a local user named User1.
B. Add User1 to the local Power Users group.
C. Assign User1 Write NTFS permission on the D:\data folder.
D. Assign User1 Full control share permissions to the Data share.
Answer: C
Explanation:
Share permissions apply to users who connect to a shared folder over the network. Share permissions do not affect users who log on locally, or log on using Remote Desktop. To set permissions for users who log on locally or using Remote Desktop, use the options on the Security tab instead of the Share Permissions tab. This sets permissions at the NTFS file system level. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder. For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally. Permissions The Read permission allows a user or group to access a file or folder but does not allow modification or deletion. The Change permission includes the read permission but also allows you to add files, delete files, and modify files in the shared folder. This permission is equivalent to the Read/Write permission in the basic File Sharing dialog box. The Full Control permission includes all the rights conferred by the Change and Read permissions. It also allows the user assigned that permission to modify the permissions of other users. Full Control is equivalent to the basic sharing Owner permission, though unlike basic sharing, where there can only be one user assigned the Owner permission, you can assign the Full Control permission to users and groups. NTFS permissionsYou can configure the local NTFS permissions for a shared folder or volume using Share and Storage Management in the following ways: New shared resources. In the Provision a Shared Folder Wizard, before you select a network sharing protocol, you can change the NTFS permissions for the folder or volume you will be sharing. These NTFS permissions will apply both locally and when accessing the resource over the network. To change the NTFS permissions, on the NTFS Permissions page, select Yes, change NTFS permissions, and then click Edit Permissions. Existing shared resources. You can change the NTFS permissions of a shared folder or volume listed on the Shares tab. To change the NTFS permissions, select the folder or volume, in the Actions pane click Properties, and on the Permissions tab, click NTFS Permissions.
Q198. - (Topic 1)
The Aero Shake feature will work if which of the following conditions are met? Choose Two.
A. A display adapter compatible with WDDM is installed.
B. Aero features are downloaded from Microsoft.
C. The windows experience index is at least 2.
D. The Windows Experience Index is 3 or greater.
Answer: A,D
Q199. - (Topic 3)
You have a computer that runs Windows 7.
You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site.
Which two configuration changes should you perform? (Each correct answer presents part of the solution, Choose two.)
A. Modify the properties of Group1.
B. Assign an SSL certificate to the default Web site.
C. Modify the authentication methods of the default Web site.
D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
Answer: C,D
Explanation:
Modifying the Default Authentication Method
You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site.
Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
See article:
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0
Web server http://support.microsoft.com/kb/271071
Q200. - (Topic 3)
Your corporate network contains a Remote Desktop Gateway (RD Gateway) server named Server1 and a Remote Desktop Session Host (RD Session Host) server named Server2.
You have a computer named Computer1 that runs Windows 7. You use Computer1 from home.
You need to access Server2 from Computer1.
What should you do?
A. Run Mstsc.exe /admin /v:server2:443.
B. Run Mstsc.exe /console /v:server2:8080.
C. Create a Remote Desktop Connection and modify the Connect from anywhere settings.
D. Create a Remote Desktop Connection and modify the Server authentication settings.
Answer: C
Explanation:
To connect using an RD Gateway server, navigate to the Advanced tab of the Remote Desktop Connection Properties dialog box and click Settings under Connect From Anywhere. This opens the RD Gateway Server Settings dialog box. This dialog box allows you to specify RD Gateway settings, including whether or not you want the RD Gateway to be detected automatically, whether to use a specific RD Gateway server, as shown in the firgure, or you can specify Do Not Use an RD Gateway Server, which is the default setting.