Exambible contains all the necessary Microsoft Microsoft training materials that you simply need to make full preparation for the true exam. We have earned a high status compared to additional competitors in the same market. Exambibles The idea professional experts write as well as revise our Microsoft Microsoft 70-680 exam braindumps periodically in order to keep tempo with the most up-to-date Microsoft 70-680 exam questions and answers.
Q31. HOTSPOT - (Topic 4)
A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that uses a preshared key for authentication.
You need to create the VPN connection on the client computers.
Which setting should you choose? (To answer, select the appropriate setting in the work area.)
Answer:
Q32. DRAG DROP - (Topic 6)
You are a systems administrator for a company that uses Windows 7 computers.
The company plans on upgrading all the computers. You have configured one computer, named SOURCE, with a power plan that meets a criteria for reduced power consumption. You want to test this power plan on another computer named DEST.
You need to transfer the power plan from SOURCE to DEST.
Which three actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q33. - (Topic 1)
Which of the following is not a volume type usable by Windows 7?
A. FAT
B. exFAT
C. NTFS
D. All of the above a volume types in Windows 7.
Answer: D
Q34. - (Topic 5)
You have a computer that runs Windows 7.
Your company has a corporate intranet Web site.
You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access Web pages on both the Internet and the intranet.
From the Tools menu, what should you do?
A. Click ActiveX Filtering.
B. Click Work Offline.
C. Click Compatibility View.
D. Point to SmartScreen Filter and then click Turn off SmartScreen Filter.
Answer: B
Q35. - (Topic 5)
You use a computer that has Windows 7 and Internet Explorer 8 installed.
You need to block all web content providers on the Internet from collecting and sharing your information with other websites.
What should you do?
A. From Manage Add-ons, disable all ActiveX and Java extensions.
B. From Internet Options, configure Privacy Settings for third-party cookies.
C. Enable InPrivate Filtering and select Automatically Block.
D. From Internet Options, add the web content provider to Restricted Sites.
E. Start an InPrivate Browsing session.
Answer: C
Q36. - (Topic 2)
You have a computer that runs windows 7.
The computer is configured as shown in the following table.
You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1.
You need to provide 40 GB of free space for the application.
What should you do?
A. Create a shortcut.
B. Create hard link.
C. Create a mount point.
D. Change the quota settings.
Answer: C
Explanation:
Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This "mounting" is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.
Q37. - (Topic 5)
A network has a main office and a branch office.
The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled.
Users at the branch office report that it takes several minutes to open large files located in the main office.
You need to minimize the amount of time it takes for branch office users to open files located in the main office.
What should you do?
A. At the branch office, configure the client computers to use BranchCache Hosted Cache mode.
B. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.
C. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers.
D. At the main office, configure the servers to use Distributed File System Replication (DFSR).
Answer: B
Q38. DRAG DROP - (Topic 4)
A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer.
You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user's files and settings.
Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q39. - (Topic 5)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
Include the CPU, Memory, and Disk subsystems.
Display real-time performance.
Obtain a list of users who have logged on by using the same tool.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: D
Q40. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file.
What should you use to accomplish this goal?
A. the User Account Control Settings Control Panel window
B. the Services management console
C. Device Manager
D. Local Users and Groups
E. the icacls command
F. the Group Policy management console
G. the folder Properties window
H. share permissions
I. the netsh command
Answer: F
Explanation:
Besides changing the notification behavior of UAC, you can also control the behavior of the UAC by using local or group policies. Local policies are managed from each local computer while group policies are managed as part of Active Directory.
Follow these steps to change UAC settings: Click Start, type secpol.msc in the Search programs and files box, and press Enter. From the Local Security Policy tree, click Local Policies and then double-click Security Options The UAC policies are at the bottom of the list. To modify a setting, simply double-click on it and make the necessary changes.