70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(14100 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 4) 

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers arm members of an Active Directory domain. You use a computer named Client1. 

You plan to collect events from Client1 on Server1 by using HTTPS. On Server 1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. 

You discover that no events are being collected. 

You need to ensure that events are forwarded from Client1 to Server1. 

What should you do? 

A. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. 

B. On Server1, create a Windows Event Collector firewall exception for the Domain connection type. 

C. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type. 

D. On Client1, create a Windows Remote Management firewall exception for the Public connection type. 

Answer:

Q2. - (Topic 3) 

You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server 2008 R2. The server requires the use of a pre-shared key. 

You need to create a VPN connection to connect to the network. 

Which type of VPN connection should you create? 

A. IKEv2 

B. L2TP 

C. PPTP 

D. SSTP 

Answer:

Q3. - (Topic 5) 

You have a computer that runs Windows 7. 

The computer's hard disks are configured as shown in the following table. 

You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure. 

What should you do? 

A. Create an Easy Transfer file on a network location. 

B. Use the Backup and Restore tool to create a system image on a network location. 

C. Create a system repair disk. 

D. Create an Easy Transfer file on an external hard disk. 

Answer:

Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image. 

You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up. 

Q4. - (Topic 3) 

You have a computer that contains the folders shows in the following table. 

You accidentally delete the Data1 folder. 

You need to restore the contents of the Data1 folder. The solution must not overwrite any changes to the Data2 folder. 

What should you do? 

A. From Recovery, restore a system restore point. 

B. From the Previous Versions tab of the User1 folder, click Copy. 

C. From the Sharing tab of the User1 folder, modify the Caching settings. 

D. Start the computer and then press F8. Restore the Last Known Good Configuration. 

Answer:

Explanation: Copy from Previous Versions allows the data to be returned to a user detailed location. 

The Previous Versions tab, showing some previous versions of files 

NOT Recovery:Would affect Data2NOT Sharing:Modifying Caching settings wont help.NOT Last Known Good Configuration:Extreme overkill and would affect Data2 

Q5. - (Topic 1) 

Which of the following Windows 7 Editions allows you to join an Active Directory domain? Choose three. 

A. Windows Home Edition 

B. Windows Professional Edition 

C. Windows Ultimate Edition 

D. Windows Enterprise Edition 

Answer: B,C,D 

Q6. HOTSPOT - (Topic 6) 

A manufacturing company has Windows Vista and Windows XP computers. 

You are responsible for upgrading all computers to Windows 7. 

You test the Windows 7 installation on a Windows Vista computer. Early in the installation 

process, you are prompted to choose the "Upgrade" option or the "Custom (Advanced)" installation option. 

You need to determine which installation option is appropriate for the different computers in your company. 

In the table below, identify the characteristics of the Upgrade and Custom installation options. (Make only one selection in each column. This question is worth two points. ) 

Answer:  

Q7. - (Topic 4) 

You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. 

You discover that Windows is unable to install the necessary device drivers for the mobile device. 

You need to ensure that you can synchronize files to the mobile device. 

What should you do? 

A. From WindowsMobilityCenter, click Sync settings. 

B. From Devices and Printers, right-click the device and click Troubleshoot. 

C. From SyncCenter, click Set up new sync partnerships. 

D. From Device Manager, click Scan for hardware changes. 

Answer:

Q8. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 

Answer:

Explanation: 

Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 

Q9. HOTSPOT - (Topic 4) 

You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue? 

Answer:  

Q10. - (Topic 1) 

Your network contains 100 computers that run Windows XP. 

You need to identify which applications installed on all of the computers can run on 

Windows 7. 

You must achieve this goal by using the minimum amount of administrative effort. 

What should you install? 

A. Microsoft Application Compatibility Toolkit (ACT) 

B. Microsoft Assessment and Planning (MAP) Toolkit 

C. Microsoft Deployment Toolkit (MDT) 

D. Windows Automated Installation Kit (AIK) 

Answer:

Explanation: 

The Microsoft. Application Compatibility Toolkit (ACT) 5.6 enables software developers, independent software vendors (ISVs), and IT professionals who work in a corporate environment to determine, before deployment within the organization, whether their applications are compatible with a new version of the Windows. operating system. ACT also enables such individuals to determine how an update to the new version will affect their applications. 

You can use the ACT features to: 

-Verify your application's, device's, and computer's compatibility with a new version of the Windows operating system, including determining your risk assessment. 

-Verify a Windows update's compatibility, including determining your risk assessment. 

-Become involved in the ACT Community, including sharing your application assessment with other ACT users. 

-Test your applications for issues related to User Account Control (UAC) by using the Standard User Analyzer (SUA) tool. 

-Test your Web applications and Web sites for compatibility with new releases and security updates to Internet Explorer., by using the Internet Explorer Compatibility Test Tool. 

Q11. - (Topic 5) 

You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point. You set the startup type of the NAP Agent service to Automatic on the computer. 

You need to complete the configuration of the computer as a NAP client. 

What should you do? 

A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command. 

B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the net command. 

C. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command. 

D. From the NAP Client Configuration console, configure the Health Registration settings. 

Answer:

Q12. - (Topic 1) 

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. 

You need to identify how much space is required to complete the migration. 

What should you do? 

A. On Computer1 run Loadstate c:\store /nocompress 

B. On Computer1 run Scanstate c:\store /nocompress /p 

C. On Computer2 run Loadstate \\computer1\store /nocompress 

D. On Computer2 run Scanstate \\computer1\store /nocompress /p 

Answer:

Explanation: 

ScanState You run ScanState on the source computer during the migration. You must run ScanState.exe on computers running Windows Vista and Windows 7 from an administrative command prompt. When running ScanState on a source computer that has Windows XP installed, you need to run it as a user that is a member of the local administrators group. The following command creates an encrypted store named Mystore on the file share named Migration on the file server named Fileserver that uses the encryption key Mykey: scanstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /o /config:config.xml /encrypt /key:"mykey" Space Estimations for the Migration StoreWhen the ScanState command runs, it will create an .xml file in the path specified. This .xml file includes improved space estimations for the migration store. The following example shows how to create this .xml file: Scanstate.exe C:\MigrationLocation [additional parameters] /p:"C:\MigrationStoreSize.xml" To preserve the functionality of existing applications or scripts that require the previous behavior of USMT, you can use the /p option, without specifying "pathtoafile", in USMT 4.0. If you specify only the /p option, the storage space estimations are created in the same manner as with USMT 3.x releases. User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState. 

Q13. - (Topic 5) 

You administer a computer that has Windows 7 Enterprise installed. 

The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots. 

You need to view a list of all installed device drivers that contain information about the digital signature of the device driver. 

Which should you do? 

A. Run the driverquery.exe /SI command. 

B. Open the System Protection configuration for drive C. 

C. Open Device Manager, show hidden devices, and sort all devices by type. 

D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file. 

Answer:

Q14. - (Topic 3) 

You have a computer that runs Windows 7. 

Windows Backup is configured to store backups on an external drive. 

You create a new NTFS volume on the computer. 

You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups. 

What should you do? 

A. From Backup and Restore, select Change settings. 

B. From Backup and Restore, select Create a system image. 

C. From the System Protection tab, create a restore point. 

D. From the System Protection tab, enable system protection for the new volume. 

Answer:

Explanation: 

Backups are configured and scheduled by using the Backup And Restore console under 

System And Security in Control Panel. 

The Change Settings option is not available unless you have configured a backup schedule 

and performed a backup. 

Q15. - (Topic 1) 

You have a stand-alone computer that runs Windows 7. 

You open Windows Update as shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can manually change the Windows Update settings on the computer. 

What should you do? 

A. Log on to Windows 7 as member of the Administrators group. 

B. From the local Group Policy, modify the Windows Update settings. 

C. Right-click Windows Update and select Run as administrator. 

D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe. 

Answer:

Explanation: 

Configuring Automatic Updates by using local Group Policy 

1. Click Start, and then click Run. 

2. Type gpedit.msc, and then click OK. 

3. Expand Computer Configuration. 

4. Right-click Administrative Templates, and then click Add/Remove Templates. 

5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open. 

6. Click Close. 

7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update. 

START 70-680 EXAM