70-680 Premium Bundle

70-680 Premium Bundle

TS:Windows 7,Configuring Certification Exam

4.5 
(14295 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Microsoft 70-680 Free Practice Questions

Q1. - (Topic 5) 

A computer that runs Windows 7 becomes infected with malware. 

You scan the computer, remove all detected malware components, and restart the computer. 

When you attempt to connect to a financial institution's Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site. 

You need to prevent the computer from being redirected to the potential phishing site. 

What should you do? 

A. Configure the SmartScreen Filter. 

B. Run Ipconfig /flushdns. 

C. Configure InPrivate Browsing. 

D. Modify the hosts file. 

Answer:

Q2. - (Topic 3) 

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer. 

You need to prevent the computer from displaying the username of the last user who logged on. 

What should you do? 

A. From Control Panel, modify the User Profiles settings. 

B. From Control Panel, modify the Personalization settings. 

C. From the local computer policy, add a policy template. 

D. From the local computer policy, modify the local security policy. 

Answer:

Explanation: 

How to Prevent the Last Logged-On User Name from Being Displayed 

1. Click Start and type secpol.msc in the search box. 

2. Press Enter. 

3. Within the Local Security Policy, navigate to Security Settings | Local Policies | Security Options. 

4. In the details pane, scroll through the options and locate Interactive logon: Do not display last user name. 

5. Double click this security option and click Enabled. 

6. Click OK. 

Q3. - (Topic 3) 

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1. 

You need to ensure that User1 and User2 can log on to Computer2. 

What should you do on Computer2? 

A. Enable all user accounts 

B. Modify the default password policy 

C. Modify the Allow log on locally user right 

D. Add User1 and User2 to the local Administrators group 

Answer:

Explanation: 

LoadState is run on the destination computer. You should install all applications that were on the source computer on the destination before you run LoadState. You must run Loadstate. exe on computers running Windows Vista and Windows 7 from an administrative command prompt. To load profile data from an encrypted store named Mystore that is stored on a share named Migration on a file server named Fileserver and which is encrypted with the encryption key Mykey, use this command: loadstate \\fileserver\migration\mystore /i:migapp.xml /i:miguser.xml /decrypt /key:"mykey" 

(local account create) /lac:[Password] Specifies that if a user account is a local (non-domain) account, and it does not exist on the destination computer, USMT will create the account on the destination computer but it will be disabled. To enable the account, you must also use the /lae option. If the /lac option is not specified, any local user accounts that do not already exist on the destination computer will not be migrated. Password is the password for the newly created account. An empty password is used by default. 

Q4. - (Topic 1) 

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. 

Users at the branch office report that it takes several minutes to open large files located in the main office. 

You need to minimize the amount of time it takes for branch office users to open files located in the main office. 

The solution must also reduce the amount of bandwidth used between the two offices. 

What should you do? 

A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. 

B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). 

C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. 

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode. 

Answer:

Explanation: 

Distributed Cache ModeDistributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. The advantage of distributed cache mode is that you can deploy it without having to deploy a server running Windows Server 2008 R2 locally in each branch office. The drawback of Distributed Cache mode is that the contents of the cache available on the branch office LAN depend on which clients are currently online. If a client needs a file that is held in the cache of a computer that is shut down, the client needs to retrieve the file from the host server across the WAN.Hosted Cache ModeHosted Cache mode uses a centralized local cache that hosted on a branch office server running Windows Server 2008 R2. You can enable the hosted cache server functionality on a server running Windows Server 2008 R2 that you use for other functions without a significant impact on performance. This is because if you found that files hosted at another location across the WAN were being accessed so frequently that there was a performance impact, you would use a solution like Distributed File System (DFS) to replicate them to the branch office instead of using BranchCache. The advantage of Hosted Cache mode over Distributed Cache mode is that the cache is centralized and always available. Parts of the distributed cache become unavailable when the clients hosting them shut down.Background Intelligent Transfer Service (BITS)The Background Intelligent Transfer Service (BITS) has two role services: the Compact Server and the IIS Server Extension. The Compact Server is a stand-alone HTTP or HTTPS file server, whereas the IIS Server Extension is an Internet Information Services (IIS) plug-in that requires a server running IIS. IIS Server ExtensionThe BITS IIS Server Extension lets you configure a server that is running IIS to allow BITS clients to perform background, resumable file uploads to IIS virtual directories. On completion of a file upload, the BITS Server can notify a Web application of the newly uploaded file. This allows the application to process the uploaded file. The Web application can then optionally reply to the client responsible for the upload.Compact ServerThe BITS Compact Server is a stand-alone HTTP or HTTPS file server, which allows applications to host files for BITS clients to download, and allows the asynchronous transfer of a limited number of large files between computers.QoS Packet SchedulerThe Quality of Service Packet Scheduler is a Windows platform component that is enabled by default on Windows Vista. and Windows XP computers. It is, however, not enabled by default on Windows 2003 computers. This scheduler is designed to control the IP traffic for various network services, including Real Time Communications traffic. This component must be installed and enabled if the QoS markings described earlier for audio and video traffic are to be implemented by the IP stack. 

Q5. - (Topic 1) 

You have a computer named Computer1 that runs Windows 7. 

You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. 

What should you do? 

A. From Windows Firewall with Advanced Security, create a new rule. 

B. From the local Group Policy, modify the application control policies. 

C. From Windows Firewall, modify the Allowed Programs and Features list. 

D. From Network and Sharing Center, modify the Advanced Sharing settings. 

Answer:

Explanation: 

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, shown in Figure 7-7, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 

Q6. HOTSPOT - (Topic 5) 

You need to uninstall a Windows update from a computer that runs Windows 7. 

Which Control Panel item should you use? (To answer, select the appropriate item in the Control Panel in the answer area.) 

Answer:  

Q7. - (Topic 3) 

You need to create a virtual hard disk (VHD) file that will be used to deploy Windows 7. The solution must minimize the performance impact caused by using a VHD. 

Which type of VHD should you create? 

A. differencing disk 

B. dynamically expanding disk 

C. fixed-size disk 

D. snapshot 

Answer:

Explanation: Typically, you place the VHD on a second internal or external hard disk (although this is not essential). You then specify the VHD size and format settings. Microsoft recommends the default Fixed Size setting, but you can select Dynamic Expanding if you do not want to allocate the disk space. Fixed Size gives better performance and is more suitable in a production environment. 

Q8. - (Topic 5) 

You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. 

You analyze the performance of the computer and discover that one of the processes uses an average of 90 percent of the CPU cores. 

You need to decrease the usage of the CPU cores by the process. 

What should you do? 

A. Run powercfg.exe. 

B. Run the Windows Experience Index. 

C. Configure Event Viewer subscriptions. 

D. Open Task Manager. 

E. Open System Properties, and configure performance settings. 

F. Open System Properties, and configure environment variables. 

G. Open System Properties, and configure user profiles settings. 

H. Open System Properties, and configure the page file settings. 

I. Open Performance Monitor, and configure a Data Collector Set. 

J. Open Performance Monitor, and customize the System Monitor view. 

Answer:

Q9. - (Topic 3) 

You have a computer that runs Windows 7. 

You add a new hard disk drive to the computer and create a new NTFS partition. 

You need to ensure that you can use the Previous Versions feature on the new drive. 

What should you do? 

A. From Disk Management, convert the new disk to a dynamic disk. 

B. From System Properties, configure the System Protection settings. 

C. From System and Security, enable BitLocker Drive Encryption (BitLocker). 

D. From the properties of the new drive, create a share and modify the caching settings. 

Answer:

Explanation: 

System protection might not be turned on for the drive. If system protection is not turned on, Windows can't create previous versions.To turn on system protection: 

1. Click to open System.2. In the left pane, click System protection. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.3. Click the drive, and then click Configure.4. Click Restore system settings and previous versions of files, and then click OK. 

Q10. - (Topic 2) 

You have a computer that runs windows 7. 

The network contains a monitoring server named server1 Computer runs a monitoring service named service1. 

Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1. 

What should you do? 

A. From windows Firewall with Advanced Security, create a predefined rule. 

B. From windows Firewall with Advanced Security, create custom rule. 

C. From the Network and Sharing Center, modify the network location settings. 

D. From the Network and Sharing Center, modify the advanced sharing settings. 

Answer:

Explanation: 

Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 

Q11. - (Topic 1) 

You have a computer that runs Windows 7. The computer connects to the corporate network by using a VPN connection. 

You need to ensure that you can access the Internet when the VPN connection is active. The solution must prevent Internet traffic from being routed through the VPN connection. 

What should you do? 

A. Configure a static DNS server address. 

B. Configure a static IP address and default gateway. 

C. Configure the security settings of the VPN connection. 

D. Configure the advanced TCP/IP settings of the VPN connection. 

Answer:

Explanation: 

To prevent the default route from being created In the properties of the TCP/IP protocol of the dial-up connection object, in the Advanced TCP/IP Settings dialog box, click the General tab, and then clear the Use default gateway on remote network check box. 

Q12. - (Topic 2) 

You have a computer that runs Windows 7. The computer is in a workgroup. 

You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. From Credential Manager, select Back up vault. 

B. From User Accounts, select Create a password reset disk. 

C. From User Accounts, select Manage your file encryption certificates. 

D. From Authorization Manager, modify the Authorization Manager options. 

Answer: B,C 

Explanation: 

Password reset disks It is not unusual for users to forget their passwords to local user accounts from time to time, especially when they use strong passwords. Before the advent of password reset disks, the only way for administrators to restore a forgotten local user account password was to manually reset the user's password. In the process, the following information was lost: E-mail that was encrypted with the user's public key Internet passwords that were saved on the computer Files that the user had encrypted Password reset disks offer another solution to the problem of a forgotten password for a local user account. If users create password reset disks for their local accounts before they forget their passwords, they can reset the passwords without losing valuable data that was lost previously with administrative password resets. When you create a password reset disk, a public key and private key pair are created. The private key is stored on a disk: the password reset disk. The public key encrypts the local user account password. If users forget their passwords, they can insert the password reset disk, which contains the private key, and decrypt the current password. The Forgotten Password Wizard prompts the user for a new password, which is then encrypted with the public key. Data is not lost because, basically, the user is simply changing a password. It is essential that password reset disks be stored in secured locations.Back up your Encryption Certificate 

1. Open User Accounts by clicking the Start button, clicking Control Panel, clicking User Accounts and Family Safety (or clicking User Accounts, if you are connected to a network domain), and then clicking User Accounts. 

2. In the left pane, click Manage your file encryption certificates. 

3. In the Encrypting File System wizard, click Next. 

4. Click Use this certificate, and then click Next. If you need more details to identify the certificate that is listed, click View certificate. If you want to choose a different certificate, click Select certificate, and then click the certificate 

you want to back up. 

5. Click Back up the certificate and key now. 

6. Type or navigate to the location where you want to store the backup. We recommend that you store the backup on removable media such as a disc or USB flash drive. 

7. Type and then confirm a password for the backup file, and then click Next. We recommend that you protect the backup file with a strong password. 

8. Select the I'll update my encrypted files later check box, and then click Next. 

Q13. - (Topic 2) 

You have a computer that runs windows 7. 

The windows experience index displays the subscores in the following. 

Component Subscore 

Processor 6.9 

Memory (RAM) 5.3 

Graphics 3.2 

Gaming graphics 4.1 

Primary hard disk 4.5 

You need to increase the Windows Experience Index base score. 

What should you do? 

A. Add more RAM. 

B. Add a second hard disk. 

C. Upgrade the video adapter. 

D. Upgrade to a faster processor. 

Answer:

Q14. - (Topic 4) 

A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. 

You need to configure the client computers to be BranchCache clients. 

Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Device Manager 

B. Local Users and Groups 

C. the User Account Control Settings Control Panel window 

D. the Group Policy management console 

E. the Services management console 

F. the folder Properties window 

G. the netsh command 

H. the icacls command 

I. share permissions 

Answer: D,G 

Explanation: 

To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode. 

To create a GPO, enable BranchCache, and select the cache mode 

Click Start, point to Administrative Tools, and click Group Policy Management Console. 

Client configuration using netsh 

When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command. 

Q15. - (Topic 1) 

You have a portable computer named Computer1 that runs Windows 7. 

You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. 

You need to configure Computer1 to meet the following requirements: 

. Ensure that cached files from Share1 are encrypted. 

. Ensure that files located in Share1 are available when Server1 is disconnected from the network. 

What should you do? 

A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. 

B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline. 

C. On Computer1, make Share1 available offline and enable encryption of offline files. 

D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption. 

Answer:

Explanation: 

Offline FilesThe Offline Files feature of Windows 7 allows a client to locally cache files 

hosted in shared folders so that they are accessible when the computer is unable to connect directly to the network resource. The Offline Files feature is available to users of the Professional, Enterprise, and Ultimate editions of Windows 7. You can use the Offline Files feature to ensure access when a client computer is out of the office or when a temporary disruption, such as a wide area network (WAN) link failing between a branch office and a head office, blocks access to specially configured shared folders. 

Using Sync CenterYou can use Sync Center to synchronize files, manage offline files, and resolve synchronization conflicts manually. Sync Center is located within the Control Panel or by typing Sync Center into the Search Programs and Files text box on the Start menu. Clicking Manage Offline Files opens the Offline Files. This dialog box is also available using the Offline Files control panel. Using this dialog box, you can disable offline files, view offline files, configure disk usage for offline files, configure encryption for offline files, and configure how often Windows 7 should check for slow network conditions. 

START 70-680 EXAM