70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(13995 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 2) 

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do? 

A. Enable InPrivate Filtering and click Automatically block. 

B. Add the Web site for the content provider to the Restricted sites zone. 

C. Enable InPrivate Filtering and select the Choose content to block or allow option. 

D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option. 

Answer:

Q2. - (Topic 3) 

You have a computer that runs Windows 7. 

A user installs a third-party media player on the computer. 

You discover that all media files automatically open by using the third-party media player. 

You need to ensure that all media files open automatically by using Windows Media Player. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you do? 

A. Select a media file. Right-click the file and select open with. 

B. Select a media file. Right-click the file and select Restore previous versions. 

C. From Control Panel, modify the Set your default programs settings. 

D. From Control Panel, modify the Set program access and computer defaults settings. 

Answer:

Q3. - (Topic 1) 

You have a computer that runs Windows 7. 

You perform an image backup. 

A virus infects the computer and causes the computer to become unresponsive. 

You need to restore the computer as quickly as possible. 

What should you do? 

A. Start the computer by using the Last Known Good Configuration feature. 

B. Start the computer from the Windows 7 DVD and then use the Startup Repair tool. 

C. Start the computer from the Windows 7 DVD and then use the System Image Recovery tool. 

D. Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe. 

Answer:

Q4. - (Topic 2) 

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. 

You need to prevent the users from using more than 2 GB of disk space on drive C. 

What should you do? 

A. From a Group Policy object (GPO), enable the Limit profile size setting. 

B. Enable System Protection for Local Disk (C) and set the disk space usage. 

C. Enable disk quota management on Computer1 and configure a default quota limit. 

D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting. 

Answer:

Explanation: 

Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB. 

Q5. - (Topic 4) 

A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) on a Windows 7 client computer. 

You capture an image of the client computer. 

A new driver is released for the network card that is installed in the client computer. 

You need to update the image with the new driver for the network card. 

What should you do first? 

A. Add a boot image in WDS. 

B. Create a capture image in WDS. 

C. Run the BCDEdit command. 

D. Run the PEImg /Prepcommand. 

E. Run the Start /w ocsetup command. 

F. Run the Dism command with the/Add-Driver option, 

G. Run the Dism command with the /Mount-Wim option. 

H. Run the Dism command with the /Add-Package option. 

I. Run the ImageX command with the /Mountparameter. 

J. Run the DiskPart command and the Attach command option. 

K. Use Sysprep with an answer file and set the PersistAMDeviceInstalls option in the answer file to True. 

L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. 

M. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. 

N. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. 

Answer:

Q6. - (Topic 3) 

You have a computer that runs Windows 7 Home Premium. 

You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. 

What should you do? 

A. Perform a Windows Anytime Upgrade. 

B. Download and run the Windows 7 Upgrade Advisor. 

C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. 

Answer:

Explanation: 

Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required. 

Windows Anytime Upgrade 

Q7. - (Topic 3) 

You have a computer that runs Windows 7. The computer contains a folder named C:\data. 

You use Advanced Sharing to share C:\data by using the default share permissions. 

When a user tries to access the share over the network, he gets an "Access is Denied" error message. 

You need to ensure that the user can access the share. 

What should you do? 

A. Allow file and printer sharing through Windows Firewall. 

B. Change the network location from a Public network to a Home or Work network. 

C. From the Security settings of the folder, assign the user the Read NTFS permission. 

D. From the Advanced Sharing settings of the folder, assign the user the Read share permission. 

Answer:

Explanation: 

Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container. 

Q8. - (Topic 4) 

You use a computer that has Windows SP1 installed. The computer has a shared folder named c:\Software. 

User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folders. You need to verify whether User1 can save files to C:\Software. 

What should you do? 

A. Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C: \Software folder. 

B. Run the Net Share command. 

C. Run the Net View command. 

D. View the Share permissions on C:\Software. 

Answer:

Q9. DRAG DROP - (Topic 6) 

An employee has a Windows Vista SP1 32-bit computer that uses legacy devices. You need to upgrade the computer to Windows 7 32-bit based on the following 

requirements: 

. Ensure application and third-party hardware compatibility. 

. Preserve existing applications, settings, and documents. 

Which three actions should you perform in sequence? (To answer, move the appropriate three actions from the list of actions to the answer area and arrange them in the correct order. ) 

Answer:  

Q10. - (Topic 3) 

You have a computer that runs Windows 7. 

You need to configure an application to connect to the computer by using the IPV6 loopback address. 

Which address should you specify? 

A. ::1 

B. 12::1 

C. 127.0.0.1 

D. fe80::f56f:56cb:a136:4184 

Answer:

Explanation: 

Loopback address The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself. It is equivalent to the IPv4 loopback address of 

127.0.0.1. Packets addressed to the loopback address must never be sent on a link or forwarded by a router.Link-LocalLink-local addresses always begin with FE80. With the 64-bit interface identifier, the prefix for link-local addresses is always FE80::/64. An IPv6 router never forwards link-local traffic beyond the link. Nodes use link-local addresses when communicating with neighboring nodes on the same link. For example, on a single-link IPv6 network with no router, hosts use link-local addresses to communicate with other hosts on the link. Link-local addresses are equivalent to Automatic Private IP Addressing (APIPA) IPv4 addresses autoconfigured on computers that are running Windows. APIPA addresses use the 169.254.0.0/16 prefix. The scope of a link-local address is the local link. A link-local address is required for Neighbor Discovery processes and is always automatically configured, even in the absence of all other unicast addresses. 

Q11. - (Topic 2) 

To establish a DirectAccess connection to the network, what is the first requirement? 

A. Install a certificate 

B. Create a VPN connection 

C. A static IPv4 address 

D. A static IPv6 address 

Answer:

Q12. - (Topic 3) 

You have a computer that runs Windows 7. 

Your network has a SSTP VPN server that uses a self-signed certificate. 

When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate". 

You need to prevent the error message from appearing when you connect to the VPN server. 

What should you do? 

A. From the properties of the VPN connection, modify the dialing options. 

B. From the properties of the VPN connection, modify the data encryption settings. 

C. From Certificate Manager, import the servers certificate into the Personal store. 

D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store. 

Answer:

Explanation: 

Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file. 

4. Right-click the certificate store you want to import, and click Install PFX on the context menu. 

5. The Certificate Import Wizard launches. Click Next. 

6. 

In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse. 

7. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next. 

8. On the next page, select where you'd like to store the certificate. Click Next. 

9. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system. 

Q13. - (Topic 5) 

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. 

You need to connect to the projector from your computer. 

What should you do? 

A. From Accessories, click Connect to a Network Projector. 

B. From PowerShell, run the Net Config command. 

C. From Display, click Connect to a projector. 

D. Run the Displayswitch.exe command and select Projector only. 

Answer:

Q14. - (Topic 4) 

You administer a computer that has Windows 7 and Internet Explorer 8 installed. 

You discover that two users have installed a new toolbar in to their browsers. The toolbar is using an unapproved search engine. 

You need to prevent the users from using the unapproved search engine. 

What should you do? 

A. From Program and Features in the Control Panel, uninstall the toolbar. 

B. From Internet Explorer, delete the browsing history and all locally stored files. 

C. Start Internet Explorer in InPrivate Browsing session. 

D. From an elevated command prompt, run %systemdrive%\Program files\Internet Explorer\iecleanup.exe 

Answer:

Q15. - (Topic 1) 

In Windows 7 you can control when users such as kids can login to Windows 7. 

Which of the following best describes where to configure this option? 

A. You cannot choose this feature unless you are connected to a domain. 

B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions. 

C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings. 

D. Go to the Homegroup settings and choose Offline Time Settings. 

Answer:

START 70-680 EXAM