70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(19860 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 1) 

You have a computer that runs Windows 7. 

You run Ipconfig as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can establish a DirectAccess connection to the network. 

What should you do first? 

A. Create a new VPN connection. 

B. Configure a static IPv4 address. 

C. Enable IPv6 on the network adapter. 

D. Add an additional default gateway address. 

Answer:

Q2. - (Topic 1) 

You have a computer that runs Windows 7. 

You perform an image backup. 

A virus infects the computer and causes the computer to become unresponsive. 

You need to restore the computer as quickly as possible. 

What should you do? 

A. Start the computer by using the Last Known Good Configuration feature. 

B. Start the computer from the Windows 7 DVD and then use the Startup Repair tool. 

C. Start the computer from the Windows 7 DVD and then use the System Image Recovery tool. 

D. Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe. 

Answer:

Q3. - (Topic 2) 

You have a computer that runs Windows Vista. 

You install Windows 7 on a new partition on the computer. 

You need to ensure that the computer always starts Windows Vista by default. 

What should you do? 

A. Run Bcdedit.exe and specify the /default parameter. 

B. Run Bcdedit.exe and specify the /bootems parameter. 

C. Create a boot.ini file in the root of the Windows 7 partition. 

D. Create a boot.ini file in the root of the Windows Vista partition. 

Answer:

Explanation: 

The Bcdedit.exe utility allows you to manage boot configuration./default - Sets the default entry that the boot manager willl use./bootems - Enable or disables Emergency Management Services for a boot application.NOT boot.ini:Windows (specifically Ntldr) uses 

Q4. - (Topic 5) 

You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits: 

. The Disk Management console (Click the Exhibit button.) 

. The System Properties window (Click the Exhibit button.) 

. The System protection for Local Disk C window (Click the Exhibit button.) 

You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS). 

You need to ensure that you can access the files from another computer. 

What should you do? 

A. Delete restore points. 

B. Create a restore point. 

C. Perform a system restore. 

D. Search for the file in the Recycle Bin. 

E. Increase disk space used for system protection. 

F. Copy the file from a previous version of a folder. 

G. Set restore settings to Only restore previous versions of files. 

H. Run the cipher /x command from the elevated command prompt, 

I. Run the vssadmin list volumes command from the elevated command prompt. 

J. Run the vssadmin list shadows command from the elevated command prompt, 

K. Run the compact /U <file_name> command from the elevated command prompt. 

Answer:

Explanation: * cipher /x[:efsfile] [<FileName>] 

Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user's certificate(s) that were used to encrypt the file. Otherwise, the user's current EFS certificate and keys are backed up. 

* Back Up Your EFS Key The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that's the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key—sadly, I haven't found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don't specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file. 

Once you've got that file created, copy it from your computer's hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you've chosen. Now, in the event of unfortunate circumstances— for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system's OS fails and you need to recover files directly from the nowdead system's hard disk—you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you'll be able to get to your files again. 

Q5. - (Topic 2) 

You have a computer that runs Windows 7. 

You need to identify which applications were installed during the last week. 

What should you do? 

A. From Reliability Monitor, review the informational events. 

B. From System Information, review the Software Environment. 

C. From Performance Monitor, review the System Diagnostics Report. 

D. From Performance Monitor, run the System Performance Data Collector Set. 

Answer:

Explanation: 

Reliability Monitor tracks a computer's stability. It can also tell you when events that could affect stability (such as the installation of a software application) occurred and whether any restarts were required after these events. Action Center monitors your computer and reports problems with security, maintenance, and related settings. The Windows Experience Index indicates the suitability of your current computer hardware for running resource intensive applications. 

Q6. - (Topic 1) 

You have a computer that runs Windows 7. 

Multiple users log on to your computer. 

You enable auditing on a folder stored on your computer. 

You need to ensure that each access to the folder is logged. 

What should you do? 

A. Start the Problem Steps Recorder. 

B. From Event Viewer, modify the properties of the Security log. 

C. From the local Group Policy, configure the Audit object access setting. 

D. From the local Group Policy, configure the Audit directory service Access setting. 

Answer:

Explanation: 

Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure. 

Q7. - (Topic 2) 

Your computer running Windows 7 Enterprise has two internal hard disks. 

System protection is configured by default on the C: drive, which holds the operating system and installed applications. 

The D: drive is a 500-GB hard disk formatted with the NTFS filing system, and you use it to store your personal files. 

You want to store previous versions going back several months and therefore intend to reserve 200 GB of this disk for system protection. 

You are not using either of your internal disks for backup; instead, you store your backups on a 1-TB external USB hard disk. 

How do you configure system protection on your D: drive? (Choose all that apply; each answer forms part of the complete solution.) 

A. Select Restore System Settings And Previous Versions Of Files 

B. Select Only Restore Previous Versions Of Files 

C. Set the Max Usage slider control to 40 percent 

D. Set the Max Usage slider control to 4 percent 

Answer: B,C 

Q8. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. 

From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. 

Which command should you run? 

A. Start disk.exe /d \\computer2 

B. Tscon disk.exe /DEST:computer2 

C. Winrm e disk.exe Cr:computer2 

D. Winrs r:computer2 disk.exe 

Answer:

Explanation: 

WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig. 

The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. 

Q9. HOTSPOT - (Topic 4) 

A company has client computers that run Windows 7. 

You need to secure a virtual private network (VPN) connection on the client computers so that two-factor authentication is used. 

Which setting should you choose? (To answer, select the appropriate setting in the work area.) 

Answer:  

Q10. - (Topic 6) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Disable Internet Connection Sharing. 

B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting. 

C. From the Safety drop-down menu, open an InPrivate Browsing session. 

D. From Internet Options, on the Advanced tab, clear Enable DOM Storage. 

Answer:

Q11. - (Topic 3) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:\folder1. 

You need to identify all of the encrypted files in C:\folder1. 

Which command should you run? 

A. Cipher C:\folder1 

B. Dir C:\folder1 /OE 

C. Fsutil C:\folder1 

D. Wfs C:\folder1 

Answer:

Explanation: 

CipherDisplays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. 

Q12. - (Topic 2) 

You have a computer that runs windows vista. The computer has one partition and 1 GB of RAM. 

You need to upgrade the computer to windows 7. 

What should you do? 

A. Add 1 GB of RAM. 

B. Create a second partition. 

C. Disable User Account Control (UAC). 

D. Install windows Vista Service pack 2 (SP2) 

Answer:

Explanation: 

You should keep the following in mind prior to and during the upgrade from Windows Vista to Windows 7: 

-Perform a full backup of the computer running Windows Vista prior to performing the installation. - That way, if things go wrong, you can do a full restore back to Windows Vista. You must ensure that Windows Vista has Service Pack 1 or later installed before you can upgrade it to Windows 7. - Ensure that you have the Windows 7 product key prior to the upgrade. - You cannot upgrade between processor architectures. An x86 version of Windows Vista cannot be upgraded to an x64 version of Windows 7, and vice versa. - You can upgrade only to an equivalent or higher edition of Windows 7. - You can upgrade Windows Vista Home Premium to Windows 7 Home Premium, Professional, Enterprise, or Ultimate, but not to Windows 7 Starter. Windows 7 Professional is equivalent to Windows Vista Business. - Ensure that there is at least 10 GB of free disk space on the Windows Vista volume prior to attempting the upgrade.Requirements:Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements: 

-1 GHz 32-bit (x86) or 64-bit (x64) processor- 1 GB of system memory- A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space- A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory 

Q13. - (Topic 1) 

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. 

You need to start the computer from the VHD. 

What should you do? 

A. From Diskpart.exe, run Select vdisk. 

B. From Disk Management, modify the active partition. 

C. Run Bootcfg.exe and specify the /default parameter. 

D. Run Bcdedit.exe and modify the Windows Boot Manager settings. 

Answer:

Explanation: 

When you have created a VHD and installed a system image on it, you can use the BCDEdit tool Bcdedit.exe to add a boot entry for the VHD file in your computer running Windows 7. 

Q14. - (Topic 1) 

You have a computer that runs Windows 7. 

You need to view the processes that currently generate network activity. 

What should you do? 

A. Open Resource Monitor and click the Network tab. 

B. Open Windows Task Manager and click the Networking tab. 

C. Open Event Viewer and examine the NetworkProfile Operational log. 

D. Open Performance Monitor and add all the counters for network interface. 

Answer:

Explanation: 

Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. To identify the network address that a process is connected to, click the Network tab and then click the title bar of TCP Connections to expand the table. Locate the process whose network connection you want to identify. You can then determine the Remote Address and Remote Port columns to see which network address and port the process is connected to. 

Q15. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL). 

You attempt to connect to the internal website. You receive the following error message: 

"There is a problem with this website's security certificate." 

You need to be able to connect to the internal website successfully. 

What should you do? 

A. From Internet Explorer, add the website to the Local Intranet zone. 

B. From Certificate Manager, import the website's certificate into your Intermediate Certification Authorities store. 

C. From Certificate Manager, import the website's certificate into your computer's Personal store. 

D. From Internet Explorer, add the website to the Trusted Sites zone. 

Answer:

START 70-680 EXAM