70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(30435 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 3) 

You have a computer that contains the folders shows in the following table. 

You accidentally delete the Data1 folder. 

You need to restore the contents of the Data1 folder. The solution must not overwrite any changes to the Data2 folder. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of the User1 folder, click Copy. 

C. From the Sharing tab of the User1 folder, modify the Caching settings. 

D. Start the computer and then press F8. Restore the Last Known Good Configuration. 

Answer:

Explanation: Copy from Previous Versions allows the data to be returned to a user detailed location. 

The Previous Versions tab, showing some previous versions of files 

NOT Recovery:Would affect Data2NOT Sharing:Modifying Caching settings wont help.NOT Last Known Good Configuration:Extreme overkill and would affect Data2 

Q2. - (Topic 1) 

You have a computer that runs Windows 7. 

Your network contains a VPN server that runs Windows Server 2008. 

You need to authenticate to the VPN server by using a smart card. 

Which authentication setting should you choose? 

A. CHAP 

B. EAP 

C. MS-CHAP v2 

D. PAP 

Answer:

Explanation: 

VPN Server Software Requirements VPN server software requirements for smart card access are relatively straightforward. The remote access servers must run Windows 2000 Server or later, have Routing and Remote Access enabled, and must support Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). EAP-TLS is a mutual authentication mechanism developed for use in conjunction with security devices, such as smart cards and hardware tokens. EAP-TLS supports Point-to-Point Protocol (PPP) and VPN connections, and enables exchange of shared secret keys for MPPE, in addition to Ipsec. The main benefits of EAP-TLS are its resistance to brute-force attacks and its support for mutual authentication. With mutual authentication, both client and server must prove their identities to each other. If either client or server does not send a certificate to validate its identity, the connection terminates.Microsoft Windows Server. 2003 supports EAP-TLS for dial-up and VPN connections, which enables the use of smart cards for remote users. For more information about EAP-TLS, see the Extensible Authentication Protocol (EAP) topic at www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/auth_eap. mspx. For more information about EAP certificate requirements, see the Microsoft Knowledge Base article "Certificate Requirements when you use EAP-TLS or PEAP with EAP-TLS" at http://support.microsoft.com/default.aspx? scid=814394. 

Q3. - (Topic 1) 

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. 

You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. 

A file server named Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Minimize network traffic between the main office and the branch office 

. Ensure that Computer1 can only access resources in Share1 while it is connected to the network. 

What should you do? 

A. On Computer1, enable offline files. 

B. On Computer1, enable transparent caching. 

C. On Server1, configure DirectAccess. 

D. On Server1, configure Share1 to be available offline. 

Answer:

Explanation: 

Transparent Caching When you enable transparent caching, Windows 7 keeps a cached copy of all files that a user opens from shared folders on the local volume. The first time a user opens the file, the file is stored in the local cache. When the user opens the file again, Windows 7 checks the file to ensure that the cached copy is up to date and if it is, opens that instead. If the copy is not up to date, the client opens the copy hosted on the shared folder, also placing it in the local cache. Using a locally cached copy speeds up access to files stored on file servers on remote networks from the client. When a user changes a file, the client writes the changes to the copy of the file stored on the shared folder. When the shared folder is unavailable, the transparently cached copy is also unavailable. Transparent caching does not attempt to keep the local copy synced with the copy of the file on the remote file server as the Offline Files feature does. Transparent caching works on all files in a shared folder, not just those that you have configured to be available offline. 

Q4. - (Topic 1) 

You have two computers named Computer1 and Computer2 that run Windows 7. 

You need to ensure that you can remotely execute commands on Computer2 from Computer1. 

What should you do? 

A. Run Winrm quickconfig on Computer1 

B. Run Winrm quickconfig on Computer2 

C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1 

D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2 

Answer:

Explanation: 

Windows Remote Management Service The Windows Remote Management service allows you to execute commands on a remote computer, either from the command prompt using WinRS or from Windows PowerShell. Before you can use WinRS or Windows PowerShell for remote management tasks, it is necessary to configure the target computer using the WinRM command. To configure the target computer, you must run the command WinRM quickconfig from an elevated command prompt. Executing WinRM quickconfig does the following: 

-Starts the WinRM service 

-Configures the WinRM service startup type to delayed automatic start 

-Configures the LocalAccountTokenFilterPolicy to grant administrative rights remotely to local users 

-Configures the WinRM listener on http://* to accept WS-Man requests 

-Configures the WinRM firewall exception 

Q5. HOTSPOT - (Topic 6) 

A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails. 

Email 1 

From: Company CIO 

Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7. 

Email 2 

From: System Administrator 

Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files. 

Email 3 

From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support 

the inference as stated? (This question is worth three points. ) 

Answer:  

Q6. - (Topic 1) 

A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate? 

A. Sysprep 

B. Windows PE 

C. WDS 

D. Windows Anytime Upgrade 

Answer:

Explanation: 

Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required. 

Q7. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to capture the operating system and all the computer configurations to a Windows image (WIM) file. 

What should you do before you capture the image? 

A. Run Oscdimg.exe. 

B. Run Windows System Image Manager (Windows SIM). 

C. Open a command prompt that has elevated privileges. 

D. Start the computer by using Windows Preinstallation Environment (Windows PE). 

Answer:

Explanation: 

Windows PE To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment 

(Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. Once you have successfully booted into the Windows PE environment, you can connect to the network share and begin the installation by running Setup.exe.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. 

Q8. - (Topic 5) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. What should you do? 

A. From Device Manager, click Add legacy hardware. 

B. From Accessories, click Connect to a Network Projector. 

C. Run the Displayswitch.exe command and select Projector only. 

D. From Display, click Connect to a projector. 

Answer:

Q9. - (Topic 2) 

You have a computer that runs Windows 7. The computers hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) 

A. Create a system image. 

B. Create a system repair disc. 

C. Shrink C and then create a new partition. 

D. Connect an external hard disk to the computer. 

Answer: A,D 

Explanation: 

A System Image is a copy of all the files and folders on the system disk (and other specified hard disks) on a computer. You can use a System Image backup to restore the computer to exactly what its configuration was when the System Image backup was created. 

External hard drives can be removed and stored in a secure location.NOT System Repair Disc:A system repair disc can be used to boot your computer. It also contains Windows system recovery tools that can help you recover Windows from a serious error or restore your computer from a system image. It does not actually save the data and will only help if a system image exists elsewhere.NOT Shrink: All partitions are inaccessible is a hard disk fails. 

Q10. - (Topic 5) 

A computer that runs Windows 7 becomes infected with malware. 

You scan the computer, remove all detected malware components, and restart the computer. 

When you attempt to connect to a financial institution's Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site. 

You need to prevent the computer from being redirected to the potential phishing site. 

What should you do? 

A. Configure the SmartScreen Filter. 

B. Run Ipconfig /flushdns. 

C. Configure InPrivate Browsing. 

D. Modify the hosts file. 

Answer:

Q11. - (Topic 2) 

You have 20 client computers. The computers run Windows XP. The computers are joined to a domain. 

You plan to perform installation of Windows 7 on the computers. 

You need to transfer all users' documents and settings. You must exclude music and video files. 

You need to use the minimum amount of administration effort. 

What should you do first? 

A. Create a config.xml file. Configure a logon script for windows XP computers to launch Windows 7 installations. 

B. Modify the migapp.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

C. Modify the miguser.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

D. Modify the migdocs.xml file. Configure a logon script for the Windows XP computer to launch Windows 7 installation. 

Answer:

Q12. - (Topic 4) 

You use a computer that has Windows SP1 installed. The computer has a shared folder named c:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folders. You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C: \Software folder. 

B. Run the Net Share command. 

C. Run the Net View command. 

D. View the Share permissions on C:\Software. 

Answer:

Q13. - (Topic 5) 

Your company network includes desktop computers that have Windows XP Professional SP1 64-bit installed. 

The company has purchased new portable computers that have Windows 7 Professional 32-bit installed. 

You need to be able to migrate user profiles from the desktop computers to the portable computers. 

What should you do? 

A. Run scanstate /nocompress on the desktop computers. 

B. Stop the User Profile Service on the desktop computers. 

C. Add each desktop user to the local Administrators on the desktop computers. 

D. Replace all versions of Windows 7 with 64-bit. 

Answer:

Q14. HOTSPOT - (Topic 6) 

You are the network administrator at a scientific research firm. You have a network of Windows Server 2008 R2 servers and Windows 7 Enterprise computers in a domain configuration. 

Management needs to support a new, remote laboratory that is connected by a very slow network link. The primary work of the five scientists is to carry out experiments by following documentation that is stored on the corporate network. The only equipment at the remote site includes five computers and network connectivity devices. 

You receive the following three email messages: 

Message 1 

All, 

Due to business constraints, we are unable to support the purchase of a server at the new remote location to service such a small number of users. The minimum number of users to support a server purchase is 10. 

Bart Cushing 

Purchasing Department 

Message 2 

Dear all, 

The new lab is up and running. By far the biggest problem is the exceptionally slow speed downloading the experiment descriptions from corporate headquarters. Is there a way to fix 

the problem? Thanks! Dana Wright 

Remote Lab Manager 

Message 3 

To all employees of A Datum Corp: 

This is a friendly reminder that corporate security policy prohibits users from creating file 

shares computers. 

Thank you for your attention to this matter 

Gwen Francis 

You need to determine if BranchCache can support the environment. 

Consider each of the following statements. Does the information in the three messages support the interference as stated? Each correct selection is worth one point. 

Answer:  

Q15. - (Topic 5) 

You have a computer that has the following hardware configuration: 

1.6-gigahertz (GHz) processor (64-bit) 

8-GB RAM 

500-GB hard disk 

Graphics card that has 128-MB RAM 

You need to select an edition of Windows 7 to meet the following requirements: 

Support DirectAccess 

Support Windows XP Mode 

Use all of the installed memory 

Support joining an Active Directory domain 

Which edition should you choose? 

A. Windows 7 Enterprise (x86) 

B. Windows 7 Professional (64-bit) 

C. Windows 7 Enterprise (64-bit) 

D. Windows 7 Ultimate (x86) 

Answer:

START 70-680 EXAM