Ucertify inclusion regarding ?¡ãa entire refund?¡À commitment. If you decide on some of our 70-680 assessment, couldnt cross the primary check-up, with all the handle and also VUE examine locations possess PROMETRIC Close up check-up record card account, we shall reclaim the total value of you buy the car assessment, the total warranty your passions is definately not virtually any diminished. Ucertify 70-680 research products are definitely the best mixture of the main title, policy regarding 96% if not more.
Q311. - (Topic 4)
Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain.
You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed.
You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers.
What should you do before you start encrypting the disk volumes with BitLocker?
A. Select the Turn on BitLocker backup to Active Directory option in Group Policy linked to the portable computers.
B. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers.
C. Run the manage-bde -on C: -RecoveryPassword command on the portable computers.
D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller.
Answer: C
Q312. - (Topic 6)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Create a system repair disk.
B. Use the Backup and Restore tool to back up data files for all users.
C. Use the Backup and Restore tool to create a system image on an external hard disk.
D. Create an Easy Transfer file on an external hard disk.
Answer: D
Q313. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
The stored password needs to be deleted.
What action should you perform?
A. The Windows credentials should be modified from Credential Manager.
B. The Authorization Manager options should be modified from Authorization Manager.
C. Del should be run and the /p parameter should be specified.
D. Runas should be run and the /noprofile parameter should be specified.
Answer: A
Q314. - (Topic 3)
You need to reduce the amount of space currently being used to store system restore points.
What should you do?
A. Run Disk Cleanup.
B. Run Msconfig.exe.
C. Configure disk quotas.
D. Configure Windows Backup.
Answer: A
Explanation:
Shadow info:
Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
NOT Disk Quota:Does not directly affect size of System Restore Points.
Q315. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder.
What should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the icacls command
B. the User Account Control Settings Control Panel window
C. share permissions
D. Local Users and Groups
E. the folder Properties window
F. the Services management console
G. the netsh command
H. Device Manager
I. the Group Policy management console
Answer: A,E
Q316. - (Topic 4)
You administer client computers that have Windows 7 Professional 64-bit installed. All the computers are members of a single Active Directory Domain.
You need to prevent users from installing non-trusted device drivers.
What should you do?
A. Enable the Code signing for device drivers in a domain Group Policy.
B. Disable the Code signing for device drivers in a domain Group Policy.
C. Add each user to the Domain Admins group.
D. Run the SigVerif.exe command on each computer.
Answer: A
Explanation:
Can't see any of the rest PREVENTING users from installing non trusted devices - but Sigverig does highlight them.
Q317. - (Topic 2)
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
IP address: 10.1.1.193
Subnet mask: 25S.255.0.0
Default gateway: 10.1.1.194
. Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet.
What should you do?
A. Delete the default gateway address.
B. Delete the preferred DNS server IP address
C. Configure the subnet mask to use 255.255.255.0
D. Configure the subnet mask to use 255.255.255.192
Answer: A
Explanation:
Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.
Q318. - (Topic 2)
Your network consists of a single Active Directory domain named contoso.com.
You have a server named Server1 that runs a custom network application.
Server1 has the following IP addresses:
. 192.168.15.10
. 192.168.15.11
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address.
What should you do from the computer?
A. Edit the hosts file
B. Edit the lmhosts file
C. Run Ipconfig.exe /flushdns
D. Run Netsh interface ipv4 reset
Answer: A
Explanation:
Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file.
Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet.
-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations.
-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface.
-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups
-LMHOSTS file, such as the ability to support routed domain logon validation.
-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations.
-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC).
Other info http://support.microsoft.com/kb/105997
Q319. - (Topic 5)
You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data. The active network connection of the computer is configured as Public.
You use Advanced Sharing to share a folder as shown in the exhibit. (Click the Exhibit button.)
A user attempts to access the shared folder across the network and receives the following error message: "Access is Denied."
You need to ensure that the user can download files from the shared folder.
What should you do?
A. Allow file and printer sharing through Windows Firewall. From the Security settings of the folder, assign the Full Control NTFS permission to the user.
B. From the Advanced Sharing settings of the folder, assign the Read share permission to the user.
C. From the Security settings of the folder, assign the Read NTFS permission to the user.
D. Change the network location of the computer from a Public network to a Home or Work network.
Answer: C
Explanation: Assuming the user has appropriate Share permissions, he would still need NTFS permissions.
Q320. - (Topic 4)
Your company network includes portable computers that have Windows 7 Ultimate and Windows 7 Professional installed.
You want to standardize all portable computers to Windows 7 Professional for Key Manager Server (KMS) licensing purposes.
You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers.
What should you do?
A. Launch Windows Update
B. Perform a clean installation over the existing system partitions.
C. Perform a clean installation on non-system partitions.
D. Supply the Windows 7 Professional KMS key.
E. Launch Windows Anytime Upgrade.
Answer: B
Explanation:
Think that this is right don't think it can be done