70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(5580 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 3) 

You have a computer that runs Windows 7. 

The Encrypting File System (EFS) key is compromised. 

You need to create a new EFS key. 

Which command should you run? 

A. Certutil -getkey 

B. Cipher.exe /k 

C. Icacls.exe /r 

D. Syskey.exe 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed.When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. /K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 

Q2. - (Topic 5) 

Your company Research department includes client computers that have Windows 7 and Windows Vista installed on separate partitions in a dual-boot configuration. The computers boot into Windows 7 by default or users can choose to boot into Windows Vista during startup. 

The company management has decided that the Windows Vista partition must be deleted from all the computers. 

You need to ensure that the staff of the Research department are not prompted to select a boot option during startup and that Windows 7 is chosen automatically. 

What should you do? 

A. In Windows Vista, from an elevated command prompt, run bcdedit /delete {current}. 

B. Select the Selective startup option button by using msconfig.exe. 

C. In Windows Vista, from an elevated command prompt, run bcdedit /delete {default}. 

D. In Windows 7, from an elevated command prompt, run bcdedit /delete {default}. 

Answer:

Q3. - (Topic 5) 

Your company network includes client computers that have Windows 7 installed. All client computers have NetBIOS disabled. 

You need to view the status of all TCP/UDP ports. 

Which command should you run? 

A. nbtstat -n 

B. ipconfig /all 

C. netstat -an 

D. ipconfig /displaydns 

Answer:

Q4. - (Topic 1) 

Which of the following is not a Windows PE tool? 

A. Diskpart 

B. Oscdimg 

C. Winpeshl 

D. None of the above. 

Answer:

Q5. - (Topic 1) 

You manage a computer that runs Windows 7. 

You are tasked to identify which applications were installed during the last week. 

What Windows component would you use to find this information? Choose two. 

A. Check the Windows System Change Log in the Control Panel. 

B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel. 

C. The informational events should be reviewed from Reliability Monitor. 

D. Check the Windows System Diagnostics Report under the Performance Monitor MMC. 

Answer: B,C 

Q6. - (Topic 2) 

Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot? 

A. Copy and paste a Microsoft Word icon to the Taskbar. 

B. Right click on the Microsoft Word icon and choose, "Staple to Superbar". 

C. Right click on the Microsoft Word icon and choose, "Pin this programm to taskbar". 

D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar". 

Answer:

Q7. - (Topic 2) 

You have a computer that runs Windows 7. The computer is joined to a domain. 

You need to ensure that only approved USB drives can be used on the computer. 

Which two policy settings should you configure? (Each correct answer presents part of the solution. Choose two.) 

A. Enable Prevent installation of removable devices. 

B. Enable Prevent installation of devices not described by other policy settings. 

C. Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the approved USB drives. 

D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives. 

Answer: B,D 

Q8. - (Topic 4) 

You create a new virtual hard disk (VND) on a Windows 7 Enterprise computer. Then you install Windows 7 on the VHD. 

After you reboot the computer, the Windows 7 boot menu shows two different Windows 7 installations titled "Windows 7". 

What should you do? 

A. Add a boot image in WDS. 

B. Run the BCDEdit command. 

C. User Sysprep with an answer file and set the PersistAllDeviceInstalls option in the file to true. 

D. Run the PEImg /Prep command 

E. Create a capture image in WDS. 

F. Run the DiskPart command and the Attach command option. 

G. Run the Start /w ocsetup command. 

H. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. 

I. Run the Dism command with the /Add-Package option. 

J. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. 

K. Run the Dism command with the /Mount-WIM option. 

L. Run the ImageX command with the /Mount parameter. 

M. Run the Dism command with the /Add-Driver option. 

N. User Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. 

Answer:

Explanation: 

http://technet.microsoft.com/en-us/library/cc709667(ws.10).aspx 

Q9. - (Topic 2) 

You have two computers that run Windows 7. Both computers are connected to a network and have IP addresses within the 172.16.10.0/24 subnet. 

You need to ensure that both computers can join a HomeGroup. 

What should you do? 

A. Enable network discovery. 

B. Set the network location to Home network. 

C. Configure Windows Firewall to allow the Netlogon service. 

D. Change the IP addresses to be within the 192.168.1.0/24 subnet. 

Answer:

Explanation: 

Windows Firewall does not allow you to create firewall rules for specific network locations on the basis of port address. Windows Firewall does not allow you to create rules that differentiate between the home and work network locations. You can only create rules that differentiate on the basis of home and work or public network locations.HomeGroup ConnectionsThis option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile. 

Q10. HOTSPOT - (Topic 4) 

You administer a computer that has Windows 7 Enterprise installed. 

The computer has an application that must run by using administrative permission. 

A user who has a standard user account connects to the computer by using a Remote Desktop connection. The user right-clicks the application shortcut, but the run as administrator option is unavailable. 

You need to ensure that the user is able to run the application by using administrative permissions. 

Which services should you configure? (To answer, select the appropriate option or options in the answer area). 

Answer:  

Q11. - (Topic 2) 

Your network consists of a single Active Directory domain named contoso.com. 

You have a server named Server1 that runs a custom network application. 

Server1 has the following IP addresses: 

. 192.168.15.10 

. 192.168.15.11 

You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. 

What should you do from the computer? 

A. Edit the hosts file 

B. Edit the lmhosts file 

C. Run Ipconfig.exe /flushdns 

D. Run Netsh interface ipv4 reset 

Answer:

Explanation: 

Differences Between the HOSTS and LMHOSTS Files in Windows NT In Windows NT, the HOSTS file is for TCP/IP utilities, and the LMHOSTS file is for LAN Manager NET utilities. If you cannot PING another computer (using a friendly name), check the HOSTS file. If you cannot NET VIEW a server using only the TCP/IP protocol, check the LMHOSTS file. 

Hosts fileThe Hosts file is a common way to resolve a host name to an IP address through a locally stored text file that contains IP-address-to-host-name mappings. On most UNIX-based computers, this file is /etc/hosts. On Windows-based computers, this file is the Hosts file in the systemroot\System32\Drivers\Etc folder. The following describes the attributes of the Hosts file for Windows: A single entry consists of an IP (IPv4 or IPv6) address and one or more host names. The Hosts file is dynamically loaded into the DNS client resolver cache, which Windows Sockets applications use to resolve a host name to an IP address on both local and remote subnets. When you create entries in the Hosts file and save it, its contents are automatically loaded into the DNS client resolver cache. The Hosts file contains a default entry for the host name localhost. The Hosts file can be edited with any text editor. Each host name is limited to 255 characters. Entries in the Hosts file for Windows–based computers are not case sensitive. The advantage of using a Hosts file is that users can customize it for themselves. Each user can create whatever entries they want, including easy-to-remember nicknames for frequently accessed resources. However, the individual maintenance required for the Hosts file does not scale well to storing large numbers of FQDN mappings or reflecting changes to IP addresses for servers and network resources. The solution for the large-scale storage and maintenance of FQDN mappings is DNS. The solution for the maintenance of FQDN mappings for changing IP addresses is DNS dynamic update.NOT LMHOSTS FileThe LMHOSTS file is a local text file that maps IP addresses to NetBIOS names of remote servers with which you want to communicate over the TCP/IP protocol. Windows recognizes names instead of IP addresses for network requests and a name discovery process is used to correctly route network requests with TCP/IP. Because the name discovery process is generally not routed by an IP router, the LMHOSTS file allows Windows machines to communicate using TCP/IP across a subnet. 

-LMHOSTS contains IP address to "NetBIOS over TCP/IP" name translations. 

-LMHOSTS is only used by the NBT (NetBIOS over TCP/IP) interface. 

-LMHOSTS file contains some valuable additions to the LAN Manager and Windows for Workgroups 

-LMHOSTS file, such as the ability to support routed domain logon validation. 

-LMHOSTS contains static information about TCP/IP addresses, but using logon scripts and/or the replicator service, the "master" file can be distributed transparently across all stations. 

-By default, the LMHOSTS file should be located in the directory %SYSTEMROOT%\SYSTEM32\DRIVERS \ETC (usually C:\WINNT\SYSTEM32\DRIVERS\ETC). 

Other info http://support.microsoft.com/kb/105997 

Q12. - (Topic 4) 

You need to identify the hardware failures that have occurred on your computer in the past six months. 

What should you do? 

A. From the Control Panel, open Performance Information and Tools. 

B. From the Control Panel, open Troubleshooting. 

C. From the Action Center, under Maintenance, click the View reliability history. 

D. From the Action Center, open Recovery. 

Answer:

Q13. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. 

You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

C. From the NAP Client Configuration console, configure the user interface settings. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:

Q14. - (Topic 3) 

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. 

You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2. 

You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort. 

Which file should you modify? 

A. config.xml 

B. migapp.xml 

C. migdocs.xml 

D. miguser.xml 

Answer:

Explanation: 

Config.xml This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 

Q15. - (Topic 5) 

You have a computer that has the following hardware configuration: 

1.6-gigahertz (GHz) processor (64-bit) 

8-GB RAM 

500-GB hard disk 

Graphics card that has 128-MB RAM 

You need to select an edition of Windows 7 to meet the following requirements: 

Support DirectAccess 

Support Windows XP Mode 

Use all of the installed memory 

Support joining an Active Directory domain 

Which edition should you choose? 

A. Windows 7 Enterprise (x86) 

B. Windows 7 Professional (64-bit) 

C. Windows 7 Enterprise (64-bit) 

D. Windows 7 Ultimate (x86) 

Answer:

START 70-680 EXAM