Act now and download your Microsoft 70-680 test today! Do not waste time for the worthless Microsoft 70-680 tutorials. Download Most up-to-date Microsoft TS:Windows 7,Configuring exam with real questions and answers and begin to learn Microsoft 70-680 with a classic professional.
Q291. - (Topic 2)
You are deciding on which storage devices you want to configure system protection. System protection is enabled by default on your C: drive, which holds your system files. No other storage device on your computer has system protection enabled.
On which of the following storage devices can you enable system protection? (Choose all that apply.)
A. Your second internal hard disk, formatted with NTFS
B. An external USB hard disk formatted with FAT
C. A USB flash drive
D. Your optical drive
E. A mounted VHD created on your second internal hard disk
Answer: A,E
Q292. - (Topic 6)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. From User Accounts, select Manage your file encryption certificates.
B. From Credential Manager, select Back up vault.
C. From BitLocker Drive Encryption, select Manage BitLocker and Turn On BitLocker.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: A
Explanation: Make sure you have a backup of the appropriate encryption certificates
Q293. - (Topic 1)
Federated Search connectors are installed using what method?
A. Purchase the Federated Search Installation Tool Pack online and buying individual search connectors from websites.
B. Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install.
C. Go to Microsoft's website. Only vendors who have signed up with the Microsoft Federated Search Tool Writers Guild can participate.
D. Go to Amazon.com and download the Shared Resource Kit for Federated Searches.
Answer: B
Q294. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008.
Computer1 and Server1 have IPv4 and IPv6 installed.
You need to identify whether you can connect to Server1 by using IPv6.
What should you do?
A. Run Ping Server1 -6.
B. Run Ping Server1- n 6.
C. Run Net view \\Server1.
D. Open \\server1 from the Run dialog box.
Answer: A
Explanation:
Ping The Ping tool is still widely used, although more firewalls block Internet Control Message Protocol (ICMP) echo requests than used to be the case. However, even if you cannot get past a firewall on your organization's network, Ping is still useful. You can check that the IPv4 protocol is working on a computer by entering ping 127.0.0.1. You can then ping the IPv4 address of the computer. You can find out what this is by using the Ipconfig tool. If your computer has more than one interface combined in a network bridge, you can ping the Ipv4 address of the network bridge. When you have established that you can ping your computer using an Ipv4 address, you can test that DNS is working internally on your network (assuming you are connected to a DNS server, a WAP, or have ICS configured on your network) by pinging your computer name—for example, entering ping canberra. Note that if DNS is not implemented on your system, ping canberra still works because the IPv6 link-local address resolves automatically. -6 Force using IPv6.
Q295. - (Topic 1)
You have a computer that runs Windows 7.
You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do?
A. From Windows Update, modify the Windows Update settings.
B. From the local Group Policy, modify the Windows Update settings.
C. From the System settings, modify the System Protection settings.
D. From the local Group Policy, modify the Location and Sensors settings.
Answer: B
Q296. - (Topic 6)
Your laptop has a 400 GB drive and currently reserves, by default, 2% (8 GB) for shadow copies.
You need to reserve more space for previous versions of files.
What should you do?
A. From System Properties, System Protection, expand the Max Usage to 20 GB.
B. From System Properties, System Protection, turn off system protection.
C. From Disk Properties, change the Quota Settings from 8 GB to 20 GB.
D. From an elevated command prompt, run vssadmin add shadowstorage /for=c: /on = c: /maxsize = 20gb.
Answer: A
Explanation: Control Panel->System and Security. >System [Properties]->System Protection->Configure
Q297. - (Topic 3)
You have a computer that runs Windows 7 Home Premium.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Perform a Windows Anytime Upgrade.
B. Download and run the Windows 7 Upgrade Advisor.
C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
Answer: A
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q298. - (Topic 1)
You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails.
You have two disks and unallocated space on your second disk.
What do you do?
A. Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.256
B. Create a RAID-0 volume.
C. Create a RAID-1 volume.
D. Create a RAID-5 volume.
Answer: C
Q299. - (Topic 3)
You need to configure a computer to encrypt all inbound connections by using IPSec.
What should you do?
A. From Network and Sharing Center, click Connect to a network.
B. From Network and Sharing Center, click Set up a new connection or network.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.
Answer: D
Explanation:
Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not.
Q300. - (Topic 2)
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer by using a local user account named User1.
Users report that they can log on to some secure Web sites by using credentials that were saved by other users.
You need to prevent forms-based credentials from being saved on the computer.
What should you do?
A. Remove all generic credentials from Windows Vault.
B. Remove all Windows credentials from Windows Vault.
C. Modify the Windows Internet Explorer certificates settings.
D. Modify the Windows Internet Explorer AutoComplete settings.
Answer: D
Explanation:
AutoComplete settings AutoComplete is a feature in Internet Explorer that remembers the information you have typed into the Address bar, web forms, or password fields, and which automatically fills in that information if you start to type the same thing again later. This saves you from having to type the same information over and over.