70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(285 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 6) 

You work as the desktop support technician at Abc.com. 

The Abc.com network consists of a single Active Directory domain named Abc.com. 

The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com. 

You need to create a Windows 7 image that includes the Office 2007. Microsoft Installer Package (MSI) package for the installation. 

What should you do? 

A. Install the MSI package by using the update command with the /slipstream switch. 

B. Install the MSI package by using the Msiexec command with the /package /uninstall switches. 

C. Install the MSI package by using the Msiexec command with the /package switch. 

D. Install the MSI package by using the Install command with the /package switch. 

Answer:

Q2. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface. 

You need to prevent the computer from using NetBIOS applications. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

Q3. - (Topic 2) 

You have an answer file for a Windows 7 installation. 

You need to perform an unattended installation of Windows 7 by using the answer file. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD. 

B. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE). 

C. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD. 

D. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE). 

Answer:

Explanation: 

Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure: 

1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM. 

2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml. 

3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer. 

4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. 

Q4. - (Topic 6) 

You administer client computers that have Windows 7 Professional SP1 64-bit installed. All desktops are members of a single Active Directory domain. 

You plan to install a driver manufactured by an unknown provider. 

You need to prepare the client computers for the driver installation. 

What should you do? 

A. Disable the Code signing for device drivers Domain Group Policy setting. 

B. Add each user to the Domain Administrators group. 

C. Run the SigVerif.exe command. 

D. Enable the Code signing for device drivers Domain Group Policy setting. 

Answer:

Q5. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. 

From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. 

Which command should you run? 

A. Start disk.exe /d \\computer2 

B. Tscon disk.exe /DEST:computer2 

C. Winrm e disk.exe Cr:computer2 

D. Winrs r:computer2 disk.exe 

Answer:

Explanation: 

WinrsYou can use WinRS to execute command-line utilities or scripts on a remote computer. To use WinRS, open a command prompt and prefix the command that you want to run on the remote computer with the WinRS –r: RemoteComputerName command. For example, to execute the Ipconfig command on a computer named Aberdeen, issue the command: WinRS –r:Aberdeen ipconfig. 

The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. 

Q6. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an inbound rule to allow port 5986 for the Public connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the connection type. 

C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type. 

Answer:

Q7. - (Topic 5) 

You use a computer that has Windows 7 SP1 installed to access your company's internal website. The website requires a secure connection. The certificate is a self-signed Secure Socket Layer (SSL). 

You attempt to connect to the internal website. You receive the following error message: 

"There is a problem with this website's security certificate." 

You need to be able to connect to the internal website successfully. 

What should you do? 

A. From Internet Explorer, add the website to the Local Intranet zone. 

B. From Certificate Manager, import the website's certificate into the computer's Trusted Publishers store. 

C. From Certificate Manager, import the website's certificate into your Trusted Root Certification Authorities store. 

D. From Certificate Manager, import the website's certificate into your Personal store. 

Answer:

Q8. - (Topic 4) 

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group policy. 

A user indicates that he is unable to connect to a remote FTP server. 

You need to view the status of TCP/UDP ports at the user's computer. 

Which command should you run? 

A. netstat -o 

B. netstat -a 

C. ipconfig /all 

D. netstat –an 

Answer:

Q9. - (Topic 3) 

You need to create a VPN connection. 

What should you do? 

A. From Windows Explorer, right-click Computer and then click Map network drive. 

B. From Windows Explorer, right-click Computer and then click Add a network location. 

C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network. 

D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace. 

Answer:

Explanation: 

Virtual Private Networks When you create a VPN connection, you need to specify the address of the VPN server that you are connecting to and your authentication credentials. You can create a new VPN connection in the Network And Sharing Center by clicking Set Up A New Connection Or Network and then Connect to a Workplace. When you create a new VPN connection, Windows 7 sets the VPN type to Automatic. You can configure a connection to use a specific VPN protocol, but if you do this, Windows 7 does not try to use other VPN protocols if the protocol you select is not available. 

Q10. HOTSPOT - (Topic 6) 

A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails. 

Email 1 

From: Company CIO 

Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7. 

Email 2 

From: System Administrator 

Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files. 

Email 3 

From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support 

the inference as stated? (This question is worth three points. ) 

Answer:  

Q11. - (Topic 2) 

You have a computer that runs Windows 7. 

You need to copy files to a virtual hard disk (VHD) file. 

What should you do first? 

A. Run Dism.exe and specify the /image and /online parameters. 

B. Open Windows Explorer, right-click the VHD file and select Open. 

C. Run Diskpart.exe and then run the Select and Attach commands. 

D. Run Imagex.exe and specify the /mountrw and /append parameters. 

Answer:

Explanation: 

DiskpartMicrosoft command-line tool Diskpart is used to create and format volumes on the target computer.SelectShift the focus to an object.AttachAttaches a virtual disk file. 

Q12. HOTSPOT - (Topic 4) 

You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue? 

Answer:  

Q13. - (Topic 2) 

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table. 

You install a new 250-GB hard disk in the computer. 

You need to ensure that all the files on the computer are available if a single disk fails. 

What should you do? 

A. Create a mount point on C and D and then create a striped volume. 

B. Create a mount point on C and D and then create two striped volumes. 

C. Convert both disks to dynamic disks and then create a mirrored volume. 

D. Convert both disks to dynamic disks and then create two mirrored volumes. 

Answer:

Explanation: 

Creating a Mirrored Volume (RAID-1)A mirrored or RAID-1 volume provides availability and fault tolerance but does not improve performance. It uses two disks (or two portions on separate disks) that are the same size. Any changes made to the first disk of a mirror set are also made to its mirror disk. If the first disk fails, the mirror is broken and the second disk is used until the first is repaired or replaced. The mirror is then re-created, and the information on the working disk is mirrored on the repaired disk. The disadvantage of RAID-1 is that you need (for example) two 200-GB disks to hold 200 GB of data. The advantage is that you can mirror a system disk containing your operating system.You create a mirrored volume using a very similar procedure to the one that creates a striped volume, except that you right-click the first disk of your mirror and click New Mirrored Volume to start the appropriate wizard. You then select the second disk. The second disk needs to have a portion of unallocated space that is at least as large as the disk you want to mirror. The drive letter for a mirrored volume is the same as the drive letter of the first disk. You can also use the Diskpart tool to create a mirrored volume. At the DISKPART> prompt you first use the select disk command to select the first disk. You then enter a command with the syntax add disk=<n>to specify the mirror disk. 

Q14. - (Topic 6) 

Your organization uses Windows 7 computers. 

You remotely administer a computer. You attempt to ping the computer to verify that it is on the network, but you do not receive a response. The user is able to connect to network resources. 

You need to verify that the firewall on the computer is configured to allow pings. 

What should you do? 

A. Verify that the rule name Network Discovery (NB-Name-In) for inbound connections is enabled. 

B. Verify that the rule name File and Printer Sharing (Echo Request -ICMPv4-IN) for outbound connections is enabled. 

C. Verify that the rule name File and Printer Sharing (Echo Request -JCMPv4-IN) for inbound connections is enabled. 

D. Verify that the rule name Network Discovery (NB-Name-In) for outbound connections is enabled. 

Answer:

Explanation: Ref: http://technet.microsoft.com/en-us/library/cc732509(v=WS.10).aspx 

Q15. - (Topic 3) 

You have a computer named Computer1 that runs Windows 7. Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1. 

A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1. A user named User1 is a member of HRUsers. 

You need to configure the computer to meet the following requirements: 

Allow User1 to print to Printer1 Prevent User1 from establishing Remote Desktop sessions to Computer1 Allow other members of HRUsers to connect to Computer1 by using Remote Desktop 

What should you do? 

A. Remove User1 from the HRUsers group. 

B. Remove HRUsers from the Remote Desktop Users group. 

C. Assign User1 the Deny log on through Remote Desktop Services user right. 

D. Assign User1 the Deny access to this computer from the network user right. Assign HRUsers the Allow log on locally user right. 

Answer:

START 70-680 EXAM