70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(4185 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 2) 

You have a dual boot PC running both Vista and Windows 7 on partitions on the computer. Which file would you edit to force the PC to book Vista by default? 

A. boot.ini 

B. ntfsboot.cfg 

C. bcdedit.exe 

D. system.cfg 

Answer:

Q2. - (Topic 4) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You need to analyze the performance of the computer to meet the following requirements: 

. Include the CPU, Memory, and Disk subsystems. 

. Send notifications to an administrator for predefined thresholds. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:

Q3. - (Topic 2) 

You have a computer that runs windows 7. 

The network contains a monitoring server named server1 Computer runs a monitoring service named service1. 

Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1. 

What should you do? 

A. From windows Firewall with Advanced Security, create a predefined rule. 

B. From windows Firewall with Advanced Security, create custom rule. 

C. From the Network and Sharing Center, modify the network location settings. 

D. From the Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Explanation: 

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 

Q4. - (Topic 3) 

You have an offline virtual hard disk (VHD) that contains an installation of Windows 7 Home Premium. 

You need to upgrade the installation to Windows 7 Ultimate by using the minimum amount of administrative effort. 

What should you do? 

A. From a computer that runs Windows 7, attach the VHD. Run Imagex.exe and specify the /apply parameter. 

B. From a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /set-edition parameter. 

C. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Dism.exe and specify the /image parameter. 

D. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Imagex.exe and specify the /capture parameter. 

Answer:

Explanation: 

Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. 

You can use DISM to perform the following actions: 

-Prepare a Windows PE image. 

-Enable or disable Windows features within an image. 

-Upgrade a Windows image to a different edition. 

-Add, remove, and enumerate packages. 

-Add, remove, and enumerate drivers. 

-Apply changes based on the offline servicing section of an unattended answer file. 

-Configure international settings. 

-Implement powerful logging features. 

-Service operating systems such as Windows Vista with SP1 and Windows Server 2008. 

-Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host. 

-Service all platforms (32-bit, 64-bit, and Itanium). 

-Use existing Package Manager scripts. 

Use the /Set-Edition option without the /ProductKey option to change an offline Windows image to a higher edition. Use /Get-TargetEditions to find the edition ID. Use the /Set-Edition option with the /ProductKey option only to change a running Windows Server. 2008 R2 operating system to a higher edition. 

Q5. - (Topic 1) 

You have a computer named Computer1 that runs Windows 7. The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008. 

You log on to the computer by using an account named User1. 

You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1. 

What should you do on Computer1? 

A. From User Accounts, select Link online IDs. 

B. From Windows CardSpace, select Add a card. 

C. From Credential Manager, select Add a Windows credential. 

D. From Local Security Policy, modify the Access this computer from the network user right. 

Answer:

Explanation: 

Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson. 

Q6. HOTSPOT - (Topic 6) 

A manufacturing company has Windows Vista and Windows XP computers. 

You are responsible for upgrading all computers to Windows 7. 

You test the Windows 7 installation on a Windows Vista computer. Early in the installation process, you are prompted to choose the "Upgrade" option or the "Custom (Advanced)" installation option. 

You need to determine which installation option is appropriate for the different computers in your company. 

In the table below, identify the characteristics of the Upgrade and Custom installation options. (Make only one selection in each column. This question is worth two points. ) 

Answer:  

Q7. - (Topic 5) 

Your company has an Active Directory domain and several branch locations. A Group Policy Object (GPO) exists for each branch office and for the main office. Computer accounts for computers used by sales employees are located in the Sales-Computers organizational unit (OU). 

The sales employees use portable computers that have Windows 7 Enterprise installed. 

Employees report that the documents that must be printed are sent to printers in their home office when they travel to the different branch offices. 

You need to ensure that documents are printed automatically to the correct printer when the sales employees travel to a branch office. 

What should you do first? 

A. From Devices and Printers, select Change my default printer when I change networks. 

B. Publish all printers to Active Directory. 

C. Link the GPO of the branch offices to the Sales-Computers OU. 

D. From Print Management, select the branch office printer, and select set as default from the Printer menu. 

E. From the Network and Sharing Center, select Advanced sharing settings, and then select Turn on file and printer sharing. 

Answer:

Q8. - (Topic 3) 

A standard user named User1 has a computer that runs Windows 7. 

You need to ensure that User1 can run Windows Easy Transfer. 

What should you do? 

A. Disable User Account Control (UAC). 

B. Add User1 to the Administrators group. 

C. Configure User1 to have a complex password. 

D. Copy the support folder from the Windows 7 installation media to the local hard disk drive. 

Answer:

Explanation: 

Windows Easy Transfer Migration After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges. 

To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer. 

NOT User Account Control (UAC) UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks. 

Q9. - (Topic 1) 

Your network has a main office and a branch office. 

The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. 

At the branch office, a computer named Computer1 is experiencing performance issues. 

You need to temporarily prevent all computers from retrieving cached content from Computer1. 

What should you do on Computer1? 

A. At the command prompt, run Netsh branchcache flush. 

B. At the command prompt, run Netsh branchcache dump. 

C. Modify the Configure BranchCache for network files Group Policy setting. 

D. Modify the Set percentage of disk space used for client computer cache Group Policy setting. 

Answer:

Explanation: 

Flush 

Deletes the contents of the local BranchCache cache. 

Q10. - (Topic 1) 

Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. (Click the Exhibit button.) 

In the branch office, you deploy a new computer named Computer1 that runs Windows 7. 

You need to assign an IP address to Computer1. 

Which IP address should you use? 

A. 192.168.2.30 

B. 192.168.2.40 

C. 192.168.2.63 

D. 192.168.2.65 

Answer:

Explanation: 

Internal IP Adress of router is 192.168.2.62/27Leaves 5 bits for range = 32 addresses (including the 2 reserved addresses)Subnet Mask = 255.255.255.224 

Q11. - (Topic 1) 

You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. 

You need to ensure that you can enable BitLocker to go on the USB disk. 

What should you do? 

A. Enable Encrypting File System (EFS). 

B. Upgrade the computer to Windows 7 Enterprise. 

C. Initialize the Trusted Platform Module (TPM) hardware. 

D. Obtain a client certificate from an enterprise certification authority (CA). 

Answer:

Explanation: 

Windows 7 ProfessionalWindows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.Windows 7 Enterprise and Ultimate EditionsThe Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft's volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD. 

Q12. - (Topic 5) 

You administer computers that have Windows 7 and Internet Explorer 8 installed. 

You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer. 

You need to ensure that any data about your browser session is not saved on the computer. 

What should you do? 

A. Disable Internet Connection Sharing. 

B. From Internet Options, select Delete browsing history on exit. 

C. Start the Microsoft Network Access Protection service. 

D. From the Safety drop-down menu, configure InPrivate Filtering. 

Answer:

Q13. - (Topic 6) 

You are a network administrator for Southbridge Video, a company that records and 

processes videos. Your network consists of Windows 7 computers and Windows Server 2008 R2 servers. 

Management secures a contract to provide closed captioning a large number of videos. They open a new, remote location with a slow network link and hire temporary staff to perform the work. The videos that the users need to view are on a file share on the corporate network. Users may have to view the video files multiple times to complete their work. 

You need to ensure that the slow network link is used as efficiently as possible. 

What should you do? 

A. Enable transparent caching. 

B. Enable folder redirection. 

C. Use DirectAccess to connect to the share. 

D. Configure the client machines to use offline file synchronization. 

Answer:

Q14. - (Topic 4) 

You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. 

You discover that Windows is unable to install the necessary device drivers for the mobile device. 

You need to ensure that you can synchronize files to the mobile device. 

What should you do? 

A. From WindowsMobilityCenter, click Sync settings. 

B. From Devices and Printers, right-click the device and click Troubleshoot. 

C. From SyncCenter, click Set up new sync partnerships. 

D. From Device Manager, click Scan for hardware changes. 

Answer:

Q15. DRAG DROP - (Topic 5) 

You use a computer that has Windows 7 Enterprise installed. 

You install two new hard disk drives and verify that the disks have been detected by Disk Management. 

You need to configure the two new disks as a software fault-tolerant disk array. 

What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) 

Answer:  

START 70-680 EXAM