Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(111-120)!

QUESTION 111
The Aero Shake feature will work if which of the following conditions are met? Choose Two.

A.    A display adapter compatible with WDDM is installed.
B.    Aero features are downloaded from Microsoft.
C.    The windows experience index is at least 2.
D.    The Windows Experience Index is 3 or greater.

Answer: AD

QUESTION 112
You manage a computer that runs Windows 7. You are tasked to identify which applications were installed during the last week.
What Windows component would you use to find this information? Choose two.

A.    Check the Windows System Change Log in the Control Panel.
B.    View the events in the Applications Log under Windows Logs in the System and Security component
section of the Control Panel.
C.    Review the informational events from Reliability Monitor.
D.    Check the Windows System Diagnostics Report under the Performance Monitor MMC.

Answer: BC

QUESTION 113
Which of the following Windows 7 Editions allows you to join an Active Directory domain? Choose three.

A.    Windows Home Edition
B.    Windows Professional Edition
C.    Windows Ultimate Edition
D.    Windows Enterprise Edition

Answer: BCD
Explanation:
 clip_image002[3]

QUESTION 114
All the games including Titan Chess come with which versions of Windows 7? Choose two.

A.    Windows Home Edition
B.    Windows Professional Edition
C.    Windows Ultimate Edition
D.    Windows Enterprise Edition

Answer: CD

QUESTION 115
Which of the following is not a minimum requirement to install Windows 7?

A.    1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor
B.    4 GB RAM (32-bit)/2 GB RAM (64-bit)
C.    16 GB available disk space (32-bit)/20 GB (64-bit)
D.    DirectX 9 graphics processor with WDDM 1.0 or higher driver

Answer: B

QUESTION 116
Which of the following is not a rating for games in Windows 7?

A.    General Audience (G)
B.    Everyone (E)
C.    Teen (T)
D.    Adults Only (AO)

Answer: A

QUESTION 117
In Windows 7 you can control when users such as kids can login to Windows 7. Which of the following best describes where to configure this option?

A.    You cannot choose this feature unless you are connected to a domain.
B.    Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then
choose Time Restrictions.
C.    Go to Start, Control Panel. User Profiles, and then Time Restriction Settings.
D.    Go to the Homegroup settings and choose Offline Time Settings.

Answer: B

QUESTION 118
Which of the following best describes how the user is alerted with information system and configuration alerts?

A.    A popup occurs and the Windows 7 desktop contrast is dimmed. Until you acknowledge the alert the
screen will not move.
B.    If Aero is installed the shaking alert flag appears in the index bar of every open window.
C.    A flag in the taskbar with a red “x” indicates there is a problem needing attention.
D.    All of the above.

Answer: C

QUESTION 119
If you have a router in the network your connected to and the Default Gateway is set to 192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network?

A.    192.168.1.1
B.    192.168.1.300
C.    192.168.1.30
D.    192.168.2.10

Answer: C

QUESTION 120
Which of the following is true of Windows 7?

A.    MailCentral is included as the new default mail client with Windows 7.
B.    Outlook Express is included with Windows 7.
C.    Microsoft Outlook is included with Windows 7.
D.    There is no preinstalled mail client included with Windows 7.

Answer: D

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump: http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(101-110)!

QUESTION 101
You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User1 uses Encrypting File System (EFS) to encrypt a file. User1 tries to grant User2 access to the file as shown in the exhibit. (Click the Exhibit button.)
You have to make sure that User1 is able to grant User2 access to the file. What action should you perform to make sure of this?
 clip_image001[1]

A.    Instruct User2 to log on to the computer and take ownership of the file.
B.    Instruct User2 to log on to the computer and encrypt a file.
C.    Instruct User1 to export his certificate to a certificate (.cer) file.
D.    Instruct User1 to move the file to a shared folder on the computer.

Answer: B

QUESTION 102
You have a computer that runs Windows 7.
You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do?

A.    From Windows Update, modify the Windows Update settings.
B.    From the local Group Policy, modify the Windows Update settings.
C.    From the System settings, modify the System Protection settings.
D.    From the local Group Policy, modify the Location and Sensors settings.

Answer: B

QUESTION 103
You plan to install Windows 7 by using a Windows 7 DVD. You need to perform an automated installation of Windows 7. What should you do?

A.    Create an answer file named oobe.xml. Copy the file to a network share.
B.    Create an answer file named winnt.sif. Place the file on a removable drive.
C.    Create an answer file named sysprep.inf. Copy the file to a network share.
D.    Create an answer file named autounattend.xml. Place the file on a removable drive.

Answer: D

QUESTION 104
You have a computer that runs Windows 7.
You perform an image backup. A virus infects the computer and causes the computer to become unresponsive. You need to restore the computer as quickly as possible. What should you do?

A.    Start the computer by using the Last Known Good Configuration feature.
B.    Start the computer from the Windows 7 DVD and then use the Startup Repair tool.
C.    Start the computer from the Windows 7 DVD and then use the System Image Recovery tool.
D.    Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe.

Answer: C

QUESTION 105
You have a computer that runs Windows 7. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What should you do?

A.    From the local Group Policy, modify an application control policy.
B.    From Control Panel, modify the BitLocker Drive Encryption settings.
C.    From Device Manager, modify the settings of all removable devices.
D.    From the local Group Policy, modify a removable storage access policy.

Answer: D

QUESTION 106
You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. You need to create a policy that allows only applications that have been digitally-signed by the company to run. What should you create?

A.    An AppLocker executable rule
B.    An AppLocker Windows Installer rule
C.    A software restriction policy and a certificate rule
D.    A software restriction policy and a hash rule

Answer: A

QUESTION 107
A user wants to install the games included with Windows 7 on his PC. They were not installed by default. Windows components can be added or removed using which of the following in Windows 7.

A.    Click the Start Bar, Control Panel, Add/Remove Programs, and click Windows Components.
B.    Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off.
C.    Click the Start Bar, Settings, Windows Control Center.
D.    Right-click the “My Computer” icon, Choose Properties, Choose Computer Management, on the left
pane choose Add Remove Windows Components.

Answer: B

QUESTION 108
You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? Choose three.

A.    Run setup.exe from the DVD to start the Windows 7 installation.
B.    Use the autorun feature on the DVD to start the installation.
C.    Perform a full installation of Windows 7.
D.    Perform and upgrade of Windows 7 keeping all the Windows XP settings.

Answer: ABC

QUESTION 109
Federated Search connectors are installed using what method?

A.    Purchase the Federated Search Installation Tool Pack online and buying individual search connectors
from websites.
B.    Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install.
C.    Go to Microsoft’s website. Only vendors who have signed up with the Microsoft Federated Search Tool
Writers Guild can participate.
D.    Go to Amazon.com and download the Shared Resource Kit for Federated Searches.

Answer: B

QUESTION 110
Which of the following is not a volume type usable by Windows 7?

A.    FAT
B.    exFAT
C.    NTFS
D.    All of the above are volume types in Windows 7

Answer: D

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(91-100)!

QUESTION 91
Which of the following must you download from Microsoft’s Web site to obtain USMT 4.0?

A.    Windows Anytime Upgrade
B.    Windows Upgrade Advisor
C.    WAIK
D.    Microsoft Toolkit

Answer: C
Explanation:
User State Migration Tool
USMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

QUESTION 92
Which Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts?

A.    OobeSystem
B.    AuditSystem
C.    Specialize
D.    OfflineServicing

Answer: A

QUESTION 93
You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails. You have two disks and unallocated space on your second disk. What should you do?

A.    Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.
B.    Create a RAID-0 volume.
C.    Create a RAID-1 volume.
D.    Create a RAID-5 volume.

Answer: C

QUESTION 94
You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table:
 clip_image001
You need to test the connection to the IPv6 address from Computer1 to Computer2. Which command should you run?

A.    Ping -6 fe80::44df:1b68%12
B.    Ping -6 fe80::44df:1b68%10
C.    Ping -R fe80::44df:1b68%12
D.    Ping -R fe80::44df:1b68%10

Answer: B
Explanation:
If you are pinging from one host to another using link-local addresses, you also need to include your interface ID, for example ping
fe80::39cd:4c93%10.
The % character followed by a number after each IPv6 address is the interface ID. If you want to display the configuration of the IPv6 interfaces on the local computer, you can enter netsh interface ipv6 show address.
Ping -6
Force using IPv6.

QUESTION 95
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
– IP address: 10.1.1.193
– Subnet mask: 255.255.0.0
– Default gateway: 10.1.1.194
– Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet. What should you do?

A.    Delete the default gateway address.
B.    Delete the preferred DNS server IP address.
C.    Configure the subnet mask to use 255.255.255.0.
D.    Configure the subnet mask to use 255.255.255.192.

Answer: A
Explanation:
Why gateways work
Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts–either a dedicated router or a computer that connects two or more network segments–maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.

QUESTION 96
You are running Windows 7 on a portable computer. A custom power plan named “On The Move” is optimized for battery life. The computer remains running when the portable computer is closed. You need to change a setting so that when you close the portable computer, it enters sleep mode. Which setting should you change? (To answer, select the appropriate setting in the work area.)
 clip_image002
Answer:
 clip_image002[6]

QUESTION 97
You have a computer that runs Windows 7. You need to modify the file extensions that are associated to Internet Explorer. What should you do?

A.    From Internet Explorer, click Tools and then click Manage Add-ons.
B.    From Control Panel, open Default Programs and then click Set Associations.
C.    From the local Group Policy, expand Computer Configuration and then click Software Settings.
D.    From Window Explorer, right-click %programfiles%\Internet Explorer\iexplore.exe and then click Properties.

Answer: B

QUESTION 98
You have a computer that runs Windows 7.
You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can establish a DirectAccess connection to the network.
What should you do first?
 clip_image002[8]

A.    Create a new VPN connection.
B.    Configure a static IPv4 address.
C.    Enable IPv6 on the network adapter.
D.    Add an additional default gateway address.

Answer: C

QUESTION 99
You have a computer that runs Windows 7. You discover that an application named App1 runs during the startup process. You need to prevent only App1 from running during startup. Users must be allowed to run App1 manually. What should you do?

A.    From the local Group Policy, modify the application control policy.
B.    From the local Group Policy, modify the software restriction policy.
C.    From the System Configuration tool, select Diagnostic Startup.
D.    From the System Configuration tool, modify the Startup applications.

Answer: D

QUESTION 100
You are in charge of two computers that are respectively named Computer1 and Computer2. Computer1 runs Windows 7 and Computer2 runs Windows XP Professional.
On Computer1, you enable Remote Desktop as shown in the Remote Desktop exhibit. (Click the Exhibit button.)
 clip_image001[6]
Later you log on to Computer2 and try to connect to Computer1 by using Remote Desktop. The connection fails and you receive the error message shown in the Remote Desktop Disconnected exhibit. (Click the Exhibit button.)
 clip_image001[8]
You need to ensure, that you can connect to Computer1 by using Remote Desktop. What action should you perform?

A.    On Computer1, enable the Allow connections from computers running any version of Remote Desktop setting.
B.    On Computer2, assign the Client (Respond Only) IPSec policy.
C.    On Computer1, add your user account to the Remote Desktop Users group.
D.    On Computer2, create a firewall exception for the Remote Desktop Protocol (RDP).

Answer: A

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(81-90)!

QUESTION 81
Your company has a main office and a branch office. A portable computer runs Windows 7. On the computer, you configure a printer for each office.
You need to configure printing on the computer to meet the following requirements:
– When you are located in the main office, all documents must automatically print to the main office printer.
– When you are located in the branch office, all documents must automatically print to the branch office printer.
What should you do?

A.    From Location and Other Sensors, configure a default location.
B.    From Devices and Printer, configure the Manage Default Printers settings.
C.    From Region and Language, modify the Location settings.
D.    From Network and sharing Center, configure the network location.

Answer: B

QUESTION 82
You have a stand-alone computer that runs Windows 7. You open Windows Update as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can manually change the Windows Update settings on the computer. What should you do?
Windows Update (exhibit):
 clip_image002[13]
Windows Update (exhibit):
 clip_image002[15]

A.    Log on to Windows 7 as member of the Administrators group.
B.    From the local Group Policy, modify the Windows Update settings.
C.    Right-click Windows Update and select Run as administrator.
D.    Right-click the command prompt, select Run as administrator, and then run Wuapp.exe.

Answer: B
Explanation:
Configuring Automatic Updates by using local Group Policy
1. Click Start, and then click Run.
2. Type gpedit.msc, and then click OK.
3. Expand Computer Configuration.
4. Right-click Administrative Templates, and then click Add/Remove Templates.
5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open.
6. Click Close.
7. Under Computer Configuration, expand Administrative Templates, expand Windows
 clip_image002[17]
Components, and then expand Windows Update.

QUESTION 83
You have a reference computer that runs Windows 7.
You plan to create an image of the computer and then deploy the image to 100 computers.
You need to prepare the reference computer for imaging. What should you do before you create the image?

A.    Run Package Manager.
B.    Run the System Preparation tool.
C.    Install the User State Migration Tool.
D.    Install Windows Automated Installation Kit.

Answer: B
Explanation:
Sysprep
Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows?XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and computer-specific settings, as well as log files. The reference installation now is complete and ready to be imaged.

QUESTION 84
You have a standalone computer that runs Windows 7.
You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer. What should you do?

A.    From Control Panel, modify the default settings for media and devices.
B.    From Control Panel, modify the default settings for device installation.
C.    From the local computer policy, modify the application control policies.
D.    From the local computer policy, modify the Microsoft Management Console (MMC) settings.

Answer: D
Explanation:
Controlling MMC usage by using local Group Policy
To control MMC usage by using local Group Policy
11. Open MMC 3.0.
12. On the File menu, click Add/Remove Snap-in.
13. In the Available snap-ins list, click the Group Policy editor, and then click Add.
14. In the Select Group Policy Object wizard, use the default setting, Local Computer, in the Group Policy Object field.
15. Click Finish to close the Select Group Policy Object wizard.
16. By default, all available snap-in extensions are enabled. If you want to enable only certain extensions, highlight the snap-in in the Selected snap-ins list, and then click Edit Extensions.
17. By default, snap-ins load as child objects of the Console Root node. Click Advanced to modify this behavior and allow you to choose a different parent snap-in.
18. In the Add or Remove Snap-ins dialog box, click OK.
19. Before closing the new console, perform any of these procedures:
– To restrict access to author mode in MMC
– To restrict access to a permitted list of snap-ins
– To permit or restrict access to a snap-in

QUESTION 85
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
A user named User1 attempts to access a Web page. User1 fails to access the Web page and receives an error message stating that the page does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating. Which settings should you modify?

A.    Content Advisor
B.    InPrivate Filtering
C.    Parental Controls
D.    Restricted Sites

Answer: A
Explanation:
Using Content Advisor to help block inappropriate web content The Internet is a great resource for children, offering a wealth of information and experiences. However, it can also expose children to information that might not be appropriate for them. Content Advisor allows you to control the types of Internet content that can be viewed on your computer. Depending on how you configure it, Content Advisor uses ratings that websites voluntarily provide to block or allow certain content. Because not all websites are rated, unrated websites are automatically blocked (but you can choose to allow them). Once you’ve adjusted the settings and turn Content Advisor on, it checks websites as you visit them. To use Content Advisor, you first need to create the supervisor password, and then you can specify the filters and rules you want applied to your children’s web use. To change settings, you’ll need to log in with the supervisor password before you can make changes. The following procedures describe how to create or change your supervisor password, and how to make specific changes to control Internet use.
To allow unrated sites
By default, content advisor will block unrated websites. To allow unrated sites to be viewed, follow the steps below.
9. Click to open Internet Explorer.
10. Click the Tools button, and then click Internet Options.
11. Click the Content tab, and then, under Content Advisor, click Settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
12. In the Supervisor Password Required dialog box, type your password, and then click OK.
13. In the Content Advisor dialog box, click the General tab.
14. Under User options

QUESTION 86
Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed?

A.    BranchCache
B.    Aero Glass
C.    DirectAccess
D.    ReadyBoost

Answer: D

QUESTION 87
To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)?

A.    Windows 7 Home Professional (x86)
B.    Windows 7 Ultimate (x86)
C.    Windows 7 Ultimate (x64)
D.    Windows 7 Enterprise (x64)

Answer: B
Explanation:
Windows 7 Upgrade paths:
http://technet.microsoft.com/en-us/library/dd772579%28v=ws.10%29.aspx The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons:
All versions are support Hardware wise.
Requirements:
Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory a 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space a graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory XP Mode
Windows XP Mode is a downloadable compatibility option that is available for the Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory
The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 Professional
Windows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.
Windows 7 Enterprise and Ultimate Editions
The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.

QUESTION 88
A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate?

A.    Sysprep
B.    Windows PE
C.    WDS
D.    Windows Anytime Upgrade

Answer: D
Explanation:
Windows Anytime Upgrade
With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
 clip_image002[19]

QUESTION 89
Which of the following tools can you use to determine if the applications installed on your computer running Windows Vista are known to have problems with Windows 7?

A.    Windows 7 Upgrade Advisor
B.    Sysprep
C.    USMT
D.    Windows PE

Answer: A
Explanation:
Windows 7 Upgrade Advisor
Prior to attempting to perform the upgrade from Windows Vista to Windows 7, you should run the Windows 7 Upgrade Advisor. The Windows 7 Upgrade Advisor is an application that you can download from Microsoft’s Web site that will inform you if Windows 7 supports a computer running the current hardware and software configuration of Windows Vista.
Prior to running the Windows 7 Upgrade Advisor, you should ensure that all hardware that you want to use with Windows 7, such as printers, scanners, and cameras, are connected to the computer. The Upgrade Advisor generates a report that informs you of which applications and devices are known to have problems with Windows 7.

QUESTION 90
Which of the following operating systems support an offline migration using USMT? Choose three.

A.    Windows 2000 Professional
B.    Windows XP Professional
C.    Windows Vista
D.    Windows 7

Answer: BCD

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(71-80)!

QUESTION 71
A company has client computers that run Windows 7. You create an AppLocker policy for the client computers.
You need to ensure that the AppLocker policy is enforced after the computers restart.
Which service startup type should you use? (To answer, select the appropriate setting or settings in the work area.)
 

_J)1YSX5}12OBI64I@@L{%9

Answer:
 clip_image001[4]

QUESTION 72
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache.
The branch office with the client computers has a slow network connection to the office with the file server. Users complain of poor performance when connecting to the file server from their client computers.
You need to verify that the client computers are configured to be BranchCache clients.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    Device Manager
B.    The Local Users and Groups
C.    Share Permissions
D.    The Folder Properties window
E.    The Netsh command
F.    The Icacls command
G.    The Services Management console
H.    The Group Policy Management console
I.    The User Account Control Settings Control Panel window

Answer: EH
Explanation:
To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode.
To create a GPO, enable BranchCache, and select the cache mode Click Start, point to Administrative Tools, and click Group Policy Management Console.
Client configuration using netsh
When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command.

QUESTION 73
You are running Windows 7 on a portable computer. A custom power plan named “On The Move” is optimized for battery life. The computer enters sleep mode when the portable computer is closed.
You need to change a setting so that when you close the portable computer, nothing happens. Which setting should you change? (To answer, select the appropriate setting in the work area.)
  clip_image002[1]
Answer:
 clip_image002[3]

QUESTION 74
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.
You are preparing to capture an image of a Windows 7 client computer.
You need to ensure that the captured image is generic and does not contain the device drivers from the client computer.
What should you do?

A.    Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
B.    Run the Start /w ocsetup command.
C.    Run the PEImg /Prep command.
D.    Run the Dism command with the /Mount-Wim option.
E.    Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
F.    Run the Dism command with the /Add-Driver option.
G.    Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
H.    Run the BCDEdit /delete command.
I.    Run the ImageX command with the /mount parameter.
J.    Run the Dism command with the /Add-Package option.
K.    Add a boot image and create a capture image in WDS.
L.    Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
M.    Run the Diskpart command and the attach command option.

Answer: L
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the Sysprep command with the /generalize option by specifying the PersistAllDeviceInstalls setting in the Microsoft-Windows- PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm).
http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx

QUESTION 75
You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7.
How do you fix this issue? (To answer, select the appropriate setting in the work area.)
  clip_image001[6]
Answer:
 clip_image001[8]

QUESTION 76
Note: This QUESTION is part of a series of QUESTIONs that use the same set of answer choices. Ananswer choice may be correct for more than one QUESTION in the series.
You have a computer running Windows 7.
You create a VHD and install Windows 7 in it.
You reboot your system and notice that the boot menu now shows two installations of Windows 7.
How do you fix it?

A.    Use Sysprep with an answer file to disable one installation.
B.    Run the BCDEdit command.
C.    Run the Start /w ocsetup command.
D.    Run the Dism command.
E.    Add a boot image and create a capture image in WDS.
F.    Run the PEImg /prep command.
G.    Run the ImageX command with the /mount parameter.
H.    Run the Dism command with the /Mount-Wim option.
I.    Run the Dism command with the /Add-Package option.
J.    Run the Diskpart command and the attach command option.
K.    Add a boot image and create a capture image in WDS.

Answer: B
Explanation:
BCDEdit Command-Line Options
Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements:
BCDEdit exposes a wider range of boot options than Bootcfg.exe.
BCDEdit has improved scripting support.
Note
Administrative privileges are required to use BCDEdit to modify BCD. BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder.
BCDEdit is limited to the standard data types and is designed primarily to perform single common changes to BCD. For more complex operations or nonstandard data types, consider using the BCD Windows Management
Instrumentation (WMI) application programming interface (API) to create more powerful and flexible custom tools.

QUESTION 77
A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. A rule in Windows Firewall with Advanced Security allows communication.
The user cannot connect to the database on the currently defined protocol due to an error in protocol type.
You need to ensure that users can connect to the database. Which setting should you choose? (To answer, select the appropriate setting in the work area.)
  clip_image001[10]
Answer:
clip_image001[12] 

QUESTION 78
A network contains computers that run Windows 7 and Windows Vista.
A computer named Computer1 runs Windows 7.
You need to ensure that only users running Windows 7 and Windows Vista can connect to Computer1 using Remote Desktop.
In the System Properties window, on the Remote tab, what should you do?

A.    Click the Advanced button. Select the Allow this computer to be controlled remotely check box on Computer1.
B.    Select the Allow connections only from computers running Remote Desktop with Network Level Authentication
(more secure) check box on Computer1.
C.    Select the Allow connections from computers running any version of Remote Desktop (less secure) check box
on Computed.
D.    Select the Allow Remote Assistance connections to this computer check box on Computer1.

Answer: B

QUESTION 79
You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2- Enterprise Security. The company’s security policy requires multifactor authentication for the portable computers.
You need to manually configure each portable computer to meet the following requirements:
Users must provide multifactor authentication. The Server Certificate held on the portable computers must match the certificate held on the server.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
  clip_image002[5]
Answer:
  clip_image002[9]
QUESTION 80
You administer Windows 7 Enterprise computers in your company network.
All computers are deployed from a single Windows image (.wim). You want to deploy the .wim file to newly purchased computers by Windows Deployment Services (WDS).
You need to protect an administrator account password used for deployment in an answer file. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
  clip_image002[7]
Answer:

clip_image002[11]

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(61-70)!

QUESTION 61
You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. You need to create a new EFS key. Which command should you run?

A.    Certutil -GetKey
B.    Cipher.exe /k
C.    Lcacls.exe /r
D.    Syskey.exe

Answer: B
Explanation:
Cipher
Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is “deallocated.” After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.

QUESTION 62
You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share.
You need to identify whether you are working on an offline version of a file.
What should you do?

A.    From Sync Center, click View sync partnerships.
B.    From Action Center, click View archived messages.
C.    From Windows Explorer, select the file and then view the toolbar.
D.    From Windows Mobile Device Center, click the Connection settings.

Answer: C
Explanation:
To find out whether you’re working offline: Offline files turn on automatically if you lose your network connection. A copy of your file is copied to your computer, and once your network connection is re-established, the two copies will be synchronized. To find out if you’re working offline, do the following.
1. Open the network folder that contains the file you are working on.
2. Check the Details pane at the bottom of the window for the status. If the status is offline, you are working with a copy of the file on your computer. If the status in online, you are working with the file on the network.

QUESTION 63
You have a computer that runs Windows 7.
You mark a folder as Always available offline.
You need to verify that an offline copy of the folder has been created on the computer. What should you do?

A.    Open Sync Center and review the status.
B.    Open Action Center and review any messages or issues.
C.    Open Windows Mobile Device Center and review the status.
D.    Open Network and Sharing Center and review the status for the local area connection.

Answer: A
Explanation:
What is Sync Center?Sync Center allows you to check the results of your recent sync activity if you’ve set up your computer to sync files with a network server. This allows you to access copies of your network files even when your computer isn’t connected to the network. Sync Center can tell you if the files synced successfully or if there are any sync errors or warnings.
NoteSync Center is designed to help you sync with files in network locations. If you want to sync a mobile device with your computer, such as a mobile phone or portable music player, Windows gives you several other options. You can install the sync software that some manufacturers include with their device, or you can use the new Device Stage feature in this version of Windows if your device supports this feature. For more information, see Sync music, pictures, contacts, and calendars with a mobile device.

QUESTION 64
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server. The external firewall has TCP port 80 and TCP port 443 open for remote access connections.
You have a home computer that runs Windows 7.
You need to establish secure remote access connection from the home computer to the remote access server.
Which type of connection should you configure?

A.    IPSec
B.    L2TP
C.    PPTP
D.    SSTP

Answer: D
Explanation:
Secure Socket Tunneling Protocol
Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP- TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.

QUESTION 65
You have a computer that runs Windows 7.
You need to record when an incoming connection is allowed through Windows firewall.
What should you do?

A.    In Local Group Policy, modify the audit policy.
B.    In Local Group Policy, modify the system audit policy.
C.    From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful
connections.
D.    From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode) IPSec
settings to Advanced.

Answer: C
Explanation:
Customize Logging Settings for a Firewall Profile
Windows Firewall with Advanced Security can be configured to log events that indicate the successes and failures of its processes. The logging settings involve two groups of settings: settings for the log file itself and settings that determine which events the file will record. The settings can be configured separately for each of the firewall profiles. You can specify where the log file will be created, how big the file can grow, and whether you want the log file to record information about dropped packets, successful connections, or both. Log successful connectionsUse this option to log when Windows Firewall with Advanced Security allows an inbound connection. The log records why and when the connection was formed. Look for entries with the word ALLOW in the action column of the log.

QUESTION 66
Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. You have a computer named Computer1
that runs Windows 7. Computer1 is configured to obtain updates from Server1.
You open the WSUS snap-in on Server1 and discover that Computer1 does not appear.
You need to ensure that Computer1 appears in the WSUS snap-in. What should you do?

A.    On Server1, open Windows Update then select Check for updates.
B.    On Server1, run Wsusutil.exe and specify the /import parameter.
C.    On Computer1, open Windows Update and then select Change settings.
D.    On Computer1, run Wuauclt.exe and specify the /detectnow parameter.

Answer: D
Explanation:
wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic
Update client installed, run the following command at the command prompt:
wuauclt.exe /detectnow

QUESTION 67
You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. (Click the Exhibit button.)
You discover that standard users are never notified when updates are available.
You need to ensure that standard users are notified when updates are available.
What should you do?
 clip_image002

A.    Select Allow all users to install updates on this computer.
B.    Specify an intranet Microsoft update service location in Group Policy.
C.    Change the Startup Type for the Windows Update service to Automatic.
D.    Select Give me recommended updates the same way I receive important updates.

Answer: A
Explanation:
Change how Windows installs or notifies you about updates You can set Windows to automatically install important and recommended updates or to install important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address noncritical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically. If you don’t want updates to be installed automatically, you can choose to be notified when updates apply to your computer instead. Then, you can download and install them yourself, or you can set Windows to automatically download updates, and then notify you so you can install them yourself. Here’s how to change how Windows installs or notifies you about updates:
1. Click to open Windows Update.
2. In the left pane, click Change settings.
3. Under Important updates, click one of the following:
4. To schedule your automatic updates, next to Install new updates, select the day and time you want updates to occur. – Install updates automatically (recommended)
– Download updates but let me choose whether to install them
– Check for updates but let me choose whether to download and install them
– Never check for updates (not recommended)
5. To get recommended updates for your computer, under Recommended updates, select the Give me recommended updates the same way I receive important updates check box.
6. To allow anyone using the computer to make updates, select the Allow all users to install updates on this computer check box. This applies only to updates and software that are installed manually; automatic updates will be installed regardless of the user.
7. Click OK. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

QUESTION 68
You have a computer that runs Windows 7.
Your computer’s disk configuration is shown in the exhibit.
(Click the Exhibit button.)
You need to ensure that you can create a striped volume on the computer.
What should you do?
 clip_image002[4]

A.    Add an additional hard disk.
B.    Convert all disks to dynamic disks.
C.    Install a digitally-signed disk driver.
D.    Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.

Answer: B
Explanation:
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost.
You can create striped volumes only on dynamic disks. Striped volumes cannot be extended.
You can create a striped volume onto a maximum of 32 dynamic disks.
Backup Operator or Administrator is the minimum membership required to complete the actions below.
Creating a striped volume
Using the Windows interface
Using a command line
To create a striped volume using the Windows interface In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume….
Follow the instructions on your screen.
To create a striped volume using a command line
Open a command prompt and type diskpart.
At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume.
At the DISKPART prompt, type create volume stripe [size=<size>] [disk=<disknumber>[,[<seconddisknumber>,
…]].

QUESTION 69
You have a computer that runs Windows 7. The computer is configured to automatically download and install updates. You install Microsoft Office 2007.
You need to ensure that service packs for Office are automatically installed.
What should you do?

A.    From Windows Update, select Restore hidden updates.
B.    From Windows Update, select Get updates for other Microsoft products.
C.    Create a folder named Updates in C:\Program Files\Microsoft Office. Install the Office Update Inventory
Tool into the Updates folder.
D.    Download and install the Office 2007 administrative template and disable the Block updates from the Office
Update Site from applying policy.

Answer: B
Explanation:
Use Windows Update to Check for Updates to other Microsoft Products By default, Windows Update can download and install updates for Windows 7 and features that are part of the operating system (such as Internet Explorer). You can also merge the functionality of Microsoft Update–a service for managing updates to Microsoft Office and several other Microsoft products–into Windows Update so that you no longer need to visit Office Online to get updates.If you do not already have Windows Update integrated with Microsoft Update, you will see the message “Get updates for other Microsoft products” on the Windows Update home page. To enable checking for other products, click the Find Out More option shown beside this message. This will take you to the Microsoft Update site for some quick installation steps. You only need to do this once. Thereafter, the Windows Update home page will indicate that you receive updates “For Windows and other products from Microsoft Update.”

QUESTION 70
You need to uninstall a Windows update from a computer that runs Windows 7. Which Control Panel item should you use?

A.    Administrative Tools
B.    Programs and Features
C.    Sync Center
D.    Troubleshooting

Answer: B

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(51-60)!

QUESTION 51
You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table:
  clip_image001[10]
You install a new 250-GB hard disk in the computer. You need to ensure that all the files on the computer are available if a single disk fails. What should you do?

A.    Create a mount point on C and D and then create a striped volume.
B.    Create a mount point on C and D and then create two striped volumes.
C.    Convert both disks to dynamic disks and then create a mirrored volume.
D.    Convert both disks to dynamic disks and then create two mirrored volumes.

Answer: D
Explanation:
Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk.
You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk.

QUESTION 52
You have two portable computers that run Windows 7. The computers are not connected to a network. The computers are configured as shown in the following table:
  clip_image002
You need to transfer a 1 GB file from Computer1 to Computer2. What should you do first?

A.    On Computer1, create a wireless ad hoc network.
B.    On Computer2, configure the Bluetooth File Transfer Wizard to send files.
C.    On Computer2, create a network profile to connect to a network named Homegroup.
D.    On Computer1, configure the computer to be a member of a workgroup named Homegroup.

Answer: A
Explanation:
Wireless Ad Hoc network
You can set up a temporary wireless network, or ad hoc network, between two or more computers running Windows 7 (or between computers running Windows 7 and Windows Vista) provided they are all within 30 feet (9 meters) of each other. A WAP is not required to set up an ad hoc network. This enables users to share folders and other resources without needing to connect to an organizational network. On the first computer on the network, you open Network And Sharing Center and click Set Up A New Connection Or Network. You then choose the option Set Up A Wireless Ad Hoc (Computer To Computer) Network. You give the network a name and (if you want) set up a security key so that users joining the network need to supply a password. For WEP, this can be 5 case-sensitive characters, 13 case-sensitive characters, 10 hexadecimal caseinsensitive characters, or 26 hexadecimal case-insensitive characters, depending on security considerations. (If you choose WPA-2 Personal, you can insist on a 64-character password, but by the time everyone has typed it in correctly, the meeting would probably be over.)BluetoothWindows supports Bluetooth version 1.1 and later versions. Windows does not support Bluetooth version 1.0 because that specification lacks several critical updates that Windows requires to support Bluetooth wireless technology well.

QUESTION 53
You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.) You need to install Windows 7 in a dual-boot configuration. What should you do?
 

D9ANMKGP5`@]H5}LMUIABXA

A.    From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1.
B.    From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1.
C.    Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1.
D.    Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.

Answer: D
Explanation:
The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive.
To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB.
Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive.
When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows
7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft.

QUESTION 54
You have a computer that runs Windows 7. The computer is in a workgroup.
You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A.    From Credential Manager, select Back up vault.
B.    From User Accounts, select Create a password reset disk.
C.    From User Accounts, select Manage your file encryption certificates.
D.    From Authorization Manager, modify the Authorization Manager options.

Answer: BC
Explanation:
Password reset disks
It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user’s password. In the process, the following information was lost: E- mail that was encrypted with the user’s public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate
1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts.
2. In the left pane, click Manage your file encryption certificates.
3. In the Encrypting File System wizard, click Next.
4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate you want to back up.
5. Click Back up the certificate and key now.
6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive.
7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password.
8. Select the I’ll update my encrypted files later check box, and then click Next.

QUESTION 55
You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message:
“The Graphics rating for the system is poor and may be the cause of performance problems.”
You need to increase the graphics performance of the computer without modifying the current hardware or drivers.
What should you do?

A.    From Personalization, modify the screen saver.
B.    From Indexing Options, modify the Advanced options.
C.    From Performance Options, modify the visual effects.
D.    From Performance Options, modify the processor scheduling.

Answer: C
Explanation:
Configuring Performance Options
The Performance Options tool is a Windows 7 Performance And Analysis tool that you can access by clicking Advanced Tools on the Performance Information And Tools dialog box and then clicking Adjust The Appearance And Performance Of Windows. You can let Windows decide what is best for your computer, adjust for best appearance, adjust for best performance, or select Custom and specify the appearance settings for your computer manually. If you select Custom, you can choose which visual effects to turn off, one by one. There are 18 visual effects that you can control, such as whether shadows are displayed under screen icons or under the mouse pointer. On the Advanced tab, you can adjust for the best performance of programs or background services. If your computer is running applications (as a typical workstation does), you would specify Adjust For Best Performance Of Programs. On a server that is functioning as a Web server (for example), you would specify Adjust For Best Performance Of Background Services.
 clip_image001[12]

QUESTION 56
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2. You need to prevent some system settings from being migrated.
You must achieve this goal by using the minimum amount of administrative effort. Which file should you modify?

A.    config.xml
B.    migapp.xml
C.    migdocs.xml
D.    miguser.xml

Answer: A
Explanation:
Config.xml
This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.

QUESTION 57
You have a computer that runs Windows 7.
You install a second internal hard disk drive in the computer.
You attempt to create a system image and discover that the new disk is not listed as a backup destination.
You need to ensure that you can use the new disk as a backup destination for system images. What should you do?

A.    Create a NTFS partition.
B.    Create a mirrored volume.
C.    Create a system repair disc.
D.    Log on to the computer by using a different account.

Answer: A
Explanation:
If the drive you are saving your backup on is formatted using the NTFS file system and has enough disk space, a System Image of your programs, your operating system, and all drivers and registry settings is also included in the backup.An external hard drive: (Note that the question actually asks about internal) You cannot use an external hard drive for a System Image backup unless you convert its filing system to NTFS. By default external hard drives are formatted using FAT.NOT Accout:The backup account requires administrative privileges to the computer being backed up, but it implys that this was not the issue, since it got to the point were it could see that this disk wasNOT System repair disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It is not a system image itself.

QUESTION 58
A standard user named User1 has a computer that runs Windows 7.
You need to ensure that User1 can run Windows Easy Transfer. What should you do?

A.    Disable User Account Control (UAC).
B.    Add User1 to the Administrators group.
C.    Configure User1 to have a complex password.
D.    Copy the support folder from the Windows 7 installation media to the local hard disk drive.

Answer: B
Explanation:
Windows Easy Transfer Migration
After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges.
To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer.
NOT User Account Control (UAC)
UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.

QUESTION 59
You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents will be included in the migration. What should you do?

A.    Run Usmtutils.exe and use the /ec option.
B.    Run Sysprep.exe and use the /audit option.
C.    Run Loadstate.exe and use the /v:12 option.
D.    Run Scanstate.exe and use the /genmigxml option.

Answer: D
Explanation:
ScanState
You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:”mykey”
/genmigxml: path to a file This option specifies that the ScanState command should use the document finder to create and export an .xml file that defines how to migrate all of the files on the computer on which the ScanState command is running.

QUESTION 60
You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. You need to ensure that you can access all encrypted files on the computer. What should you do first?

A.    At a command prompt, run Cipher.exe.
B.    At a command prompt, run Certutil.exe.
C.    From the local comput er policy, modify the User Rights Assignment.
D.    From User Accounts, run the Manage your file encryption certificates wizard.

Answer: A
Explanation:
Cipher
Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is “deallocated.” After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data.
/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size.
/R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521.

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(41-50)

QUESTION 41
You have a customized image of Windows 7 Professional. You need to create a new unattended file to automate the deployment of the image. You must achieve this goal by using the minimum amount of administrative effort. What should you do first?

A.    Run Imagex.exe and specify the /mount parameter.
B.    Run Dism.exe and specify the /Mount-WIM parameter.
C.    From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM).
D.    From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM).

Answer: D
Explanation:
Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT DismDeployment Image Servicing and Management (DISM) is a command-line tool used to service Windows?images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./mountMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read-only permission to a specified directory. Once the file is mounted, you may view, but not modify, all the information contained in the directory.NOT MDT MDT 2010 is the Microsoft solution accelerator for operating system and application deployment and offers flexible driver management, optimized transaction processing, and access to distribution shares from any location. You can use the MDT on imaging and deployment servers to implement the automatic deployment of Windows 7 (for example) on client computers. It is possible to run MDT 2010 on a client running Windows 7, but in practice it would typically run from a distribution server running Windows Server 2008. The MDT provides detailed guidance and job aids and offers a common deployment console that contains unified tools and processes that you can use for client and server deployment. The toolkit offers standardized desktop and server images, along with improved security and ongoing configuration management.

QUESTION 42
You are deploying a custom Windows 7 system image to a new computer.
You perform the following tasks:
– Start the new computer by using the Windows preinstallation Environment (WPE).
– Connect to a shared network location that contains the Windows 7 image file.
You need to apply the Windows 7 image to the computer. What should you do before you apply the image?

A.    Mount the image.
B.    Configure Windows Firewall.
C.    Configure and format the hard disk drive.
D.    Initializa the Boot Configuration data (BCD) store.

Answer: C
Explanation:
Deploying from a Network Share
After you have imaged your reference installation, you can deploy the image onto new hardware (one or more destination computers). To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment (Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. To deploy an image from a network share, you use the Diskpart tool to format the hard drive of a destination computer. Then you copy the image from the network share and begin the installation by running Setup.exe.

QUESTION 43
You have a computer that runs Windows 7. You have an application installation package named app1.msi. You need to perform a customized installation of app1.msi. What should you do?

A.    Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst.
B.    Create a transform file named app1.mst and then run Msinfo32.exe /i app1.msi /t.
C.    Create a transform file named app1.msp and then run Msiexec.exe /i app1.msi /t app1.mst.
D.    Create a transform file named app1.msp and then run Msinfo32.exe /i app1.msi /t.

Answer: A
Explanation:
Windows Installer Transform Files
A Windows Installer transform (.mst) file provides configuration settings for a customized installation. A transform file contains information about components, features, setup properties, and changes that you can use to customize your installation.
MsiexecProvides the means to install, modify, and perform operations on Windows Installer from the command line. To install or configure a product Syntax msiexec /i {package|ProductCode} /i: Installs or configures a product. /t : Applies transform to advertised package.NOT Msinfo32
Displays a comprehensive view of your hardware, system components, and software environment.

QUESTION 44
You have a computer that runs Windows 7.
You have a third party application.
You need to ensure that only a specific version of the application runs on the computer.
You have the application vendor’s digital signature. What should you do?

A.    From Application Control Policies, configure a path rule.
B.    From Application Control Policies, configure a publisher rule.
C.    From Software Restriction policies, configure a path rule.
D.    From Software Restriction policies, configure a certificate rule.

Answer: B

QUESTION 45
You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer. You need to protect data on the removable drive by using Bitlocker To Go. What should you do first?

A.    Upgrade the computer to Windows 7 Enterprise.
B.    Install all Windows Updates for Windows 7 Professional.
C.    Issue a digital certificate for the Encryption File System (EFS).
D.    Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

Answer: A
Explanation:
Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate EditionsThe Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft’s volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.

QUESTION 46
You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. You discover that windows is unable to install the necessary device drivers for the mobile device. You need to ensure that you can synchronize file to the mobile device. What should you do?

A.    From Windows Mobility Center, click Sync settings.
B.    From Sync Center, click set up new sync partnerships.
C.    From Device Manager, click scan for hardware changes.
D.    From Devices and Printers, right-click the device and click troubleshoot.

Answer: D
Explanation:
You cannot sync without the drivers installed. It says unable to install, assuming that it could find the device if it was able to reach attempting to install point. Therefore Troubleshoot.

QUESTION 47
You have a computer that runs Windows 7.
You view the properties of a file on the computer as show in the exhibit. (Click the Exhibit button.) You need to ensure that you can configure permissions on the file. What should you do?
 clip_image001

A.    From Folder Options, modify the View settings.
B.    Move the file to a disk that has the NTFS file system.
C.    Open Windows Explorer by using elevated privileges.
D.    Hold the SHIFT key, right-click the file, and click Properties.

Answer: B
Explanation:
Missing options hints not on NTFS. On NTFS volumes, you can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps:
1. In Windows Explorer, right-click the file or folder you want to work with.
2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab.
3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object.

QUESTION 48
You install an application named app1.exe on a computer. After the installation the computer becomes unresponsive.
You restart the computer and attempt to uninstall App1.exe. The uninstallation of App1.exe fails. You need to restore the computer to its previous functional state.
You must achieve the goal by using the minimum amount of administration.
What should you do?

A.    From Recovery, restore a system restore point.
B.    From the Previous Versions tab of App1.exe, click Restore button.
C.    Start the computer, press F8 and then use the Last Known Good Configuration.
D.    Create a system repair disc and then start the computer from the system repair disc.

Answer: A
Explanation:
If you install an application that causes your computer to become unstable, you should first attempt to uninstall the application. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore.
Windows 7 creates system restore points on a regular schedule and prior to events such as the installation of applications and drivers. A restore point contains information about registry settings and other system information. Windows 7 generates restore points automatically before implementing significant system changes. You can manually create restore points and restore a computer system to a selected restore point. If you install an application or driver that causes your computer to become unstable, you should first attempt to uninstall the application or roll back the driver. If this does not solve the problem, you can restore system files and settings by performing a system restore to restore the computer to its last system restore point. A system restore returns a computer system to a selected restore point. System restores do not alter user files. Note that a system restore is not the same as a System Image restore.

QUESTION 49
You have a portable computer named Computer1 and a desktop computer named Computer2. Both computers run Windows 7. On computer2, you create a share named Share1 by using Advanced Sharing feature. You need to ensure that when you connect to Share1 from Computer1, the files that you open are automatically cached. What should you do?

A.    On Computer1, modify the Offline Files settings.
B.    On Computer1, modify the User Profile settings.
C.    On Computer2, modify the properties of Share1.
D.    On Computer2, modify the file sharing connection settings for the HomeGroup.

Answer: C
Explanation:
The caching feature of Shared Folders ensures that users have access to shared files even when they are working offline without access to the network. You can also use Shared Folders or Share and Storage Management to enable BranchCache on shared resources. The BranchCache feature in Windows?7 or Windows Server 2008 R2 enables computers in a branch office to cache files downloaded from this shared folder, and then securely serve the files to other computers in the branch.
To set caching options for a shared folder by using the Windows interface
1. Open Computer Management.2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.3. In the console tree, click System Tools, click Shared Folders, and then click Shares.4. In the results pane, right-click the shared folder, and then click Properties.5. On the General tab, click Offline Settings, configure the offline availability options as appropriate and then click OK. Offline availability optionsSelect the following offline availability option for each shared folder:
All files and programs that users open from the share are automatically available offlineWhenever a user accesses the shared folder or volume and opens a file or program in it, that file or program will be automatically made available offline to that user. Files and programs that are automatically made available offline will remain in the Offline Files cache and synchronize with the version on the server until the cache is full or the user deletes the files. Files and programs that are not opened are not available offline.
 clip_image001[6]

QUESTION 50
You have a computer that runs Windows 7. The computers hard disks are configured as shown in the following table:
 clip_image001[8]
You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail.
Which two actions should you perform? (Each correct answer presents a part of the solution. Choose two.)

A.    Create a system image.
B.    Create a system repair disc.
C.    Shrink C and then create a new partition.
D.    Connect an external hard disk to the computer.

Answer: AD
Explanation:
A System Image is a copy of all the files and folders on the system disk (and other specified hard disks) on a computer. You can use a System Image backup to restore the computer to exactly what its configuration was when the System Image backup was created.
External hard drives can be removed and stored in a secure location.NOT System Repair Disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It does not actually save the data and will only help if a system image exists elsewhere.NOT Shrink: All partitions are inaccessible is a hard disk fails.

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(31-40)

QUESTION 31
You have a computer named Computer1 that runs Windows 7. Computer1 is a member of an Active Directory domain. Remote Desktop is enabled on the computer. You share a folder on Computer1. You need to configure Computer1 to meet the following requirements:
– Allow computers in the local subnet to access the shared folder.
– Prevent computers in remote subnets from accessing the shared folder.
– Allow all computers to connect to Computer1 by using Remote Desktop.
What should you do?

A.    Modify the subnet mask.
B.    Modify the Public folder sharing settings.
C.    Disable network discovery on all computers located in remote subnets.
D.    Modify the properties of the File and Printer Sharing firewall exceptions.

Answer: D
Explanation:
Network ProfilesNetwork profiles are important because you can use them to apply different collections of firewall rules based on which network profile is active. A significant difference between Windows Vista and Windows 7 is that in Windows 7, profiles apply on a per-network interface basis. This means that if you have one network adapter connected to the Internet and another connected to your office LAN, different sets of rules apply for each connection. The firewall in Windows Vista chooses the most restrictive network profile when a computer has connections to different network types and applies the most restrictive set of rules to all interfaces.Allowing Programs Through Windows FirewallWindows Firewall allows you to configure exceptions based on programs. This differs from Windows Vista where Windows Firewall would allow you to configure exceptions based on port address. You can still create rules based on port address; you just have to do it using WFAS, covered later in this lesson. You can also allow specific Windows 7 features, such as Windows Virtual PC, through Windows Firewall. Feature rules become available when you enable the feature using the Programs And Features item in Control Panel. To add a rule for a feature or program, click Allow A Program Or Feature Through Windows Firewall item in the Windows Firewall section of Control Panel. The figure shows a list of currently installed features and any programs for which rules have been created as well as the profiles for which rules concerning those programs and features are enabled.File and Printer Sharing
This feature is used for sharing local files and printers with other users on the network.
(Uses NetBIOS, LLMNR, SMB and RPC)
 clip_image002[4]

QUESTION 32
You have a computer that runs Windows 7.
You attempt to add files to %programfiles%\app1 and receive a prompt to elevate your privileges. You need to ensure that you can add files to %programfiles%\app1 without receiving a prompt for elevated privileges.
The solution must prevent harmful applications from making unwanted changes to the system. What should you do?

A.    Enable the built-in administrator account.
B.    Modify the User Account Control (UAC) settings.
C.    Add your user account to the local Power Users group.
D.    Modify the permissions of the %programfiles%\app1 folder.

Answer: D
Explanation:
In order to secure a computer and its resources, you must consider the rights that users will have. You can secure a computer or multiple computers by granting users or groups specific user rights. You can help secure an object, such as a file or folder, by assigning permissions to allow users or groups to perform specific actions on that object.

QUESTION 33
You have a computer that runs Windows 7.
You configure the computer to automatically install all updates.
You need to verify whether a specific update is installed. What should you do?

A.    In event viewer, examine the application log.
B.    In windows update, examine the update history.
C.    At the command prompt, run Wusa.exe and specify the /kb parameter.
D.    At the command prompt, run Verifier.exe and specify the /query parameter.

Answer: B

QUESTION 34
You have a computer that runs Windows 7.
You need to identify which hardware is required to create a system repair disc.
What hardware should you identify?

A.    CD/DVD burner
B.    Floppy disk
C.    Tape drive
D.    USB disk

Answer: A

QUESTION 35
You have a computer that runs Windows 7.
You manually create a system restore point.
You need to restore a copy of a file stored on a drive C from two days ago.
You must act with minimum administrative effort.
What should you do?

A.    From recovery, select System Restore.
B.    From Backup and restore, select Restore my files.
C.    From the command prompt, run Wbadmin get items.
D.    From the properties of the file, select Previous Versions.

Answer: D
Explanation:
How do I view or restore previous versions of a file and folder? Right-click the file or folder, and then click Restore previous versions. You’ll see a list of available previous versions of the file or folder. The list will include files saved on a backup (if you’re using Windows Backup to back up your files) as well as restore points. To restore a previous version of a file or folder that’s included in a library, right-click the file or folder in the location where it’s saved, rather than in the library. For example, to restore a previous version of a picture that’s included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions. For more information about libraries, see Include folders in a library.
 clip_image001
The Previous Versions tab, showing some previous versions of files
NOT System Restore: System Restore restores system files and settings and does not affect any of your documents, pictures, or other personal data.
NOT Backup and Restore: System restore point was created, no backup meantioned.NOT Wbadmin:
The Backup And Restore console does not provide a graphical tool for scheduling System Image backups. You need to create a System Image backup manually from the Backup
And Restore console whenever you have made significant changes to a computer’s configuration. Take care that if you restore a System Image backup and boot from it, or if you make the VHD bootable for failover protection, your computer could be vulnerable unless the System Image includes security updates. Although you cannot use Backup And Restore to schedule System Image backups, you can use the Wbadmin command-line utility to perform this function. For example, to initiate a System Image backup of the C: drive to the H: drive, you run the following command from an elevated command prompt:
wbadmin start backup -backuptarget:h: -include:c: -quiet

QUESTION 36
You have a computer that runs Windows Vista. The computer has one partition and 1 GB of RAM. You need to upgrade the computer to Windows 7. What should you do?

A.    Add 1 GB of RAM.
B.    Create a second partition.
C.    Disable User Account Control (UAC).
D.    Install Windows Vista Service pack 2 (SP2).

Answer: D
Explanation:
You should keep the following in mind prior to and during the upgrade from Windows Vista to Windows 7:
– Perform a full backup of the computer running Windows Vista prior to performing the installation. – That way, if things go wrong, you can do a full restore back to Windows Vista. You must ensure that Windows Vista has Service Pack 1 or later installed before you can upgrade it to Windows 7. – Ensure that you have the Windows 7 product key prior to the upgrade. – You cannot upgrade between processor architectures. An x86 version of Windows Vista cannot be upgraded to an x64 version of Windows 7, and vice versa. – You can upgrade only to an equivalent or higher edition of Windows 7. – You can upgrade Windows Vista Home Premium to Windows 7 Home Premium, Professional, Enterprise, or Ultimate, but not to Windows 7 Starter. Windows 7 Professional is equivalent to Windows Vista Business. – Ensure that there is at least 10 GB of free disk space on the Windows Vista volume prior to attempting the upgrade.Requirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
– 1 GHz 32-bit (x86) or 64-bit (x64) processor
– 1 GB of system memory- A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space
– A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory

QUESTION 37
You have a computer that runs Windows 7. The computer is configured as shown in the following table:
 clip_image001[6]
You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1.
You need to provide 40 GB of free space for the application. What should you do?

A.    Create a shortcut.
B.    Create hard link.
C.    Create a mount point.
D.    Change the quota settings.

Answer: C
Explanation:
Assign a mount point folder path to a driveYou can use Disk Management to assign a mount-point folder path (rather than a drive letter) to the drive. Mount-point folder paths are available only on empty folders on basic or dynamic NTFS volumes.Volume Mount PointsVolume mount points are new system objects in the internal namespace of Windows 2000 that represent storage volumes in a persistent, robust manner. This feature allows multiple disk volumes to be linked into a single tree, similar to the way Dfs links remote network shares. You can have many disk volumes linked together, with only a single drive letter pointing to the root volume. The combination of an NTFS junction and a Windows 2000 volume mount point can be used to graft multiple volumes into the namespace of a host NTFS volume. Windows 2000 offers this new mounting feature as an alternative to drive letters so system administrators can transcend the 26-drive letter limit that exists in Windows NT. Volume mount points are robust against system changes that occur when devices are added or removed from a computer. Important-icon Important A volume is a self-contained unit of storage administered by a file system. The file system that administers the storage in a volume defines a namespace for the volume. A volume mount point is a directory name in an NTFS file system that denotes the root of an arbitrary volume. A volume mount point can be placed in any empty directory of the namespace of the containing NTFS volume. Because volumes can be denoted by arbitrary directory names, they are not required to have a traditional drive letter. Placing a volume mount point on an NTFS directory causes the storage subsystem to resolve the directory to a specified local volume. This “mounting” is done transparently and does not require a drive letter to represent the volume. A Windows 2000 mount point always resolves to the root directory of the desired volume. Volume mount points require that the version of NTFS included with Windows 2000 be used because they are based on NTFS reparse points.

QUESTION 38
You have a computer that runs Windows 7.
You log on to the computer by using a user account that is a member of Administrator Group. From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. You attempt to save the file and receive the save as dialog box.
You need to ensure that you can save changes to c:\windows\system32\drivers\.
What should you do?

A.    Stop the windows search service.
B.    Remove the inherited permissions from the file.
C.    Start Windows Notepad by using elevated privileges.
D.    Change the user account control (UAS) settings to Notify Me Only when programs try to make changes
to my computer.

Answer: C
Explanation:
Windows 7 does not allow applications to write data to these secure locations. User Account Control (UAC)UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator- level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.Privilege elevationAll users of clients running Windows 7 run with the rights of a standard user. When a user attempts an act that requires administrative privileges, such as creating a new user account, her rights need to be raised from those of a standard user to those of an administrative user. This increase in rights is termed privilege elevation. UAC is a gateway to privilege elevation. It allows users who are members of the local Administrators group to access administrative rights, but ensures that the person accessing the Administrative rights is aware that they are doing so. This privilege elevation occurs only for a specific task. Another task executed at the same time that also requires privilege elevation generates its own UAC

QUESTION 39
You have a computer that runs Windows 7.
The network contains a monitoring server named server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs).
You need to ensure that Service1 can receive requests from Server1.
What should you do?

A.    From windows Firewall with Advanced Security, create a predefined rule.
B.    From windows Firewall with Advanced Security, create a custom rule.
C.    From the Network and Sharing Center, modify the network location settings.
D.    From the Network and Sharing Center, modify the advanced sharing settings.

Answer: B
Explanation:
Creating WFAS Rules
The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.

QUESTION 40
You have a customized image of Windows 7 Professional. You mount the image and modify the contents of the image. You need to restore the image to its original state. Which tool should you use?

A.    Dism.exe
B.    Ocsetup.exe
C.    Pkgmgr.exe
D.    Sysprep.exe

Answer: A
Explanation:
Dism
Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system.
Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing.
You can use DISM to perform the following actions:
* Prepare a Windows PE image.
* Enable or disable Windows features within an image.
* Upgrade a Windows image to a different edition.
* Add, remove, and enumerate packages.
* Add, remove, and enumerate drivers.
* Apply changes based on the offline servicing section of an unattended answer file.
* Configure international settings.
* Implement powerful logging features.
* Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
* Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
* Service all platforms (32-bit, 64-bit, and Itanium).
* Use existing Package Manager scripts.
DISM Command-Line Options
To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.
NOT Sysprep
Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning.
Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

Official 2014 Latest Microsoft 70-680 Exam Dump Free Download(21-30)

QUESTION 21
You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. Windows Remote Management (WinRM) is
enabled on both computers.
You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do?

A.    On Computer2, run Winrs and then run Diskpart.
B.    On Computer2, run Winrs and then run Diskmgmt.msc.
C.    On Computer1, install the Telnet Client and then run Diskpart from Computer2.
D.    On Computer1, install the Telnet Client and then use Disk Management from Computer2.

Answer: A
Explanation:
Winrs You can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS -r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS -r:Aberdeen ipconfig The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt.
Diskpart: Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.

QUESTION 22
A remote user has a computer that runs Windows 7. The user reports that he receives several error messages while using an application.
You do not have remote access to the user’s computer. You need to tell the user how to create
screenshots of the actions he performs on the computer. The solution must track the mouse actions that the user performs. What should you instruct the user to do?

A.    Press ALT + PrintScreen.
B.    Run Psr.exe and then click Start Record.
C.    From Mouse Properties, select Display pointer trails.
D.    Run Snippingtool.exe, click New, and then click Window Snip.

Answer: B
Explanation:
How do I use Problem Steps Recorder?You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.NotesWhen you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you’re trying to solve, use the comment feature described below to highlight where the problem is occurring.

QUESTION 23
You have a computer that runs Windows 7. The computer’s disk is configured as shown in the exhibit. (Click the Exhibit button.)
 clip_image002
You need to extend volume C.
What should you do first?

A.    Back up and delete volume D.
B.    Convert disk 0 to a dynamic disk.
C.    Remove the crash dump from volume C.
D.    Move the paging file from volume C to volume E.

Answer: A
Explanation:
Extend a Basic Volume
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume, it must be raw or formatted with the NTFS file system. You can extend a logical drive within contiguous free space in the extended partition that contains it. If you extend a logical drive beyond the free space available in the extended partition, the extended partition grows to contain the logical drive. For logical drives, boot, or system volumes, you can extend the volume only into contiguous space and only if the disk can be upgraded to a dynamic disk. For other volumes, you can extend the volume into noncontiguous space, but you will be prompted to convert the disk to dynamic.

QUESTION 24
You need to increase the size of a paging file. What should you do?

A.    From Disk Management, shrink the boot partition.
B.    From Disk Management, shrink the system partition.
C.    From System, modify the Advanced system settings.
D.    From System, modify the System protection settings.

Answer: C
Explanation:
1. Click Start, right-click My Computer, and then click Properties.
2. In the System Properties dialog box, click the Advanced tab.
3. In the Performance pane, click Settings.
4. In the Performance Options dialog box, click the Advanced tab.
5. In the Virtual memory pane, click Change.
6. Change the Initial size value and the Maximum size value to a higher value, click Set, and then click OK.
7. Click OK to close the Performance Options dialog box, and then click OK to close the System Properties dialog box.

QUESTION 25
You have a computer that runs Windows Vista (x86). You need to perform a clean installation of Windows 7 (64-bit). What should you do?

A.    From the Windows 7 installation media, run Rollback.exe.
B.    From the Windows 7 installation media, run Migsetup.exe.
C.    Start the computer from the Windows 7 installation media. From the Install Windows dialog box,
select the Upgrade option.
D.    Start the computer from the Windows 7 installation media. From the Install Windows dialog box,
select the Custom (advanced) option.

Answer: D
Explanation:
When you are performing a clean installation, you should select Custom (Advanced). Almost all installations ofm Windows 7 that you will perform will be of the Custom (Advanced) type rather than upgrades. You can initiate upgrade installations only from within Windows Vista or Windows 7.NOT Rollback, Migsetup, or Upgrade:Specified clean installation not migration, update or rollback.

QUESTION 26
Your network consists of a single Active Directory forest.
You have 50 portable computers and 50 desktop computers. All computers have 32-bit hardware. You plan to deploy Windows 7 and 10 corporate applications to the computers by using a custom image.
You need to prepare for the deployment by using the minimum amount of administrative effort. What should you do first?

A.    On one computer, install Windows 7 and the corporate applications.
B.    On one portable computer and one desktop computer, install Windows 7 and the corporate applications.
C.    On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit.
D.    On a server, install the Windows Automated Installation Kit (AIK) and run Windows System Image Manager
(Windows SIM).

Answer: A
Explanation:
To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown.
Sysprep prepares the image for capture by cleaning up various user-specific and computerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.

QUESTION 27
You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first?

A.    Run Dism.exe and specify the /image and /online parameters.
B.    Open Windows Explorer, right-click the VHD file and select Open.
C.    Run Diskpart.exe and then run the select and attach commands.
D.    Run Imagex.exe and specify the /mountrw and /append parameters.

Answer: C
Explanation:
Diskpart Microsoft command-line tool Diskpart is used to create and format volumes on the target computer.SelectShift the focus to an object.AttachAttaches a virtual disk file.

QUESTION 28
You have a computer that runs Windows 7.
You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first?

A.    Run Sdbinst.exe.
B.    Run Msiexec.exe.
C.    Right-click the application executable file and modify the compatibility settings.
D.    Right-click the application executable file and modify the advanced security settings.

Answer: A

QUESTION 29
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer.
What should you modify in the Local Group Policy?

A.    Enable the Prevent redirection of USB devices setting.
B.    Enable the Prevent installation of removable devices setting.
C.    Disable the WPD Devices: Deny read access setting.
D.    Disable the Allow administrators to override Device Installation Restriction policies setting.

Answer: B
Explanation:
Prevent installation of removable devices
This policy setting allows you to prevent Windows from installing removable devices. A device is considered removable when the driver for the device to which it is connected indicates that the device is removable. For example, a Universal Serial Bus (USB) device is reported to be removable by the drivers for the USB hub to which the device is connected. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing removable devices and existing removable devices cannot have their drivers updated. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of removable devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update device drivers for removable devices as allowed or prevented by other policy settings. NOT Prevent redirection of USB devicesThis policy setting prevents redirection of USB devices. If you enable this setting, an alternate driver for USB devices cannot be loaded. If you disable or do not configure this setting, an alternate driver for USB devices can be loaded.

QUESTION 30
Your network consists of a single Active Directory domain named contoso.com.
You have a server named Server1 that runs a custom network application.
Server1 has the following IP addresses:
– 192.168.15.10
– 192.168.15.11
You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. What should you do from the computer?

A.    Edit the hosts file.
B.    Edit the lmhosts file.
C.    Run Ipconfig.exe /flushdns.
D.    Run Netsh interface ipv4 reset.

Answer: A
Explanation:
Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file.
Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX- based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows-based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet.
– LMHOSTS contains IP address to “NetBIOS over TCP/IP” name translations.
– LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface.
– LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups
– LMHOSTS file, such as the ability to support routed domain logon validation.
– LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the “master” file can be distributed transparently across all stations.
– By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually
C:\WINNT\SYSTEM32\DRIVERS\ETC).
Other info
http://support.microsoft.com/kb/105997

Passing Microsoft 70-680 Exam successfully in a short time! Just using Braindump2go’s Latest Microsoft 70-680 Dump:
http://www.braindump2go.com/70-680.html

1 2