getcertified4sure.com

Examples of applocker 70-680




Actualtests provides your examinees with the free of charge downloadable 70-680 exam questions. You can please take a quiz to look at the questions and also answers quality involving ourMicrosoft Microsoft training materials before a person purchase it. It is furthermore helpful in your case to seek out your Microsoft exam weakness, then you certainly should perform harder on this in your later study. All the Microsoft certification study goods can be available at Actualtests website. Youll be able to download them with regard to free in accordance with your personal requirements.

2021 Nov mcts 70-680 exam:

Q81. - (Topic 3) 

You have three computers that run Windows 7. 

You use Windows PowerShell to perform remote administration tasks on all three computers. 

You need to remotely administer all three computers by using PowerShell. 

Which PowerShell cmdlet should you use? 

A. Enable-PSRemoting 

B. Enable-PSSessionConfiguration 

C. New-PSDrive 

D. New-PSSession 

Answer:

Explanation: 

New-PSSessionCreates a persistent connection to a local or remote computer. The New-PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows PowerShell establishes a persistent connection to the remote computer. Use a PSSession to run multiple commands that share data, such as a function or the value of a variable. To run commands in a PSSession, use the Invoke-Command cmdlet. To use the PSSession to interact directly with a remote computer, use the Enter-PSSession cmdlet. You can run commands on a remote computer without creating a PSSession by using the ComputerName parameters of Enter-PSSession or Invoke-Command. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used for the interactive session or for a single command and is then closed. 


Q82. - (Topic 2) 

You have a computer that runs Windows 7. The computers hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a system image. 

B. Create a system repair disc. 

C. Shrink C and then create a new partition. 

D. Connect an external hard disk to the computer. 

Answer: A,D 

Explanation: 

A System Image is a copy of all the files and folders on the system disk (and other specified hard disks) on a computer. You can use a System Image backup to restore the computer to exactly what its configuration was when the System Image backup was created. 

External hard drives can be removed and stored in a secure location.NOT System Repair Disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It does not actually save the data and will only help if a system image exists elsewhere.NOT Shrink: All partitions are inaccessible is a hard disk fails. 


Q83. HOTSPOT - (Topic 5) 

You need to uninstall a Windows update from a computer that runs Windows 7. 

Which Control Panel item should you use? (To answer, select the appropriate item in the Control Panel in the answer area.) 

Answer: 


Q84. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the net command. 

C. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:


Q85. - (Topic 1) 

Which of the following is not a rating for games in Windows 7? 

A. General Audience (G) 

B. Everyone (E) 

C. Teen (T) 

D. Adults Only (AO) 

Answer:


Abreast of the times exam 70-680 windows 7 configuration pdf:

Q86. - (Topic 4) 

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy. 

A user indicates that he is unable to connect to a remote FTP server. 

You need to view the status of TCP/UDP ports at the user's computer. 

Which command should you run? 

A. netstat -o 

B. netstat -a 

C. ipconfig /all 

D. netstat –an 

Answer:


Q87. - (Topic 2) 

You have a computer that runs windows 7. 

You log on to the computer by using a user account that is a member of Administrator Group. 

From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. 

You attempt to save the file and receive the save as dialog box. 

You need to ensure that you can save changes to c:\windows\system32\drivers\ 

What should you do? 

A. Stop the windows search service 

B. Remove the inherited permissions from the file. 

C. Start Windows Notepad by using elevated privileges. 

D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer. 

Answer:

Explanation: 

Windows 7 does not allow applications to write data to these secure locations. 

User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when 

the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC 


Q88. HOTSPOT - (Topic 6) 

You work with Windows 7 computers. 

Your company has a policy of not allowing software to be upgraded without proper authorization from the managers. 

You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.) 

Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. ) 

Any upgrades or change to the WinWord.exe will result in the program not operating. 

When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.) 

Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. ) 

Answer: 


Q89. - (Topic 1) 

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. 

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. 

A file server named Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Minimize network traffic between the main office and the branch office 

. Ensure that Computer1 can only access resources in Share1 while it is connected to the network. 

What should you do? 

A. On Computer1, enable offline files. 

B. On Computer1, enable transparent caching. 

C. On Server1, configure DirectAccess. 

D. On Server1, configure Share1 to be available offline. 

Answer:

Explanation: 

Transparent Caching When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline. 


Q90. - (Topic 1) 

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. 

What should you do? 

A. Install a computer certificate. 

B. Create a new network connection. 

C. Enable the Network Discovery firewall exception. 

D. Add the computer account to the Network Configuration Operators group. 

Answer:

Explanation: 

Certificates The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication.DirectAccess Client Configuration Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer's client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates.